Few markets are undergoing such constant and rapid change as the mobile technology market. Smartphones and tablets are fighting to replace laptops as the road-warrior’s tool of choice. Once-dominant players are now fighting for survival. The strength of a particular manufacturer’s hardware now has far...

There are many iPad apps that can service your business but the key to a successful implementation is finding the right apps that fit your business workflow. That's the risk of something like the iPad with its highly diverse app market. Finding the right combination...

 When traveling, it is not unusual for me to see more people with tablet devices in the airport than carrying a laptop.  Tablets like the iPad are lighter, boot up much more quickly and give users access to the essentials like email, presentations and web...

The technology environment in today’s world puts us all at risk.  Threats are coming at us from so many different angles.  We have to protect ourselves and our businesses against viruses, malware, identity theft, phishing scams and more.  There is no single solution to fully...

In an uncertain economy, many businesses are reluctant to make investments in their technology infrastructure.  This is an understandable reaction to today’s business environment, although statistically many businesses do have the cash flow. Our caution would be to keep in mind that if you are...

For our customers running IBM's AIX operating system, IBM has recently announced the end of support (end of life) date for AIX 5.3.  It is April 30, 2012.  This means that those running AIX 5.3 as an operating system will no longer be able to...

As recent events have reminded us, disasters can strike at any time. Earthquakes in Colorado and Virginia as well as the arrival of hurricane season and Hurricane Irene should provide plenty of motivation to review your organizations' disaster preparedness plans.  Even if you already have...

Spam is a problem any business e-mail user deals with on a daily basis. Spam is broadly defined as the use of electronic messaging systems to indiscriminately send unsolicited bulk messages. While e-mail spam is the most common form, there is also instant messaging spam,...

Your business relies on many things to run efficiently on a daily basis. Information and the systems that store that information have become vital to the running of today’s modern business. Protecting that information from disasters is crucial. Consider a complete loss of all of...

In roughly the last decade, Bell Atlantic and GTE formed Verizon, SBC and Bell South formed Cingular, Sprint bought Nextel, AT&T bought Cingular, and Verizon bought Alltel and now AT&T has purchased T Mobile this past week for $39 billion.  The link below talks about...