Google’s ambitious plans to use technology to ‘accelerate urban development’

Google has built an online empire by measuring everything. Clicks. GPS coordinates. Visits. Traffic. The company's resource is bits of info on you, which it mines, packages, repackages, repackages again, and then uses to sell you stuff. Now it's taking that data-driven world-building power to the real world. Google is building a city. 


Be wary of links in Facebook Messenger

Facebook Messenger has become the latest minefield for unwary computer users, thanks to a new variety of malware that has immerged over the past few months. Even the latest anti-malware and patches cannot prevent every attack. However, there are steps we can all take that can minimize the risk.

Nonprofits encouraged to embrace AI

Artificial Intelligence promises to be an important strategy for nonprofit organizations. It can help engage with more people where they are and in a more meaningful way. Furthermore, voice-fundraising will make it virtually effortless (pun intended) for people to support a cause at the very moment when and where they are moved to give. Some early adopters have already starting using voice-activated technology.

After 30+ years, Excel still #1 office software

In an age where technology continues to change and evolve at an accelerating pace, Excel remains the go-to software for small business and nonprofits decades after it was launched in 1985. It is the most widely utilized office software in the world with an estimated 120 million people using Excel. Its longevity can be attributed, in part, to its adaptability...however a recent insurrection among finance officers stirred up new debate about Excel’s value.

Successful consumer marketing combines digital, face-to-face strategies to make it personal

No matter the age of the customer, it is all about being in a relationship — one that has meaning to both parties. Customers, including the much-desired millennials, crave personal marketing. This lesson is resonating in the age of digital customer relationship management. All customers, including tech-savvy millennials, need more than an email to feel wanted, warns a host of business experts.

Was this the year tech giants grew a conscience?

2017 marks the year that tech giants such as Apple and Facebook began to rethink their responsibilities about how their technology impacts people and society. While 2017 may have been a year of reflection for some tech companies, it was also the year that they were able to gain an even greater foothold into our private lives

How Small Business + Nonprofits Can Benefit from the Gig Economy

In the US, approximately one-third of all workers are freelance, or nearly 54 million people, and that number is expected to grow. Cloud-based platforms are making it easier for small businesses and nonprofits to tap into the gig economy and find the people they need from a global talent pool. For companies who need flexible workers who are willing to work on a project basis, these platforms can be both convenient and cost-effective.

It's personal for successful small businesses

It’s this personal relationship between the local business owners and customers that is at the heart of a successful small business. Connections count for small business owners. The personal bonds that these businesses form with their customers can help lead to a successful launch, sales growth and, in one example, even help resurrect a business after a disaster.

The A.I. you choose might be with you for life

There is a war going on between giants and they are fighting for the right to be in your home – maybe even in your bedroom – in order to watch, listen and collect information about you. It’s probably inevitable that you will let one of them in (or maybe a new one you have not met yet), but whatever your choice, it will likely be around for a while… like your email or your bank. It will become so entrenched in your life that it will be a huge hassle if you change your mind.

Who are you? Understanding your online identity and how to protect it

In the digital world, there is no one, trusted source to verify who we are, so we fill in the same information at dozens of different sites. Each different site that gathers and verifies our info does it in a silo. The process is closed and complex with each site checking a directory of information and making a decision about whether we are who we say we are. 

So, what should we while we wait for technology and policies around digital identity to catch up?

New Wi-Fi vulnerability and why devices needs to be more connected

Consumers and businesses alike are choosing the convenience and efficiencies of being connected over the security of being "off the grid" (so to speak), and there are no signs of it slowing down. And, right now, the policies for securing these devices is in its infancy, increasing the risk for attacks.

Which Backup Solution is Right for Your Organization?

Bug in iOS 11 update prevents Microsoft accounts from sending emails

Apple has released an update to iOS, the operating system for iPhone and iPad that contains a known bug. The upgrade – iOS 11 – began rolling out on September 19 following Apple’s announcement of the new iPhone 8 and iPhone X smartphones. People using the Mail app on iPhone have a few options.


Artificial Intelligence (Semi-) Simply Defined

Even though Alexa may have been programmed to have the ability to provide pithy comebacks, AI is still in its infancy, but expected to surge over the next few years. According to a new report from Tractica, interest in implementing AI systems is growing among companies and institutions around the world, and the revenue generated from the direct and indirect application of AI software is predicted to grow from $1.4 billion in 2016 to $59.8 billion by 2025.... But what exactly is Artificial Intelligence, anyway? 

Mobile device policies are more critical than ever. Here’s what you need to know…

One of the biggest vulnerabilities in endpoint security exists with mobile devices such as laptops, phones, and tablets. So, what can you do to mitigate the risk? Develop a mobile device or BYOD policy designed to protect your organization’s technology infrastructure and sensitive data. Here are 10 considerations:

Tech Safety While On Vacation

It’s hard enough to keep your technology secure when you’re working from the office, even harder when you work remotely, but while on vacation, it’s even trickier to keep your devices and data safe. A little bit of preparation and being a little tech security savvy can prevent headaches during your summer vacation and the rest of the year.