tag:blogger.com,1999:blog-50667303360449603802024-02-20T02:08:32.148-05:00Kardon Tech NotesArticles and discussions concerning technology and it's use in small businesses.
Please do not ever take this as fool-proof advice or an endorsement of any product. Every situation is different.
Visit our site at http://www.kardontech.comDonnaGhttp://www.blogger.com/profile/14918805802444395169noreply@blogger.comBlogger48125tag:blogger.com,1999:blog-5066730336044960380.post-60305799107746547862015-02-02T11:30:00.001-05:002015-02-04T10:16:20.085-05:00Doxxing? Is that french?
See: Doxxing? Is that french?
Anonymoushttp://www.blogger.com/profile/06832477561233525385noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-29435866825505503692015-01-19T11:04:00.001-05:002015-02-04T10:21:22.178-05:00A default password is no password at all.
See: Kardon Tech Notes
Anonymoushttp://www.blogger.com/profile/06832477561233525385noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-2439724072668800632015-01-07T11:30:00.001-05:002015-02-04T10:21:53.135-05:00Podcasts? Don’t be afraid.
See Kardon Tech Notes
Anonymoushttp://www.blogger.com/profile/06832477561233525385noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-83003535060496781572014-12-08T11:38:00.001-05:002015-02-04T10:22:31.757-05:00Two-Factor Authentication. What in the heck is that? And why should I use it?
See Kardon Tech Notes
Anonymoushttp://www.blogger.com/profile/06832477561233525385noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-65297268332258914732014-12-01T11:43:00.001-05:002015-02-04T10:22:43.211-05:00Wipe Data From Your Old SmartPhone
See Kardon Tech Notes
Anonymoushttp://www.blogger.com/profile/06832477561233525385noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-59635294417314064162014-11-10T13:22:00.001-05:002015-02-04T10:22:52.117-05:00Set your clocks back. Check your Crypto protection!
See Kardon Tech Notes
Anonymoushttp://www.blogger.com/profile/06832477561233525385noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-24122303444410180182012-06-26T09:15:00.000-04:002012-06-26T09:15:27.545-04:00Mobile Location-Based Apps and Services
There are approximately 93.1 million smart phone users in
the United States today, up 11% from 2011.
With this increase comes more access to location-based apps and
services.
Location-based services have become very useful in social
networking today. Advances in smart
phone technology are allowing people to use their mobile devices to get location-based
information Christa Hartmanhttp://www.blogger.com/profile/12425069886559770006noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-44289342176428942562012-06-14T10:23:00.000-04:002012-06-14T10:23:59.464-04:00Tablet or E-Reader? B/W or Color? WiFi or 3G? Please, make it stop.In the last blog, we helped solve the maze of products that has become the Amazon Kindle line of products. From entry-level e-readers to a color feature-filled tablet, there is a Kindle product that will fulfill your mobile computing desires.
Now, before you run off and go Kindle shopping, the important thing to remember is there are tablets falling from the sky these days. Big, small, heavy, Anonymousnoreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-56231811543006926182012-06-08T12:23:00.000-04:002012-06-08T12:25:35.667-04:00Kindle Komparison
(Credit: Danny Sullivan)
If the market for tablets and e-readers was not confusing enough, Amazon has been nice enough to throw out half a dozen Kindle models to choose from. There are enough choices to make your head spin and the choices provide just enough doubt to wonder if you are buying the right device for you.
In this blog post, I am going to look at the bare basics of the four Anonymousnoreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-20558276535413393212012-05-30T15:16:00.000-04:002012-05-30T15:27:09.143-04:00Power Cords for Laptops - Are they all the same?If you’re like me, you rely heavily on some sort of a
computer for work and/or play. For me,
my “computer” comes in the form of a laptop, iPad, and iPhone. You could say I have at least one of these
devices on me at all times. Of course, I
use my laptop for the heavy lifting – it’s portable and convenient. One of the most important laptop
accessories is a power cord.  Christa Hartmanhttp://www.blogger.com/profile/12425069886559770006noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-36456734648328436912012-05-16T10:30:00.000-04:002012-05-16T10:30:00.857-04:00Where is the next data breach?
