Search Results

Streamer Interview Series #1

August 29, 2023

This is our first streamer interview of our tech blog, by none other than, one of our favorite streamers GeekyGlam, and we hope you enjoy! Who is your favorite video game character? What’s your backstory and how did you get into streaming?  Tell us about your channel and community: What are your hobbies and interests?…

Read More
Man using phone to build computer

Information Technology Strategic Planning

August 21, 2023

IT Strategic Planning is a process that helps organizations align their technology strategies with their business goals. With the rapid pace of technological advancements, for example it is essential for businesses to develop a strategic plan that can keep up with the changing trends and stay ahead of the competition. This tech blog will explore…

Read More
Laptop with padlock on the table

What is Antivirus?

August 7, 2023

Antivirus software is a type of program that is designed to prevent, detect, and remove malicious software. This is also known as malware, from a computer or network. Malware is a type of software that is intended to cause harm to a computer or its users, such as stealing sensitive information, damaging files, or taking…

Read More

Computers being exploited again!

July 31, 2023

Large companies are being targeted, most likely for ease of breach vs size of company. In a post, the hacker collective claimed the Radisson Hotels Americas Cyber Attack, stating that the company “doesn’t care about its customers” and it “ignored their security”. Choice Hotels has announced that it has become caught up in the MOVEit…

Read More

Cyber Security and Social Engineering

July 24, 2023

Cyber security isn’t always about some guy behind a keyboard “hacking” into your computer. Some of what a hacker is looking for is an easy target that can be manipulated. They like to take advantage of people who aren’t aware of how these people approach you over the phone, e-mail, or in real life. The…

Read More
Laptop with Cadala Consolidated logo

Touch screen vs Non Touch

July 17, 2023

How is a Touchscreen Different from a Normal Screen?As technology continues to evolve, touchscreens have become a common feature in many electronic devices, including smartphones, tablets, laptops, and even some desktop computers. But how are they different from traditional screens? In this article, we’ll explore the differences between touchscreens and normal screens, and the technology…

Read More
Fiber Optic cables connected to optic ports and UTP, Network cables connected to ethernet ports

Google an AI – a Superpower?!

July 10, 2023

Have you heard about Google using AI:“Google’s latest update to its privacy policy will make it so that the company has free range to scrape the web for any content that can benefit building and improving its AI tools” Major issues Girding the mass development of artificial intelligence are questions about sequestration, plagiarism, and whether AI can disband correct information. Machine Literacy is a form of artificial intelligence grounded on algorithms that are trained on data. These algorithms can descry patterns and learn how to make prognostications and…

Read More

Project Tribute Foundation

June 26, 2023

We support Project Tribute Foundation , but you might have not heard of them yet? I know this isn’t a normal tech tip but we wanted to talk about a group we support. From their website:“We support our first responders by providing them life-saving training, equipment, tools, and support. In support of our mission, we…

Read More
Laptop with Cadala Consolidated logo

Types of Computer Scams

June 19, 2023

Employment ScamsScammers pose as a potential employer for an exclusively online or remote job. They will ask you to purchase computers and office equipment with the promise of reimbursement or claim to have overpaid you for your work. Reimbursements and overpayments will be reversed, leaving you responsible for the funds. Payment ScamsScammers often provide customers…

Read More

Cybercrime Continued:

June 12, 2023

Following a two- time disquisition, The Guardian this week published a harrowing exposé on Facebook and Instagram’s use as hunting grounds for child predators, numerous of whom business in children as sexual abuse victims for clout on the two social media services. Despite the claims of the services’ parent company Meta that it’s nearly covering…

Read More