732-926-0112
Login
10/14/2014
What you should consider when choosing a password manager

Many security experts feel that passwords are no longer sufficient to keep online accounts safe from hackers, but we're still a long way from widespread adoption of biometrics and alternative methods of authentication. Most of us are stuck with using passwords as the primary keys to our online lives, so we should at least strive […]

Read More
10/13/2014
Data Protection Strategy to Secure Your Business

Data protection is highly relevant among businesses, especially in the growing digital marketplace. Data protection is viewed to include data privacy and security. It involves the collection and use of data and its accessibility for various users within the organizational network. Data protection systems are applied in every data storage infrastructure of organizations to ensure […]

Read More
10/13/2014
Facebook Ads Invade Apps, User Locations

Facebook launches two new data-based tools for advertisers: Audience Network, which places ads in third-party apps, and a tool that taps into your location. Imagine this: You're in the car and use Shazam to tag a song. Up pops an ad, tailored for you based on your Facebook data. Or, you're browsing your Facebook news […]

Read More
10/10/2014
How to Go on Vacation Without Abandoning Your Business

Summer of 2014 found me traveling across the entire United States — I was literally gone more than I was home. My younger son competed in Odyssey of the Mind world finals in Iowa (his team finished fourth!); I took a girls’ trip to an art retreat with a friend at Madeline Island School of […]

Read More
10/09/2014
Can Google Be Trusted? Guide To Protecting Your Online Privacy

Since former NSA analyst Edward Snowden leaked evidence of the security agency’s covert surveillance of millions of Americans to journalist Glenn Greenwald last year, online privacy has become one of the tech sector’s most contentious issues. Few issues in tech are as polarizing as online privacy, but the topic goes far beyond opinions about the […]

Read More
10/09/2014
Coca-Cola gets inspiration for IT automation from its bottling plants

Coca-Cola, the multi billion pound drinks company, today revealed that its automated bottling plants are inspiring its IT operations, particularly in the area of data collection. Michael Connor, the multinational corporation's senior platform architect and the man behind the claim, said Coca-Cola is collecting unprecedented levels data as a result of automation processes that have […]

Read More
10/09/2014
The BadUSB exploit is deadly, but few may be hit

Nine years ago, I created what I believe was the world's first USB worm. By playing around with a USB thumb drive and placing a hidden file on it, I was able to make any computer in which the "infected" USB drive was plugged into automatically spread the file to the host computer, then back […]

Read More
10/09/2014
Four-digit passcodes remain a weak point in iOS 8 data encryption

The strength of Apple's revised encryption scheme in iOS 8 hinges on users choosing a strong passcode or password, which they rarely do, according to a Princeton University fellow. Apple beefed up the encryption in its latest mobile operating system, protecting more sensitive data and employing more protections within hardware to make it harder to […]

Read More
10/08/2014
Healthcare Software Development: We Can Do Better

Yes, users do know what they want from software. And developers must listen. Benjamin Franklin said, "An ounce of prevention is worth a pound of cure." Then why is so much software rework done today, and why do so many software products fail to delight users? In my view, it is because most companies don't […]

Read More
10/08/2014
Microsoft Unveils Windows 10: “One Product Family, One Platform, One Store”

What we expected to be Windows 9 has been gradually revealed through leaks over the past several weeks, but Microsoft has thrown a curveball into the mix with Windows 10. The latest information, revealed during a public Microsoft Windows event, has gone into much detail concerning the nature of the newest incarnation of Windows, including […]

Read More
1 9 10 11 12 13 19
Copyright © 2024 QWERTY CONCEPTS, Inc   |   All Rights Reserved   |   Sitemap   |   Managed IT services provider for New Jersey and New York City businesses