Being in IT, we’ve seen and heard it all. Between the campfire horror stories of technicians to the outlandish IT conspiracies and ‘home remedies’ that get passed around, we’ve decided to compile a list of some of our favorite IT and technology myths.
When we write about Net Neutrality, we typically write about how it is designed to keep the telecommunications conglomerates, who make Internet service available to individuals on the Internet, honest when laying out their Internet service sales strategy. One way to put it is that without net neutrality in place, the Big Four (which are currently Comcast, Charter, Verizon, and AT&T) have complete control over the amount of Internet their customers can access.
There has been a lot made in the media about the effect that movies and television has had on society. More often than not, the media that is produced is a result of the ebbs and flows that happen in society, which ironically makes the whole notion that television and movies affect society an interesting paradox. The ludicrous portrayal of criminality in media is one issue that is resoundingly debated by lawmakers and sociologists, alike.
The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.
The holiday season is here, and the spirit of giving is in the air. Why not give the IT professional in your life a few things that they’ve been wishing for all year? Here, we’ve compiled a list of things you can give them, some of which will cost you (and your business) nothing.
Recently we’ve seen figures, public and private, lose their jobs and sometimes even their careers over things they’ve posted not only in the present but the past on social media. While public figures may have the resources to put up a fight, those in the private arena often don’t, and so the double-edged sword of attention can be particularly sharp. Once average people attract the all-seeing eye, never forgetting and unforgiving memory of the Internet, they find the weight of public opinion brought down upon them; with all the consequences - positive and negative - such attention may bring.
Children are the future, as the saying goes, so do we really want the future to be taught using tools from the past? While some schools are still using technology that better belongs in the 20th century, others are embracing innovation and teaching in ways that better translate to the “real world.” Let’s take a look at how our evolving technology is transforming the classroom and explore some ways to get it to more students.
With information technology touching nearly every part of modern culture, it isn’t a surprise that it is being utilized by sectors of industry where you may not expect. One of those sectors that may not register as one of the most IT-centric is the criminal justice system. This is largely because it is traditionally thought to be filled with jobs that seemingly haven’t changed much in centuries. Today, we’ll take a look at the technology that fuels today’s criminal justice system and see how municipalities and companies, alike, are benefiting from technology solutions.
To start the journey through the legal system, we’ll start with the people whose job is defined by exercising moral authority: the police. The first thing that anyone needs to know about their investment in IT and their use of technology systems is that, since the police gets a majority of their funding from public money, IT budgets aren’t always in line with a private business’. In fact, some police departments don’t see the point in more IT when good cops are being laid off so they will deliberately cut their IT budgets in line with the budget they get from their municipality.
While IT isn’t always a priority for the police, it can be effective at providing exceptional departmental productivity gains. With the remote nature of the job, most police cars today are outfitted with laptops and Internet accessibility. This allows officers to access motor vehicle and individual information stored on useful databases, but since these machines are hardwired into a car dock, they only get a partial benefit of mobility. Innovative solutions are now being used where police are outfitted with department-owned smartphones and tablets so that officers can access relevant information from outside of their cars.
There are several parts of the job where police can benefit from new technology. Along with the in-car computer networking, and potentially mobile device networking, IT can compliment a lot of what a police officer does. The right IT solution can boost communication, augment (or completely run) operational capabilities, and effectively reduce costs by providing information faster and speeding up procedure. After all, a large percentage of effective policing has to do with having actionable information. As a result, by implementing IT solutions, the public welfare improves--which is the situation that any citizen can ask from their officers of the peace.
From a software perspective, here are three types the typical police department can’t do without:
- Computer Aided Dispatch (CAD) - An application that assists dispatchers route police resources to places of priority need.
- Geographic Information System (GIS) - An application that provides in-depth geographic information to provide dispatchers and officers a comprehensive view of the landscape.
- Records Management System (RMS) - An application that provides officers with access to reliable information to assist them in their duties.
Moving on to the lawyers, we’ll find a professional that is torn between the past and the future. Many lawyers understand that IT can benefit them, but at the same time the simply don’t have time to monkey with technology that, for some, can do more harm than good. The average lawyer that works criminal cases, whether they are prosecutors, defense attorneys, or specialists, understands how to effectively utilize certain technologies to provide their clients the best service possible. After all, they deal with a lot of sensitive information, and have a responsibility to protect it.
