February 24th, 2018 by Jennifer Lough
This is the first of a multipart series on common types of malware and other computer hazards. For those who have managed services with Micro Visions, we’re keeping an eye on threats for you. However, there are always small things you can do to further protect yourself.
Part 1: Viruses and Worms Read the rest of this entry »
February 12th, 2018 by Jennifer Lough
The latest cellular technology that mobile phone companies are touting is 5G, due for release in the next year or two. If you’re wondering what that means and why it’s going to be better that whatever you have now, read on. Read the rest of this entry »
February 4th, 2018 by Jennifer Lough
Cryptocurrency: online currency based on a peer-to-peer network (as opposed to any central entity, like a bank for traditional currency). The system is decentralized, so no single entity controls exchanges. To prevent corrupted transactions, the currency exchanges use blockchain technology. This means that multiple machines host data (as opposed to one central server). As a result, data are completely public, similar to a Google Doc.
How does cryptocurrency work? Read the rest of this entry »