Psst… Do You Want to Know a Secret?

Psst… Do You Want to Know a Secret?

Amazon’s Alexa Has Some Answers to Questions You Probably Don’t Even Know to Ask.

Alexa is a top-selling gadget for Amazon, and the list of things it can do is ever increasing. Most people who use Amazon Alexa ask the same things over and over -but this virtual assistant can answer a lot of questions you’d never think of. Plus, with new “Skills” (commands) being added all the time, you’ll wonder how you ever got along without it.
But first, a little about Alexa for those of you who aren’t familiar with its capabilities.
Alexa is the cloud-based brain behind the Echo speaker. It’s a “virtual assistant” capable of voice interaction. You can ask Alexa to make to-do lists, set alarms, stream podcasts, play audiobooks and music, and provide other real-time info like weather, traffic, and news. Alexa can also control smart devices in your home if you install the Skills for them. However, unlike mobile-based virtual assistants like Apple’s Siri, Alexa is a dedicated, in-home device.
Here’s a basic list of what Alexa can do.

Answer questions: Alexa can find facts for you, calculate mathematics, look up terms, make conversions or even tell a joke.
Report the latest headlines and sports news: It can give you a brief about what’s in the news with audio clips that go along with it.
Let you know about the current traffic or what the weather will be: Alexa can read the latest weather forecast in your area, or in other locations, plus it can inform you about the most recent traffic accidents or incidents that may slow down your commute.
Stream music: Just ask Alexa to play your favorite album in your Amazon Prime Music Library. Alexa can also access music services like Pandora and Spotify, iHeartRadio and TuneIn.
Set an alarm: You can ask Alexa to set a recurring alarm to wake you up in the morning or let you know when the chicken in the oven is done based on your commands.
Control your smart home devices: Alexa is compatible with devices like Philips Hue and Lifx smart bulbs, Belkin WeMo smart switches, Internet-connected thermostats like the Ecobee3 and the Emerson Sensi, and home platforms like Wink, Insteon, and SmartThings.
Order products from Amazon: Order anything you would via your computer online such as household items you typically reorder. Alexa can even track your orders.

Now that you’ve got the basics covered, here are some fun questions you can ask Alexa.
(Remember to say “Alexa” before you ask the question.)
Education and Trivia
Whether you’re curious about when Napoleon was born, how to translate a term from Spanish to English or if you want a trivia fact, Alexa can inform you. Here are some fun questions to ask:

How do you say where’s the bathroom in [language]?
How long is the Appalachian Trail?
What’s the closest airport to [location]?
What time is it in [city]?
What is the capital of [state or country]?
How high is Mt. Everest?
How old is the oldest person alive today?
What’s the meaning of life?
What day will the 4th of July be on in the year 2025?
What is the mass of Pluto in grams?

 Travel

What’s the weather going to be in New York City this weekend?
What time is Delta flight 162 landing in Atlanta?
What time is it in Paris?

Conversions

How many liters are in a gallon?
How many ounces in a pound?
What is the conversion rate between the US dollar and Canadian dollar?

Sports

What is the latest medal count from the Winter Olympics?
Who had the best batting average last season?
What are last season’s standings for the NFL?
Who’s winning the [team’s] baseball game today?
When does [team] play next?

Cooking

What temperature should I cook the turkey at?
Start a timer for 30 minutes for the biscuits.
How many calories are in a Golden Delicious apple?
How many minutes are left on my timer?
How many ounces are in 3 cups?
How many tablespoons are in 1 cup?

Everyday Needs

Is the [store] pharmacy in [city] open right now?
What are the hours for [business]?
How far away is the Walmart in [city]?
What time does [restaurant] open?
Find my phone. Call [number].
Buy paper towels on Amazon.
Add milk to my shopping list.

Weather Details

Will it snow today?
How many inches of snow will we get today?
What will the weather be like on Friday?
What is the weather in Boulder, Colorado today?
How many inches of rain did we get in [city] yesterday?