Some of the technologies that law firms typically utilize come in the form of business-type solutions that enhance their productivity, efficiency, and data redundancy. Others, however, are best utilized by a business like a law practice. Most practices need strong collaborative systems that allow multiple people to share files, the ability to print off documents, and a central database that has access to documents. These requirements make computing solutions in the cloud a perfect fit for the modern law office. Cloud computing can offer these organizations a way to host all their necessary software, while also providing virtual hardware and redundant storage capabilities without having to pay huge upfront costs.
Lawyers typically use the following software:
- Practice Management - An application that is designed to help lawyers and their staff manage the large quantity of work they are inundated with.
- eDiscovery - An application that makes finding, collection, identifying, and sharing relevant information easy.
- Video Conferencing - Lawyers are extraordinarily busy and often don’t have time for face-to-face meetings. Video conferencing helps fill the void by allowing them to meet with clients, colleagues, and staff from anywhere with an Internet connection.
Since its main purpose is to be a place to hear arguments, the courtroom doesn’t need all the technology that the police and lawyers use to keep things rolling efficiently along. In fact, most of the technology that is utilized in the duration of a criminal trial would be traditionally provided by the prosecution or defense. This simply isn’t so today. The courtroom of the information age is seeing a major shift, and changing the nature of litigation completely.
The biggest change to the modern courtroom is in the availability of data. Since data is now able to be securely broadcast from cloud servers to devices such as laptops and tablets, the notoriously slow court proceedings’ pace has quickened somewhat. Other technologies like wireless Internet connections and charging ports add to the connected courtroom effectiveness.
Along with the technology people bring in to the courtroom, there are major changes in the technology inside the courtroom itself, too. The modern courtroom features video displays--either in the form of a mounted screen and a LCD projector or smaller, individual screens in the jury box--to provide juries a resource to see evidence. Many courtrooms also have individual witness monitors and annotation monitors.
Since the courtroom only has a couple of static employees, software isn’t typically necessary to manage the staff or used for productivity, but some software is available. There are titles for court and case management, e-filing, and audio-visual that are all found in the modern courtroom.
The criminal justice system ends with institutional corrections (prisons and jails) and community corrections (probation and parole). Like the other parts of the system, the corrections system has become dependant on the use of technology, especially for communication. Internet-based databases help corrections professionals track and maintain records on offender rehabilitation, while also helping provide an alternative to incarceration for nonviolent offenders. This provides the public significant cost savings, while also providing correction officers the ability to effectively monitor and manage offender probation.
Since budgetary considerations can really put a damper on the amount of acceptable innovation in corrections, the use of standard information technology is extremely important. It is making prisons and jails safer, and community corrections more effective. No better example of this than then the use of asset tracking technology through an automated offender management system.
The automated offender management system allows multiple users to access (and alter) an offender’s record simultaneously.with other users. This real-time information sharing improves efficiency, as the more information that’s available between multiple elements of the criminal justice system (and in this case, the corrections system) the better the entire system moves. Additionally, by providing real-time inmate information to corrections officers, it will reduce security risks.
If the technologically puerile criminal justice system is utilizing technology to improve operations, your business can, too. To see how Directive’s knowledgeable IT consultants can make technology work for your organization, call us today at 607.433.2200.
As technology has evolved, so have our capabilities of using it. While this has led to great improvements in how we can live our lives, it has also made it much easier for us to torment and harass one another. This is a huge problem, and growing, so it is important to know how to take a stand against it - both at home, and in the workplace.
The office is a workplace, so it most likely isn’t a place that is often associated with fun and games. However, different aspects of games have been shown to provide significant benefits when introduced into the professional environment. Today, we’ll explore some of the ways that a little frivolity may benefit your office.
The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.
Star Wars is a cultural phenomenon. For the past 40+ years audiences from all around the world have become enthralled with the characters, the story, and the technology that existed a long time ago in a galaxy far, far away. Who knew that it was also a wonderful lesson in modern IT security? For today’s blog, we look at three situations that happened in Star Wars: A New Hope; and, how, if proper IT strategies were put in place, the Empire would have been able to protect its greatest asset.
On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.
As though the initial news of Equifax’s 2017 data exposure wasn’t bad enough, it has been discovered that there are even more victims than previously thought. While news like this is never good, it can bring a silver lining if the opportunities that such news presents are seized.
In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.
