Why business-class PCs are a smart investment
used with permission from HP Technology at Work Think back to the last time you bought a new PC or laptop for your business. Did you approach the purchase the same way you would for a personal device? And if you had a problem, were you satisfied with the level of service you received? Many […]
Analytics And The Power of Decisions
A great way to explain the analytics maturity and value curve is to use the idea of descriptive, predictive and prescriptive analytics. Analytics consultants and thought leaders love to frame the field in these terms, if for no other reason than to give a broad, important topic some structure. Briefly, let me define these concepts: […]
Encryption: How To and Why It’s Important
used with permission from Norton by Symantec by Nadia Kovacs Encryption is the process of protecting personal data, often with a form of “secret code,” so that it cannot be read by anyone who doesn’t have the code key. Today, huge amounts of personal information are managed online, via computer applications, and stored in the […]
Business after the EMV liability shift
used with permission from HP Technology at Work What is EMV chip card technology? Is it really more secure than magnetic stripe technology? Is compliance worth the cost of upgrading? It’s been over a month since the “EMV liability shift” went into effect in the U.S. on October 1, 2015, but many businesses still have […]
Small Business, Big Data: How to use data to spot business trends
“Big data isn’t just for the big guys,” says small-business mentor Rieva Lesonsky. “The immense volumes of information available to anyone can level the playing field for smaller businesses.” Businesses can use this data to help predict customer behavior, find inefficiencies in their operations, and analyze marketing campaigns. “There’s an insane amount of information available […]
A Preview of Windows 10
Windows 10 is the next generation of Microsoft’s device OS that adapts to the devices you’re on and what you’re trying to get done, with a consistent, familiar, and compatible experience that enables you to be more productive. Future Features Here is a quick introduction to the first highlighted key features of Windows 10 that […]
What Is Spear Phishing?
used with permission from Norton by Symantec by Nadia Kovacs Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for your password or other private information, spear phishing takes this […]
Seasonal Changes Present Ideal Time to Review Emergency Preparedness
used with permission from SBA.gov by Bridget Weston Pollack As summer turns to fall, it’s easy to get caught up in seasonal activities like choosing Halloween costumes, picking apples and pumpkins, or for small business, even getting ready for the hustle and bustle of the holiday season. But if a disaster struck your business, would […]
Hurricanes, floods and earthquakes: How to keep data safe
used with permission from Microsoft For Your Business If your data lives with you on-site, it’s vulnerable to natural disasters. Keeping your data in the cloud, or using the cloud as a backup, helps protect your data from local events. Most cloud services offer geo-redundant data centers. This means that they back up your data […]
Dictate Instead of Typing in Office 365 Apps
Did you know that in many Office 365 applications you can dictate text instead of typing it? You may find this useful, especially if you need to respond to an email message and your hands aren’t free, or if you want to brainstorm out loud and capture your thoughts without taking notes by hand. First […]
How to Detect Malware Symptoms
used with permission from Microsoft Safety & Security Center If your computer starts to behave strangely, you might be experiencing spyware symptoms or have other unwanted software installed on your computer. Here are a few tips on how to detect malicious software: I see pop-up advertisements all the time. Some unwanted software will bombard you with […]
Crash course: Computer memory
used with permission from HP Technology at Work There are dizzying amounts of memory types in modern computer devices, from DDR SDRAM to L3 caches. And for many of us, understanding all the nuances of computer memory is a bit like understanding how the catalytic converter in your car works: It might be nice to […]