Tech gifts from the recent pass

Fifteen years of various tech gifts.  Like all in computing, things have gotten more innovative along with faster, better, and cheaper.  And it's a lot more connected than in 1999.

Do you remember what gifts you were giving—or more importantly, hoping to get—a few years back? Tech devices have long been a holiday favorite, but technology changes fast. The top spots on our own wish lists rarely stay the same day-to-day, let alone year-to-year. So we thought it would be fun to revisit some of the coolest tech gifts of the last 15 years to see what it was we loved about them—and if we still would put them on our wish list today.


Top Business EDGE eNews entries for 2014

With the end of the year upon us, we begin looking at what's going to happen in 2015.  However, we also look back on the year just ended.  In that regard, we took a look at our Business EDGE eNews Blog and reviewed the top five most read articles for 2014:

1. Myths regarding the use of refilled toner cartridges:

2. Securty Habits of Effective PC Users: 


Getting customer emails

Do you run an onlne business?  Do you have customers that you'd like to regularly email?  Read on!

"Putting a sign-up box on your home page should be the first thing on anybody's mind when they start an online business."

— Louis Jay, President, Health4her

If you're like most small-business owners, you need a generous supply of potential customer names and email addresses to effectively market your offerings online.

The good news is you don't have to deceive or spam people to get them. The bad news is that too many others have already taken that route, giving online marketing a shady reputation.

Unlike the offline world, where consumers get junk mail daily and simply toss it into the recycling bin, unwanted email messages offend people and trigger nasty replies. People are more protective than ever of their email addresses.

"Spammers have made it bad for the rest of us," says Derek Scruggs, an expert on permission-based email marketing. So you shouldn't be one yourself; there are enough already out there.


7 Steps for Safer Surfing

You might not think about it when you’re browsing the web, shopping online and interacting on social media, but you are the first line of defense against cyber security risks. The power to be safe is in your hands, and at your fingertips. Developing and maintaining good habits can make online activity much safer, and more enjoyable for you and your colleagues.
The following 7 good habits take only minutes to learn. and are easy enough to incorporate into your daily work life.


Email Systems -- Change is in the Air

Editors Note:  Where and how email is stored and managed is one of the hottest topics for our clients.  This is a good overview article of some of the available options.  We're familiar with all the techniques described here and have clients using "on premise" email systems and various "hosted" solutions. This is one area where "one size" definitely does NOT fit all. Contact us when your email system needs to updated, upgraded, or for us to help you figure out which email management system is best for you.

When it comes to business email, change is in the air.

Web-based platforms have all but taken over the personal email market—Gmail alone has over 425 million active users worldwide and counting [1]. With Microsoft® also ending extended product support for Exchange Server 2003, now could easily seem like the perfect time to switch your office desktop email client and server to an online solution.

But most small businesses should think twice.


Previous Entries / More Entries