The holidays are getting closer, and picking the right gift for someone is only becoming a more stressful activity. To make things a little easier for you, we’ve found some gadgets that might make the perfect gift for that person on your list who has a particular interest. This blog will go over some of these interests and the gifts that might make their holiday.
For the last several years, we have annually asked the members of our team what they were grateful for. It doesn’t have to be a major thing, just some way that technology has improved our everyday lives. After a few silly answers, like memory foam (which is great) and forks (also important technology), they ended up coming up a few great technologies that they are thankful for. Here’s a few stand out items that we wanted to highlight:
Many consider the beginning of the holiday (shopping) season to be Black Friday, the day after Thanksgiving. This day is infamous for deals so good, people are willing to wait in line for hours before the stores even open in order to take advantage of them--however, are these deals really the best, when Cyber Monday is now in play? We examined what can be expected on the major deal days to find out.
When it’s time to replace your technology, it might bring about a sense of panic. How can you replace your technology without breaking your budget, or worse, exposing data on your old technology to potentially threatening actors? Only one thing is for sure; you need to make sure that you have a solid strategy to adhere to when you need to replace your broken-down technology.
Did you know that over 2,000 Domino’s Pizza franchises in Australia, New Zealand, France, Belgium, The Netherlands, Japan, and Germany feature delivery by robot? Starship Technologies, a self-driving robotics company, announced on March 29th that they would be partnering with Domino’s to revolutionize the way the delivery process works.
In October of 2016, the Federal Communications Commission designed a set of rules known as the Broadband Consumer Privacy Proposal. These rules had intended to flip the status quo and require Internet service providers (ISPs) to gain their customers’ permission before they harvested their browsing histories to sell to advertisers. This proposal is now moot with the establishment of a new law that passed through Congress and was signed by President Trump in April 2017.
In November of 2016, Governor of New York Andrew Cuomo devoted $30 million dollars to a 50-mile-long flight traffic management system to promote the use of unmanned aircraft systems (more commonly known as drones) for Central New York business purposes. This ‘corridor,’ as it is called, will stretch from Griffiss Air Force Base in Rome to Syracuse by sometime in 2018.
There are an unfortunate number of cyber threats out there; protecting your company’s network from these threats is paramount. In order to find out how acquainted you are with the malicious programs and attacks that could harm your business, we’ve devised this quick quiz to test your knowledge.
The concept of 3D printing is becoming a factor in more and more industries, perhaps most promisingly in the healthcare sector. This specialization has the potential to revolutionize how patients are treated for some very serious maladies, as well as how well they adjust to their life during the post-treatment stages. However, this application of 3D printing is not without its concerns.
Let’s say you’ve got an email that you really need to crank out from home, and pronto. So, you whip out your laptop to get started, and that’s when you spot the menacing eyes of a toddler from across the room. What do you do? Is it even possible to use a mobile device once a toddler has it in their greedy little sights? For this week’s tip, we’ll explore your options.
The Internet of Things may have just entered social consciousness, but people have been trying to add Internet functionality to devices for quite some time. One instance of this is the development and manufacture of smart car technology. In the same way as our services are designed to proactively monitor and maintain your business’ network, a smart car has been developed largely as an completely connected automobile that allows car owners to worry less about their car and to get the most out of their investment and driving experiences.
One of the most high-profile hacking attacks in the United States struck last year when the Internal Revenue Service (IRS) was breached. 464,000 Social Security numbers were swiped; enough to file 101,000 tax returns using false personal identification numbers. Every organization can learn how to better protect themselves during tax return season, especially since you have so much on the line every year.
Let’s say that you're on a business trip. As you travel, you decide you may as well get a bit of work done. You pull out your laptop and are pecking away, and that’s when you notice a growing feeling of nausea rising in your stomach. It gets so bad that you finally have to put the laptop away, having accomplished relatively little, before you are sick.
Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.
It can be easy to underestimate the importance of maintaining permissions on your network. In fact, sometimes it takes a good dose of misfortune to present the consequences of unchecked access to your network. This time, the misfortune befell PA Online, an Internet service provider located in Pennsylvania.
It’s safe to say that hacking is a frowned-upon practice, but that hasn’t stopped cyber criminals from attempting to turn a profit off of it. This practice has led them to target nonconventional organizations, including hospitals and other healthcare facilities. However, just because a hacker can target a hospital, does this mean that they should? This is a topic of some debate amongst hackers, whom, believe it or not, actually do have some sort of ethical standards.
