Blog

Ecommerce: Squarespace adds new analytics

Even if your business doesn’t see internet-based commerce as a top priority, it’s hard to ignore it as a sizable revenue opportunity regardless of your target market. Content management service (CMS) Squarespace knows exactly how you feel. Long kept as a secondary goal, the popular service will finally make moves to better cater to ecommerce […]

Tools for online reputation marketing

Like the Loch Ness Monster, reputation marketing has long been considered a figure that is shrouded in mystery. Shai Aharony from Redboot Online sums it up as “tools that allow you to analyze, track, monitor and engage online activity, giving you the power to directly respond to customer complaints and turn potentially damaging feedback into […]

Game Over: NBA team losses valuable data

Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every which way. For the Milwaukee Bucks, their on-court and cyber security defense could both use a little practice. Yahoo! Sports reported that the Milwaukee Bucks sent out the names, addresses, Social Security numbers, compensation information and […]

5 ways to get a better ROI from your VoIP phones

If you’re making or receiving VoIP calls from clients you may be sitting on top of a trove of valuable data, and not even know it. Whether you’re still getting accustomed to your new telephony system and its features or you’ve been using it for much longer and are simply unaware of its existence, it’s […]

Seven Microsoft Excel mastery tips

When was the last time you used Microsoft Excel? And no, hovering over the icon doesn’t count. If it’s taking you too long to remember, then it probably is. Digital literacy is an essential part of finding a job these days, in fact taking a look at it further reveals that proficiency in Excel is […]

Learn from this NFL team’s EMR fumble

ESPN recently reported that a laptop containing the medical records of thousands of NFL players was stolen from the car of a Washington Redskins’ trainer. And while the team released a statement saying no health information protected under HIPAA guidelines was at risk, the incident shows that EMRs are vulnerable no matter the size of […]

Creating online communities for businesses

Gamers require an effective strategy to thwart the boss, athletes require constant updates on the latest tournaments to improve performance and businesses require an online community to fully thrive. As the saying goes: ‘What comes easy won’t last, and what lasts won’t come easy’. This is especially true when you embark on building an online […]

Three client level virtualization options

Server-hosted delivery of client applications is hardly new. Whether it was Microsoft Windows Terminal Services back in 1996 or the Remote Desktop Services of today, it has been around for a while now. With client virtualization, boundaries of traditional networks are done away with to allow rich client applications and environments to endpoints. Keep centrally […]

Ransomware to begin self-propagation

One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns. The best way to protect your network from a security threat is to understand it, here’s […]

Windows Phone is calling it quits

Microsoft smartphones have been on their last legs for months, if not years. Though builds and new features held promise in revitalizing the device, Microsoft announced the removal of their phones from the consumer market. While Microsoft maintains its stance on “fully committing” to Windows Phones, the fact that they are selling off their handset […]