Guest Columns

Tech-Policy Think Tank Offers Trump Administration Quick-Start Policy Checklist For 2017

WASHINGTON - The Information Technology and Innovation Foundation Wednesday released an open memo to President-elect Donald Trump and his transition team outlining actionable proposals that the new administration can accomplish in its first year to bolster America’s innovation economy. Think tank ITIF proposes 36 policies that can be achieved quickly through executive authority or discrete

By |2016-11-16T20:08:22-05:00November 16th, 2016|Guest Columns|

Mobile-Friendly: Google’s Getting Real Serious and So Should You

FLINT - Here we go again. Another potential massive shake up with how Google structures their index and trust me on this, it will have an impact on your site’s rankings! Google is taking mobile-friendly to a new level. All of this has to do with the seismic shift people are making to mobile. For

By |2016-11-11T08:58:37-05:00November 11th, 2016|Guest Columns|

(Not so) Dirty Word Of The Day: Outsourcing

ROCHESTER HILLS - One of the challenges CloudTech1 faces each day when talking with potential partners and clients is their fear of “outsourcing.” CloudTech1 excels at helping clients outsource their IT. That’s not a bad thing. Taking the unnecessary stresses away from a business decision maker and passing them on to a Managed Service Provider

By |2016-11-11T08:31:26-05:00November 11th, 2016|Guest Columns|

Behind The Wheel – Hackers Attack Unprotected Connected Vehicles

ANN ARBOR - In July 2015, a pair of hackers commandeered a Jeep Cherokee through its Uconnect entertainment system to attack the vehicle’s brakes, engine and navigation system. Fiat Chrysler responded by patching the vulnerability and then issuing a recall for 1.4 million vehicles. Fast forward to July 2016: Fiat Chrysler announced it would pay

By |2016-11-03T18:54:54-04:00November 3rd, 2016|Cyber Defense, Guest Columns|

Forbes Magazine Profiles AEG’s Analysis – Best Predictor of the Presidential Election

EAST LANSING – U.S. voters are likely to provide the largest number of votes to the nominee of the incumbent Democratic Party on November 8. The proprietary “Pocketbook Model,” which has predicted the largest vote-getter in 22 of the past 25 elections, and every election since 1980, projects a popular vote margin of victory between 3 percent

By |2016-11-03T16:32:59-04:00November 3rd, 2016|Guest Columns, Politics|

ITC Towers Rise To The Sky

NOVI - What can a utility do when an existing transmission line does not meet clearance criteria? One option would be to build a new transmission line, but this would be expensive and could take many years just to get the required permits. Instead, ITC Holdings Corp. — faced with such an issue — opted

By |2016-11-02T13:21:42-04:00November 2nd, 2016|Guest Columns|

CloudTech1 Offers Special Pricing On Office 365 – Free For 3 Months Or Cost

ROCHESTER HILLS - CloudTech1 is offering a special deal on Microsoft Office 365. Clients that buy O365 receive either three months free, or pay what CloudTech1 does. If you already have O365, renew and transfer to CloudTech1 as a client and pay what we pay. What does Office 365 have to offer? The core Office

By |2016-10-21T14:01:14-04:00October 21st, 2016|Guest Columns|

CloudTech1 Offering Microsoft 365 At Cost Through End Of Year

ROCHESTER HILLS - CloudTech1 is offering a discount of all Microsoft Office 365 products until the end of the year. Our new partners and clients will pay what we pay. This is a great opportunity to invest less and get more. Not only is the communication flexible, but so is the deployment. Microsoft will not

By |2016-10-14T07:32:56-04:00October 13th, 2016|Guest Columns|

New Guide Offers Advice on Securing Internet of Things Products

LANSING - As more and more devices enter cyberspace, the online security concerns are growing just as fast. In fact, new Internet of Thingscv devices are being taken over and used as attack vectors. Here are some top DDoS stories from the past few months: June 2016 — IoT Botnet — 25,000 CCTV Cameras Hacked

By |2016-10-10T10:39:21-04:00October 10th, 2016|Cyber Defense, Featured, Guest Columns|