The busy business owner rarely has time to indulge in extracurricular activities, but there are still ways that you can make progress--even when you’re not actually in the office or working on important plans, there’s still the opportunity for self-improvement. One way that you can do this is by being well-read. In fact, science has practically proven that reading literary fiction is just as beneficial for your professional development as other seemingly more practical works.
A business owner is always looking to improve their skills and learn about new ones. It’s natural to want to learn new things, even if you’re already an expert in your own field. The 10,000 hour rule offers a few guidelines to help you learn a new craft, but it’s not as easy as consistent practice. You might be in for a long journey toward “expert status.”
There’s no question about it; hackers make things difficult for businesses of all industries and sizes. They go out of their way to steal data and turn a profit off of it, as well as misrepresent organizations and individuals. The business environment is chaotic enough without hackers mucking everything up. However, the recent hacking attacks behind the group Anonymous have evolved the persona of the typical hacker into something very different.
Having a workflow that works for you is the key to being successful. Sometimes, finding such a routine requires taking some rather extraordinary measures. If you’re looking for ways to tweak your workflow to be more productive, then consider these outside-the-box productivity tips from some of history’s very successful people.
Does the U.S. Constitution allow the American government to access the electronic devices of its citizens? According to FBI Director James Comey’s statements at Symantec’s Annual Government Symposium, it certainly does.
Memes are deeply rooted into today’s online culture. Thanks to the Internet, even the most absurd things can quickly gain popularity through social media and online forums. While they might seem silly and pointless, it would be foolish to dismiss them as wastes of time; especially considering how popular they are. If you are looking for a creative way to get your name and brand out there, why not try using memes?
Sharing your Netflix password with a friend so they too can enjoy a vast catalogue of movies seems harmless enough. However, due to a recent ruling by judges of the Ninth Circuit of the United States Court of Appeals, this common action is now a federal crime.
Do you loan out your Netflix password to friends so that they can catch up on their favorite shows? If so, you’re in violation of a recent federal court ruling, which declares that sharing a password of any kind is now a federal offense. So, if you plan on watching the new Netflix original series Stranger Things, you may want to reconsider how you plan to do so.
Cyber security professionals and Internet users rejoice, for the “Spam King,” Sanford Wallace, has finally been sentenced for his longtime use of stolen Facebook credentials to spam other users. Between 2008 and 2009, he had stolen credentials for Facebook accounts, and then used the accounts to send credential-stealing web links. Now, he gets to spend the next two and a half years in prison, and pay an oddly-specific fine of $310,629.
When you think of a computer, you think of a machine that makes your life easier. You can look up events, check facts, record data, and so much more. However, the first computer might be something extraordinarily unexpected; a submerged treasure off the coast of Greece called the Antikythera mechanism, which was used to predict and track astronomical events, like the movement of the planets or the occurrence of eclipses.
Smartphone technology is currently experiencing cool innovations. Plus, there are some crazy reasons behind what these devices can and can’t do that you may not have known about. Check out these four cool smartphone factoids from List25.
Upgrading technology is a sure way to improve the efficiency, security, and productivity of your company’s operations, but is there a point when upgrading one’s tech can go too far? As much as you hear us sing the praises of upgrading, we have to admit that there’s a point when you can have too much of a good thing.
When you think about the stock market, one vibrant image that comes to mind is the chaotic trading floor of the New York Stock Exchange, with traders climbing over each other and barking orders. Today, the NYSE trading floor is much more subdued, a testimony to just how much technology has changed the financial marketplace.
In a recent poll by WSJ/NBC comparing tech companies to US presidential candidates, Google came out on top with 67 percent of respondents having a positive opinion of the company. Compare this to Apple’s 54 percent, and 43 percent going to the highest-rated candidate. Perhaps Apple and the politicians can take a cue from Google and make use of Easter eggs, because who doesn’t love Easter eggs?
Do you remember the days where you didn’t have the the Internet? Remember going to the library to research information, or using a phone book to find contact information for an important contact? These are only a few ways that the Internet has changed society.
How private are your emails and other digital communications? Can the government go through your digital files without you knowing about it? As you may have suspected, they can, thanks to a loophole in an outdated law--a loophole that U.S. lawmakers are trying to close.
Robotics are making leaps and bounds in all sorts of different industries. Robots aid doctors with surgery, work in manufacturing plants, and perform countless other functions. Now, we can add “pizza delivery” to this list, thanks to a somewhat bizarre and extremely welcome innovation by the Domino’s pizza chain.