Party Time

Play Happy Birthday.
Play light rock.
Play [album].
Play country music.

Silly Stuff
Alexa’s easter-egg commands will make you laugh.

Sneeze
Beam me up
High five
Play rock scissors, paper.
Tell me a Star Trek joke.

These are just some of the things Alexa can do with its built-in commands. You can enable so much more by adding Skills to Alexa. For example, you can download a Skill from Domino’s Pizza, so Alexa can order a pizza with your favorite toppings. Or, download an Uber Skill, so you can ask Alexa to schedule a pick up for you. Download an app from Capital One, and Alexa can help you with financial management. You can also use the Alexa app on your smartphone to download additional Skills. Alexa can handle over 15,000 Skills, and the list is growing all the time.
Most are free to enable. Just go to Amazon and look under Alexa Skills to find them. Here are some that may interest you:
Cooking, Food and Drink: All Recipes, Save the Food, Bartender, Ingredient Sub, Anova Precision Cooker, Beer Calculator, Meat Thermometer, Best Recipes, Meal Idea
Fitness: 7-Minute Workout, 5-Minute Plant Workout, Fitbit, Track by Nutritionix, Guided Meditation
Entertainment: Radio Mystery, Short Bedtime Story, This Day in History, Valossa Movie Finder, Jeopardy
Finance: Capital One, Opening Bell, TD Ameritrade, Cryptocurrency Flash Briefing
Productivity: Giant Spoon (marketing), Quick Events (calendar)
Weather: Big Sky, Feels Like, Fast Weather
Travel: Kayak, Uber, Lyft, Airport Security Line Wait Times
Skills for Kids: Sesame Street, The SpongeBob Challenge, Amazon Storytime, NASA Mars, 1-2-3 Math, Word of the Day, This Day in History
Skills for Seniors: Senior Portal, VoiceFriend, EngAGE Workout, AARP Now News
It’s a good idea to check regularly to see what’s new with Amazon’s Alexa because she’s getting smarter all the time!

GAM Tech Is Proud To Be Part Of The Canadian Federation of Independent Business

GAM Tech Is Proud To Be Part Of The Canadian Federation of Independent Business

GAM Tech has recently joined the Canadian Federation of Independent Business (CFIB), Canada’s largest non-profit organization dedicated to business advocacy. With more than 11,000 members, this group has been working since 1971 to advocate for small business with politicians and decision-makers, influencing public policy based on members’ views and ensuring that members like us have a chance to make our voices heard regarding the laws and policies that affect our businesses. This means taking on challenges such as negotiating better rates for services and lobbying the government on the business’ behalf with regards to taxes.

CFIB works with businesses across Canada, providing resources like on-call counsellors and offering partnerships with carefully selected service providers to deliver group-exclusive savings. Their goal is to see small businesses thrive, and by connecting businesses to an extensive peer network and specialized resources, they’re accomplishing just that.
We could not be more excited to be a member of this group, and the entire GAM Tech team is looking forward to what working with CFIB will bring to our business.
Want to learn more about the industry-leading IT support services GAM Tech provides to area businesses? Give us a call at (403) 768-0900 or email us at info@gamtech.ca today.

