20 Oct Turning off electronics can be a real turn on
It’s amazing how dependent we’ve become on technology and how connected we are to our mobile devices. Read more...
It’s amazing how dependent we’ve become on technology and how connected we are to our mobile devices. Read more...
If something is worth protecting, then it’s worth the extra time and effort needed to ensure its security. Proprietary and confidential mean just that, and these terms should be taken seriously and not applied haphazardly. Read more...
At some point in your life, you’ve probably been sick or had a minor injury. Before the advent of smartphones and even the Internet, when this happened you would schedule an appointment with your doctor. Now, however, people are turning to websites and apps to...
Getting a diagnosis of depression usually involves filling out questionnaires about your mood and undergoing lengthy interviews with a psychiatrist. But smartphone apps might be able to handle some of that work, and at least tell you if you are at risk of depression, simply...
The term “friending” refers to adding someone to a list of friends on a social media website. This list is more of a contact database rather than meaning someone on it is actually your friend. And yet, the popularity of social media can’t be ignored....
Social media is not often associated with learning, yet it is emerging as the next tool for employers to improve upon the learning environment for their workforce. Read more here...
It used to be in the workplace that if someone typed something they shouldn’t have, such as in a paper or email, then they could often try and retract or delete it or make the recipient swear that he or she wouldn’t share it. However,...
When a cyber security breach hits the news, those most closely involved often have incentive to play up the sophistication of the attack. Read more here...
With social media at the forefront of the internet, how should you go about using it during the interview process? Learn more here...
Once hackers set their sights on a target with access to sensitive company information, attacks may ensue from multiple directions – in the office, at home or on the move. Read more here...