Years ago, the high-tech company that drove me closest to the edge of madness was Microsoft. That firm treated its customers as if they were lucky to have computers. But for sheer frustration, I think Google tops Microsoft.
The position is meant to be more than a glorified tech support desk. It should be the office where infrastructure growth is planned and merged with the company’s overall goals.
The cloud is what we call the storage areas we never see except in our browsers—that online, cyberspace world that holds our files and often our working applications.
In the aftermath of the Great Recession, the economy continues to grow, but it’s becoming obvious that unemployment isn’t going to nosedive the way it has after previous recessions.
“BYOD” is tech-speak for “bring your own device,” and it refers to whether you want to allow employees to transact your business using their own laptops, notebooks or smartphones, or if you want to impose your own standards and supply what you think they should have so you keep control of the technology.
Employers have to contend with a new generation of workers who expect to work from home at least part of the time, and entirely from home when feasible.
If you’re one of those businessfolk who buy new gadgets just because you can, you might want to move on to the food reviews now. I’m going to be talking today about when to upgrade devices or software.
This is the last column before Christmas, and in keeping with long tradition, I’m writing a year-end column about screw-ups and techno-pratfalls that should make you glad you’re not in the hottest of hot seats.
Even the most supposedly secure password is toast from the time you first use it, because today’s hackers have a veritable arsenal of ways to get through or around any password scheme.
The online world is blossoming with education, both good and questionable. It was one of the first uses for the Web. The Web brought technical people together to share information, and often it was in the form of a tutorial to answer the question, “How do I get this to do that?”
Today, the two worlds cross over almost effortlessly, but the divisions between them have spawned entirely different design and usage paradigms.
When you reveal information about yourself, do you still own or control it? And if you reveal something about someone else, who owns it then?
Even laser pointers can be hazardous if they’re pointed right into an unprotected retina.
When I was a kid, eager futurists predicted what wonderful technologies we’d all have someday.
Google Earth is one of Google’s odder and spottier applications. It started life as Keyhole, a 3-D mapping program originally paid for by the CIA and subsequently purchased by Google in 2004.
First, you’ll need good hardware. Don’t skimp here, because reliability trumps economy.
You often hear that you’re anonymous online, and you can be if you want to be. But if you want to buy or sell, register for newsletters, or get return e-mails, you have to declare your identity. And that identity is your e-mail address.