by ray | Feb 5, 2015 | Cloud Tools
Article by Matt Weinberger Ask any IT administrator about Microsoft’s licensing setup and they’ll hurl up a string of four-letter words that would incur an FCC fine if delivered on television. In a world where everyone wants to use everything —...
by ray | Jan 24, 2015 | Security
Article by Alan Henry Your home network is your fortress. Inside it lies tons of valuable information—unencrypted files, personal, private data, and perhaps most importantly, computers that can be hijacked and used for any purpose. Let’s talk about how you can,...
by ray | Jan 24, 2015 | Tech News
Article by Meghana Keshavan Phenotyping needs to catch up with genotyping: That’s one key move that must be made for us to bring this precision medicine thing to widespread fruition. And to connect these dots most effectively, more robust cloud computing will be a...
by ray | Jan 23, 2015 | Cloud Tools, General News
Article by Javier Soltero When you’re running a business, you need to get things done no matter where you are. Say you’re onsite with a vendor and need to send a quick update to your team back at the office, or perhaps you bump into a potential client at Starbucks and...
by ray | Jan 19, 2015 | General News, Security, Wordpress
Article by Larry Seltzer For some time WordPress, the popular blogging platform, has been one of the major attack target platforms on the web. A compromised site can deliver malware to users and be used to sell illicit goods, among other nefarious uses. Some users are...
by ray | Jan 19, 2015 | General News, Security
Article by Steve Herrod former CTO and SVP of R&D of VMware As we bear witness to the aftermath of major attacks this year against the likes of Target, Home Depot, Neiman Marcus and most recently, Sony, it becomes clear that we are entering an entirely new “war”...