<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Implementing the iPad as a Business Tool

Posted by Michael Lupacchino on Fri, Jul 09, 2010

iBusiness

Consumers absolutely love the iPad. Music, videos, documents and eBooks are all wrapped up in a sleek and very attractive package. However, can the iPad cross over into business territory or should organizations stick to using Netbooks while on the go?

Read More

Topics: Cloud Computing, Mobile Device Management, Managed Services, New Technology, Apple

Private Cloud or Public Cloud?

Posted by Michael Lupacchino on Fri, Jun 25, 2010

Private or Public Clouds?

IT Wants Them Both!  Cloud Computing Private vs. Public

InfoWorld published an article about a recent survey conducted by the International Data Corporation (IDC). In the survey, IDC asked IT executives if they preferred Private Clouds in comparison to Public Clouds. The results showed that many companies expect to use a combination of both Public and Private Cloud services. The mixed use of Public and Private Clouds is also referred to as a Hybrid Cloud.

Read More

Topics: Cloud Computing, Managed Services

Is Internet Capacity Really Running Out?

Posted by Michael Lupacchino on Wed, Jun 16, 2010

The End Of The Internet?

There has been a lot of buzz from people stating we are reaching the end of the internet's capacity. To be honest, all I can ever think of is the episode of South Park where the internet access starts to dry up. In the episode, the "internet" is actually a giant Linksys router and Kyle reestablishes the internet by resetting the device. Although hilarious, the probability of the internet disappearing is pretty low (notice how I didn't say impossible).

Read More

Topics: Managed Services, New Technology

IT Security Expert Discusses Google Web-Encrypted Search

Posted by Melissa Cocks on Thu, Jun 03, 2010

Google Web Security

Search Privacy

On May 13th, Google announced that it will offer a web-encrypted search feature to increase privacy for end-users. We've asked our computer security expert, Ben Howard, to explain how Google is able to make search more secure with its new web-encrypted search option.

Ben says that Google allows the use of SSL (Secure Socket Layer) to connect a user's browser to their search engine.  The new site, 

Read More

Topics: Disaster Recovery, Managed Services

The 5 Ways Hacker Malware Can Get Into Your Computer Systems and What You Can Do About It

Posted by Cathie Briggette on Thu, May 13, 2010

By: Ryan Hickey
IT Project Manager, NSK Inc

Here are five ways hackers can get into your computer system, and the steps you need to take to stay protected.

1. Peer to Peer networking sites

These include:

• Bit torrent - open source file sharing application
• Kazaa - free music and movie downloads
• Limewire - free music and videos
• Sharezaa - video sharing site.

Read More

Topics: Disaster Recovery, Managed Services, Data Security