Movie Review: Man Vs Snake: The Long and Twisted Tail of Nibbler
Man Vs Snake

Rewind back to the early 80s in small town Iowa. It is the golden age of arcade games, the era that brought us some of the big-hit classics, like Donkey Kong and Pac-Man. Teens everywhere are obsessed with video games and conquering them, especially Tim McVey (not to get confused with the terrorist, the documentary explains). In 1982, the game Nibbler made its debut.

6 Considerations Professionals Should Make with Each Laptop Purchase

Your laptop is your go-to for everything from email and productivity to gaming and social networking. Everyone wants the highest performance, but it is important to consider the price and other key factors when choosing the right business laptop.

Don’t Fall Victim to an IRS Phishing Scam
IRS Phishing

With tax season upon us, we’re starting to get reports of people receiving phishing emails purportedly from the IRS. It’s important to keep an eye out for these, know how to identify them, learn to avoid them and, if possible, filter them out entirely.

Powerful Project Planning Pointers to Focus on in the New Year

Does your company have any New Year’s resolutions? Communicate better? Spend less? Work harder? Work smarter?

What about project management?  Proper project planning is essential in today’s fast-paced, tech-dominated world and keeping your team on target is essential for success. “Plan the work and work the plan” is a popular piece of advice and utilizing proper project management can be a great way to stay ahead of the pack and to deliver consistent business results.

Beat the Cloud with your own network and the magic of a VPN

Today we’re going back to basics in understanding VPNs. We’ll unpack just what a VPN is and how it’s implemented. Then we’ll look at how a VPN can give you all the mobility of the Cloud with the full control and security of you own, in-house server and data storage.

What Is a VPN?

VPN means Virtual Private Network and it allows your computer to access your private office network over a public network.

2016: A year of Change for Advantage Technology

It has been a year of change here at Advantage Technology. So, let’s take a look at the biggest stories with this year-end wrap up and then we’ll look to what technological wonders 2017 year has in store.

2016 Tech Review
Augmented Reality

2016 has been a real banner year for technology. We’ve seen the mainstream finally come to terms with the need to take cyber security seriously with the hacks of Internet of Things devices, email hacking scandals and the rise of ransomware. We’ve learned that not everything you read on the Internet is true with the controversies surrounding “fake news” online. We’ve seen the proclamation that we’ve entered the post-PC era… again. Not to mention the fact that we might be in the post-headphone era.

Recently Discovered Vulnerability in NEC Phone Systems Leaves Thousands Vulnerable to Toll Fraud
NEC SL1100

Our telecommunications engineers have recently discovered a security vulnerability in the popular NEC SL1100 phone systems that can be exploited for toll fraud. Commonly known as “phreaking,” Toll fraud is the practice of exploiting vulnerabilities in phone systems and is quite possibly the oldest form of hacking. To this day, phreaking accounts for more monetary damage than credit card fraud.

Let’s talk about Our People
Advantage Technology

On Tuesday, December 13th, I returned to 580 WCHS’s Ask The Expert radio show with Dale Cooper to wrap up the year and talk about the dynamics of our innovative and relationship-driven company and take general tech support calls. At Advantage Technology, we stand by the fact that Our Advantage is Our People and I discussed some of the most important characteristics of our company that has made us who we are today.

How we’ve improved Advantage Backup and Recovery to disaster-proof your data
Backup and Recovery

If you’ve ever had a hardware disaster, you know it comes at the most inconvenient of times. Even the smallest of businesses have huge amounts of data and protecting that data is essential to daily operations and productivity.  There are many actions that a business can take to ensure protection from data threats and disasters. The primary and the most fundamental thing that needs to be in place is a data backup and recovery plan.