How to make a secure password

Knock know, who’s there? A hacker, maybe not, maybe your password is just that ‘password.’  Let’s break this down a bit. Identification and authentication are what you use to access your favorite site such as your banking establishment or shopping site....

How To Catch a Thief

Unfortunately, video surveillance doesn’t deter individuals from snatching a handbag from a counter or walking off with an early birthday gift, courtesy of your bottom line.  The reason for this could be that video still shots that you see on the internet or...
What is the Cloud?

What is the Cloud?

In the IT (information technology) world, companies are moving toward more cost-effective ways to meet the needs of their customers. One way of accomplishing this is through the world of ‘the cloud’. So, what is the ‘cloud’ or cloud computing? The term itself implies...

VOIP and Hosted Communications in a Nutshell

Voice Over Internet Protocol, also known as VOIP, means that your phones use an internet connection rather than a copper wire going to the phone pole. It also means that you do not need to invest in expensive hardware that comes with an office phone system. This...