Motor City Technology Blog

Recent blog posts

b2ap3_thumbnail_remember_to_renew_400.jpgYou have a system in place to remind yourself of when to pay your bills. Otherwise, bills would go unpaid, essential services would be cut off, and your credit rating would plunge. However, not everyone has a system in place to renew their software licenses, which could lead to consequences that are just as dire.

Last modified on

The 3 Ways to Resolve a Technology Issue

Posted by on in Newsletter

b2ap3_thumbnail_resolution_to_problem_400.jpgYou know that one unlucky employee that seems to have the most problems with their computer? Perhaps they keep getting an error that no one can replicate, or they need a little help setting up a Mail Merge? Due to most managers only knowing of two technical support options, business owners can get stuck in a tough spot with employees like this.

Last modified on

Introducing Cloud Computing to Your Business

Posted by on in Newsletter

b2ap3_thumbnail_here_is_the_cloud_400.jpgYou’ve probably heard about the cloud and how businesses are taking advantage of it, but due to the way it's marketed and all the different tasks that it’s capable of, there may be some confusion as to how it works and how exactly it can be a game-changer for your business.

Last modified on

b2ap3_thumbnail_language_security_400.jpgWhen the Internet was first established, malware and hacking were in their infancy, and not as much of an immediate problem as they are today. Thanks to this fact, the Internet wasn’t really created with a certain security design in mind, and has instead adapted to shifts in its environment. Unfortunately, as hackers grow more powerful, several of these patchwork protocols are growing outdated.

Last modified on

4 Signs You’ve Been Hacked

Posted by on in Newsletter

b2ap3_thumbnail_secure_your_computer_400.jpgWhen a virus infects your computer, you may not know about it until it’s too late. Like a biological virus, the damage it does to your system can be minimized if it’s caught early on. Stopping a computer virus early is possible if you know what symptoms to look for. Is your PC infected? Here are four signs you’ve been hacked.

Tagged in: Hackers Privacy Security
Last modified on

b2ap3_thumbnail_do_it_right_400.jpgDoing a project right the first time around is the most valuable way to get it done. Businesses that best understand this concept are the ones that have experienced the folly of choosing the cheap route to get something fixed, only to then have it break again--which ends up costing them more in the long run. Nowhere is this more true than with IT support.

Last modified on

b2ap3_thumbnail_professional_vendor_relationships_400.jpgAs a small business owner, you want the best technology that will assist your company and allow it to grow. Not all technology vendors can do this for you. In order to get the most out of your technology, you need to separate the champs from the chumps. That’s where our vendor management service comes in.

Last modified on

b2ap3_thumbnail_e_signature_400.jpgWhat’s so special about a physical signature created with pen and paper? If it’s an autograph from your favorite celebrity, then you’ve got something special. Other than that, there’s no reason why an electronic signature can’t get the job done in today’s hi-tech business world.

Last modified on

b2ap3_thumbnail_virtualization_for_business_400.jpgImplementing virtualization for your network can provide your business with several benefits, like saving money and streamlining operations. Business executives from a variety of different backgrounds are taking advantage of virtualization to meet their goals.

Last modified on

How BYOD Neglect Can Ruin Your Business

Posted by on in Newsletter

b2ap3_thumbnail_byod_can_be_bad_400_20141210-143513_1.jpgEmployees bringing their own mobile devices into the workplace (BYOD) is one of the hottest business technology trends. BYOD has been shown to increase productivity, but when it’s implemented improperly, it can leave your business vulnerable to security threats. How do you motivate employees to stick to your BYOD policy in order to ensure the safety of your company’s data?

Last modified on

Information Technology at the Movies

Posted by on in Newsletter

b2ap3_thumbnail_cinema_it_400.jpgThe history of movies is rooted in technological advancement. After all, there are well over 100,000 still photographs in any feature length motion picture. The persistence of vision allows for these images to be strung together by our perception to form the images we see. It didn’t take long after the discovery of this phenomenon for it to be utilized as entertainment, and giving birth to cinema as we’ve come to know it.

Last modified on

b2ap3_thumbnail_phone_fraud_400.jpgWith all the attention given today to scams over the Internet, it’s easy to neglect classic scams like con artists using the phone to exploit people. You may think that you’re safe because you have a smartphone with caller ID, but thanks to new spoofing tactics, reliable defenses like caller ID can no longer be depended upon to safeguard you from telemarketer scum.

Last modified on

b2ap3_thumbnail_logo_square.pngMotor City Technology - Tuesday, November 18, 2014 - Last week, representatives from Motor City Technology traveled to Orlando, FL to attend IT Nation 2014, the most important IT channel conferences of the year. These events were created and structured to allow Motor City Technology and other managed IT solution providers from all over the country a chance to improve their service offerings and discover new technology solutions. 

Last modified on

4 Reasons Why Your System is Bugged

Posted by on in Newsletter

b2ap3_thumbnail_software_bugs_400.jpgAs long as computer software has existed, it's been plagued by bugs. Like real bugs, software bugs are an infestation and can cause major problems for businesses. When assessing software bugs, one question comes to mind; "After decades of dealing with bugs, why are they still an issue?"

Last modified on

b2ap3_thumbnail_company_collaboration_400.jpgBusinesses look to technology to solve their problems and make operations more efficient, and rightfully so, after all, technology is synonymous with “solution.” Although, just purchasing new technology isn’t enough to automatically see the desired results. New technology must be accompanied by intentional implementation efforts, which includes adapting it to your company’s culture. In other words, working with people.

Last modified on

How Secure Are Your Virtual Servers?

Posted by on in Newsletter

b2ap3_thumbnail_hosted_server_400.jpgIn today's technology world, a lot of businesses are opting to take advantage of virtualized servers. These offer various benefits, including the ability to consolidate your servers into a neat, controlled package. But according to a recent study by Symantec, virtual servers might not be as secure as once thought. In fact, they might not be any more secure than a physical server.

Last modified on

b2ap3_thumbnail_solar_flares_400.jpgIn 1859, our planet was hit with the largest recorded solar flare. This particular flare was known as the Carrington Event and it produced auroras that could be seen all around the world, even as far south as the Caribbean. The 1859 solar flare caused minimal damage and was seen mainly as an oddity. If such a flare struck today, however, the world would erupt into chaos.

Last modified on

Small Businesses Need an Intranet

Posted by on in Newsletter

b2ap3_thumbnail_intranet_400.jpgAs a small business owner, you enjoy the ability to operate quickly when action is needed. You appreciate the ease of communication within your office, and you can get things accomplished simply and efficiently. At least, that's the goal; maybe things aren't so smooth. One way to fix that is by integrating an intranet into your workplace.

Last modified on

b2ap3_thumbnail_dark_data_400.jpgAccording to a recent survey by IDG Research Services of business and technology leaders, on average, only 28 percent of data stored and maintained has value to the day-to-day operations of a business. Translation: a whopping 72 percent of files stored by a business are useless.

Last modified on

b2ap3_thumbnail_bring_your_own_device_400.jpgThe concept behind BYOD seems really good--employees bring their personal devices to work and use them to accomplish company projects. Initially, BYOD was well received, but after reviewing the security risks, more companies are opting out of it. Is there another way to use mobile devices at work without all the hassle and risks of BYOD?

Last modified on