blog

November 13, 2013

Movember: Raising Awareness One Mustache at a time

Sporting a mustache has never been more in style. November is prostate cancer awareness month; How a robotic rear end is training doctors to detect early signs of this disease. As some of you may know, it’s Movember, which means […]
November 6, 2013

Businesses beware: Tis the Season to be Scammed

The holiday season is nearly upon us, and as many prepare themselves for festivities and online shopping, cyber thieves are quietly plotting how to rip us off. Businesses beware, tis the season to be scammed Hijacking is one scheme used […]
November 5, 2013

Using the Internet to Cut Costs and Increase Revenue

The internet has forever changed the way we do business. The following tools can help drive sales and lower costs: The Internet is a powerful tool for businesses. The Internet allows businesses to connect with customers and suppliers that would […]
October 24, 2013

Floating an RFP (request for protocol) for IP Telephony

Many organization are implementing an IP telephony solution. A request for protocol invites vendors to submit their proposal for such a solution. After meeting with the short-listed vendors, the next step is to issue the RFP or Request For Proposal. […]
October 17, 2013

Increase Productivity At Work With Unified Communications

Unified communications is the process of integrating existing real-time communication channels such as: instant messaging, video conferencing and IP telephony, with other non-real-time communication channels: Unified communications have grown steadily in the business world over the past few years due […]
October 4, 2013

Top 5 Reasons to Deploy Mobile Device Management Tools

Mobile Device Management is an essential component of BYOD (bring your own device) and can help your business achieve its sales goals. Mobile Device Management (MDM) has become increasingly important for many businesses nowadays. The business landscape has changed, and […]
October 3, 2013

How Secure is The Data on Your Phone?

More and more of us rely on our smart-phones for things like email, downloads etc. But how many of us actually secure our devices? More and more people are using their phones to access the web. With all the recent […]
September 21, 2013

Explaining Processor Use and Load Averages In CentOS Servers

System administrators of CentOS Linux servers need to be aware of the tools at their disposal to measure CPU resource usage. System administrators regularly need to monitor the use of their server’s processors to both keep an eye on load […]
September 17, 2013

National Databases: Is Collecting Student-Specific Data Necessary?

US citizens are concerned over online privacy now more than ever. As students return to school many question should the NSA (National Security Agency) have the right to collect student specific data? US citizens are understandably concerned about their privacy […]
National Databases: Is Collecting Student-Specific Data Necessary?
This website uses cookies to improve your experience. By using this website you agree to our Data Protection Policy.
Read more