SEO – What it means
We recently took on a client that was in desperate need of search engine ranking help. As of now I will not mention their name due to privacy concerns but I want to share their situation, the mistake they made, how they could have avoided…
Vulnerability in Linux Surfaces
Source: Goldsboro Networks Last week, Security Researcher Rafal Wojtczuk, of Invisible Things Lab detailed a security exploit that had been present in all Linux distributions since 2003 in this Large Memory Attacks (pdf) report. This is a exploit that Linux distributors had already known about…
Google: A Peeping Tom?
On June 12th, 2010, Christopher Dawson reported on ZD-Net that Google had many law-suits piling up over a very serious privacy violation. What Google had done was about criminally equivalent as a “Peeping Tom”. Google uses their mobile street-cars to snap pictures around your area…
Improve Your Company With Web 2.0
Web 2.0 isn’t just a fad, it was a new method of sharing favorite information, and has grown to standards conformation, easy to use websites which has developed into a system that is now widely used across the net. In fact, the larger companies IT…
Google Fiber – Not just a diet
The rave is in and not only have two cities in North Carolina been selected as candidates for Google’s new fiber optic network, but these two cities are in the top 100, making North Carolina the only state that has two cities in the list. …
e-NC Surveys Broadband
Some may have noticed this week that the e-NC Authority has been taking very detailed surveys from North Carolina internet users. Rumor has it that North Carolina legislature is being pushed by e-NC to greatly enhance broadband availability and quality in the state of North…