Slider

Call (866) 633-3832 to immediately schedule quick-response service.

AllCity Technology has been providing quality computer service and support since 1999. From our flagship TECHMERGENCY quick-response computer repair and network engineering to our SMART Service managed IT plans, AllCity Technology offers unparalleled solutions that help streamline the internal processes of your business.

Intelligent IT SolutionsAll of our technicians are industry certified engineers that have gone through a government certified screening process. This insures that we employ the highest-quality technicians and that all of your information remains proprietary. Our skill sets range from our core computer repair and network administration to custom web application development.

From our signature IT service, to enterprise software and systems, AllCity Technology can provide the right solution for your company. With our unique and competitive tiered pricing model, we help all companies, from the sole proprietor to the Fortune 500. We are your single source for new equipment, software solutions, network security and custom tailored technical services.

Call us TODAY, toll-free at (866) 633-3832 to schedule your FREE support plan assessment and learn about other SPECIAL OFFERS!

  • Lenovo's new workstation is 'Tiny' but packs a punch 2017/06/21

    Windows users who work in tight spaces and are looking for a small form factor workstation with multiple display ports and solid processing power have a new contender to check out: the new ThinkStation P320 Tiny.

    The workstation lives up to its name: At 1.4x7.1x7.2 inches, it's the smallest workstation on the market that is ISV (independent software vendor) certified, according to Rob Herman, the general manager of Lenovo's workstation business unit.

    The ISV certification is important. "We don't consider a machine to be a workstation unless it has ISV certification," according to Lloyd Cohen, an analyst with IDC.

    The U.S. government uses the same definition for workstations and for non-government users, software certifications mean that you can run CAD and CAM programs, for example, without worrying about crashing, Cohen noted. That's important if you're working on a complex design.

    To read this article in full or to leave a comment, please click here

  • Mingis on Tech: Is the iPad Pro (finally) ready for the enterprise? 2017/06/21

    Apple's Worldwide Developers Conference two weeks ago was as much about hardware as software -- with a special emphasis on the new 10.5-in. iPad Pro (and its also-updated 12.9-in. sibling).

    The new A10X processor, a brighter TrueTone screen, improved graphics, and even a better camera system all combine to make for a worthwhile upgrade over earlier versions of the iPad Pro.

    Those iPads, along with a revamped iOS 11 -- especially as it will be used on tablets -- make for a powerful combo that again raises the question: Is the iPad a real enterprise device?

    To read this article in full or to leave a comment, please click here

  • Flash Player updated just 3 days after an update 2017/06/18

    On June 13th, Adobe updated their Flash Player to fix a number of critical security flaws. Then, just three days later, another fix.

    The new fix seems relatively trivial. On the 16th, the company said "we've updated Flash Player to address a bug that was impacting some Flash content. If you are having problems interacting with mouse button presses or drag and drop actions, we recommend you update to today's release."

    The latest version is now 26.0.0.131, except, of course, with Microsoft's browsers.

    To read this article in full or to leave a comment, please click here

  • Blockchain integration turns ERP into a collaboration platform 2017/06/09

    As the blockchain continues to mature and find adoption in areas other than cryptocurrency, ERP vendors are working to integrate the distributed ledger technology as a trackable, immutable record for everything from shipping manifests and supply chains to equipment maintenance and dispute-resolution systems.

    "This is very real and something we're aggressively excited about," said Brigid McDermott, vice president of Blockchain Business Development at IBM. "What blockchain does is provide a trust system of record between disparate companies."

    To read this article in full or to leave a comment, please click here

  • The top 5 mobile security threats 2017/06/02

    A smartphone can feel like a ticking time bomb to IT security pros. With the BYOD trend now well established in the workplace, and employees less vigilant about avoiding malicious links, the chances for trouble remain high.

    But when your personal and professional lives intersect on your phone -- the same one that often includes confidential corporate data and email -- it's inevitable that someone will stumble onto malware. Chris Crowley, an instructor at the SANS Institute, offers a rundown of the top mobile security threats today and what can be done to head then off.

    1. Untrustworthy devices. A device itself may be faulty or maliciously configured within the supply chain, providing violation of CIA (confidentiality, integrity, availability), he said. One example: CheckPoint earlier this year found an infection of 36 Android devices at a large telecommunications company. In each case, the breach was not caused by the user, but by malware already on the phone when the employee took it out of the box.

    To read this article in full or to leave a comment, please click here