Happy April Fool’s Day! It’s a time to celebrate pranks, practical jokes, and laughter. Therefore, we thought we’d mix it up a bit and seek out technology advice from the funniest and the furriest CEO we know, Old Spice’s wolf-dog hybrid, Mr. Wolfdog!
What if we asked you to throw your expensive smartphone high up into the air, just for the fun of it? You’d probably tell us to take a hike. However, thousands of phones get tossed into the air and put at great risk every day, thanks to an app designed for just such a purpose. In our opinion, this may be the greatest (and most devious) technology prank of all time.
Apple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.
While they might seem like glorified toys for adults, drones are fantastic tools that can help people take some breathtaking photos and videos of their local scenery. Unfortunately, as is the case with most good technology, there are people out there who want to use them for nefarious purposes. This leads authorities to a tough question: how do you knock an illegal or dangerous drone out of the sky without harming those down below? The answer is simple: eagles.
The introduction of new and exciting technologies keeps changing the ways people interact. Innovations such as email, instant messaging, and the development of mobile devices are now turning out to be just fundamental steps to a more connected planet. The Internet of Things is set to turn human civilization on its head. What does this shift mean for the immediate future?
The Internet is a fantastic tool that has ushered in an era of productivity and connectivity that we could only previously have dreamed of. Unfortunately, like every great tool, it can be used for darker, malicious purposes. In the Internet’s case, it’s used for anonymous illegal activity, like drug trafficking or selling data on the black market.
Social media addiction is a problem that plagues most modern businesses. Even though it’s a best practice to leverage social media to your business’s advantage, it’s a well-known fact that social media addiction can lead to wasted time and distractions in the office. In order to beat social media addiction in the office, it’s best to understand how it comes about, and what you can do to help your workers leave it alone, rather than locking everything down completely.
The Internet is an absolutely essential part of today’s workplace. It helps businesses get the upper hand on their competition by offering practically limitless access to tools, resources, and contacts that can be used for the betterment of their organizations. However, classrooms can reap the benefits of Internet too, and it’s surprising that it’s taken so long for all schools to hop on board with this concept.
Today’s civilization might be the most technologically advanced in the history of the world as we know it, but this also comes with the burden of properly disposing outdated technology. Unfortunately, the world faces a significant e-waste problem that cannot be ignored. As consumers of technology, this responsibility falls on your shoulders.
Halloween is a time to conjure up things that give people the creeps. Scary sounds are just one way to send shivers up the spine. Sounds like, howling werewolves, zombie groans, chainsaws, and bloodcurdling screams are enough to make you want to run and hide. Yet, there’s one sound that’s the most terrifying of them all, and it’s coming from your server room!
What’s scarier, monsters or computer viruses? While it would be horrifying to be caught in a dark alley with a vampire, it would also be terrifying to lose your data to a hacker. Each entity is scary in its own right, but how frightening would it be if the two were combined?
As a business owner, you’re proud of your company’s logo because of everything it represents. Do you love your logo enough to get it tattooed on your body? What about your staff? Would they be willing to make such a permanent commitment to their job? Yes, tattoo marketing is a real thing. What can your business learn from this bold marketing trend?
At a September tradeshow event, Travis Kalanick, cofounder and CEO of Uber, said five words in an interview that made everyone give pause to the potential for technology to shape our world for the better, “Every car should be Uber.”
We all know that Windows 10 is the hot new operating system released by Microsoft this past July, with slick new features and (gasp!) the Start menu. We’ve been writing a lot of articles about how great and functional the new operating system is. Keep in mind that Windows 10 is a great operating system, but you should also take note of these four shortcomings when considering whether you should immediately upgrade or not.
Agent Chrome is a pretty well-known guy in Google City. In fact, you could say he was the top of his class at Browser University, and everybody who is anybody knows who he is. When on the job, Agent Chrome sometimes needs to lay low and avoid the prying eyes of the masses around him. And this particular operation, rightfully dubbed “Incognito,” is one such occasion.
We’ve seen some pretty incredible technology developed in the past several years, but all of it pales in comparison to the epitome of the Internet of Things: the KFC Memories Bucket. Why? Because nothing says “the future,” like printing your family’s photos out of a family meal chicken bucket.
How often does autocorrect breathe down your neck when you type out emails or documentation? We might have it now, but before autocorrect was introduced, every little mistake had to be resolved manually, without the help of technology. So, we salute you, autocorrect; saving us from the grammar police since the early 90s.
