Tag: technology

Web malware detection increasingly difficult

Web malware detection increasingly difficult

Google recently published a report based on its research into identifying malicious websites. The company routinely flags malicious websites as part of its attempts to warn search engine users of potential dangers, but this report suggests that hackers are using new methods to avoid flagging. Many methods exist to discover malware, and the report dissects […]

Read the full article.

Windows 8 Cloud Strategy – Will it prevent piracy or alienate users?

Windows 8 Cloud Strategy – Will it prevent piracy or alienate users?

In its next OS launch, Microsoft is likely taking advantage of cloud technology to stymie attempts at piracy. Windows 8 will not only change from product keys checked against a simple .txt file on the install disk; online authentication will be mandatory. Part of the operating system might not even be available until the OS […]

Read the full article.

Mozilla joins the mobile OS party

Amidst competitors such as Google’s Chrome OS, Apple’s iOS, Microsoft’s Windows Phone 7, and various flavors of Linux, Mozilla is diving into the mobile OS market with its Boot to Gecko or “B2G” operating system.  Designed for quick booting, ease of taking your settings with you across devices, and optimized for web browsing, mobile operating […]

Read the full article.

Technology’s promise is not a panacea

Technology’s promise is not a panacea

Improvements in healthcare technology are often met with high praise, but a recent presentation by Marge Funk, RN and nursing researcher at Yale-New Haven Hospital suggests that nurses maintain their caution—and common sense—when adopting new techniques and technologies. When approaching technology, Funk advocates four guidelines to follow. Use technology appropriately. Just because a new technology […]

Read the full article.

Migration from Exchange to Google Apps Frustrating, Satisfying

Migration from Exchange to Google Apps Frustrating, Satisfying

Paul Venezia, writing in Network World, details some of the decision making issues, human factors, and potential outcomes of a corporate switch from an Exchange-based solution to Google’s cloud-based system.  Financially, the process was a success; however, it was not an easy transfer due to Google’s lack of support and need for an in-depth understanding of […]

Read the full article.

Security is not an option

Security is not an option

In light of a recent multitude of security failures, service provider security is a hot topic.  While many companies purport to have excellent security features, many of these features are hidden behind “opt-in” dialogues and fees.  HTTPS encryption is an oft-used method of protecting network data, but many websites do not encrypt data.  Encryption is […]

Read the full article.

New Occupational Therapy Study: Brain Injury Patients Improve Memory with Apps and Smartphones

New Occupational Therapy Study: Brain Injury Patients Improve Memory with Apps and Smartphones

According to a new study in Australia, occupational therapists have found that portable touch-screen technology via smartphones and etablets is able to help patients with traumatic brain injuries remember daily tasks better than writing down notes in diaries. Researchers believed this was due to a more comfortable or “hip” feeling of using technology in addition […]

Read the full article.

IT Projected to have greatest impact on Healthcare Worker Shortage

IT Projected to have greatest impact on Healthcare Worker Shortage

A recent survey at ASQ of 475 healthcare professionals revealed the greatest burden is to be felt by Primary Care Physicians and Nurses, when staffing shortages worsen in 2014 as the healthcare reform law kicks in and more baby-boomers become Medicare-aged.  Healthcare IT systems (especially Electronic Medical Records (EMRs) were viewed as key to prevent […]

Read the full article.

Enterprise Mac networks face crippling exploits

Enterprise Mac networks face crippling exploits

Mac OS has had a veneer of invulnerability for quite a while, and new releases such as OS X Lion have improved security features. Many users do not even bother to install anti-malware software on their Macs. Whether OS X is truly a more secure operating system than its competitors is in question, however. At […]

Read the full article.

How Does Cable Broadband Work?

How Does Cable Broadband Work?

[seotool] Ars Technica has an easy to understand article revealing how a one-way technology was converted to a bi-directional networking system through the magic of DOCSIS.  This is a must-read for any tech supporting SOHO or SMB networks using cable. Visit Stanbridge College to learn about how you can pursue a career in Information Technology. […]

Read the full article.