Welcome To CPS's Blog Categories

Servers Become More Climate Friendly

Danish researchers from the University of Copenhagen recently developed a novel algorithm that can substantially reduce the carbon footprint of computer servers. The green transition for computer servers is an urgent matter, as they are more taxing on the climate than global air traffic. The massive amount of electricity consumed by computer servers is expected…

Read more

QR Codes and Virus Removal & Protection

Protect Yourself Using QR Codes QR codes are all the hype now. Invented in 1994 and popularized by the pandemic, QR codes have been popping up everywhere, including Super Bowl ads. The two-dimensional code advertised during the Super Bowl was Coinbase, a cryptocurrency exchange. It generated so much traffic that it crashed Coinbase’s app, proving…

Read more

Malicious Authenticator App Stealing Bank Information

An Android app posing to provide two-factor authentication in the Google Play store has turned out to be malicious. With over 10,000 phones affected, the app was available for 15 days. The malicious app, called 2FA Authenticator, is no longer available on the Google Play Store. The app description read, “A secure authenticator for your…

Read more

February 2022 Newsletter

Focus on your business, not fighting online viruses: CPS offers Managed Antivirus & System Health Monitoring Whether your office network consists of just a few computers or hundreds, the days of requiring individual users to track their own antivirus software are long gone – or should be. Face it, having non-IT professionals overseeing your company’s…

Read more

2022: The Year to Protect Your Data

Cybercriminals are improving their ransomware computer viruses by exploiting weaknesses throughout different types of software and applications available on the Internet. Hacks were ever-popular in 2021, resulting in shutting down oil pipelines, food shortages, public water storage tanks, elevated gas prices, governmental breaches, and much more. Ransomware has become a national security threat, according to…

Read more

Computer Hand Gesture Recognition Improved

Researchers have been endlessly searching for ways to use computers beyond the typical mouse, keyboard, remote control, or touch screen. Much of their effort is geared toward unlocking more natural forms of communication. For example, voice commands have been a prominent feature in many smartphones and virtual assistants. Hand gestures are another form of human…

Read more