Blog

Early adopters share iPad Pro feedback

Early adopters share iPad Pro feedback

People love websites like TripAdvisor, Yelp and Angie’s List for a reason: feedback from real customers is invaluable when making a purchase decision. When it comes to Apple’s iPad Pro, you may’ve had some difficulty tracking down what actual users think about the tablet as it’s still a new technology.

Why Peter Pan’s cloud migration would thrive

Why Peter Pan’s cloud migration would thrive

Think happy thoughts. Peter Pan knew the power of positive thinking more than any of us, which is why if he had a business today it would have likely been a great candidate for cloud technology. You see, half the battle when adapting new IT, whether it’s the cloud or managed services, is going in with the right attitude.

Aspects of virtualization: licenses

Aspects of virtualization: licenses

Software developers make a profit by selling us the best product they can create. When selling pieces of their software in bulk they offer licensing packages to businesses so you don’t have to buy 100 copies of the same CD. Simple enough, right? Well, now that an increasing amount of services and tools are moving into the cloud it’s a lot harder to track how many licenses you’ll need and how much they’ll cost.

Engage your audience with Google Slides

2016May24_GoogleApps_CPresentations no longer have to be one-way transactions where presenters spoon feed information to participants. Until now, slideshow software didn’t offer a lot of opportunities for back-and-forth communication with your audience, leaving you to facilitate Q&A by yourself.

5 tricks for thwarting VoIP threats

5 tricks for thwarting VoIP threats

The VoIP market continues to grow and doesn’t show any signs of stopping. As its use becomes more widespread, so too do the security threats against it. Although these type of attacks haven’t received as much media attention as ransomware and phishing, they’re no less dangerous or damaging to your SMB. Let’s examine 5 five useful tips for protecting your VoIP network.

How business continuity plans can fail

How business continuity plans can fail

Your service provider, who you have tasked with looking after your company’s IT, has kept your business up and running for the past 10 years. Usually, that kind of longevity in developing continuity plans has resulted to some providers overlooking or underestimating certain issues.

Why you should be excited about Android 6.0

Why you should be excited about Android 6.0

If Google intended to build the hype for Android 6.0 by announcing its codename instead of the official one, then they did an excellent job. Promising “the sweetest, smartest Android version yet”, Google has fulfilled that promise with the Marshmallow update.

Are your site’s images hiding an attack?

Are your site’s images hiding an attack?

As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should be concerned about from a security standpoint.

A more secure cloud-based Microsoft Office

A more secure cloud-based Microsoft Office

Privacy and security concerns can derail a lot of great software ideas — but Microsoft is determined not to let that happen to their browser-based Office Online services. Last week, the software giant announced that their cloud-based versions of Office would be available to be hosted locally, wooing over security skeptics.

7 Twitter tactics to get more retweets

7 Twitter tactics to get more retweets

Managing your company’s Twitter account can be tricky. You have a lot of brilliant things to say in under 140 characters but the problem is getting more eyes on your tweets. What’s worse is that there are other companies competing with you to grab that attention.