Bryley Basics (in 100 words): Mass. enacts sales tax on Computer Services

Massachusetts is now one of the few states collecting sales tax on services; the 6.25% tax targets specific computer system design services as of July 31st. The legislation was approved July 24th, 2013 with the intent to tax customization services; the relevant, broadly worded phrases: “’Computer system design services’, the planning, consulting or designing of […]

Why are QR codes failing?

Why are QR codes failing? QR (Quick Response) codes were developed over 20 years ago to track goods and inventory, but are now a marketing technique targeted at on-the-go cellphone users to easily receive information and promotions.  However, only 19% of US cellphones have ever tracked a QR code; plus, most QR codes are scanned […]

Jim Livingstone Retires

Jim Livingstone officially retired from Bryley Systems; he was a dedicated and highly productive employee for over 22 years. After a distinguished career in Engineering, Jim moved his family to Massachusetts in the early 1970s to run Data Technology, Inc., which he later purchased and grew before spinning off a new company, RoMec Inc. in […]

Bryley Basics: Getting you informed in 100 words or less

Tips on email attachments Most folk send attachments with their emails; it is a quick, easy way to share a file with the email recipient.  However, attachments can have a negative impact on your computer-network infrastructure: Emails saved with attachments consume storage. Large attachments slow performance and may be rejected by the provider. Attachments copied […]

Security concern with popular, home-based, Internet routers

Independent Security Evaluators, a Baltimore-based security firm, stated that 13 Internet routers sold for home use were vulnerable to attack if the hacker had network access and could obtain the username and password of the router.  These routers include: Linksys WRT310v2 Netgear’s WNDR4700 TP-Link’s WR1043N Verizon’s FiOS Actiontec MI424WR-GEN3I D-Link’s DIR865L Belkin’s N300, N900 and […]

The (near-term) future of computer technology – Part 1

The crystal ball is somewhat cloudy, but here are my thoughts on user interfaces and their adoption. User interfaces on computing devices Alphabetically, these are the practical computer-interface options we know today: Heads-up Display (HUD) – Military displays have been based on HUD technology for decades.  Basic concept is to provide see-through information that is […]

Simple passwords = disaster

The top five end-user passwords from 2012 were: password (yes, the actual word itself) 123456 12345678 abc123 qwerty (top-left keys on your keyboard below the numbers)   The top three in this list, “password”, 123456”, and “12345678”, were also the top three passwords in 2011.  Basic analysis:  Most people prefer simple passwords that are easy […]

HP still top PC manufacturer worldwide in a slowing market

Despite internal issues, HP remained the top manufacturer of PCs worldwide in Q4 of 2012 followed by Lenovo (the Chinese firm that purchased IBM’s PC business in 2005) and then Dell. Overall, PC shipments dropped 6.4% from Q4 of 2011. Dan Reisinger of eWeek notes that Q4 of 2012 is the first time in five years […]

Preview into Microsoft Office 2013

In addition to Windows 8, I have also been using Office 2013 over the past few months; I like some things, but not everything: • Excel updates ripple slowly down the page; they seemed to run a bit faster in previous versions. • The top-right Window icons have shifted somewhat; the Minimize icon ( _ […]

Booting Windows 8 into Safe Mode

Safe Mode is useful for diagnosing PC problems. Because Windows 8 starts quickly, you cannot get into Safe Mode by pressing [F8] during the boot-up process (as you could with previous versions of Windows). The new procedure: Go to Settings and then select Power Hold [Shift] and then press Restart to open System Recovery Options Select Troubleshoot […]

$295 Raised for Hudson Charities by Bryley Systems Inc. and Yours for Children, Inc.

Bryley Systems and Yours for Children together raised $295 for the Hudson Food Bank and the Hudson Boys & Girls Club.  The money was generated through a free giveaway of refurbished PCs in exchange for the suggested donation of $35 to either Hudson non-profit organization. With the generous contribution of 9 used PCs by Yours […]

Job Promotion at Bryley Systems

I am very pleased to announce that Michelle Denio has been promoted to the position of Administrative Support Technician. Michelle is a key member of Bryley’s Technical Service Department and with this new expanded role she will be able to use her expertise and knowledge of Bryley’s clients to everyone’s advantage.   Congratulations!!!!   Hudson Sun

System Builders Await Surface’s Impact

Gavin Livingstone, President of Bryley Systems, talks to Channel Pro Networkabout Microsoft’s Surface tablet.  Read the full article System Builders Await Surface’s Impact

Garin Livingstone Passes his Windows 7 Exam!

Congrats Garin Livingstone, Bryley Systems Senior Tech, for successfully completing and passing your Windows 7 configuring class and test!!! 

Cybercrime targets smaller organizations

A recent Data Breach Investigation Report (DBIR) from Verizon notes that 98% of data breaches stemmed from external sources using hacking techniques (81%) and malware (69%).  About 79% of the data breaches were directed at “targets of opportunity”, typically smaller organizations that are vulnerable through an “exploitable weakness”; most attacks were performed using relatively unsophisticated […]

Migrating Postini users to Google Apps for Business; also, an alternative

As mentioned in our August 2012 Bryley Tips and Information, Google has moved Google Message Security (GMS)/Postini into Google Apps for Business and will migrate all GMS/Postini customers to Google Apps for Business by the end of 2013.   Google will migrate GMS/Postini users gradually, focusing initially on its large, direct-billed customers and eventually tackling those […]

Protect your mobile device – Part 3: Enforcement, Tools, and First Steps

We have explored the importance of setting policies and training users on mobile device security and management; now, we wrap-up with how to enforce these policies, recommended tools, and first steps to mobile device security.   Enforcement   Enforcement is usually assisted through a Mobile Device Management (MDM) tool; typically a software-based application that requires […]

Microsoft Streamlines Windows Server Options, Kills Versions for Home and Small Business

Microsoft has revealed that the Windows Server 2012 options will be drastically streamlined from the myriad choices of its predecessor. In the paring down, though, Microsoft is killing off Windows Small Business Server, and Windows Home Server–the two most popular versions for small and medium businesses (SMBs). On the one hand, the news is quite welcome. Variety […]

Protect your mobile device – Part 2: Training

Training is an important, early step in any process; informing end-users of the need to secure their mobile devices is critical. Recommended training topics: ● Why we need to authenticate and encrypt ● How to reduce the risk of loss or theft ● How to safely deploy new applications ● How to securely backup your data   Authenticate and encrypt […]

Protect your mobile device – Part 1

The need to secure newer mobile devices (smartphones, tablets, etc.) has grown since they now meet the basic criteria for malicious, cyberspace-based attack: Developer kits are readily available Mobile devices are in widespread use throughout the world Motivation is increasing since usable/saleable data live on these devices   In addition, BYOD (Bring Your Own Device) […]