No More Double-Doubles At Some Timmie’s

No More Double-Doubles At Some Timmie’s

Tim Hortons Hit By Ransomware
The value and reputation of a popular Canadian restaurant chain have been negatively affected by a ransomware attack.
One of Canada’s most popular coffee shop chains, Tim Hortons, was recently hit with a ransomware attack. Although they say that their customer data wasn’t breached, the cyber attack caused many of Tim Hortons’ locations to suffer computer outages. As a result, 1,000 of their shops were affected, and many had to close their doors.
Tim Hortons’ members of the Great White North Franchisee Association asked the head office to compensate them for their losses. A letter from their law firm reports, “The business interruption includes inability to use some or all of the issued cash registers and [point-of-sale] terminals, causing partial and complete store closures, paying employees not to work, lost sales and product spoilage… [the hack] is causing tremendous downward pressure on the value the Tim Hortons brand”.
According to IT experts, small businesses are even more vulnerable to the devastating effects of ransomware than their larger counterparts.
Last year, Datto published a report about ransomware and its devastating effects on small businesses. It revealed that they are extremely vulnerable to ransomware attacks. Ransomware is a malicious computer virus, the threat of which has grown to epidemic proportions. It holds your data hostage until you pay a ransom. As you can see with Tim Hortons’ restaurants, it caused significant downtime, data loss, and financial costs. Plus, it damages the reputation of every business it hits.
Downtime from ransomware costs small businesses an average of around $8,500 an hour.
Security Awareness Training Is the First Step Towards Protection
Hackers work 24/7 to obtain access to your confidential information, and using ransomware is one of the easiest ways for them to do this.  It’s easier for them to trick your employees than it is to break into a well-secured IT system.
Ransomware succeeds via phishing attacks, in which employees are convinced to click a malicious link. Once they do, the virus enters their computer and locks down all the data. Good employees make mistakes – if they aren’t properly trained to recognize a cyber threat, your network and business are vulnerable.
Today’s 
security solutions are no match for ransomware. This is because the criminals get into your system via your employees’ negligence.  Malicious emails coupled with a lack of employee cybersecurity training 
is the leading cause of successful ransomware attacks.
The best way to protect your business from cybercrime is by instituting enterprise-wide Security Awareness Training.
Ask your IT Managed Services Provider (MSP) to conduct regular Security Awareness Training for you and your employees.
Security Awareness Training is a formalized training conducted by IT professionals who are up to date on the latest threats and how to mitigate them. When conducted properly, Security Awareness Training for your employees will reduce the risk to your organization’s information and IT systems and limit the chance of a data breach.
It’s essential to train your employees to recognize phishing emails and know what to do if they receive one. Make sure they know how to avoid common dangers like opening attachments from unknown senders. Every employee should participate in this training. Make sure that your IT provider holds refresher courses, as threats are constantly changing.
1 in 4 of those who pay a ransom never recover their data.
This is why many security organizations urge victims not to pay.
Backup Your Data to a Reliable Source.
A ransomware attack can hold your data hostage and paralyze your business just like it did for Tim Hortons. That’s why having a reliable backup solution both onsite and via the cloud is crucial. Ask your MSP to provide regular onsite backups of your servers and IT assets, and an offsite backup of the same to a secure cloud facility.
Work with your MSP and answer the following questions so they can provide the best backup solution for you:
How critical is the data you store?
This will help your MSP determine when and how it should be backed up.

For critical data that includes databases, you’ll require a backup plan that extends over a number of time periods.
For confidential information, your backup data should be physically secure and encrypted.
For less critical data, an extensive backup plan isn’t required. However, you should still regularly back up your data and ensure it is easily recoverable.

Do you need to back up your backup?
If you use large servers, your MSP should create an image of them so your data can be retrieved immediately. Remember, backups can fail, so it’s important to back up your backup.
Do you test your backups to ensure they are readily recoverable?   
No matter how comprehensive your backup plan is, you’ll never know if it actually works unless you test it. Avoid potential backup failures by asking your MSP to regularly test the recoverability of your data backups.
How long can your business survive if your data isn’t available?   
It’s important to consider this possibility. It could be a while before your data can be retrieved if it isn’t stored properly. For some, this means weeks without their data. However, your MSP can provide a proper extensive backup solution so that you can retrieve your data within minutes. Time is an extremely important factor.
Every minute of lost productivity will cost you.  Not only in terms of money, but in regard to your credible reputation with clients or customers. This is what happened to Tim Hortons.
You should regularly back up your information to the cloud to protect against data or financial loss if you’re hit with ransomware. Just like you need this protection in the event of a power loss, accidental deletion of data, or a disaster that destroys your servers, you need it to protect your business from ransomware attacks.
100% of the MSPs surveyed by Datto believe that if their small-business clients had a backup and disaster recovery (BDR) solution in place, they would have been able to recover their data.
Don’t wait until a ransomware attack locks up your data. Get in touch with a reliable cybersecurity expert today that will equip your business with an effective backup solution.

