31478 Industrial Road Suite 200, Livonia, Michigan 48150 sales@xfer.com

XFER Blog

XFER Blog

XFER has been serving the Livonia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

XFER has not set their biography yet

The Darknet: The Illegal Tech Black Market in the Gutters of the Internet

b2ap3_thumbnail_darknet_gutters_of_the_internet_400.jpg
We’re so busy worrying about hackers that we rarely think about how they acquire the tools they need to steal you out of house and home. One reason that the surge of hacking activity has skyrocketed over the past few years is because hacking tools have become more readily available, through an illegal black market known as the Darknet.

Continue reading

Technology Pitfalls are Embedded in Human Nature

b2ap3_thumbnail_technology_and_the_human_condition_400.jpg
For a piece of technology to make it into your hands, the design is rigorously tested and QC checked. Therefore, what rolls off the assembly line should work just fine. Yet, users experience technology problems all the time. Did you know that one of the biggest reasons why technology fails is because it’s human nature to mess it up? Here are three reasons why humans aren’t compatible with technology.

Continue reading

Yesterday’s Technology Can Hurt Tomorrow’s Collaboration Efforts

b2ap3_thumbnail_no_collaboration_400.jpg
Business owners talk a lot about collaboration, but few organizations have the means to take full advantage of it. One way these businesses miss the mark is by using outdated technology. Ironically, most technology in the workplace is designed to improve collaboration yet businesses continue to struggle with it. By improving your understanding of your technology, you’ll pave the way for greater workplace synergy.

Continue reading

Finding the Right Fit For Your Business’s Technology Vendor Needs

b2ap3_thumbnail_vendors_work_for_you_400.jpg
Having the right technology vendor can go a long way. How can you be sure that your business has partnered with the proper technology vendor? If you’re unfamiliar with the ways that a tech vendor operates, they might even try to rip you off and weasel more money out of you. One way you can know for sure you’ve made the right decision is by having your IT provider do the dirty work.

Continue reading

Don’t Ignore Communication with Your IT Department

b2ap3_thumbnail_synergy_400.jpg
When dealing with a large infrastructure, like that found within your business, it’s important to be clear and concise. This is especially true when it comes to your IT department, as miscommunications can lead to lost work or even fatal issues. If a problem does arise, you want to make sure that they are available to take care of it. In order to keep your issues to a minimum, it’s a good idea to plan out your IT communications systems and stick to them at all times.

Continue reading

Tip of the Week: How to Stay Productive, Even When You Feel Under the Weather

b2ap3_thumbnail_under_the_weather_400.jpg
Even if you’re a top-tier businessman, you’re still only human; and the human body can be defeated by something as insignificant as germs. Eventually, your body’s immune system can give in and let a biological virus or two into your system. When you’re feeling under the weather, it’s probably best to stay home, but you can still keep yourself preoccupied and productive if need be.

Continue reading

Vulnerability WinShock Gets Patch 19 Years Later

b2ap3_thumbnail_problem_solved_400.jpg
After a long 19 years, a critical vulnerability found in the Windows series of operating systems has been patched. IBM informed Microsoft of the flaw back in May 2014. The flaw, which allows for remote code execution via a packet to a Windows server, is found in every Windows operating system since Windows 95.

Continue reading

Digital Scanners Make the Perfect Stocking Stuffer

b2ap3_thumbnail_digital_scan_documents_400_20141201-213650_1.jpg
Did you know that this holiday season is basically an assault on trees? Each December, thousands of healthy pines are murdered and their remains are proudly put on display. Adding insult to injury, boxes are then piled up around the fallen trees and wrapped in paper. To add some equilibrium to the holidays, consider a digital scanner for those on your shopping list.

Continue reading

Two-Factor Authentication: What Does the Future Hold?

b2ap3_thumbnail_two_factor_authentication_400.jpg
Passwords are slowly becoming obsolete in the face of more powerful security solutions. This is especially true considering how a hacker can input millions of characters every second in an attempt to break into your account and unleash who knows what into your business’s network. While using a password is still a good idea, professionals are working tirelessly to bring the new face of two-factor authentication to light.

Continue reading

Tip of the Week: How to Remotely Wipe Your iPhone or iPad Data

b2ap3_thumbnail_iphone_data_format_400.jpg
The new iPhone 6 was released several weeks ago, and it was greeted by many users eager to get their hands on the flexible new device. These users will likely sell their old devices in order to pay the hefty purchase fee. Little do they know, however, that their old devices should be wiped completely before being sold to another person, especially if the company they work for deals with sensitive information.

