teXium Blog

This is some blog description about this site

Using a Camera With Chicken Grease on Your Hands is a Bad Idea, But Don’t Tell KFC That [VIDEO]

b2ap3_thumbnail_curious_use_of_technology_400.jpgWe’ve seen some pretty incredible technology developed in the past several years, but all of it pales in comparison to the epitome of the Internet of Things: the KFC Memories Bucket. Why? Because nothing says “the future,” like printing your family’s photos out of a family meal chicken bucket.

Continue reading
  772 Hits
  0 Comment
772 Hits
0 Comment

Spending on Cloud IT Infrastructures Projected to Reach $33.4 Billion in 2015

b2ap3_thumbnail_cloud_computing_enhancement_400.jpgHow much thought have you put into your business’s cloud solution? If you haven’t already considered cloud computing, you definitely should. There’s a reason why cloud spending is in third place overall in IT expenditures, and that’s thanks to the overwhelming benefits that it offers in contrast to the traditional IT network model.

Continue reading
  741 Hits
  0 Comment
741 Hits
0 Comment

Tip of the Week: 4 Ways to Help Prevent Comment Spam

b2ap3_thumbnail_what_to_do_with_comment_spam_400.jpgWhile it might be nice to imagine making $500 a day by working from home, this is the type of thing only really seen in a website’s spam comments. If these annoyances are common, know that you’re not alone. Even the most innocent sites can be stricken with this issue. So, how can you minimize spam comments?

Continue reading
  917 Hits
  0 Comment
917 Hits
0 Comment

Don’t Fix an IT Problem Just to Have to Fix it Again

b2ap3_thumbnail_your_companys_it_budget_400.jpgWe live in a world where money is the solution to all problems. If you have a problematic piece of technology, what do you do to fix it? You can call in the professionals, or shell out for new hardware or software. Either way, you’re spending money, but the difference in how much you need to spend depends on the policies your IT support budget specifies.

Continue reading
  1105 Hits
  0 Comment
1105 Hits
0 Comment

Your Biggest Vulnerability May Come From Forgetting to Logout

b2ap3_thumbnail_your_workspace_400.jpgEven if you have the best network security tools in place, you can still fall victim to a major data breach, just by doing something as seemingly-harmless as not manually logging out of your online accounts.

Continue reading
  877 Hits
  0 Comment
877 Hits
0 Comment