Pete provided an excellent service when I needed my iPhone screen repaired. Within 10 minutes of calling, I had dropped my phone off too him, and had it back in my hands looking brand new within a matter of hours. Thanks for your efforts Pete!

Recommendation on Facebook

Would you be happy to
Leave a Testimonial?


It's no secret that Instagram is making a big play into the world of e-commerce.
Read more: irishtechnews.ie


New cloud storage services for Microsoft Azure at Ignite 2018
Microsoft launches Data Box hardware appliances for cloud ingestion
Read more: computerweekly.com


Choosing Between Private and Public Clouds:
How to Defend Which Workload Goes Where
Read more: insight.com


Top biometric technologies that will kill passwords
Today, it takes only an unthinking brush of the thumb to unlock our phone or transact via mobile pay,
Read more: techworld.com


15 Best Google Chrome Privacy Extensionss
Google Chrome offers a host of built-in features aimed at maintaining your privacy
Read more: tomsguide.com


How to Take Better Phone Photos
It's not just that smartphone designers can pack fantastic image sensors and lenses into a device that fits in your pocket.
Read more: popularmechanics.com


5 simple tips to boost your home Wi-Fi
To some, Wi-Fi is a requirement as basic as electricity and running water.
Read more: gadgetsnow.com


14 Things You Can Do in macOS 10.14 Mojave That You Couldn't Do Before
The new and improved macOS 10.14 Mojave rolled out to compatible Macs everywhere yesterday.
Read more: gizmodo.co.uk


Yes Facebook is using your 2FA phone number to target you with ads
Facebook has confirmed it does in fact use phone numbers that users provided it for security purposes to also target them with ads.
Read more: techcrunch.com


What will Android look like in the next ten years?
A decade ago, Android launched... to a world of challenges.
Read more: engadget.com


How to scale in the face of competition
No matter who you are, what you are trying to sell, or who you are trying to sell to – you will always have competition.
Read more: uktech.news


How to fix six Windows 10 headaches
Microsoft's latest OS is a lot better than its predecessor, but it still has some annoying quirks.
Read more: computerworld.com


5 Ways to Transfer Files From One Computer to Another
When you buy a new computer, you’ll want to transfer most of your existing files over to the new computer.
Read more: makeuseof.com


Your computer's graphics card isn't just for gaming. Here's how to upgrade it.
If you want to boost your computer's visual performance, you need to improve its graphics.
Read more: popsci.com


5 safe practices you should follow to avoid malware
In a world with increasing cases of privacy violations online and countless scams, the need to be safe and protect yourself from harmful elements has never been greater.
Read more: gizbot.com


Simplifying Hybrid Cloud Management to Accelerate Digital Transformation
We live in an age where a little bit of paranoia is healthy and making sure that out personal information is safely and securely erased off devices we've used is a good thing.
Read more: zdnet.com


Simplifying Hybrid Cloud Management to Accelerate Digital Transformation
Many organisations have embraced cloud services to accelerate their digital transformation,
Read more: computerweekly.com


Who controls your data?
We requested our personal information from dozens of companies.
Read more: engadget.com


The three critical ingredients for cloud security success
The terms 'cloud' and 'security' have gone hand-in-hand since the concept of cloud was first initiated many years ago.
Read more: computing.co.uk


15 ways to run a terrible website
Irritating website characteristics can annoy and drives users away from your business.
Read more: techrepublic.com


Google Go can now read any website out loud
Yes, the app can read this article for you.
Read more: engadget.com


How to Factory-Reset Your Router
The recent alerts about the VPNFilter malware told millions of people worldwide that they should factory-reset their home Wi-Fi routers.
Read more: tomsguide.com


Boost your content across devices
Promote your company updates to targeted audiences on desktop, mobile, and tablet.
Read more: linkedin.com


SD-WAN (software-defined WAN)
Software-defined WAN (SD-WAN) is a technology that distributes network traffic across wide area networks
Read more: searchsdn.techtarget.com


Red Hat: Rapid creation, maintenance, and management of applications
Modern app development is the rapid creation, maintenance, and management of applications that run across complex hybrid cloud environments without modification.
Read more: techdatanewsflash.co.uk


Keeping it on the Down Low on the Dark Web
Sites on the Dark Web Have Several Motivations to Unmask Their Visitors
Read more: securityweek.com