Answers To Every Burning Question You Have About Phishing

Answers To Every Burning Question You Have About Phishing

Today, 90% of all data breaches are the result of a phishing attack. A recent study by Google revealed that phishing attacks are the main cause of compromised online accounts. The study was conducted over a one-year period from March 2016 to March 2017. During this time, 1.9 billion user accounts were exposed due to phishing and data breaches.

What is phishing?
Phishing is a fraudulent act in which a scammer steals private and sensitive information such as credit card numbers, account usernames, and passwords. The criminal uses a complex set of social engineering and computer programming strategies to lure email recipients and Web visitors into believing that a spoofed website is legitimate. The phishing victim later realizes that their personal identity and other confidential data was stolen.

How does the scammer succeed?
Phishing succeeds when a cybercriminal uses fraudulent emails or texts, and counterfeit websites to get you to share your personal or business information like your login passwords, Social Security Number or account numbers. They do this to rob you of your identity and steal your money.

Phishing emails are typically crafted to deliver a sense of urgency and importance. The message within these emails often appears to be from the government, a bank or a major corporation and can include realistic-looking logos and branding.
The scammer will typically insist that you click on a link in an email or reply with confidential information to verify an account. They may also attempt to install ransomware on your computer that will lock you out of your files until you pay a fee.
Why do people follow their instructions?

Scammers present themselves as trusted individuals by pretending to be an authority figure in your business, the government, or even friends or family members. They may try to trick you into believing they’re from the IRS and urge that your bank account will be frozen unless you provide confidential information.

How do you protect your business from phishing?
The best way to defend your business is to train your employees to recognize phishing emails so that they don’t click on them. You should do this with ongoing Security Awareness Training conducted by a professional IT Managed Services Provider (MSP).
Ensure that all new employees receive this training as a part of their orientation and that everyone receives further training twice a year, so they’re informed about the latest phishing threats
So you plan to schedule Security Awareness Training for your employees – but what can you do in the meantime?
Be sure that your employees scrutinize all emails and text messages by doing the following:

Be wary of malicious attachments in email messages. They may contain malware that can infect their computer.
Check to see who the real sender of the message is. The company name in the “From” field should match the address. Also, watch for addresses that contain typographical errors like “jsmith@wellsfarg0.com.”
Look closely at the salutation in the message. If they spell their name wrong or use an impersonal greeting like, “Dear Ma’am” this could be a phishing attempt.
Hover over the URL in the email to view the full address. If you don’t recognize it, or if all the URLs in the email are the same, this is probably a phishing threat. Also, make sure that you and your employees know that all reputable URLs now start with https rather than http.

Check the footer in the message. It should include both the physical address of the sender and an unsubscribe button.
If a user isn’t sure if the company in the email is legitimate, they should call the number that they know is correct (not the one in the email) and ask a customer representative about the request in the email.
Make sure your employees are using Two-Factor Authentication whenever possible. This requires an additional piece of information (a code or token) that’s generated and sent to their phone or email address. They must use the code or token to log in to the account, which will protect the account even if their password was stolen.
Tell them not to click on any links, attachments or phone numbers in emails or text messages. These may contain a virus or be redirected to a fake website where a virus is downloaded. If they want to visit a site, they should key in the web address or phone number that they know is legitimate.
If there’s any doubt, they should just delete the message. If the message was from a genuine source, they will try to contact them another way.

What else can you do to protect your confidential business information?

