Login 

Sagacent Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Recent blog posts

b2ap3_thumbnail_former_employee_theft_400.jpgIn a survey by Cyber-Ark, close to half of employees interviewed admitted that if they were fired tomorrow, they would take with them their former company's proprietary data. This is a shocking revelation considering how much you trust your current staff, maybe even to the point of referring to them as "family." What can you do to protect your business from a former employee with ill intentions?

0
Continue reading 0 Comments

Has Your Business Moved to the Cloud Yet?

Posted by on in Cloud

b2ap3_thumbnail_cloud_computing_questions_400.jpgThe cloud is becoming a very important part of the modern-day business, and for good reason. It frees companies from the restricting physical nature of servers, desktops, and other hardware. In fact, according to Joe McKendrick of Forbes magazine, four-out-of-five small businesses will soon operate on the cloud.

0
Continue reading 0 Comments

marsAs we all know, Earthlings are capable of making some pretty cool technology (we’re quite partial to it ourselves), but we’ve not yet mastered the art of making technology that doesn’t require some level of support or maintenance. Without any assistance, every piece of earth-based technology will eventually fail. Our Mars rovers are no exception to this rule. This is why NASA is both monitoring and maintaining its Mars rovers all the way from Earth--a remote connection of more than 125 million miles.

0
Continue reading 0 Comments

b2ap3_thumbnail_protect_your_credit_card_400.jpgThe Target data breach seems but a distant memory now, yet the same malware strikes again, this time at Home Depot. The hacking attack targeted the millions of credit and debit cards used at these large retailers, but these attacks could have been mitigated with proper precaution.

Tagged in: Hackers Privacy Security
0
Continue reading 0 Comments

b2ap3_thumbnail_big_data_causing_problems_400.jpgData centers are truly modern marvels. These warehouses full of servers are responsible for harboring most of the Internet, and these facilities are popping up all over the place. As great as data centers are, according to a new study by the National Resources Defense Council, the increasing demand for data doesn't bode well for the environment.

0
Continue reading 0 Comments

Find Time to Read Every Book on Your List

Posted by on in How To

b2ap3_thumbnail_speed_reading_400.jpgFor people that have super-busy schedules, reading books seems like a luxury, but somehow, the most successful people always seem to have time to read the latest publications pertaining to their field. How do they do it? Many avid book readers have a little help.

Tagged in: Read Save Time Software
0
Continue reading 0 Comments

b2ap3_thumbnail_licensed_software_400.jpgWhat's the licensing status of your company's software look like? If you've not been intentional about this, then your business may be using several unlicensed applications. You may be thinking, "Everything works fine. No big deal." Sure, it's no big deal--until you're caught!

Tagged in: Internet Software
0
Continue reading 0 Comments

b2ap3_thumbnail_kids_love_coding_400.jpgIt's back to school time and the battle of getting your kids to play less video games so they can get their homework done begins anew. What if a fun video game can teach your kid a marketable skill like programming? This is the case with the popular video game by Mojang, Minecraft.

0
Continue reading 0 Comments

Europe’s Great Debate: The Right to Be Forgotten

Posted by on in IT Blog

b2ap3_thumbnail_do_you_have_the_right_to_be_forgotten_400.jpgOne of the hot topics in recent news is a concept in European courts about the "right to be forgotten." The ruling, passed in May 2014, suggests that search engines must consider requests for removal of content that is, according to ZDNet, "inadequate, irrelevant, or no longer relevant." In some circles, this ruling is seen as controversial.

0
Continue reading 0 Comments

Don’t Let Your Tech Ruin Your Vacation

Posted by on in Miscellaneous

b2ap3_thumbnail_relax_go_hiking_400.jpgEver since mobile devices gained the ability to connect to the Internet, the integration of smart technology has followed us out of the office and into our homes, and even on your family vacation. If you are afraid that unplugging yourself from the workplace will spell trouble for your business, think again - you might just be worrying too much.

0
Continue reading 0 Comments

b2ap3_thumbnail_powerpoint_for_presentations_400_20140829-202114_1.jpgIf there's one thing that you can learn from today's marketing trends, it's that visual content sells. Images and videos are a powerful marketing tool that should be taken advantage of at all costs, but an infographic can also help you keep a balance between content and visuals. If you can master the art of the infographic, your business will soar high above your competitors.

