Corporate Technology Group Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Recent blog posts

b2ap3_thumbnail_checking_the_secs_of_your_machine_400.jpg“What kind of computer have you got there?” For a novice computer user who knows very little about this sort of thing, being asked a basic question like this can be baffling. You don’t have to be embarrassed by your lack of technical prowess. Microsoft makes it easy to find out what you’ve “got under the hood.”

0
Continue reading 0 Comments

b2ap3_thumbnail_social_media_engagement_400.jpgRegardless of how much interaction you get on your company’s social media pages, you want more. You want to be like one of those big corporations that get a ton of hits and likes. But did you know that not even major corporations get a lot of views?

0
Continue reading 0 Comments

b2ap3_thumbnail_employer_responsibility_400.jpgWhen you hire a new employee, you make it clear what the job’s expectations are. You expect them to be productive, and you provide them with an environment that’s conducive to getting the job done. This leads us to ask a fundamental question about workplace productivity: How much responsibility do you have in aiding your employees’ productivity?

0
Continue reading 0 Comments

b2ap3_thumbnail_stealing_my_wifi_400.jpgWireless connections like WiFi can be tricky at times. Either they don’t work, the connection isn’t a very good one, or there are too many people using it for it to be effective. Whatever the reason, you can bet that there are people using your WiFi who shouldn’t be can be. This can lead to many problems including security concerns, slow browsing speeds, and more.

0
Continue reading 0 Comments

b2ap3_thumbnail_failed_backedup_400.jpgWhen a disaster strikes, you should be able to recover quickly and efficiently with minimal downtime. Unfortunately, for some businesses, things don’t work out quite so smoothly. If your backup doesn’t process correctly, you might be in a bind when it comes time to restore operations from your backed-up data. How does one go about troubleshooting a failed backup?

0
Continue reading 0 Comments

b2ap3_thumbnail_radioshack_400.jpg“It’s as if a thousand stores cried out in terror.” This was the case February when RadioShack filed for Chapter 11 bankruptcy and announced plans to sell between 1,500 and 2,400 of its stores. For anybody with an affinity for technology, this announcement is sad news. Let’s honor the passing of an American institution by taking a look back at the Shack.

0
Continue reading 0 Comments

Why Bother Archiving Your Email?

Posted by on in Business

b2ap3_thumbnail_archiving_your_email_400.jpgWhat’s the point of archiving company emails? After all, it takes up a significant amount of storage space that might be used for other, more important information. Maybe it’s because you’re forced to do so by some regulation, but there are other reasons that archiving your email is a good thing. Whatever the reason, you’ve made the right choice by archiving your email.

Tagged in: Email Search Storage
0
Continue reading 0 Comments

b2ap3_thumbnail_community_interaction_with_your_business_400.jpgAs a business owner, you know that the key to the path of your success is in the relationships that you forge along the way. These same relationships can be just the boost you need to get the edge on your competitors and knock them out of the game. It all comes down to your communication with the your surrounding community.

0
Continue reading 0 Comments

Meet Sway, Microsoft’s New Office App

Posted by on in Technology

b2ap3_thumbnail_sway_presentations_400.jpgDesigned to meet the changing needs of computer users is Sway, a new addition to the family of Microsoft Office apps. Sway is a cross-platform content aggregation tool allowing users to easily develop and share web-based presentations that are rich in both pictures and text. How can a tool like Sway help your business?

0
Continue reading 0 Comments

b2ap3_thumbnail_prosecutors_powerpoint_400.jpgAre you a master of making brilliant Microsoft PowerPoint slideshows to augment your presentations? You’re not the only one; it’s widely known as one of the best mediums to create a compelling, professional slideshow. It’s used in classrooms, training sessions, and much more. However, there’s one profession where PowerPoint’s effectiveness is questionable: A prosecutor in a court case.

0
Continue reading 0 Comments

b2ap3_thumbnail_do_it_now_400.jpgTwelve years after its release, Microsoft has scheduled to end mainstream support for Windows Server 2003 on July 14, 2015. This move essentially pulls the plug on the popular operating system, leaving any business using the server OS after its end-of-support date vulnerable. If your organization is still running this outdated OS, you need to update ASAP.

