Pro Corner

Technology


5 Myths of Cloud Computing

5 Myths of Cloud Computing
Posted in Featured & Networking & Technology on January 2, 2015 , by

Daily, IT personnel are under pressure to do more with less and maximize the return on investment throughout the entire IT infrastructure business process. I see this scenario daily and it puzzles me why business owners  do not invest in the proper IT infrastructure to run their business. After all if the IT infrastructure fails […]

Read More

My first week wearing Google Glass XE12

My first week wearing Google Glass XE12
Posted in Featured & Technology on February 21, 2014 , by

So on my first week of being a Google glass explorer I learned a new word…  the definition of “Glasshole” to be creepy or rude (aka, a “Glasshole”). Respect others and if they have questions about Glass don’t get snappy. Be polite and explain what Glass does and remember, a quick demo can go a […]

Read More

Windows XP’s 6 month “End of Life” deadline

Windows XP’s 6 month “End of Life” deadline
Posted in Networking & Security & Technology on October 29, 2013 , by

Now that we are closing in on November, users of Microsoft’s Windows XP operating system now have six months left to act before Microsoft closes off all support, including Windows updates, to the now 13-year-old operating system on April 8, 2014. What does this exactly mean for consumer and enterprise-level users still using XP? Increased […]

Read More

How the web has turned into a virtual battlefield

How the web has turned into a virtual battlefield
Posted in Featured & Security & Technology on March 29, 2013 , by

A graphical representation of a DDoS-style attack on a target website. The internet is one of the modern world’s most utilized technologies today, with over 2 billion users accessing web content and services via computers and mobile devices every day. It now only makes sense that more and more nefarious individuals and organizations are utilizing […]

Read More

United States Constitution vs. Your Hard Drive

United States Constitution vs. Your Hard Drive
Posted in Featured & Security & Technology on July 14, 2011 , by

Data encryption is not like a wall safe or a key lock that is “physical per say” where we can require or subpoena a key. If we subpoena an individual they can plead the 5 amendment which protects a person’s right for self-incrimination.

Read More

Do they really "Like" me?

Do they really "Like" me?
Posted in Featured & Internet Marketing & Social & Technology & Web Design on May 24, 2011 , by

Have you ever asked yourself what all this craziness over the Facebook “Like” button is about? It seems this one word button is almost everywhere and anywhere. Well it would seem this way for a good reason.

Read More

The Advantages of Using Analytics

The Advantages of Using Analytics
Posted in Featured & Internet Marketing & Technology on March 11, 2011 , by

Whether you are running a personal or business website, knowing as much as you can about your visitors is the most important factor in determining your success. The second one is actually delivering what they need. Web Analytics helps to provide you with the information you need to achieve these goals.

Read More

5 quick ways to use social media to help promote business

5 quick ways to use social media to help promote business
Posted in Featured & Internet Marketing & Social & Technology on March 9, 2011 , by

Social Media is everywhere online and it seems like everyone and their grandmother has some form of presence online through one of the many social media sites available. Social Media has made it possible for anyone anywhere to find out about almost anything online. But how can it be applied to business ?

Read More

Categories

Here are some the categories & topics to help you get around.