Data security is
the ever present concern for the health industry. Doctor/Patient confidentiality
is imperative for medical personnel. With recent changes to HIPAA regulations
and the HITECH Act, as part of the ARRA stimulus, have brought the importance
of data security back to the forefront of medical concerns.
&Anonymousnoreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-30127609768076213102012-04-25T12:29:00.001-04:002012-04-25T12:29:38.639-04:00Battery Woes for Mobile Devices
In the “old days”, you could get away for the weekend
without the need to take your cell phone charger, much less have to recharge
your battery. But with the growing
technology being built into smartphones and tablets today, powering these
devices is draining batteries quickly.
Thereby, requiring you to be tethered to your charger and re-charging
your battery during the day.
Christa Hartmanhttp://www.blogger.com/profile/12425069886559770006noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-78121082418412970562012-04-05T10:10:00.000-04:002012-04-12T22:44:15.960-04:00Cloud Backup HIPAA StyleWith the advent of cloud computing, there has been an explosion of internet-based software and software solutions. One of the specific areas of development is cloud-based storage. The importance of data backup has always been at the forefront of any smart company’s technology needs. That need has moved from tape drives to external drives to DVDs and, now, online solutions.
It is imperative that Anonymousnoreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-41453021375966253462012-03-28T13:02:00.000-04:002012-03-28T13:02:43.340-04:00Should I Replace My Desktop PC with a Laptop?
Laptop vs Desktop Computer
Which came first the Desktop computer or the Laptop? Well that’s not as hard as the “chicken or the egg” question. Answer: The desktop, of course. Desktop computers typically consist of several separate components: a tower (CPU), display (monitor), keyboard, and mouse. Whereas, a laptop was designed to combine all those components in one portable device.
In Christa Hartmanhttp://www.blogger.com/profile/12425069886559770006noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-87542480333168148842012-03-09T12:37:00.000-05:002012-03-09T12:37:31.881-05:00HELP! I have too many passwords!
Password overload. These days, that can become so serious that it borders on a medical disorder. Everyone has a password for their computer, for their email, for their phone, for Facebook, for company software, plus half a dozen other computer related things.
Invariably, people will create shortcuts to avoid the stress of Anonymousnoreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-8171335059294007532012-02-29T12:20:00.000-05:002012-02-29T12:20:31.411-05:00Phishing Email Scams - What They Are and How to Avoid Them
Phishing scams have been rapidly growing on the Internet for years. It is a means of online identity theft and fraud. Phishing emails typically look authentic and claim to be from a trustworthy company, usually a banking institution, credit card company, or other financial organization. Some phishing scams seek to steal personal information and financial data. Others can infect computers Christa Hartmanhttp://www.blogger.com/profile/12425069886559770006noreply@blogger.com1tag:blogger.com,1999:blog-5066730336044960380.post-52020213830197375402012-02-16T11:14:00.000-05:002012-02-16T11:14:36.467-05:00Which mobile OS do I need? Part 2 of 2
Last time we discussed which mobile operating system would be best for you, as a consumer. In the end, it came down to personal preference. There are positives and negatives for each design. Easy-to-use and smooth design lends itself to an iPhone, while versatility and customization lead you to Android.
