Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Researchers Investigated Internet-Connected Surveillance Cameras, What They Found is Unbelievable

b2ap3_thumbnail_internet_of_things_presents_risk_400.jpgThere’s a reason why IT professionals think that the Internet of things is a major security discrepancy. Around 5.5 million new devices are being connected to the Internet every day, and are giving security experts a run for their money. The Internet of Things and its devices could potentially become a security hazard for businesses that aren’t prepared to protect their assets from hacks.

Continue reading
0 Comments

Using a Camera With Chicken Grease on Your Hands is a Bad Idea, But Don’t Tell KFC That [VIDEO]

b2ap3_thumbnail_curious_use_of_technology_400.jpgWe’ve seen some pretty incredible technology developed in the past several years, but all of it pales in comparison to the epitome of the Internet of Things: the KFC Memories Bucket. Why? Because nothing says “the future,” like printing your family’s photos out of a family meal chicken bucket.

Continue reading
0 Comments

The Internet of Things is Changing the Way Businesses View Online Threats

b2ap3_thumbnail_internet_of_things_400.jpgWhen you think of the Internet of Things, does your mind immediately wander into the realm of connected devices that change the way we interact with each other? Or, does it consider the security issues that can potentially become a threat to your entire network and technology infrastructure? Hopefully it’s a little of both, with an emphasis placed on security.

Continue reading
0 Comments

The Internet of Things Might Invoke Murder, Ransom, and More

b2ap3_thumbnail_internet_of_things_death_400.jpgWith the Internet of Things connecting more devices to the Internet, these devices can potentially be turned to nefarious use. Despite all of the benefits of the Internet of Things, like big data analytics, anything connected to the Internet is threatened by cyber crime to at least some degree. In fact, some professionals believe that the Internet of Things will usher in an era of new types of cyber crime; murder included.

Continue reading
0 Comments

Even Farmers Can Take Advantage of the Internet of Things

b2ap3_thumbnail_big_data_farmer_400.jpgThe Internet of Things is on its way, and we are seeing new applications for web-connected devices every day. Perhaps one of the most interesting ways to use Internet of Things technology is its integration into agriculture, or more specifically, artichoke growing at Ocean Mist Farms in Salinas Valley, California.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Business Computing Google Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips IT Support Communication VoIP Business Management Data Quick Tips Virtualization Smartphone Server Network Email Holiday Saving Money Apps Disaster Recovery Alert Save Money Remote Computing Operating System Social Media Upgrade Going Green Business Continuity Office Mobile Device Management Small Business Android Chrome Social Facebook Mobility WiFi Application Identity Theft The Internet of Things Best Practice Big Data Antivirus Managed Service Provider Employer-Employee Relationship Microsoft Office Ransomware Analytics History Gmail Search Browser Current Events Government Law Enforcement Information Technology Office Tips Spam Saving Time Bandwidth Password Unified Threat Management Lithium-ion battery Hacking Tablet Printer Passwords BYOD Encryption Recovery Network Security Remote Monitoring Automation Streaming Media Tech Support Education User Error intranet Net Neutrality Firewall Computers Disaster iPhone Collaboration Laptop Avoiding Downtime Money Phone System Data Management Router Hard Drives Maintenance Apple Wireless Fraud communications Gadgets Telephone Systems Smartphones Work/Life Balance Users Humor USB Printer Server VPN Benefits Wi-Fi Flexibility Marketing App Administration Cybercrime Risk Management Content Filtering Fax Server Managing Stress Point of Sale IT Consultant Private Cloud Wireless Technology PowerPoint Cost Management Data Loss Office 365 Update Retail Wearable Technology BDR Entertainment Proactive IT Budget Mobile Office Online Currency Personal Information Shortcut Business Intelligence Transportation Internet Exlporer Biometrics Social Engineering IT Solutions Telephony Customer Service Managed IT Services Virtual Reality Google Drive DDoS Outlook Data Theft Internet of Things Bloatware Legal Slow IT consulting Smart Phones Applications Artificial Intelligence Distributed Denial of Service Keyboard Mouse CloudSync Sports Branding Politics Windows 8 Touchpad eWaste Hiring/Firing Network Congestion Compliance Programming Scalability Experience WIndows 7 Vendor Management Operating Sysytem Television Storage Inbound Marketing Files Two-factor Authentication How To Bluetooth Music Emails Audit Computing Trending Twitter OneNote Chromecast Customer Relationship Management SharePoint Books User Prodcuctivity Excel Black Market OneDrive Administrator Online Backup Reputation Teamwork Electronic Medical Records Best Available Bring Your Own Device HaaS Paperless Office Instant Messaging Presentation Workplace Access Meetings Safety Display Hosted Solution Science Miscelllaneous Battery End of Support Running Cable Emergency Phishing HIPAA Networking Automobile Travel Robot Advertising Cleaning Regulations ISP RAM Human Resources Worker Commute Near Field Communication 3D Printing Website Data storage Ebay PDF Save Time Uninterrupted Power Supply Video Games CPU Amazon Blogging Text Messaging Hacker Cameras Computer Accessories

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code