0
Continue reading 0 Comments

b2ap3_thumbnail_managed_services_demand_400.jpgA lot of today's companies are taking advantage of the money they can save by switching to an outsourced IT provider, but they all have their reasons. The reasons why they outsource their IT may vary by company, but there are always constants that can help you figure out what you should expect from your IT.

0
Continue reading 0 Comments

172248Are you familiar with the story of San Jose’s old Electric Light Tower? A replica of the tower stands today straddling the intersection of Santa Clara and Market Streets. Even though the tower never quite lived up to the expectations of its designers, it stands today as a symbol of how technology can benefit society.

...
0
Continue reading 0 Comments

The Challenges of Keeping Up with Big Data

Posted by on in Cloud

b2ap3_thumbnail_control_big_data_400.jpgWe're living smack dab in the middle of the data age. In fact, 90% of the world's data was generated last year. New devices and systems create crazy amounts of data, and every byte must be processed, stored, and catalogued in such a way that it can be easily retrieved from any device, anywhere. The IT industry refers to this as "Big Data," and how your business manages its data will determine your success in this new age.

0
Continue reading 0 Comments

b2ap3_thumbnail_healthcare_hacker_400.jpgWe've got yet another major data breach to report that affects millions of users, this one of a very personal nature. This week, it was revealed that Chinese hackers compromised 4.5 million medical records from Community Health Systems, a hospital network with 206 facilities in the United States. Ask your doctor today if identity theft prevention is right for you.

Tagged in: Health Privacy Security
0
Continue reading 0 Comments

b2ap3_thumbnail_smartphones_hurting_some_restaurants_400.jpgThe point of all these cool smartphones is to make life easier, improve productivity, and communication, but how sure are you that these devices are making things better? One restaurant did a study where they looked at their business both before and after the smartphone revolution. Their findings may make you lose your appetite for mobile technology.

0
Continue reading 0 Comments

b2ap3_thumbnail_public_cloud_making_waves_400.jpgSome businesses prefer having their own IT infrastructure over using a public cloud computing service. Given the amount of control that a private cloud model provides, it's easy to see why hosting data in-house would be attractive, but, as cloud computing technology improves, more businesses are turning to public cloud offerings.

0
Continue reading 0 Comments

Are You Being Hacked by Your Neighbor’s Cat?

Posted by on in Security

b2ap3_thumbnail_hacked_by_neighbors_cat_400.jpgYes, you read that title right. If your WiFi isn't protected, you can be hacked by the furry little creature that wanders around your backyard when you're not home. Coco, a Siamese cat from Washington, D.C., was able to discover dozens of weak or unprotected WiFi networks in his neighborhood with his high-tech collar.

Tagged in: Privacy Security Wifi
0
Continue reading 0 Comments

b2ap3_thumbnail_apple_microsoft_lag_behind_in_mobile_400.jpgOf all the computer company rivalries going on, one of the largest and most well known is Apple vs. Microsoft. The storied competition between these two software giants has driven innovation forward for more than thirty years. Today, the frontlines of this battle take place between the two company's mobile divisions, and now there's a third major competitor in the mix.

0
Continue reading 0 Comments

fail safe Data BackupThis month, you may have been one of the lucky Bay City residents to have caught a glimpse of actor "The Rock" Dwayne Johnson traversing our streets wearing disheveled clothes. Don’t be alarmed, Hayward native The Rock hasn’t fallen upon hard times. Instead, he’s cooking up a new disaster movie called "San Andreas", and he’s filming it in our backyard! Your business can learn a thing or two from The Rock about the importance of disaster preparedness.

0
Continue reading 0 Comments




LiveZilla Live Help

Contact Us

Contact us today to learn how Sagacent Technologies can make your technology actually work for your business!

Phone: (408) 248-9800

Email Support
Email Sales

Join Our Community

image010

image012

pinterest-script

image011

image014

image013

newsletter signup

 

Click the Newsletter link above and Enter your email address to receive monthly updates about our latest news, events and free technology resources for your small business!

I would like a 30 minute business discussion with Sagacent

Fill in your information below and we will be in contact with you shortly.

Occasionally, Sagacent will share relevant IT information with you via email.