Posted by on


In response to an article at The Daily that Office for the iPad coming in the next few weeks, Microsoft denied it’s developing an iPad version of Office Suite; a move that suggests they want to strengthen their own attempt into the tablet arena. This comes as a curious and cynical play by the software giant. The market for tablet computing is growing quickly; the iPad is the front runner with current competition from Android and Kindle. Microsoft is set to throw their hat in the ring with its next release of Windows which has a heavy focus toward a tablet interface. (See the next article for information about Windows 8). What doesn’t make sense about this is there are ways to use Office products on an iPad using iPad workplace integration tools like Microsoft Remote Desktop Services (previously known as terminal server), or from companies like Citrix. The browser versions of office available on office 365 also work on Safari on the iPad as well.  Read more...


Posted by on

The Clearwire, a wireless-broadband provider, took a heavy blow at the end of February after Google announced plans to sell all its shares in the company. Clearwire has struggled to be profitable and has requested more funding.  Clearwire Chief Executive Erik Prusch said that the company is close to securing $200 million in vendor financing.  Read more...


Posted by on

Microsoft is getting ready to unveil their new operating system, Windows 8, to the beta community. There has already been a lot of controversy surrounding the direction they are taking. Users that have seen the results of Microsoft’s labor are wondering what happened to their desktop. The interface has several options, the “Metro” look of brightly colored tiles used by their phone OS, or the classic windows 7 look.

Microsoft hasn’t done very well in the mobile computing market. This aesthetic choice is definitely a move to pick up some attention among tablet users as other companies, like Apple and Google, have left everyone behind in almost cartoonist fashion. While some are frustrated with this new interface, others are happy to see a lot of the usual desktop clutter gone. The most difficult change for either camp will be the lack of the iconic “Start” button that became the springboard for most users since Windows 95. Though Windows 7 did a lot to win back the trust lost over Vista’s pitfalls, the tech community is still a little gun shy.  Read more...


Posted by on

As the technical world takes advantage of new virtual environments and cloud storage, Symantec is noticing and keeping pace. The new product promises better reliability and an interface that is easier to navigate, but more dazzling additions are Backup Exec Cloud, for remote storage, and Backup Exec V-Ray Edition, for virtual machines. It’s great to see these options that had been absent are finally available. This was a noticeable lacking in Symantec’s products when put against up-and-coming competitors and it’s a step in a good direction.

We’ve been using Backup Exec for a very long time and continue to refer it to our clients.  If you would like information about Backup Exec 2012 or SpireTech’s cloud backup solution, please contact us.  Read more...


Posted by on

PIE PDXPortland Incubator Experiment (PIE), a uniquely Portland celebration of creativity and entrepreneurship, announced they are accepting applications for a new class. PIE, started in 2009, is a collaboration of Weiden + Kennedy and other denizens of the PDX tech community to help promising startups to get on their feet and run. This is a golden ticket opportunity that has seen the launching of many promising tech startups in Portland. Word is getting out – Over half of the applications seen previously have come from outside Oregon. The project’s success is hinged on its leverage of Portland’s vibrant creative and technical communities.

   Read more...


Posted by on
It seems like touchscreen technology just came into our lives, yet we already take it for granted that when we touch an icon on our device a very specific action will be preformed. We expect the device to get it right, each time.

Posted by on
Consumer spending heavily relies on digital currency and perhaps someday paper money will be obsolete.  It might sound fantastic but consider how often you yourself use a credit card to buy things, go online to shop, or receive gift cards preloaded with a specific amount of money.  Most likely you pay your bills via internet banking, pay-at-the-pump with a credit card, and even purchase movie tickets online.  Once you consider the frequency of which you actually use digital currency on a day-to-day basis, we aren’t really that far off from going fully digital with our currency. The Bitcoin revolution

Posted by on
This year’s Tokyo Motor Show showcased some interesting, wild, and green concept cars. With efficiency in mind, companies unleashed these eco-friendly designs that are both innovative and rather unconventional. Here are just a few

Posted by on
There’s a significant difference between Android smartphones and Apple’s iPhones. Android phones, powered by Google, allow for an impressive level of customization. Android phones are open source

Posted by on

Phishing scams are at the top of cyber criminals’ moneymaking lists. It’s disturbing that the important data of organizations such as Sony are under threat from phishing scams. But in contrast to the widespread notion, these scams affect small enterprise owners as much as they affect the big corporations.

The Internet Crime Complaint Center (partners with the FBI) and the National White Collar Crime Center (NW3C) have reported more than 300,000 cases of online phishing scams and other Internet related crimes.

To give you a better comprehension as to why your small business is of great value to a cyber criminal, let’s take a look at what phishing is exactly. 

What is phishing?

What does “phishing” mean? Phishing is the attempt to access private data, such as financial information, usernames, and passwords. This is attained by making false websites, graphics, email accounts, and phone numbers. The subject is convinced, by one method or another, to reveal these types of data that may be used to steal their identity (social security numbers are a popular target).  Read more...

1 27 28 29 30 31