by Joseph Forbes | Sep 17, 2017 | DATA, HARDWARE, SECURITY, Technical Support, Technicals
Whether you’re managing disaster preparation activities for a small business or a large corporation, you need to plan for natural disasters because, as we all know, information technology and water don’t mix well. Let’s go over some basic steps...
by Joseph Forbes | Sep 9, 2017 | Blog Entry, DATA, EDUCATION, HARDWARE, REVIEWS, Technicals
So, at this point it is hard to say that current quantum computers (well more like chips) have integrated within them RAM (random access memory), ROM (read only memory), hard drives (another memory component), and buses or data lines — but there are developments in...
by Joseph Forbes | Sep 2, 2017 | Blog Entry, INTERNET, KnowledgeBase (KB), SECURITY, SOFTWARE, Technicals
All Windows computers include features that protect the operating system from hackers, viruses, and various types of malware. There are also protections in place to prevent mishaps that are brought on by the users themselves, such as the unintentional installation of...
by Joseph Forbes | Sep 2, 2017 | Blog Entry, DATA, Data Recovery, HARDWARE, KnowledgeBase (KB), SECURITY, Technical Support, Technicals
Whether you’re a home PC user or a network administrator, you always need a plan for when the unexpected happens to your computers and/or network. A Disaster Recovery Plan (DRP) is essential in helping to ensure that you don’t get fired after a server gets...
by Joseph Forbes | Aug 31, 2017 | Blog Entry, KnowledgeBase (KB), REVIEWS, Technicals
The Return The Windows 10 Start menu. Without a doubt, the Windows 10 Start menu is the most talked-about, most-requested, and most delightful part of Microsoft’s newest operating system. Its return was undoubtedly the cornerstone of Microsoft’s plans for...
by Joseph Forbes | May 31, 2017 | Blog Entry, Data Recovery, HACKING, INTERNET, KnowledgeBase (KB), Malware Reports, Microsoft's Malware Protection Center, SECURITY, SOFTWARE, Technicals
Ransomware cyber attacks are quickly becoming the preferred method of attack by cybercriminals. WannaCry, the latest global incident, is particularly damaging because it is also a worm—not just a ransomware program. As a result, it looks for other computers to spread...