blog jenaly

Jenaly Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts
Posted by on in Miscellaneous

This History of the Autocorrect is as Fascinating as it Sounds

b2ap3_thumbnail_automated_corrections_400.jpgHow often does autocorrect breathe down your neck when you type out emails or documentation? We might have it now, but before autocorrect was introduced, every little mistake had to be resolved manually, without the help of technology. So, we salute you, autocorrect; saving us from the grammar police since the early 90s.

Posted by on in Security

How You Handle Your Mouse Says a lot About You

b2ap3_thumbnail_mouse_authentication_400.jpgIn this day and age, a password isn’t enough to keep your accounts secure from attempted hacks. Passwords can be cracked as easily as anything. A lot of businesses have moved to two-factor authentication in order to preserve their data. There are several ways of using this for your business, but a new startup called BioCatch is developing an authentication procedure which looks at your mouse activity.

Posted by on in How to

Tip of the Week: 52 Minutes On and 17 Off Maximizes Your Productivity Potential

b2ap3_thumbnail_your_productivity_400.jpgThere are a lot of ways to boost your productivity in the workplace, but sometimes it can be as simple as not working. According to a study by Julia Gifford of Draugiem Group, it’s not about what workers do to get ahead of the curve, but what they don’t do that sets them apart from others around them.

Posted by on in Miscellaneous

Humans and Robots: An Uneasy Trust

b2ap3_thumbnail_robot_killer_400.jpgAs technology grows more advanced, humans turn to robots to replace certain monotonous jobs. The goal here is to create a society where people are free to spend more time enjoying life. However, technology is prone to both technical problems and user error, which can lead to disastrous consequences.

Posted by on in Security

You Made A Smart Business Decision!

I read a very interesting opinion piece in today’s Wall Street Journal.  If you subscribe, here’s the link to the article: http://www.wsj.com/articles/how-small-businesses-can-fend-off-hackers-1437088140.  You will have to login to read the entire article. If you don’t subscribe, the basic message of the article is that 71% of cyberattacks hit companies with fewer than 100 employees.  The message being that small businesses are just as, if not more, at risk as the Fortune 500.  The article goes on to recommend that you outsource your IT security to a qualified IT services firm.  That’s why our clients have made a smart business decision.  Outsourcing your IT su...

Blog Archive

Tag Cloud

WiFi Workplace Tips Phone System Best Available Content Filtering Printer Server Efficiency Computer Accessories Virtualization Smartphones Best Practices Data Spam Operating System Microsoft Office Antivirus Search Inbound Marketing Hackers Save Money Security Lithium-ion battery IT consulting Recovery Android Business WIndows 7 Small Business Computer Wireless Technology Business Computing Entertainment PowerPoint Malware Automation Cloud Data Management Science Administration Going Green Browser Education Software Application Printer Presentation Saving Time Emails Excel Marketing Hard Drives Productivity Communication Mobile Device Management User Travel Privacy Server Smartphone Users IT Support Bloatware Two-factor Authentication Twitter Hardware Health Tip of the Week Remote Computing Innovation intranet Firewall Mobile Devices Customer Service The Internet of Things Tablet Chrome Internet Microsoft Holiday Upgrade Technology Network Employer-Employee Relationship Business Continuity Windows Social Business Management Windows 10 Disaster Big Data Social Engineering Passwords Office Disaster Recovery Biometrics Managing Stress Managed Service Provider Business Intelligence Bandwidth Cameras Phishing Compliance Email Near Field Communication Humor Backup Virtual Reality Gadgets Miscellaneous Hacking Computers Apps Hosted Solutions Mouse Information Technology IT Services Social Media Saving Money Google Mobile Computing VoIP Best Practice Network Congestion Regulations Unified Threat Management Analytics User Tips Storage

Mobile? Grab this Article!

Qr Code

Find out why

You should only hire an IT firm that holds a CompTIA Trustmark.