Blog

The Most Anticipated Innovations of 2015

Perhaps one of the greatest things about the rise of high-speed wireless internet connectivity is that the whole world exists as one ...

IT Continues To Struggle with Shadow Apps

The first step in solving a problem that you have is admitting that you have it to begin with. To be able ...

Leverage Tech to Increase Productivity

It has been said over and over, and proven by research and real life experience, that technology can be used to effectively ...

The Problem With Panda Antivirus

If you use Panda’s free antivirus software, you could be in some trouble. There’s a problem with the software in that it ...

DRAM Rowhammer Allows Hackers to Gain Kernel Privileges

Google’s “Project Zero” security initiative is bearing fruit, unearthing security issues we’ve never seen before, in hopes of getting them patched before ...

Business Begins to Adopt Drones

The drones are coming. The FAA has now taken the first step toward making commercial use of drones a viable option. While ...

Protecting Yourself from FREAK

There’s a new SSL security flaw that’s making the news, and as usual, it has the major tech companies scrambling to provide ...

You Need To Build THIS into Your BYOD Policy Now

The great problem with free apps is that they’re often developed by very small companies. That’s not an inherently bad thing, but ...

Are Mobile Payments More Secure Than Credit Cards?

Most people are of the opinion that credit card transactions are fairly secure, in spite of the fact that over the past ...

Energy, Technology, and You

There is a sea change occurring in the area of electricity generation, and whether you realize it or not, whether you think ...