Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Make Sure Your Mobile Device Policy Covers These 3 Areas

Tip of the Week: Make Sure Your Mobile Device Policy Covers These 3 Areas

If we asked you to count the number of mobile devices in your workplace, would you be able to do so? This includes smartphones, laptops, tablets, and others--anything that’s not a workstation or hardware tied down to your location. While mobile devices can be beneficial for any business, it’s still important to keep security at the top of your mind. Here are three topics that you need to be sure you’ve considered before allowing mobile devices in the workplace.

Continue reading
0 Comments

For Emergency Purposes Only: Users Can Now Activate Facebook’s Safety Check

For Emergency Purposes Only: Users Can Now Activate Facebook’s Safety Check

Since 2014, Facebook has quietly featured Safety Check, a crisis response tool that lets users in areas struck by natural disasters or other emergencies to confirm their safety on the social network. Originally, Facebook itself would have to activate a Safety Check, but that has changed--the power to activate a safety check is now in the hands of the stricken community.

Continue reading
0 Comments

What Kind of a Story Do Readers Want? Big Data Knows

What Kind of a Story Do Readers Want? Big Data Knows

Sometimes it can be tricky to identify what will be popular in the years to come, but that doesn’t stop big data from trying. Cultural anomalies are particularly difficult to predict, but an algorithm is attempting to predict which modern novel will become the next big bestseller. Jodie Archer, author of an upcoming book titled The Bestseller Code: Anatomy of the Blockbuster Novel, takes a critical look at what makes something popular amongst consumers--particularly in regard to literature.

Continue reading
0 Comments

3 Advantages to Hosting Your Own Phone System In-House

3 Advantages to Hosting Your Own Phone System In-House

A lot has been said about communications solutions, particularly in regard to the advantages and disadvantages of hosted and in-house telephony infrastructures. While businesses find that a cloud-hosted VoIP phone system is very convenient, there are others who believe that an on-site telephony infrastructure presents a certain value.

Continue reading
0 Comments

eBay Revamps Security Protocols. Should Your Business Follow Suit?

eBay Revamps Security Protocols. Should Your Business Follow Suit?

As technology advances and allows for common pain points to be corrected, many of today’s most well-known entities will adopt new solutions to ease the experience of their customers and clients. Take, for example, eBay. The famous reselling site has been taking steps to install an assortment of new features to improve its customers’ experience.

Continue reading
0 Comments

Sign Up for Our Newsletter

captcharefresh

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Workplace Tips Windows 10 Miscellaneous Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication User Tips IT Support VoIP Business Management Email Network Holiday Data Quick Tips Virtualization Smartphone Server Going Green Office Business Continuity Mobile Device Management Saving Money Apps Disaster Recovery Alert Save Money Remote Computing Operating System Social Media Upgrade Small Business Android Chrome Microsoft Office Social Application Facebook Best Practice Employer-Employee Relationship Ransomware WiFi Identity Theft The Internet of Things Big Data Managed Service Provider Antivirus Mobility Passwords BYOD Law Enforcement Analytics History Office Tips Search Gmail Password Browser Current Events Government Information Technology Spam Bandwidth Saving Time Unified Threat Management Hacking Lithium-ion battery Tablet Printer Gadgets Smartphones USB Users Wireless Encryption Money Data Management Streaming Media Remote Monitoring Tech Support Education Work/Life Balance communications User Error Computers intranet Disaster Telephone Systems Net Neutrality Firewall iPhone Collaboration Humor Laptop Avoiding Downtime Phone System Router Recovery Apple Network Security Hard Drives Maintenance Automation Fraud Managing Stress Private Cloud Wireless Technology Outlook Update Printer Server Personal Information VPN Marketing Budget Administration Managed IT Services Shortcut Business Intelligence App Transportation Content Filtering Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Fax Server Cost Management Telephony Customer Service IT Consultant Wi-Fi Retail Data Loss Flexibility BDR Virtual Reality Entertainment Google Drive DDoS Wearable Technology Benefits Proactive IT Mobile Office Online Currency Office 365 Cybercrime Risk Management IT Solutions Black Market 3D Printing Files Two-factor Authentication Bluetooth Electronic Medical Records RAM Trending Website HaaS Ebay Instant Messaging Chromecast Customer Relationship Management Cameras SharePoint User Safety CPU Amazon Data Theft Excel Blogging Battery Administrator Teamwork Best Available Emergency Reputation Slow Smart Phones CloudSync Presentation Automobile Access Meetings Cleaning Hosted Solution Compliance Science Windows 8 Programming Worker Commute End of Support Running Cable Phishing Save Time Video Games Inbound Marketing Vendor Management Emails Networking Audit Robot Advertising Hacker OneNote Legal Computing Twitter Human Resources Near Field Communication Data storage PDF Keyboard OneDrive Uninterrupted Power Supply Prodcuctivity Bring Your Own Device Politics Text Messaging Paperless Office Computer Accessories Hiring/Firing Online Backup Workplace Scalability Internet of Things Bloatware IT consulting Experience Applications Artificial Intelligence Distributed Denial of Service Miscelllaneous Mouse How To Sports Display Branding Music Touchpad eWaste HIPAA Network Congestion Travel Regulations WIndows 7 Books Operating Sysytem Television Storage ISP

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code