THE TECHNOLOGY BLOG

by LINC Project

We love Technology ! We love to blog !

To interact with people, we write, share, and review technical articles with you, our readers and customers.

As an independent managed service provider, it is our company’s responsibility to stay up-to-date on the latest trends in technology, networking, and related services.

USB-C Steps Into the Ring

Since the dawn of IT a mess of cables has been a necessary and cumbersome evil, but can USB-C put a dent in the dreaded Rat’s Nest?

What can Wifi Do for You?

In today’s economy everyone is carrying a mobile device be it one issues from the employer or brought in by the employee so the unavoidable fact that you NEED good WiFi in your office.

A Moment of Silence for the ‘Shack’

It’s official. Despite every effort to head it off, including a complete redesign and marketing campaign that included a well received 2014 Super Bowl Commercial, RadioShack is going the way of the saber tooth tiger.

Windows 10 – All Together Now!

“Imagine All the Devices Living in Peace”. OK, so that’s not quite how the John Lennon song goes, but it still underscores a major theme of the Windows 10 event last Wednesday. Microsoft has recognized something that Apple has known for quite a long time…that people use MANY devices.

CES 2015: the Internet of everything

Remember back in the day when Dr. Nick from ‘The Simpsons’ sang this song? We all know that he was singing about bypass surgery, but if he had attended the 2015 Consumer Electronics Show (CES 2015) in Las Vegas, he could have just as easily been talking about any selection of devices, gadgets, and gizmos on display.

Mirror Mirror Tell Me What Are The 2015 Technology Trends?

New Year’s Eve is upon us! It’s a time for celebration, reflection, and (more often than not) remorse.
In 2014 we saw the raise of China, the fall of Sony, phones bend, and software break. It wasn’t all bad though. So, before we take out our champagne flutes and oversized 2015 sunglasses, the LINC Project blog will attempt to look into the future to identify five important technology trends for 2015.

Don’t mess up my passwords

Longer than you’re able to remember, slower than e-mail needed to reset them, able to make you tear your hair out in a single pull. LOOK! On your monitor, it’s a letter, it’s a number, it’s a symbol, its…capitalized? It’s our blog entry about PASSWORDS!

Inbox: email E-volution ?

E-mail: Just the very name can conjure up images of instant communication and overcrowded inboxes. Thirty years ago, the concept of sending someone an electronic mail was astounding. Today, it’s more astounding if someone takes the time to write you a letter on paper and send it through the postal carrier.

Centralization, Collaboration & Your Back End Systems

Active Directory, central inventory, IP Phone centralization. What is the big deal with centralized systems anyway?
Well, if saving time, money, and improving security are important to you, then you should pay attention.
In the world of IT, there are very few concepts sweeter to a system administrator’s ears than ‘Centralization’.

Apple Releases iOS 8 To Strike Back At Android Kit Kat

Along with last week’s release of the iPhone 6 and 6 plus also came the much anticipated release of Apple’s iOS 8 mobile device operating system. While there has been much hype and mania over the release of the iPhone 6 itself, much less has been made over the release of i0S 8.

Guarding your iCloud from hackers

By Bridget Carey
Hackers attacked the iCloud accounts of some celebrities, so it’s time to boost your own cloud-security awareness. CNET’s Bridget Carey offers tips on keeping your account secure and explains why deleting a photo doesn’t always truly delete it.

Emerging Technology Trends of 2014

By Matt Young
In a recent study, technology research firm Gartner identified a number of top technology trends emerging in 2014, with the potential to have a significant impact on enterprises over the next three years.

Heart Bleed OpenSSL Computer bug

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.