What are the real costs of Cloud Computing for business across Australia? Our Australian Cloud Computing specialists recently came across an interesting article written by security specialists, Symantec on avoiding the hidden costs of the cloud. In the article, Symantec shares research showing that while the cloud offers significant advantages there are some elements of...
Twitter makes the news once again. Another reminder about the vulnerabilities of cloud services and why it is so critically important that businesses maintain sound IT security practices. Late in January, Twitter suffered down time causing users of the popular social media service to go through some pretty serious withdrawal. However, this latest security breach...
For the second time in January, Twitterholics awoke on January 31 to the famous whale. Twitter was down yet again. When Twitter goes down, it is not life or death. The world will continue to spin on its axis and business will continue. Twitter’s outage will not bring your business to a grinding halt. However...
Research in Motion is no more – this announcement hit the Canadian Press this week. Canada’s next Nortel? Not this time, although headlines around the world shouted the words – Research in Motion is gone. It doesn’t mean that the Canadian tech giant has closed their doors. During the BlackBerry 10 launch on January 30,...
Kevin Priddle frequently writes articles for the “IT in Canada” website. Kevin is a respected leader in the Canadian IT landscape. This week when we stumbled upon Kevin’s interview with Kaspersky Lab’s VP Canadian Sales, Kevin Krempulec, we paid attention to what they see happening with Information Technology in 2013. Priddle reports that IT security...
US Homeland Security is issuing another IT security warning for business and home computer users on January 29, 2013 urging computer users to disable a common networking technology feature. Researchers have warned Homeland Security that hackers have the potential to exploit flaws in tens of millions of devices. The US Government’s Computer Emergency Readiness Team...
The world is shifting at a rapid pace and how industry uses software is evolving. Just a few years ago, we used to pay for a software product or license and we were good to go. But that is all changing. Microsoft announced recently their Office 365 Home Premium service which is one of these...
Did you hear about this? A software developer thought that he would outsource his own job to China allowing him time to surf the web and shop online. While workers in China were taking on his duties for about one fifth of his six figure salary, this George Costanza-type worker goofed off throughout the day....
A Montreal computer science student was expelled recently for finding IT security holes in the school’s student portal, exposing the confidential records of over 250,000 students attending Dawson College. Hamed Al-Khabaz was working on creating a mobile application for students to have easier access to their school accounts. As he worked on his mobile application...
The headaches surrounding the most recent US Homeland Security warning surrounding Java 7 are not going away for Oracle and users of Java. This leaves computer users scratching their heads on what they should do today to protect their computers …
CardMunch is a handy iPhone app that will enable you to take a picture of a business card and then all the info is inputted into your phone. You may have tried some of the dozens of business card OCR …
The business community is dotted with many outsourced IT support companies. Many of these choices offer services your business can immediately use to help solve your latest technical challenge. But is technology acumen enough when outsourcing your IT support? For …