Our Blog

Why consider disaster recovery for 2017

Why consider disaster recovery for 2017

The new year is well upon us, and with it comes an equally new IT budget. Judging by the advancements in computing technology, many 2017 business wish lists probably include powerful onsite servers, workstations, and the Internet of Things. But as tempting as these purchases may be, it’s important that you don’t dismiss an old yet essential IT resolution: disaster recovery.

Facebook’s group voice calling

Facebook’s group voice calling

“What’s your Facebook name?” is not a question you’re often asked when someone needs your contact details. In the first place, Facebook messaging isn’t everyone’s voice call app of choice, especially for group conversations. As of now, Skype rules that arena, especially for business communications.

The state of web services in 2017

The state of web services in 2017

It’s a new year, and it’s time to start thinking about what information technology will look like in 2017. That could mean anything from forecasting the costs of adopting new technology to upgrading your products to better integrate with new trends.

Guide to large-scale AWS cloud migration

Guide to large-scale AWS cloud migration

We’ll just go ahead and say it: cloud migration is a smart business move and we highly recommended it. The potential for greater efficiency, more manageable storage capacity, and cost savings are all but guaranteed. Virtualization, however, is not a walk in the clouds.

New Office 365 updates for collaboration

New Office 365 updates for collaboration

Every now and then we all need a little help, especially in today’s digital era. To keep up with the competition, companies are gearing up, especially in the IT department. With the help of cloud computing technology, Office 365 is a productivity and collaboration-enhancing software that is changing the way small- and medium-sized businesses operate.

Ransomware demands more victims for freedom

Ransomware demands more victims for freedom

Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of their friends for a chance to rid their own computers of the virus. In cyber security this level of diabolical blackmail represents a new and scary trend for hackers.

HTML5 trumps Flash in Google Chrome

HTML5 trumps Flash in Google Chrome

Google Chrome is following through with a game plan it announced in February of last year. In an effort to punish slow-loading or lagging sites that use Flash, a web component known to take up resources and memory, Google’s browser will make a newer, faster player the default.

AWS to launch “Glue” service

AWS to launch “Glue” service

Many businesses and enterprises have long struggled with the drudgery and difficulty that is data analysis — especially data analysis in a cloud-based system. AWS (Amazon Web Services) may have just the solution to that problem. A new app, known as “Glue,” offers the opportunity for businesses to clean up data to help analytics run more smoothly.

Containers Vs. VMs: performance variations

Containers Vs. VMs: performance variations

Virtual containers have incrementally increased the ability of users to create portable, self-contained kernels of information and applications since the technology first appeared in the early 2000s. Now, containers are one of the biggest data trends of the decade — some say at the expense of the virtual machine (VM) technology that preceded them.

Yahoo was hacked but you do not have to be

Yahoo was hacked but you do not have to be

Hello everyone! I’m Derek and I’m here to talk about everyone’s favorite part about using a computer. Passwords! We have to come up with new ones all the time, and they just keep getting more and more complex. Why do we need so many passwords, and why is it important to take it seriously?

While passwords are a vital component of system security, they can be cracked or broken relatively easily.