Categories
Exabyticals

Twitter For Business?

After Facebook, Twitter has become one of the most widely used social networking site in the world. Placing mini blogs, or short status updates, that contain a message within 140 characters makes Twitter a unique tool for conveying messages to large populations, especially for businesses. So is the investment of time and effort worth it […]

Categories
Exabyticals

Security for Your Business – Part 2

Statistics of IT Security Threats This article is a continuation of Security for Your Business – Part 1. We will discuss various statistics related IT threats and security concerns. This article points out clearly the importance and significance of securing your IT infrastructure. Do not hesitate in anyway from ensuring proper security measures, as not […]

Categories
Exabyticals

Google Chromebook: The Future?

Cloud Computing to the Next Level There’s another player in the IT operating system (OS) market now, and it’s by Google. The Google Chromebook offers a web (or Cloud) OS that derives its applications from the Internet and thereby reduces the need for expensive hardware. Although the Cloud has been in existence for sometime now, […]

Categories
Exabyticals

Easy Networking for Your Business

A Networked Business A network is basically computers and devices, like printers and servers, hooked up to each other. This allows for easy file transfer and printing of documents. If there was no network in place, files and resources would not be available to all of the computer users in the company. Networking allows resources […]

Categories
Exabyticals

Prospects of Tablet PCs

With the decline of first quarter PC sales in 2011, tablet PCs are becoming the new primary computing device. A recent survey conducted suggested that around 25% of computer users now use their tablet as their main device for checking email and surfing the Internet. So is it likely that the tablet PC will replace […]

Categories
Exabyticals

IPV6 – The New Internet Scheme

Believe it or not, the Internet has run out of addresses. This means we need to transition to a new addressing scheme, IPv6, that facilitates our growing need for Internet addresses and that helps our businesses grow. To access company networks and the Internet, each device or computer is assigned a logical address. That basically […]

Categories
GPIT

Is Software Piracy Ethical?

We’ve heard of the legend of Robin Hood, the lone vigilante who steals from the rich and gives to the poor. The right being done by the granting of provisions not available to the poor from those who have more. Right or wrong, this same ethical issue faces many people in the digital and technological […]

Categories
GPIT

The New Grounds for Cybertheft

Theft used to be limited to stealing of physical goods or the classic burglar robbing the bank for cash. Now the concept of theft has radically changed as the digital age advances and the lines between the physical and virtual become blurred. Most people know cybercrime for its stealing of people’s money from their bank […]

Categories
Exabyticals

What’s the Deal with Macs?

I’m often confronted with businesses that do not know quite what to make of the Apple revolution. They don’t understand the difference between a Mac and a PC and are baffled by the hype surrounding Macs. It’s kind of like the war on Afghanistan, PC vs Mac is a vague and ambiguous fight. I have […]

Categories
Exabyticals

Virtualization For Businesses

One of best ways to streamline business infrastructure is to use a process called virtualization. Virtualization basically reduces the need for physical hardware as it uses software environments to create and share hardware resources. On one physical desktop computer you can run multiple operating systems, each sharing the hardware of the desktop computer to give […]