Technology Basics: Read-Only
Technology Basics: Read-Only In your time dealing with files and folders on computers, you may have encountered some that have been marked as “read-only.” What
Cleaning Up a Server Room Mess
Cleaning Up a Server Room Mess If you’ve ever been in the server closet at your place of work, chances are you’ve seen a tangled
How Are Your Protecting Your Collaborative Data?
How Are Your Protecting Your Collaborative Data? As the cloud has increased in popularity, companies have moved a lot of their computing off of their
Could Your Business Benefit from E-Commerce?
Could Your Business Benefit from E-Commerce? Commerce has been fully embraced by the Internet, with online stores slowly phasing out many brick-and-mortar establishments. While you
Phishing for Gift Cards
Phishing for Gift Cards Yesterday, the email shown below was sent to Ashton’s “security alert” distribution list. The topic is the recent spate of email
Tip of the Week: How to Speed Up a Computer
Tip of the Week: How to Speed Up a Computer When a computer is new, it seems to blaze through tasks at unbelievable speeds… but
Vendor-Caused Headaches Are Not Necessary
Vendor-Caused Headaches Are Not Necessary You provide a good or service to your clients, and therefore, could be considered a vendor to them. Similarly, your
Are Medical Practices Taking Advantage of Cloud-Based EMR?
Are Medical Practices Taking Advantage of Cloud-Based EMR? In today’s medical field, technology is a big player. With regulations dictating that even independent practices attempt
Tip of the Week: Options to Secure Your Email Messages
Tip of the Week: Options to Secure Your Email Messages Due to the popularity of email in the business world, it’s an extremely popular method