Always back up your files to an external hard drive or cloud storage. It’s best to use a comprehensive solution with remote, offsite backup and data recovery services to ensure your business information is safe no matter what. Your MSP can provide this for you.
Also be sure to keep your security solutions up to date. Ask your IT MSP about Email and Spam Protection, which offers:

Anti-Spam, Anti-Virus and Anti-Malware solutions that scan incoming mail, and block spam, malware, and phishing attempts.
Firewall Management that determines if an address that’s trying to connect to your computer is one you can trust. If not, it denies access.
Outbound Mail Scanning so if one of your computers is infected with a virus, your outgoing mail services aren’t compromised. This is important because it will keep your company off spam lists and blacklist

How Can You Be Sure Your Employees Know About Phishing?
The best way to ensure your employees know how to deal with a phishing threat is to test them. Allow us to help. We’ve prepared an example phishing email template that you can fill out and send to employees in just minutes to test their knowledge of phishing threats.

How do you report phishing scams?

Should your employees believe an email may be a phishing email, please them forward the email to phishing@compnetsys.com and we can help validate the email. If we suspect its phishing we will let you know right away and also report eh email to spam@uce.gov. We will also file a complaint with the Federal Trade Commission (FTC).

Be sure to check for the most recent scam alerts at The Federal Trade Commission’s SCAM ALERT page at https://www.consumer.ftc.gov/scam-alerts.

Stay competitive by making technology your business advantage

With our expertise and cloud services from Microsoft, you can quickly and affordably meet your business goals, whether it’s adapting to a changing competitor landscape, achieving business growth, protecting customer data, or reaching new clients. Let CompNetSys and Microsoft cloud services put you on the fast track to the modern business

Update on Multifactor Authentication Methods

Update on Multifactor Authentication Methods

Each year seems to bring even bigger and more expensive data breaches. It’s become commonplace to hear that your favorite retailer was just breached and millions of records were lost to hackers somewhere on the other side of the world. In spite of our best efforts, cyber crimes are now the number one leading crime worldwide. Every organization is vulnerable on some level.
Stopping Cyber Thieves
Though most companies now employ much stronger cybersecurity than they did 10 years ago, our society is light-years away from being impenetrable. Some industry experts believe we’ll never be able to fully stop all breaches from occurring. The reasons for this vary but the most logical line of thinking is that that technology is evolving at nearly a daily rate. With each new invention, we open another window that cybercriminals can climb through. Every new convenience we gain through technology is another potential vulnerability just waiting to be exploited.
Password Protected
According to a recent survey, about 60 percent of all internet users confess that they use the same passwords across multiple accounts. That means that a hacker only has to discover one password instead of a dozen. It makes the work of cybercriminals much easier. Once they have learned the password to one of your online accounts, they’ll go to work trying it on other accounts.
As a society, we must realize that cybercrime is escalating. Data breaches are becoming the norm. One of our most important defenses is to make it as difficult as possible for criminals to learn our passwords by creating log-ins that are hard to decipher. A 2017 Verizon Report on Data Breaches found that 81 percent of all data breaches occurred because user passwords were weak and easy to decrypt.
This is one area we all need to improve upon and it’s not difficult or expensive. Simply start today by creating passwords that begin with numerals and contain symbols and upper-case letters. Be sure to write the passwords down so you don’t have to memorize them all. Change all passwords on at least a quarterly basis.
Two-Factor Authentication
Another key element is our log-in security. Two-factor authentication (2FA) is one way to keep your data more secure. 2FA requires the consumer to utilize two methods to confirm that they are the rightful account owner. There are three categories of information that can be used in this process:

Something you have: Includes a mobile phone, app, or generated code
Something you know: A family member’s name, city of birth, pin, or phrase
Something you are: Includes fingerprints and facial recognition