Google accused of tracking users even with 'location tracking' turned off
Google claims it's all part of improving the user experience
Read more: computing.co.uk


How to boost your mobile signal
Poor mobile signal? Here are some of the things you can do to boost your signal and get better reception, or make calls without signal.
Read more: techadvisor.co.uk


5 Sites to Find Product Reviews, Compare Anything, & Decide…
Online shopping is great to search for something you want and buy it. But it’s difficult to discover products or find the best new things to buy.
Read more: makeuseof.com


The most common social engineering attacks
The human is the weakest link in the chain of security -
Read more: techworld.com


All the key news on Apple's upcoming streaming TV platform
Last year, reports broke that Apple was going to spend upwards of $1 billion on a streaming video platform, which would complement its Apple Music streaming service.
Read more: theverge.com


9 tech tips I learned while traveling abroad
Before you take a trip outside the country, make sure you're technologically prepared.
Read more: cnet.com


The most common social engineering attacks
The human is the weakest link in the chain of security - you can have all the best technology in place to offset the risk of a malicious attack,
Read more: techworld.com


Tech-as-a-Service: Transform the way you sell
With Tech Data's award winning and leading vendor endorsed Tech-as-a-Service
Read more: techdatanewsflash.co.uk


Cloud Computing | What is it?
You might have heard a lot about cloud computing in the news recently but what exactly is cloud computing, and why is it so important?
Read more: comparethecloud.net


Blockchain update: Google joins the blockchain fray with new cloud partnerships
There's a lot going on in the world of decentralised networking and not just the daily rollercoaster ride of the cryptocurrency markets.
Read more: computing.co.uk


How to Make Your Mac Play Nice with Your Android Phone
Getting iPhones to play nice with Windows can be a challenge, but so can getting Android to play nice with Macs
Read more: gizmodo.co.uk


How to Make Your Wifi Router as Secure as Possible
Though more router manufacturers are making routers easier to set up and configure
Read more: lifehacker.com


Today's email system has no mechanism to fully prevent spoofing
Enterprising hackers can spoof the email address of a trusted friend, co-worker, or business and send forged emails to victims.
Read more: sciencedaily.com


Best free VPNs 2018
A virtual private network – a VPN – is a way to connect to a private network hosted elsewhere over the internet.
Read more: techworld.com


Firefox Focus can lock your tabs behind Face ID
If you use Firefox Focus for its privacy features, you'd love its latest version for iOS.
Read more: msn.com


How to tell if your computer has been hacked
Although most of us have some form of anti-malware software installed, this cannot always offer peace of mind in regards to attacks on our networks, given that cyber attacks are constantly evolving.
Read more: computerworlduk.com


Privacy conversation turns to enabling smart TV tracking services
Remember when tech topics had such happy focal points as bendable displays and a new stylus for tablets?
Read more: techxplore.com


The Best Defense Against Fake News in Social Media
By now most of you know that the last presidential election had more to do with Russia and Facebook than pure voter preferences.
Read more: technewsworld.com


Samsung Phones Randomly Texting Photos and No One Knows Why (Update)
Got a late-model Samsung phone? Is T-Mobile your carrier? If you can answer "yes" to both, then...
Read more: tomsguide.com


How to Avoid (and Block) 'Neighbor-Spoofing' Robocalls
If your phone has been ringing off the hook with calls from supposed local numbers, you are not alone.
Read more: tomsguide.com


What's causing the cybersecurity skills gap?
The proliferation of next-gen technology into mainstream society has been a boon for consumers, entrepreneurs, and business owners alike.
Read more: malwarebytes.com


Continued conversation is arriving for Google Home users today
Continued conversation allows you to ask Assistant a question and then add a follow-up, a reminder, or an item to a shopping list without having to say, "OK Google," each time
Read more: theverge.com


Protect what must be kept private with Blackphone 2.
Blackphone is the world’s first smartphone built from the ground up to be private by design.
Read more: silentcircle.com


What Ever Happened to Google Fiber?
A couple of years ago, one of the hottest new technologies was Google Fiber.
Read more: ecommercetimes.com



It's no secret that Instagram is making a big play into the world of e-commerce.
Read more: irishtechnews.ie

Would you be happy to
Leave a Testimonial?