Continue reading

Budgeting Trends for IT in 2015

b2ap3_thumbnail_IT_budgeting_400.jpg
As the calendar fast approaches 2015, the topic of IT budgeting for the new year is a hot topic. It’s the time to decide how much you will spend in comparison to how much you should spend. Budgeting can be a difficult decision, especially if you’re a small business owner with a limited budget. Thankfully, you don’t have to take on this important part of business alone.

Continue reading

Google Places Hacking Serves Up Catastrophe for DC Restaurant

b2ap3_thumbnail_misinformation_from_hacker_400.jpg
Last year, a Washington DC restaurant called the Serbian Crown was forced to close its doors to the public. Instead of chowing down on delicacies such as lion, horse, and kangaroo meat, customers can now only sink their teeth into disappointment. The reason? A nasty Google Maps hacker, and lack of brand management to help clean the mess up.

Continue reading

Tip of the Week: How to Dilute Pure and Unadulterated Downtime

b2ap3_thumbnail_ultra_productive_workplace_400.jpg
We talk a lot about how downtime experienced from a technology issue like a server outage can destroy your company’s productivity. Yet, we’ve not distinguished between the different types of downtime, with the worst kind being pure and unadulterated downtime. What is pure downtime and how can you dilute it?

Continue reading

Darkcoin: Bitcoin’s Anonymous, Sketchy Brother

b2ap3_thumbnail_darkcoin_online_currency_400.jpg
Cryptocurrency is a concept that goes from somewhat useful (Bitcoin) to just plain weird (Dogecoin), and now it goes a step further with the anonymous new cryptocurrency called Darkcoin. It acts similarly to Bitcoin, but its primary selling point is that Darkcoin is completely anonymous and difficult to trace.

Continue reading

Tip of the Week: How to Keep Yourself Safe while on Public WiFi

b2ap3_thumbnail_pubic_wifi_issues_400.jpg
As a business owner, you might find yourself on the road a lot, and you likely feel the need to check your email for important updates from the home base. This becomes more difficult as you move from civilization into the vast unknown, with the only available WiFi connections found in public places. Unfortunately, public WiFi spots are notorious for being unsecured and unprotected, and it’s important to practice proper security when dealing with them.

Continue reading

Is PowerPoint the Army’s Most Dangerous Weapon?

b2ap3_thumbnail_army_uses_powerpoint_400.jpg
When a soldier in the military is promoted to officer, one would assume that it's due to their ferocity and quick decision-making abilities that have been proven on the battlefield. Character traits like these are important, but to be an officer in today's military, one will need to possess one skill above all others: Microsoft PowerPoint proficiency.

Continue reading

Wouldn’t it Be Nice if Microsoft OS Upgrades Were Free?

b2ap3_thumbnail_windows_for_free_400.jpg
Operating systems aren't designed to last forever. This is why new versions are released every few years or so. In the case of Microsoft, selling their latest OS has always been their bread and butter. However, with Windows 10 on the horizon, one has to wonder if Microsoft has considered offering their new OS to users as a free upgrade?

Continue reading

When Managing IT Feels Like Herding Cats [VIDEO]

b2ap3_thumbnail_cat_herding_400.jpg
Cat Herding: The attempt to control or organize a class of entities which are uncontrollable or chaotic. Implies a task that is extremely difficult or impossible to do, primarily due to chaotic factors (Wikipedia). Does the humorous concept of cat herding sound like your current approach to IT management?

Continue reading

Keyboard, Video, Mouse: How to Choose a KVM Switch for Your Business

b2ap3_thumbnail_keyboard_video_mouse_400.jpg
A business's IT infrastructure is complex and confusing. Just like a puzzle, it is made up of several vastly different pieces that come together to perform a particular function. One of the things that ties an IT infrastructure together is a KVM switch. Without a quality KVM switch, your network might fail to operate properly. Here are a few tips to help you choose the right KVM solution for your business.

Continue reading

Does Your Business’s Data Have a Self-Destruct Switch, Just in Case?

b2ap3_thumbnail_destroy_data_400.jpg
It seems most logical to store every byte of your data, and with the advent of cloud computing, it's more affordable than ever. While most companies tend to store a huge amount of data, some forget that they should always be willing to delete old files if need be. This is especially true if you deal with sensitive data which can leave your business liable to a possible lawsuit.

Continue reading