When it comes to smart phones in an enterprise situation, consumer preference can find Anonymousnoreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-30866552395813337932012-02-08T14:11:00.000-05:002012-02-08T14:11:20.575-05:00Which Mobile OS do I need? Part 1 of 2
In an effort to make the world complex beyond our wildest dreams, cell phone choices have exploded over the past decade. It was not that long ago that cell phone choice was made between the gray Motorola brick or the black Motorola briefcase phone. Then, you could choose between smaller and smaller or, in true futuristic technology, a flip-phone. These days, the term “smartphone” has invaded ourAnonymousnoreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-55551085412040739932012-01-24T15:32:00.000-05:002012-01-24T15:32:01.792-05:00Important Concerns When Moving Your Apps to the Cloud
Internet-based services have been around for more than a decade. Believe it or not, many of us already have a foot in the cloud. For instance, if you use Gmail you are in the cloud allowing Google to handle your email (and Hotmail, and Yahoo). There are also a growing number of tools and applications for businesses available online. More and more businesses are exploring options of moving Christa Hartmanhttp://www.blogger.com/profile/12425069886559770006noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-46110366341378643342012-01-13T12:57:00.000-05:002012-01-13T13:03:56.343-05:00Data Sharing - Part 2 of 2
Last time, we discussed hardware solutions for data sharing issues. Software and cloud solutions provide a more flexible way to share data across multiple platforms. They also combine similar ideas to allow for backup, sharing between people, and sharing between your own devices.
Dropbox and YouSendIt are two software solutions that provide the desktop ability to share or move data Anonymousnoreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-52895665511024097712012-01-09T10:26:00.000-05:002012-01-09T11:12:26.682-05:00Data Sharing - Part 1 of 2In today’s busy world, the idea of mobile computing has invaded every aspect of life. Work and play is filled with using a computer on the train, on the couch, in the office, at your house, with a mouse, at the park, for just a lark.
The avenue of information gathering is filled with laptops, phones, tablets, netbooks, and even that trusty desktop sitting at home. Our daily lives are spread Anonymousnoreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-8961674474903344922012-01-04T19:55:00.001-05:002012-01-26T18:21:20.062-05:00Email is Absolutely NOT a Secure Way to Exchange InformationIf anyone tells you email is secure, don't believe them. I now explain email security the same way my brother-in-law explained text messages to his teenage son. "Don't put anything in a text message you wouldn't mind seeing on the front page of the local newspaper."
There are both technical and human reasons this statement is true.
Email is just like a postcard. If you Anonymoushttp://www.blogger.com/profile/06832477561233525385noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-91955833653973691892011-12-29T09:20:00.000-05:002011-12-29T09:24:50.301-05:00Donating PCs and Other EquipmentNow that 2011 is winding down, you may discover you have some old PCs, smart phones, peripherals, tablets, and flash drives laying around. Why not donate them? There are several reasons to donate or recycle your used equipment. According to techsoup.org:
75% of the fossil fuels and energy used by a computer are actually consumed during manufacturing. Extending the computer’s lifespan through Christa Hartmanhttp://www.blogger.com/profile/12425069886559770006noreply@blogger.com1tag:blogger.com,1999:blog-5066730336044960380.post-10295490400976339042011-12-14T09:46:00.000-05:002011-12-14T09:52:24.158-05:00Are you updated or outdated?Most Android and iPhone users know that the real value of their smartphones lies in the Apps. The App Stores make a smartphone a handheld computer that also makes phone calls. Otherwise, the device is a phone that can do some cool things.
Many people, though, don't understand what they are really doing when they download an App. Many of you can recall when you purchased Anonymoushttp://www.blogger.com/profile/06832477561233525385noreply@blogger.com0tag:blogger.com,1999:blog-5066730336044960380.post-11058353025395198712011-12-06T11:59:00.000-05:002011-12-09T13:19:54.219-05:002011 Web Products of the Year Blog
As we enter December, it is time for year-end wrap-ups of all kinds. Images, songs, movies of the year provide time to reflect on what was a part of our life for the past 12 months. With ReadWriteWeb’s Top Consumer Web Products of 2011, we can see just how attached to web technology our lives have become.
The top 5 list gives us a glimpse in to what is most important for our technology. The Anonymousnoreply@blogger.com0