Are small office servers obsolete?

While not every office can throw away their server and still function smoothly, it is true that many small and medium-sized offices no longer need the extra expense of a server. Cloud computing has advanced to a level that many offices work even better in the cloud environment.
Five Biggest Facebook Scams or Hoaxes

First, I want to apologize for there not being any blog posts last week (or Tuesday of this week.) I got hit up beside the head with a pretty vicious flu bug and it knocked me down for a few days.
Today’s post will be for all of our Facebook friends out there. We’ll take a quick look at the five most common (or biggest) scams (or hoaxes) that seem to persist on Facebook.
Windows 8 Update Feature and Internet Explorer Vulnerability

This bog post has two parts. If you want, you may read the Part 2 first, but the second has a relationship with Part 1.
Part 1
For people who want to take a little more “hands on” approach to updating their Windows 8 updates from Microsoft, here’s the easiest way to get you to where you need to be: Press the Windows key
The JAVA Exploit

Welcome to another “tech blog.” I apologize for the delay in posting at least once a week. Sometimes the ‘local’ job takes over and doesn’t give me the time needed. This edition (Oops, I started to say ‘this week’s edition’) has a very important, urgent message pertaining to your computer’s safety.
Facebook Facial Recognition and Follow Up

Welcome everyone! Glad you are taking a small amount of time to read this.
First on the menu for today: Facebook Facial Recognition – It’s back.
What Temperature Should My Processor Be Running At?
Below is a nice little article about heat and your computers’ processor. It was written by David A. Harding. You can reach David at: [email protected].
7 Ways Hackers Trick You

Very nice article by Stu Sjouwerman from knowbe4.com.
You may not be aware that there is a scale of seven deadly vices connected to social engineering. The deadliest social engineering attacks are the ones that have the highest success rates, often approaching 100%. What is the secret of these attacks, how come they succeed so well?
The “problem” of Google using your photo and reviews in their ads – SOLVED!
For those of you worried about the new “problem” of Google using your Google account information (profile photo and reviews in ads) – click this link and then uncheck the box at the bottom (if checked) and click SAVE: https://plus.google.com/settings/endorsements?hl=en REMEMBER: This only affects you on Google products and ONLY if you have a Google […]
Spicer Interiors
Katherine Spicer needed an elegant site to showcase her design portfolio. She can upload images, add testimonials and many other items as need.

