Tag: Technology/Internet

18
Feb

How important is managing your IT assets?

If asset management was fun, everyone would be doing it. Managing inventories or counting stock on shelves is not that exciting. Neither is keeping track of your computer systems, software licenses and any other asset found on your computer network. We all know that it is important, especially tracking software compliances; but it never makes it to the top of

Read more

11
Jan

Rogue Security Programs and How You Can Avoid Them

If you think all anti-virus programs you spot are for your protection, you need to change your opinion. There are plenty of rogue security softwares or fake anti-virus programs out there that provide you with little or no protection at all. Also known as scarewares, most of these misleading programs even facilitate the installation of malicious code that they claim

Read more

12
Dec

Microsoft Security Bulletin Summary for December 2012

  Issued: December 12, 2012  As your trusted Microsoft Partner, we would like to share these important security bulletins with you.  The information contained within these security bulletins is vital to maintaining a secure environment for both your computers and your network.  If you have any questions about the security of your business network, please…

26
Nov

A few expensive and collectible PCs

While many people would die for the latest laptops and tablets, there are a few people who would spend millions of dollars for an old PC that doesn’t even boot up. It might sound crazy but there are some collectors …

22
Nov

Businesses With Their Heads “In The Cloud” Have An Advantage

Cloud-based services are rapidly revolutionizing the business world. Although the concept behind the technology isn’t new (web-based e-mail, which has been around for more than a decade, is an everyday example of cloud technology ) the impact is only beginning …

19
Nov

Top Technology Challenges As 2012 Nears It’s End

A tech world without an issue is really impossible to imagine. Although technology makes radical improvements every year and resolves the existing issues it is facing, there is always a new issue in the tech arena. In this article, we …

16
Nov

Apple starts to track its users again with its IFA/IDFA technology

Apple has left no stone unturned in making a grand release of its Apple iPhone 5. There was promotion for the iPhone 5 almost everywhere. However, they haven’t made that much noise about its IFA/IDFA identifier for advertisers’ technology which …

14
Nov

Beware of the Cyber-Grinch – Safe Online Holiday Shopping Tips

Dell security experts provide tips and advice for a safe online shopping experience – More than half of Internet users in Canada shop online to purchase goods and services to the tune of $15.3 billion annually, according to a Statistics …

10
Nov

Canada falls back in adopting cloud computing

It is the age of cloud computing and almost every developed nation has joined in this revolution. Cloud computing is an innovative, cheap and safe way to store your important data and applications. Hence, it has become a popular choice …

30
Oct

Canadian government passes bill that limits privacy on official computers

Even though this may seem like shocking news, people using office computers and network connections have almost no privacy. All their activities and Internet usage can be monitored and also blocked by the network administrators and supervisors.  Although, concerned officials argue that employee monitoring is essential for the safety and security of the company, they…

CONTACT US