A business’s website is one of its lifelines; it can either make or break your online presence. One of the most important parts of having a website, though, is owning your domain name. There are a lot of different choices for them, but do you know that at one point in history, they had their own individual uses and meanings?
As technology grows more advanced, humans turn to robots to replace certain monotonous jobs. The goal here is to create a society where people are free to spend more time enjoying life. However, technology is prone to both technical problems and user error, which can lead to disastrous consequences.
In today’s society, we throw the word “hack,” around without a second thought. This is especially true in the realm of cyber security for businesses. Have you ever taken a moment to think about why the term “hacker” was chosen as the title for those who partake in sketchy online activity? What exactly makes a hacker, a hacker?
It's no secret that smartphone owners love their devices. Although, is there ever a point where smartphones become too much of a good thing? If someone can’t seem to live without their device, that’s a pretty clear sign things have gotten out of hand.
With Jurassic World hitting theaters, today seems fitting to talk about a new use for 3D printing that you might not have thought of: recreating fossils. Researchers in Kenya are taking advantage of this new technology to study and preserve fossils that could potentially be damaged by the intense weather conditions of the Turkana Basin.
Your smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!
When it comes to challenges, there’s no better place to turn to than the Internet. However, the Internet is also saturated with useless, time-wasting videos and articles that are meant to stimulate the mind and destroy boredom. In the face of all of this media, a lone CollegeHumor video challenges a user to endure boredom for a measly three minutes.
In 1977 the first Star Wars movie premiered, entitled “A New Hope.” The science-fiction film became a hit and spawned a franchise that’s still going strong 38 years later, with the upcoming release of its much-anticipated seventh feature film, “The Force Awakens.” In fact, Star Wars is such a big deal that it has its own holiday, celebrated every May 4th (May the 4th be with you).
With the long-awaited release of Star Wars: Episode VII The Force Awakens this December, today’s Star Wars Day holiday may be the biggest yet (May the 4th be with you). As a technology-loving IT company, we’re happy to honor our favorite science fiction franchise by taking a fun look at its futuristic space technology.
On your journey through entrepreneurialism, few resources you’ve encountered are as valuable as those that will stick around unconditionally. In fact, few things are as reassuring in the morning as the smell of coffee grounds stewing in the pot, producing that mesmerizing aroma that could snap Sleeping Beauty out of her coma.
When it comes to getting new technology, it’s typical to spend a significant amount of time agonizing over which product is the best. All the while, little regard is given to the disposal of one’s old tech, which often gets tossed in the trash. You may not have realized it, but haphazardly disposing of our old technology is wreaking havoc on the environment.
Do you remember the good old days when a simple magic trick was capable of bringing a smile to anyone’s face? Optical illusions, card tricks, or sleight of hand; all of these are basic tactics used by the average magician. However, Simon Pierro, a German magician, uses his iPad to come up with mind-bendingly spectacular tricks that take advantage of modern technology.
Google is the world’s most popular search engine, and it’s grown so outrageously popular that there’s even a verb named after it; “to google” is to search for something on the Internet using Google. However, to this day, Google continues to surprise the public with fun Easter eggs, hidden functions which provide a level of entertainment to the user.
Even if you like Internet Explorer, you may have noticed that it can be a bit buggy at times. Perhaps if Microsoft had more information about the causes of its software issues, they could develop a better product. This is the purpose of software error reports, which largely go unsent and unread; or at least, that’s what Microsoft thought.
Unless you’ve been living under a rock, you know that cat memes infest the Internet to the point where it’s difficult to not see one. But, have you considered that it might not be that people are obsessed with cats, and that maybe the cats are simply overwhelmed by their ego as a superior race? Perhaps cats understand technology far better than even humans do, and they are the masterminds behind why the Internet has gone cat-crazy.
Remote controlled drones are one of the hottest consumer technologies on the market. Businesses are finding ways to profit from them too. You might even own a drone or you’re thinking about buying one. What drone-flying rules should you know before launching it to the heavens?
Last February RadioShack declared Chapter 11 bankruptcy and announced plans to sell between 1,500 and 2,400 of its stores. IT techie’s around the country are mourning the loss. It almost feels like losing a friend that’s always been there for you. We need closure, so let’s all gather around the store’s silicone grave and say fare thee well to RadioShack.