Entries by Garin Livingstone

3 Simple Steps To Secure Your Mobile Device

Three simple steps to keep your mobile device secure: Turn off the Wi-Fi capability when not using it Turn off GeoLocator when not needed Logout and lock when finished See Ray Ramon’s article at http://www.smallbiztechnology.com/archive/2014/02/3-simple-ways-to-be-secure-no-wifi-no-geolocation-logout.html/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Smallbiztechnologycom-SmbNewsAndInsight+%28Smallbiztechnology.com+-+small+biz+tech+news+and+insight%29 for more information.

Bryley Basics: Encrypt your iPhone

iPhones, versions 3GS and later, offer hardware encryption; it is activated through the data-protection feature by enabling a passcode: Tap Settings > General > Passcode. Follow the prompts to create a passcode. After the passcode is set, scroll down to the bottom of the screen and verify that “Data protection is enabled” is visible. Note: […]

Maintaining your dynamic website

Guest writers: Al Morel, Carlos Ramos, and Dan Rouse of www.CommAreUs.com Your car, house, and most things in life, take some amount of maintenance. Add to that list your website. A website can be comprised of thousands of files working with all kinds of tools and underlying code. The days of ‘static’ websites, i.e. built […]

Google’s ChromeBook – A realistic alternative to a Windows Ultrabook?

Google introduced its Chromebook in 2009; sales have increased and it can be considered a low-cost alternative to the pricier, Microsoft Windows-based Ultrabook, but Chromebooks have significant limitations.  Some also say that a Chromebook can replace a tablet, but comparison1 suggests otherwise. Chromebooks run Chrome OS, Google’s Linux-based operating system integrated with Google’s Chrome web […]

Roy Pacitto works almost 20 years at Bryley Systems

Bryley employees were recently celebrating Roy’s 20th anniversary when someone pointed out that it was a year early.  Since we already had a 20th-year cake, we ate it anyway. Roy, a key member of the management team, started as service manager in 1995. He moved to the sales team in 1997; in the mid-2000s he […]

What is the business case for Windows-Server virtualization?

Windows-Server virtualization, the deployment of a virtual version of a Windows-Server operating environment, is used to reduce hardware costs, gain efficiencies, and improve the availability of computing resources.  It refers to installing a virtual environment onto one or more “virtualized” hardware servers (termed Physical Hosts) and deploying multiple virtual Windows-Server operating systems (termed Virtual Guests) […]

Deploying software systems to manage a growing organization

Most organizations use software to manage at least these items: Accounting – Perform vital bookkeeping and accounting functions Contacts – Organize and manage clients, prospects, vendors, etc. Operations – Match assets to organization’s need on a daily basis In organizations with funding limitations, deployment of a software-based system to manage specific functions often starts as […]

Comparing Cloud-based services (Complete Overview)

Many Cloud-based services fall into one of these categories: Productivity suites – Applications that help you be more productive Storage – Storing, retrieving, and synchronizing files in the Cloud Backup and Recovery – Backing-up data and being able to recover it Prevention – Prevent malware, typically spam and related components Each category is represented below […]

Protect your mobile device

The need to secure newer mobile devices (smartphones, tablets, etc.) has grown since they now meet the basic criteria for malicious, cyberspace-based attack: Developer kits are readily available Mobile devices are in widespread use throughout the world Motivation is increasing since usable/saleable data live on these devices In addition, BYOD (Bring Your Own Device) has […]