by Tom | May 25, 2018 | Blog
Hundreds of millions of people use wireless Internet connections every day, and as a result, hackers are taking that as a challenge. They are now starting to develop malware that targets people through their routers. Recently, security researchers at Kaspersky Lab...
by Tom | May 23, 2018 | Blog
If you hang out around technology professionals for any period of time, chances are that you’ve heard the word “cache” used before. The word, pronounced cash, is usually heard in the phrase, “clear the cache,” but if you don’t know what this phrase means, how can you...
by Tom | May 21, 2018 | Blog
Today, communications are an important part of business, and with nearly every organization looking to reduce redundancies, a lot of businesses are starting to take advantage of Voice over Internet Protocol (VoIP) solutions, using the resources they already have in...
by Tom | May 18, 2018 | Blog
The notion of artificial intelligence has played out in fiction, on the silver screen, and on the small screen for decades. Instead of having sentient cyborgs that enslave humanity, people are using A.I for our benefit. Today, we take a look at the A.I. of 2018 and...
by Tom | May 16, 2018 | Blog
If you’re like most business users, you rely on email quite a bit to stay apprised of what is going on, as do most of the people you are likely in communication with. As such, you most likely understand that, while most emails require some kind of response or...