X

Blog

About Us / Blog
Technology News

How can the small business owner in a Hurricane zone benefit from Azure, in a big way?

Azure during Hurricane season

  • 14 July 2015
  • Author: Anonym
  • Number of views: 2027
  • 0 Comments
IaaS, or Infrastructure as a Service, is the industry term for basically running your network via a service model, such as what we have all come to know as the cloud. So rather than purchase server hardware, pay someone to maintain this hardware along with the software that runs on it, keep up with warranties, and replace all of that in five years, you run some or all of the applications that you needed that hardware and software for in the cloud and pay a much smaller monthly or yearly fee as opposed to a large upfront cost.

Windows Server Virtual Machine

Watch the video on how to create a Windows Server Virtual Machine

  • 8 July 2015
  • Author: Anonym
  • Number of views: 2611
  • 0 Comments
Iaas or Infrastructure as a Service, is what it's called to run virtual systems, servers just like you have in your office, in Azure.

Think you are too small to hack? Think again.

Security Auditing for Small Business

  • 29 June 2015
  • Author: Anonym
  • Number of views: 2219
  • 0 Comments
Think of it this way: a thief is walking down a street lined with parked cars. He stealthily attempts to open the doors of each car he walks by. If its locked, he moves on. He doesn't even leave the sidewalk to try the street side lest he expose himself to viewing by the buildings across the street. He tries the next car, and the next, and the next, until he finds an open door on a 9 year old unassuming sedan. He sits down, rifles through the glove box, under the seat, center console, floor in the back seat, and takes whatever he can carry. He even finds an extra ignition key in the glove box, but he doesn't care he has no intention of stealing the car. However he just walked away with your $90 sunglasses, your $50 Pottery Barn gift card you got for Christmas, an iPad on the floor of the back seat, and worst of all several old credit card and banking statements you left in your center console.

Bad Bad Google, Bad Google

Don't let Google eavesdrop on your conversations!

  • 25 June 2015
  • Author: Anonym
  • Number of views: 2262
  • 0 Comments
Seems Google has learned the old ways of Microsoft and other software companies. It was discovered that if you used the Google Chrome browser, it is loading listening software without permission, to turn on your microphone and listen in on your conversations.

Azure for Disaster Recovery

You cannot afford "NOT" to do this!

  • 22 June 2015
  • Author: Anonym
  • Number of views: 2233
  • 0 Comments
Microsoft Azure has become the most effective solution for your Disaster Recovery plan that I have ever seen, especially in terms of cost to implement compared to the abilities you get. You can use Azure to back up your systems and/or replicate them in their entirety so that during an emergency, and even for testing purposes, they can be turned on in the cloud and accessed just as they were when running on your on-premise hardware.

What is new in Dynamic GP 2015

There are alot of new additions to Dynamic GP. We listed a few of the new advancements.

  • 3 April 2015
  • Author: Anonym
  • Number of views: 4361
  • 0 Comments
Microsoft Dynamic GP 2015 Is releasing allot of great features. We listed a few of the most important features.

Just What Is Microsoft Azure?

  • 2 February 2015
  • Author: Michael Zenzer
  • Number of views: 2867
  • 0 Comments
So what is this Azure? You have no doubt by now heard of this thing we call the "Cloud". It's everywhere, but a lot of people still don't quite understand what it is. To put it very simply, the "Cloud" is just a computer (or loads of them, actually) that are not where you are currently sitting.

Think you are too small to hack? Think again.

Security Auditing for Small Business

  • 26 January 2015
  • Author: Michael Zenzer
  • Number of views: 3414
  • 0 Comments
In the world of information security, there is a saying "security by obscurity is not security". The breaches that get national attention would have you believe, and understandably so, that hackers go after high profile targets and they don't care about the little guys. But in fact the opposite is true because the little guys (small business) spend less or no money or security, and worst of all, nobody is even watching for an attack. In my line of work, we call that the "low hanging fruit".
RSS
123578910Last