Skip to content

What Does End of Life Mean for Windows 7?

Time is up for Windows 7. Users have to move on, one way or another. As of January 14, 2020, Microsoft won’t offer any more support for the operating system. There will be no updates and no security patches. Continuing to use it on the Internet will be like walking through a malaria-infested swamp with…

Read More

Trick or treat: I know your password!

A few months ago, some rather creative hackers came up with a pretty ingenious con.  They realized they could create an email like the one below pretending to have hacked your computer and installed malware that has allowed them to watch you surf the internet and even video what you were doing while surfing the…

Read More
shadowy figure

Gaining Visibility into Shadow IT: The Case of NASA JPL

What comes to your mind when you hear the term ‘Shadow IT?’ For some people, they first think about Ra’s al Ghul’s League of Shadows –formerly referred to as League of Assassins- in the film Batman. This answer is not far from the truth because Shadow IT is an assassin targeting organizations with huge adverse…

Read More
laptop on desk

18 Steps to Improving BYOD Security

BYOD or Bring your own device policies are becoming more and more common, especially for contractors and people who work remotely. Many employees don’t want to have to carry two separate cell phones, do work in their own home on their own desktop, or have one laptop for both work and personal purposes. BYOD also…

Read More
twins sitting on a moon cutout

Digital Duplicates of Your Spaces and Structures with Azure Digital Twins

Many software packages can model a network and the data flowing through its devices. With the Internet of Things, though, this isn’t enough. The devices obtain input from their environment, and their actions affect it. Really modeling their actions requires including their interactions with the physical environment. Microsoft’s Azure Digital Twins addresses this need. It…

Read More
User accessing macbook air

Zero-Day Zoom Webcam Vulnerability targeting Apple Macs announced

Apple Macbooks and iMacs have been long praised for their built-in security features and access restrictions, unfortunately, the software you install on your Macbook, not so much! Yesterday, Jonathan Leitschuh provided a post on Medium, the popular blog aggregation service, about a zero-day vulnerability in Zoom’s Conferencing software the opens your Apple MacOS computer to…

Read More
picture of a large building on a bay

The Ever Changing Importance of Technology in Hospitality

Think about the experience of booking, and staying at, a hotel 10-15 years ago. You may have called to make a reservation. When you got to your room, you may have paid extra for dial-up internet access, but more than likely you were off to your destination after dropping off your stuff. You made sure…

Read More
buildings with clouds

The Ultimate Guide to Getting Started in the Cloud

 Especially to small business owners and technology principals, buzzwords can be both confusing and worrisome. As your competition is embracing big data, machine learning, and predictive analytics, are you ready and willing to keep pace? Cloud computing is one of those buzzwords. You’ve probably heard of it, and might even have a vague idea of what…

Read More
woman staring at various numbers

Azure Functions – An Introduction

Azure Functions is a service from Azure that allows developers to create serverless code. The idea is that you can build apps more quickly with this approach than you’d be able to otherwise. Azure Functions Overview A major part of Azure Service Functions includes the fact that it can process events for you. Essentially, it…

Read More
Scroll To Top