An easy way to check the status of a shipment, is to copy and past the tracking number into Google search. The search will return a link for the shipper that best matches the format of the tracking number. Clicking the link will take you directly to the status page for your tracking number.
Author Archive | Chris Shank
5G internet – fast, reliable and coming soon
It’s no secret that businesses and consumers alike are getting their hands on more and more network-connected devices. Gartner estimates that there will be 20.8 billion network-connected devices worldwide by 2020 (compared to 6.4 billion today) and Internet of Things sensors are appearing in everything from fridges to water meters. Of course, this means that […]
Can robotic process engineering transform your business?
One of the most talked-about trends in the digital economy is robotics and its ability to perform tasks infinitely faster and more accurately than human workforces. The key to such advances is automation. Specifically, robotic process automation (RPA), which uses software ‘robots’ governed by business logic and structured inputs. RPA is already having a big […]
Classroom 2.0: When old school meets new tech
The traditional classroom is in some ways a blank canvas, a simple room with desks, chairs and a blackboard at the front. It’s a setup that has worked well for centuries – but interactive technologies are set to transform it by taking this arrangement and adding a new layer of flexibility. Digital technology now allows […]
Remember what you’ve learned: data storage for schools
As education becomes more and more digital, education CIOs at all levels are faced with an ever-expanding network of desktops, servers, notebooks, mobile devices and digital education and research tools. In addition to requirements around governance, security, deployment, maintenance, and training, these tools typically generate enormous amounts of data. Multimedia information is becoming more prevalent […]
3 key factors in cloud security
Everybody loves cloud services for their utility and accessibility. How about their security? It remains a concern for private users, small businesses and global enterprises alike. Leviathan Security Group research has identified three key factors in the effectiveness of cloud security: availability, staffing and vulnerability management. Only by considering, and carefully managing, all three can […]
Hackers: use their power for good, not evil
IT systems are business-critical but hard to secure. Criminals are working full-time to find ways to bust in and exploit your valuable data and we all know that no system or infrastructure can ever be made perfectly secure. Hackers are determined, resourceful and devious – so if you can’t beat ’em, join ’em. It may […]
Can mobile tech do it all?
The increasing power of mobile phones, tablets and other devices has challenged the traditional desktop and laptop computer. Yet is it really possible to run your business from your phone? Is an iPad Pro a good substitute for a MacBook, or a Galaxy S9 a substitute for a PC? And where do devices like the […]
Why the smart money is moving to the cloud
We all love having the latest, newest and best technology but there’s one small problem: whatever you buy today will be obsolete tomorrow. And with technology’s accelerating rate of change, ‘tomorrow’ comes faster and faster every year. That’s why ‘as a service’ (aaS) software (and even hardware) offerings are gaining in popularity. More broadly, it’s […]
Prevent data loss in five easy steps
We’re now living in the data economy, so you can’t afford to neglect the possibilities of employee actions causing data leakage. Sometimes this can be malicious; it’s been estimated that one-quarter of employees will take or share sensitive company information when they leave their job. The findings of a 2016 Biscom survey of 600 employees […]