by ray | Feb 7, 2015 | Security
Article by John D. Sutter Maybe you got the email, too? It landed in my inbox at 1:58 a.m. on Thursday. “To Our Members: Safeguarding your personal, financial and medical information is one of our top priorities, and because of that, we have state-of-the-art...
by ray | Feb 6, 2015 | Security, Tech News
You may have worked in the cloud if you’ve ever created and shared a homework document in Google Docs, been on a project team in Basecamp, or used customer relationship management software like Salesforce. Or maybe you regularly dump your photos into Flickr,...
by ray | Feb 5, 2015 | Cloud Tools, Security
Article by Marlene M. Maheu, Ph.D. As computer hard drives are getting overloaded with information, behavioral professionals are beginning to wonder which companies to trust with their client/patient information. Many data storage companies have developed robust...
by ray | Feb 5, 2015 | Cloud Tools
Article by Matt Weinberger Ask any IT administrator about Microsoft’s licensing setup and they’ll hurl up a string of four-letter words that would incur an FCC fine if delivered on television. In a world where everyone wants to use everything —...
by ray | Jan 24, 2015 | Security
Article by Alan Henry Your home network is your fortress. Inside it lies tons of valuable information—unencrypted files, personal, private data, and perhaps most importantly, computers that can be hijacked and used for any purpose. Let’s talk about how you can,...
by ray | Jan 24, 2015 | Tech News
Article by Meghana Keshavan Phenotyping needs to catch up with genotyping: That’s one key move that must be made for us to bring this precision medicine thing to widespread fruition. And to connect these dots most effectively, more robust cloud computing will be a...