Tag: information technology

Stanbridge College Recognized as One of America’s Best Technical Colleges for the Second Consecutive Year

Stanbridge College Recognized as One of America’s Best Technical Colleges for the Second Consecutive Year

Stanbridge College in Irvine, California, has been recognized as one of America’s Best Technical Colleges ® for the second consecutive year, based upon the student loan default rate for the Federal Family Education Loan (FFEL) Program and the William D. Ford Federal Direct Loan Programs compiled by the U.S. Department of Education. Default Rates, By […]

Read the full article.

New Occupational Therapy Study: Brain Injury Patients Improve Memory with Apps and Smartphones

New Occupational Therapy Study: Brain Injury Patients Improve Memory with Apps and Smartphones

According to a new study in Australia, occupational therapists have found that portable touch-screen technology via smartphones and etablets is able to help patients with traumatic brain injuries remember daily tasks better than writing down notes in diaries. Researchers believed this was due to a more comfortable or “hip” feeling of using technology in addition […]

Read the full article.

IT Projected to have greatest impact on Healthcare Worker Shortage

IT Projected to have greatest impact on Healthcare Worker Shortage

A recent survey at ASQ of 475 healthcare professionals revealed the greatest burden is to be felt by Primary Care Physicians and Nurses, when staffing shortages worsen in 2014 as the healthcare reform law kicks in and more baby-boomers become Medicare-aged.  Healthcare IT systems (especially Electronic Medical Records (EMRs) were viewed as key to prevent […]

Read the full article.

Enterprise Mac networks face crippling exploits

Enterprise Mac networks face crippling exploits

Mac OS has had a veneer of invulnerability for quite a while, and new releases such as OS X Lion have improved security features. Many users do not even bother to install anti-malware software on their Macs. Whether OS X is truly a more secure operating system than its competitors is in question, however. At […]

Read the full article.

How Does Cable Broadband Work?

How Does Cable Broadband Work?

[seotool] Ars Technica has an easy to understand article revealing how a one-way technology was converted to a bi-directional networking system through the magic of DOCSIS.  This is a must-read for any tech supporting SOHO or SMB networks using cable. Visit Stanbridge College to learn about how you can pursue a career in Information Technology. […]

Read the full article.

You need more than just technology

You need more than just technology

Spear phishing is targeted phishing.  A user receives the standard email containing a link to a fake web site purporting to be legitimate.  The website has input boxes to entice users into voluntarily giving up personal/corporate information and the added bonus of only sending the emails to users of the legitimate web site.  PhishMe, a […]

Read the full article.

No excuses: tips for cleaning screens

No excuses: tips for cleaning screens

Do you keep your screens clean? Or can you write in the dust on your laptop screen? From tablets to smart phones to LCDs and projection screens, we have to set up, manage, and troubleshoot more and more screens at work and in our home. However, screens—especially touch screens—are subject to a lot of grime. […]

Read the full article.

Booting the Unbootable

Booting the Unbootable

Just about everyone has experienced a hard drive failure.  What recovery methods are your old standbys? In an article on TechRepublic, Jack Wallen discusses a few strategies for recovering unbootable hard drives, including booting from a restore disk and using a Linux live CD.  A Linux live CD is definitely something that you should have […]

Read the full article.

Using Personal Network Devices at Work

Using Personal Network Devices at Work

An interesting article in the Wall Street Journal raises many questions about allowing/encouraging employees to use their own personal devices to perform necessary work functions, including security questions about lost phones/laptops, wiping devices if reported stolen (including wiping the employee’s personal information, too), and cost questions for devices used for both personal and work reasons.  […]

Read the full article.

Conan the Destroyer… of hard drives?

Conan the Destroyer… of hard drives?

While we usually dread the loss of access to our data on a drive, occasionally we need to ensure the data is no longer accessible by anyone – which either involves destroying the data or the physical drive itself.  Tech Republic has five tips on removing access to data on a drive that will no […]

Read the full article.