<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Net Neutrality: Internet Censorship Should We Worry?

Posted by Ola Owojori on Wed, Jan 22, 2014

internet censorshipFor those of you who are not aware of Net Neutrality and are questioning why does it concern you; this blog post will answer those questions for you AND questions that you haven’t asked yet.

Read More

Topics: New Technology, Data Security

The Advantages and Disadvantages of Cloud Computing

Posted by Phuong Diep on Thu, Dec 05, 2013

Cloud ComputingIf you own a Macbook or any other device by Apple Inc, then you probably have heard of cloud computing, through their iCloud software. Technology everywhere is slowly beginning to accept cloud computing, the delivery of shared resources, software and information through computers and other devices as a utility over the Internet.  Users are able to access cloud based applications through a web browser or app while their data is held on servers in a remote location. The goal of cloud computing is to give the same or better service and performance versus client software programs installed directly on computers. It allows for faster applications, less maintenance and easier manageability. Like a lot of things, cloud computing isn’t for everyone. So how do you know if it’s the right application for you? Here we discuss the advantages and disadvantages of cloud computing to help you decide!

Read More

Topics: Cloud Computing, Disaster Recovery, Data Security

Hacked! Why it’s All Over the News

Posted by Amanda Furrer on Tue, Mar 12, 2013

These past few months, American security systems seem to have virtually checked out while Chinese hackers are checking in. The hackers’ jobs have even taken a turn to professionalism—hackers, apparently, get weekends off too.

Read More

Topics: Disaster Recovery, Managed Services, Data Security

Continuous Data Protection: A Substitute for Traditional Backup

Posted by Cathie Briggette on Wed, Feb 13, 2013

Data Protection Continuouslyby: Lana Tkachenko

Read More

Topics: Disaster Recovery, Data Security

Fingerprint Technology and Security

Posted by Cam Green on Tue, Nov 20, 2012

Up until about 2 months ago, most people probably thought that fingerprint technology was a lost cause. What was once supposed to be the future of security, seems to have faded off as there hadn’t been many new or groundbreaking developments in the past few years. Other FingerPrintTechthan banks and forensics, can you really name any other places that come to mind immediately that use fingerprint technology? I can’t, and neither can the Google search engine. But that could all come to change in the next 2-3 years. Apple is reportedly planning on countering Samsung’s NFC investment with Fingerprint Technology.

Read More

Topics: Disaster Recovery, Managed Services, New Technology, Data Security, IT Services