Search Features

Security Feature

Email Showdown: Gmail vs. Yahoo! vs. Outlook vs. the Field

Free email clients are a dime a dozen these days, but how do you know which one will best fit your needs? Let's take a look. Read full article

Security Feature

What is Two-Step Verification? How Do You Set it Up?

What is two-step verification and how can it help you from being the victim of online identity theft? Read full article

Security Feature

Why Your Company is Finally Cloud Bound

The next big upheaval in enterprise technology is happening as you read this. Large scale corporations are in the midst of staging major migrations from the world of yesterday, onsite[...] Read full article

Security Feature

Tips For Managing Your Social Media And Employer

Most reasonably intelligent people in this world go out of their way to ingratiate themselves with their workplace superiors. It’s only common sense. Whether this is accomplished by way of[...] Read full article

Security Feature

What Makes a Business Notebook a Business Notebook?

The term "business notebook" meant something ten years ago. Even though the lines have been blurred, there are still features that device a business laptop. Read full article

Security Feature

What Does 802.11ac Mean For Business?

802.11ac is the latest Wi-Fi standard, which promises blazingly fast Wi-Fi speeds. TechnologyGuide looks to separate its promise from reality, and figure out what it means for businesses. Read full article

Security Feature

The Great Reinventors: Best & Worst Tech Company Rebranding Efforts

A brand defined as a complex set of inter-related components that overall set an expectation for a customer experience. A brand involves the name the logo, the colors, the tone,[...] Read full article

Security Feature

BYOD and Cloud Storage: A One Two Punch to Enterprise Security

Today, the advent of the cloud and the proliferation of inexpensive hand-held mobile devices has changed everything. And corporate security personnel are scrambling for ways to make sure these[...] Read full article

Security Feature

BYO Security Threat: Empowered Employees Able to Ignore Policies in BYOD Era

The self-empowered BYO employee is as compelling to businesses as the proposition is terrifying. With a massive BYO movement afoot, organizations are scrambling to figure out how to reap the[...] Read full article

Security Feature

The Always On Employee: What Does MDM Mean for Me?

Are you a bring your own device (BYOD) rebel rouser? A freewheeling employee using whatever mobile device suites your computing style whenever? If so, it’s important to know about mobile[...] Read full article

Security Feature

Tablet Security Focus Shifts from Software to Hardware

by Paul Korzeniowski Security has been an ongoing concern with tablets. Recent moves by Apple Inc. illustrate a potential change in emphasis, with device suppliers incorporating more hardware based security[...] Read full article

Security Feature

IT Execs Cautious About the Cloud, But Compelled By Cost-Saving Benefits

In this presidential election year, consumers and business people alike may claim that the candidates and their respective followers may have their head in the clouds when it comes to[...] Read full article

12