31478 Industrial Road Suite 200, Livonia, Michigan 48150 sales@xfer.com

XFER Blog

XFER Blog

XFER has been serving the Livonia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding Basic Formulas in Microsoft Excel 2013

b2ap3_thumbnail_Excel_for_databases_and_spreadsheets_400.jpg
It can be difficult to keep track of your budget and expenses, especially when prices and needs are always changing. But perhaps the biggest annoyance is the intense paper trail that you leave behind when building your budget. By taking advantage of Microsoft Excel's formulas, you can easily keep track of your budget and alter it as prices change and demand increases.

Continue reading

Staying Ahead of Big Data is No Small Task

b2ap3_thumbnail_big_data_analytics_400.jpg
Civilization has passed through various ages, like the Stone Age, the Ice Age, Bronze Age, and so on. And now, we're progressing through another one - the Data Age. In fact, 90 percent of the world's data was created in 2013. With each new device and system comes an incredible amount of data that must be processed, stored, and catalogued. This is Big Data, and the way that your business works with this information will determine the success of your business in the Data Age.

Continue reading

Mobile Devices Leaving an Unsavory Taste in Restaurant Owner’s Mouth

b2ap3_thumbnail_problems_for_smartphones_restaurant_400.jpg
Smartphones have revolutionized the way that we communicate with each other and increased productivity, but for some businesses, they are only making things worse. A perfect example of this is the restaurant business - in fact, one restaurant owner decided to take matters into his own hands, and has performed a study which examined their business before and after the mobile revolution.

Continue reading

Hackers Lay Claim to 4½ Million Medical Records

b2ap3_thumbnail_stethescope_keyboard_400.jpg
If 2014 hasn't been a legendary year for data breaches yet, it certainly is now. Community Health Systems, a hospital network for over 206 facilities across the United States, has been the target of a data breach resulting in 4.5 million records being compromised by Chinese hackers, including Social Security numbers, birthdays, names, addresses, and telephone numbers.

Continue reading

Hairballs and WiFi Data are What the Cat Dragged In

b2ap3_thumbnail_warkitteh_on_the_loose_400.jpg
For Washington D.C. residents, there's a dubious threat looming in their backyards putting their personal data at risk. It's Coco, a Siamese cat wearing a high-tech collar designed for hacking WiFi networks. Have you taken the proper security measures to protect your sensitive information from feline foes like Coco?

Continue reading

3 Results Businesses are Demanding from Their Outsourced IT Provider

b2ap3_thumbnail_outsourced_it_key_to_success_400.jpg
Outsourcing your companies IT is a great way to free up money and take advantage of time-saving remote services. Businesses have different reasons for signing up for the outsourcing service, but many clients have similar expectations of the results they want out of their managed IT service provider.

Continue reading

Smartphone Demographics - Shaken, not Stirred, with a Lemon Twist

b2ap3_thumbnail_what_kind_of_smartphone_user_are_you_400.jpg
The battle between iOS and Android operating system enthusiasts has been a long and bloody affair with plenty of third-party casualties (sorry Blackberry), but did you know that you might be able to tell a lot about someone just by looking at their smartphone?

Continue reading

Is Your Antivirus Software Up to Snuff?

b2ap3_thumbnail_is_your_antivirus_working_for_you_400.jpg
All of the security breaches and vulnerabilities of 2014 sure have made for an interesting year; first Heartbleed, then the Internet Explorer vulnerability, GameOver Zeus, and the Russian password-stealing gang. In light of these events, you really have to ask the question, "how can we fight these threats?" Symantec has told The Wall Street Journal that they feel antivirus technology is "dead."

Continue reading

Computing Giants Microsoft and Apple Still Fighting in New Mobile Frontier

b2ap3_thumbnail_apple_windows_mobile_400.jpg
Microsoft and Apple have been at the forefront of personal computing since the 1970s. The competition has caused partnerships and strain between the two companies and in the interim, created hardware and software that would change the world. Although the two companies will be forever linked, they both are betting on mobile, and for good reason.

Continue reading

4 Benefits of Virtualizing Your Desktop

b2ap3_thumbnail_hosted_desktop_solutions_400.jpg
Desktop virtualization isn't necessarily a new subject, but it is something that has been growing in popularity over the past few years, and it's easy to understand why. Instead of keeping your desktop in physical form on your computer, it's becoming more reliable to just keep it safe and secure on a hosted server. This takes care of most physical problems that computers often deal with, such as a sudden crash or old age.

Continue reading