by ray | Feb 5, 2015 | Cloud Tools, Security
Article by Marlene M. Maheu, Ph.D. As computer hard drives are getting overloaded with information, behavioral professionals are beginning to wonder which companies to trust with their client/patient information. Many data storage companies have developed robust...
by ray | Feb 5, 2015 | Cloud Tools
Article by Matt Weinberger Ask any IT administrator about Microsoft’s licensing setup and they’ll hurl up a string of four-letter words that would incur an FCC fine if delivered on television. In a world where everyone wants to use everything —...
by ray | Feb 5, 2015 | Google, Google Workspace
Article by Prajesh Parekh When we discover something amazing – whether it’s a new local coffee shop or a tool that improves the way we work – we want to share it with people we know so they can also benefit. For those of us who use Google Apps, the ability to access...
by ray | Feb 5, 2015 | General News
Article by James O’Toole   Amazon may be the world’s most ambitious company. Not content to dominate the book industry, the so-called “Everything Store” has branched out into an astonishing variety of businesses, many of which you may not be...
by ray | Jan 24, 2015 | Security
Article by Alan Henry Your home network is your fortress. Inside it lies tons of valuable information—unencrypted files, personal, private data, and perhaps most importantly, computers that can be hijacked and used for any purpose. Let’s talk about how you can,...