0
Continue reading 0 Comments

b2ap3_thumbnail_outlook_mail_400_20150220-055732_1.jpgOne of the best reasons to use Microsoft Outlook is the little-known Quick Steps feature. With Quick Steps, you can apply multiple actions at the same time to your email messages. Users that feel bogged down by their inbox will especially appreciate this email management tool.

0
Continue reading 0 Comments

b2ap3_thumbnail_superfish_one_400.jpgNormally, you can trust the software that comes preinstalled on a new computer. Unfortunately, this isn’t the case with the shopping-search app Superfish, which came installed on every Lenovo device sold between September and December 2014. If you’ve got the Superfish app on your computer, then you need to remove it before it does some superbad damages. Here’s how you do it.

Tagged in: Hackers Malware Security
0
Continue reading 0 Comments

b2ap3_thumbnail_anthem_hack_400.jpgThis month saw one of the largest recorded data breaches ever, when healthcare-provider Anthem experienced a hack causing data belonging to more than 80 million of its patients to be exposed. This includes sensitive information like Social Security numbers, dates of birth, email addresses, and more. How can you protect yourself from a hack like this?

Tagged in: Data HIPAA Security
0
Continue reading 0 Comments

b2ap3_thumbnail_biometric_security_400.jpgHumans are always striving to create the next big security measure against the massive wave of online threats. One topic consistently in discussion is biometrics as a security measure, which take advantage of unique biological aspects of users in order to maximize security. Now, the US military is seeing the value of this kind of technology, and they’re funding a campaign to make it available to users.

0
Continue reading 0 Comments

b2ap3_thumbnail_eureka_moments_400.jpgDo you get some of your best ideas somewhere other than at your desk? Ever get a brilliant game-changing idea while walking the dog, driving home from work, when out at a restaurant, or even in the shower? If you do, then you’ve experienced the frustration of forgetting your life-changing idea before you get a chance to write it down.

0
Continue reading 0 Comments

b2ap3_thumbnail_confusing_acronyms_400.jpgIt’s always important to know about what you’re investing in before you take the leap of faith. In the world of business and managed IT, we understand that jargon and abbreviations can potentially kill a sale. This is what we call “geekspeak,” and while it’s generally avoided as much as possible, it can cause some business owners’ eyes to glaze over and zone out.

0
Continue reading 0 Comments

Looking for Virtual Love in All the Wrong Places

Posted by on in Security

b2ap3_thumbnail_i_love_you_400.jpgOnline dating has been around long enough that it no longer carries a negative social stigma. In fact, you may know of some success stories from online dating--or you may have even successfully used online dating yourself. When looking for online love, remember to use protection from scammers.

0
Continue reading 0 Comments

b2ap3_thumbnail_microsoft_word_400.jpgHave you ever been working in Microsoft Word and needed to go back and check an edit you made, but you didn’t remember what you did, or where in the document you did it? Going back and reviewing your edits in Word is easy using the little-known Go Back command.

0
Continue reading 0 Comments

b2ap3_thumbnail_voip_features_400.jpgWhat’s the protocol for when your staff gets a phone call from a client or potential customer? If you don’t have a phone-answering procedure in place, then you’re winging it and you’ll end up scribbling notes and fumbling through a Rolodex to answer a customer's question. VoIP offers your business a better way to process company calls.

0
Continue reading 0 Comments

Latest Blog Entry

Is Society Really Prepared For the Drastic Changes The Internet of Things Will Usher In?
Technology has changed the world. It has changed individual lives, businesses, and the way people communicate with one another. The main reason for this is that technology, and the use of it, happens everywhere. In fact, the world has seen a huge spike in th...
Continue Reading...

Latest News

Our Site Has Launched!

Corporate Technology Group's New IT Support Portal

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Corporate Technology Group!

Read more

Contact Us

Learn more about what Corporate Technology Group can do for your business.

callphone

Call us today   
(817) 557-4091
(806) 355-3316

801 Stadium Dr Suite 112, Arlington, Texas 76011
509 S Arthur Street, Amarillo, Texas 79102

IT Support Dallas Fort Worth Network Support Dallas Fort Worth #