Using Zoom – You need to read this before your next meeting.
Zoom, in its present form, has several security vulnerabilities that you need to be aware of that can be managed...
Zoom, in its present form, has several security vulnerabilities that you need to be aware of that can be managed...
If you are not technical and have been reading about what happened in Iowa, you will get the impression that...
You can now see what apps share data with FB and its scary. In my case 267 apps have shared...
AWS Billing – What is EC2-Other One question I always get relates to AWS billing,specifically EC2-other. Hopefully, this post...
With the release of Catalina, Apple has added a new security requirement. “Mac apps, installer packages, and kernel extensions that...
This is a technology blog that will cover multiple technology areas including the following: General Cloud Computing AWS (Amazon Web...
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec elementum augue vitae mauris accumsan, eu ultrices nisi luctus. Vivamus iaculis...
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec elementum augue vitae mauris accumsan, eu ultrices nisi luctus. Vivamus iaculis...
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec elementum augue vitae mauris accumsan, eu ultrices nisi luctus. Vivamus iaculis...