Blog

Are Changes Coming to the Tracking Cookie?

While the cookie is not likely to change throughout the entirety of the Internet, Microsoft has some plans in store for it. In fact, ...

8 Courteous Habits For Smartphone Users

Smartphones are a standard in the workplace, personal life, and at all public or private events. The common use of a ...

What to Expect with New Domain Names

Earlier this year, new domain names were announced, ranging from “.cloud” all the way to “.cricket” and “.blog”. If you already ...

The $100 Bill Gets Redesigned, New Security Features Added

In the next few days, the new US $100 bill will begin to circulate as the past bill is phased out. While this is ...

Is Your Business Prepared for a Website Crash?

Even the most stable websites aren’t immune to crashes, especially if they’re targeted by a hacker testing out his skills. However, outages ...

What You Should Know About Cloud Security

In the upcoming fiscal year, the cloud budget could be as much as 30% of the overall IT budget in many businesses. The ...

Privacy Settings for New Facebook Search

If you haven’t heard, Facebook has recently introduced a new type of search the company has deemed “Graph Search”. If you have ...

Almost 3 Million Adobe Accounts Compromised After Hack

Just yesterday, Adobe announced that it had been the target of a successful hacking attempt that put millions of accounts in danger ...

Yahoo Recycled Email Program Faces Security Problem

A few days ago, Yahoo announced that they would roll out a new tool that allowed people to claim accounts that were ...

3 Components in Finding the IT Balance: Business Growth and Technology Management

An informational technology employee or contractor is hired to oversee and manage the technology of your business. This specialized area is critical, but ...