COMMON Blog

Welcome to the COMMON Blog

Thank you for visiting the COMMON Blog. With the blog, we hope you find information of value regarding information technology. Posts are organized into a wide array of categories. If you would like to see a topic covered in the blog, please let us know.

Latest Blog Posts


  • As the novel coronavirus has reminded us, preventing a pandemic is a race between the spread of the disease and efforts to develop an effective vaccine. Even a disease such as the one that is now ravaging parts of China, with about a two percent fatality rate, could potentially kill millions if not contained in time. Think about the 1918 Spanish Flu read more

  • Blog Entry

    by @Gordon Leary AI, or Artificial Intelligence , is not that scary machine that you saw in that movie last night. AI uses algorithms and data to solve problems , or find answers . Through continued use of these algorithms, we amass more data, and make our machines smarter, and deliver better business results . AI is used in many aspects of our lives read more

  • Security Risks in Mobile Devices

    Blog Entry

    The desktop computer industry is giving way to more convenient ways of computing — mobile devices such as smartphones and tablet computers. Convenience is a good thing but generally, it can give way to security caveats. Whether the business or nonbusiness user takes advantage of the devices, there are some points to keep in mind when using them. Complacency read more

  • Where Do Hackers Begin Their Attack?

    Blog Entry

    When the internet became more user-friendly in the mid to late 90’s, it opened the door to various security caveats ⁠— a criminal’s honeypot. The world connected via routers, servers, and computers is now a primary target for those looking to exploit data theft ⁠ — a craft by which well-informed and expert computers users utilize a read more

  • Security Risks in Mobile Devices

    Blog Entry

    The desktop computer industry is giving way to more convenient ways of computing — mobile devices such as smartphones and tablet computers. Convenience is a good thing but generally, it can give way to security caveats. Whether the business or nonbusiness user takes advantage of the devices, there are some points to keep in mind when using them. Complacency read more