Technology

Mac Malware

by Holly Howell, HH Designs

I just set a record with phone support to Apple Computer this past week. Macs are not impervious to malware. It took 3 software tech support conversations (over an hour each) and a visit to the Genius Bar at the Apple Store (also over an hour) to find the malicious problem.

Read More…

Many small business owners and professional services providers believe that once a domain name has been registered, a unique address on the Internet has been secured for the website that will occupy that domain name. The truth is that when your domain name gets typed into a Web browser for display on a computer screen, that browser must first convert the domain name into an IP address, then find the domain name within the IP, and then your website gets displayed.

Sounds confusing? Think of the Internet as a street lined with both one-family buildings and apartment buildings. Each building represents an IP address, and in the case of the apartment buildings, each unit represents a domain name residing within a given IP address.

Read More…

Does your contact management system work for you? Do you rewrite your entire address book every year? Can you find someone’s business card when you need it? Do you have difficulty remembering a business prospect’s first or last name?

Read More…

RFID actually stands for Radio Frequency Identification, a network of transponders (tags), readers and software that enables automatic identification and tracking of items from a remote location. Each RFID tag contains an integrated circuit (IC), which is encrypted with a unique electronic product code (EPC) — essentially, an electronic fingerprint. When a tag passes within range of a reader, the EPC is transmitted to the reader through an antenna. The transaction is recorded and retained in the central database, providing real-time track-and-trace of the tagged item.

Read More…