Securely Wiping Phones or Computers

People really value their cellphones and devices.

A survey conducted by Lookout and IDG Research found that when phones are lost or stolen, victims will go to great lengths to get them back. Half of the victims would pay $500 and one-third would pay $1,000 to get them back. Two-thirds of theft victims also express willingness to put themselves at physical risk to regain their devices.

It’s not the devices themselves that are so valuable, but the data stored on them. Not all the data on smartphones is valuable to anyone but the owner, but some is. It is important to securely wipe phone or computer personal content when you sell or abandon your devices. It can be the very outline needed for very convincing identity theft or direct meddling in such things as the owner’s bank account or even his or her personal relationships. Continue Reading

How to Choose: VoIP vs Traditional Phone System

Innovation is what begins the cycle of technological evolution. Consider the telephone. Supposedly, Alexander Graham Bell made the first successful telephone call on March 10, 1876 and cited it in his laboratory notebook. This thought usually instills an image of a bearded man using a rotary dialed phone with a separate earpiece for listening and mouthpiece for speaking. This invention went on to many different incarnations over the next century and a half roughly including a unified headset for listening and talking, push buttons, and even cordless technology. Continue Reading

  • 11/14/2016
  • IT

Battery Backup or Surge Protector

Computing equipment likes a nice, steady flow of current. Sudden overvoltages can damage or destroy a computer. These can come from a lightning strike, a fallen tree shorting the power lines, a squirrel in a transformer, or just a poor-quality power grid.

Undervoltages are bad too. They most often come from brownouts when demand on the power grid is high. When the outlet isn’t delivering enough voltage, power supplies have to draw more current to compensate, stressing them and possibly causing long-term damage. Continue Reading

  • 11/03/2016
  • IT

The Importance of IT/Web Usage Policies

In the business world, not only is technology one of the most important factors, but its usage has also substantially grown over the years. Data can be stored and accessed much easier, people are more dependent on their mobile devices in the workplace, and Internet access has become all too common. In fact, most (if not all) businesses in this day and age wouldn’t even be able to function if it wasn’t for access to the World Wide Web. Through the usage of Internet, you can reach out to your customers easier, use social media platforms to further your company’s goals, and even collaborate with business partners. With that said, constant use of the World Wide Web can also be a cause for concern in the workplace. If you don’t set some ground rules as a business owner, you may find your employees abusing their privileges and even visiting the wrong websites. When it comes to IT/web usage policies in the workplace, what are some things to keep in mind, especially for your employees? Here is what to consider.  Continue Reading

The Role of People in Man-Machine Process

Until AI reaches level 2, people will be part of processes. The thought that frightens so many people is that computers will replace humans. The United States National Science Foundation predicts a somewhat different scenario. They predict something they call “network-enhanced telepathy.” Based on progress in recent research they posit a kind of digital mind meld. Sending thoughts over the internet, they say, would be practical by the 2020s. Continue Reading

  • 10/14/2016
  • IT

Which Is Right For Your Business: Fiber, Copper Or Standard Cable?

Although there are really only three main choices for a wired internet connection for businesses, the process of figuring out which is best for you can nevertheless be very confusing. That’s mostly because a “cable” connection can mean different things depending on where you are located. Just about all cable companies have fiber optic cable in their systems, but not all will run it directly to your business. Continue Reading

  • 09/30/2016
  • IT

Understanding POP, IMAP, Exchange, and Webmail

When you set up an email account, you’re likely to see a confusing choice of protocols. There are four main ways to receive email on your computer. One of them — webmail — is obviously different and relatively easy to understand. The other three — POP, IMAP, and MAPI (Exchange) — require a bit more explaining. Here’s a quick overview of what they’re all about, without getting too deep into technical details. Continue Reading

  • 09/23/2016
  • IT
1 2 3 28