Motor City Technology Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

3 Ways to Skip Out On Printing Altogether

Posted by on in Business

b2ap3_thumbnail_printing_expense_400.jpgBusinesses always try to eliminate unnecessary costs, but printing isn’t necessarily everyone’s first idea of an unnecessary cost. With so much revenue being invested in paper, ink, and toner every year, just think of how many resources this can free up for your business if you could find a way to eliminate them from your budget. With the right technology solutions, you can easily cut costs on printing.

Last modified on

b2ap3_thumbnail_identification_application_400.jpgListening to the radio is a great way to pass the time during your morning commute, especially if you don’t have a CD player or an auxiliary port in your vehicle. While listening to the radio, you might hear a catchy tune that you want to look up later. Now, thanks to various smartphone apps and technology solutions, you can do it while listening to the song.

Last modified on

Are Vigilante Hackers a Threat?

Posted by on in Business

b2ap3_thumbnail_do_vigilante_hackers_present_problems_400.jpg2015 was a brutal year for major corporations, as one by one they fell victim to hacking attacks. Major organizations like Blue Cross Blue Shield, Anthem, and even the United States Office of Personnel became victims of major hacking campaigns. A fact that’s often lost amongst these details is that not all hackers use their skill for evil actions, even if they are still illegal.

Last modified on

b2ap3_thumbnail_bring_your_own_device_mdm_400.jpgMobile devices are challenging the traditional perception of the office environment. When employees bring their own devices to work, this is called Bring Your Own Device (BYOD), and it’s an increasingly popular trend. Initially thought of as a threat, BYOD is proving to be a valuable option for businesses wanting to increase productivity, so long as it’s regulated properly.

Last modified on

b2ap3_thumbnail_bring_YOD_400.jpgMobile devices have taken the workplace environment by storm, and you’d be hard-pressed to find anyone who doesn’t use their smartphone, laptop, or other device for work purposes. This trend, called Bring Your Own Device (BYOD), helps employers spend less on new solutions, but it also presents a risk that needs to be managed: the Internet of Things (IoT).

Last modified on

b2ap3_thumbnail_password_locks_400.jpgVirtually every kind of online account requires a password. Yet, due to the aggressive nature of hackers, passwords alone are no longer enough to protect your information. The best way to approach network security is to have more protections in place than just a flimsy password.

Last modified on

b2ap3_thumbnail_security_firewall_400.jpgFirewalls are one of the most common IT security measures on the market today, and for good reason. They act as the first line of defense against any incoming threats, and without them, your organization would have to deal with one data breach after another. Of course, that’s only if you’re taking advantage of a proper firewall; if not, you should seriously consider doing so as soon as possible.

Last modified on

b2ap3_thumbnail_cloud_comp_solution_400.jpgAs an increasingly more important component of the modern technology infrastructure, the cloud can be a daunting new addition to any organization’s business strategy. Yet, many businesses still haven’t made the jump to the cloud, perhaps out of fear that their use of the cloud won’t significantly benefit them.

Last modified on

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Last modified on

b2ap3_thumbnail_remote_bro_400.jpgIn an age when working remotely is a commonly accepted practice, many organizations are still skeptical about letting their employees work from home. They think that doing so will disengage them from the workplace environment and that they’ll be too distracted to perform their work to specification. Yet, businesses that aren’t flexible on this issue could be missing out on several significant cost savings.

Last modified on

b2ap3_thumbnail_windows_8_done_400.jpgIf you’re one of the unfortunate souls still using Windows 8 (as opposed to 8.1) on your business’s workstations, you should consider upgrading, and as soon as possible. Microsoft has cut off support for its infant operating system, so if you want patches, security updates, and just a better overall operating system, upgrading to Windows 8.1 or 10 is an ideal solution to this dilemma.

Last modified on

b2ap3_thumbnail_email_spoofing_400.jpgLet’s say you get an email from a close friend. It looks like it’s legitimate, until you check the contents of the message. It’s an advertisement, or it’s trying to get you to click on a link to see something “important.” Regardless of what the content of the message is, you should probably slap that bad boy in the Spam section of your email inbox. You’ve just been the target of email spoofing, and it’s more common than you might think.

Tagged in: Email Hackers Security
Last modified on

The Rise, and Fall, and Rise of Bitcoin

Posted by on in Technology

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

Last modified on

b2ap3_thumbnail_security_cloud_400.jpgSecurity is a huge problem for businesses that take advantage of the cloud, but never to the same degree. It’s often the nature of the industry which dictates how much a business should invest in cloud security. However, despite these differences in policy, there are some aspects of cloud security that absolutely can’t be overlooked, including data permissions, account security, vulnerability to malware, and other online issues.

Last modified on

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Tagged in: Alt Codes Typing Windows
Last modified on

b2ap3_thumbnail_hacked_pc_400.jpgMost computer users should practice the policy of ensuring optimal security on their PCs. To this end, assuming that you’ll be hacked (or at least targeted) at some point is pretty reasonable, as it allows you to plan ahead and take preventative actions. Still, there are plenty of people in the world who don’t care enough or worry enough to make security-minded decisions. Contrary to popular belief, there are countless ways that a hacker can take advantage of a hacked PC.

Last modified on

b2ap3_thumbnail_a_plan_for_growth_400.jpgBusinesses invest a significant amount of time and energy into growing their business, but what some organizations don’t understand is that this growth comes with what we like to call “growing pains.” When an organization grows, there are all sorts of problems that must be addressed in order to maintain optimal operations. Among these is your network. Is it ready to handle your organization’s growth?

Last modified on

b2ap3_thumbnail_clean_computer_tips_400.jpgA clean computer is a happy computer. Just like any other piece of gadgetry, a computer requires regular cleanup sessions that allow users to get the most from them. In fact, January is known as Clean Up Your Computer Month, so what better way is there to ring in the new year than making sure your computer is in tip-top shape?

Last modified on

b2ap3_thumbnail_internet_of_things_400.jpgIn the near future, there will be many new devices connecting to the Internet. Some will be useful, while others will be… not so much. Either way, the fact remains that, according to IDC, the Global Internet of Things (IoT) spending is expected to reach around $1.3 trillion by 2020. That’s a pretty huge number, and we’ll tell you why your organization needs to keep the IoT in mind when putting thought into your technology strategy.

Last modified on

b2ap3_thumbnail_deep_learning_400.jpgInefficiencies can often keep operations from producing a satisfactory return. It might be time to start measuring your company’s ability to meet expectations. With the use of state-of-the-art computing programs, you can locate the problems your organizations is having and work toward patching the process any way you can. While data-collection was once a difficult system to implement, new computer-driven, business-intelligence software can provide you with the vital answers you need to make the changes required for profitability.

Last modified on