Though 2FA does make it harder for the account owner to access the account, it also makes it difficult for cyber thieves to learn your password. Their job becomes much tougher because they now need to do more than just hack your password. They’ll need personal information about the account owner. With so many accounts being too easy to break into, hackers are more likely to just move on instead of trying to break through the multiple factor authentication process.
How to Implement 2FA for Your Business
Many companies now use some form of 2FA to protect their valuable data. In fact, there are apps today that make it much simpler to implement this type of security. Google Authenticator has quickly become a favorite app, along with Duo Mobile and Twilio Authy. Online gaming services have led the way in this type of technology because of their popularity and content.
Blizzard Entertainment, an online gaming service, requires that all users receive a code when first trying to log on to the site. The code is sent to the mobile phone number you have on file. That type of authentication makes it practically impossible for a hacker to steal your password. They would first need to know your mobile phone number and be able to intercept your text messages. As stated above, with so many accounts now so vulnerable, hackers are much more likely to just move to another consumer’s account where there isn’t such a sophisticated level of security.
These codes can also be sent via email instead of text messages, but experts highlight the fact that email accounts are easy to hack. That means thieves can intercept messages.
Time-Based One-Time Passwords
Time-based codes are a very effective method of stopping hackers. With this type of security, a dynamically generated code is sent via email.
A time-based one-time password (TOTP) will not stop the more determined cyber thieves but it is still much stronger than regular passcode methods. You not only need to know the code, but you have a specific window of time to use it before it expires. Though the code can hypothetically be intercepted, it’s a complicated process that hackers might want to avoid.
Other Security Methods
A newer, more complex method of security involves using a Hardware Token. This token is an actual item that the user has with them. Though this is extremely effective, it also has a number of drawbacks and has not been widely used. To date, the 2FA method has been viewed as the most secure while still being convenient for users. It is widely used by financial institutions and developers are working on ways to make this type of security even stronger.
One thing that industry experts warn about is the “set it and forget it” risk. Often, a business will set up the two-factor authentication protocol, but then just assume that everything is well-protected from that point onward. In order to be as secure as possible, all network and internet security require frequent checks to make sure things are still working. Security experts also recommend regular patches and updates to the software. Implement a simple alert system that notifies your IT department of any unauthorized access attempts. These are just a few of the many ways we can all protect our online data.

Look Out Silicon Valley- There Are New Players in Other Towns

Look Out Silicon Valley- There Are New Players in Other Towns

Everyone knows that Silicon Valley is the place to be for high paying, high-tech jobs. However, with the prestige and power that the area holds, there also comes a high cost of living and other unfavorable, namely overpopulation, congestion and limited housing options.

As the area’s population gets denser and denser, companies are looking beyond California to other regions that just could be the next Silicon Valley. Here’s a breakdown of the top five areas in North America just waiting to burst onto the scene.
Provo, Utah
While Provo might not be as exciting or glamorous as coastal California, it has a lot of advantages that are drawing people to the area. Nicknamed the Silicon Slopes, the Provo area has Brigham Young University which has a fantastic STEM program. The state also allows for vast tax breaks. It’s been said that if Silicon Valley knows how to make great engineers, Utah breeds great salespeople who know how to work for the high-tech crowd. It’s no wonder that tech giants like Microsoft and Oracle have placed sales offices and call centers in Utah.
Seattle, Washington
Seattle is known for more than Starbucks and ’90s Grunge bands. The Bay area’s neighbor to the north, nicknamed “Silicon Forest “, is home to commerce giant Amazon and a flourishing tech scene. It’s also adding high tech jobs at a faster rate than Silicon Valley. In the last 10 years, there’s been a rise of a new breed of large Seattle-based tech companies, companies that are smaller than the two local powerhouses, Microsoft and Amazon, yet still big enough to fill out the middle tier of the tech world.
This group includes companies such as Expedia, Zillow, PopCap Games, Adobe, and Isilon. Seattle has an ample number of companies not only at the $100 billion estimation but throughout the $10 billion, $1 billion, or $100 million valuation ranges as well.
Ten years after Google arrived in Seattle, the city has seen an explosion of Silicon Valley companies setting up their second engineering offices. Seattle is now home base to engineering offices for Google, Facebook, Apple, Twitter, Salesforce, eBay, Dropbox, Uber, Groupon and Hulu to name a few. In addition, the University of Washington has one of the top 10 computer science programs in the country, with graduates who want to remain in the region.
Toronto, Ontario
The area surrounding Toronto is home to Google and Shopify, along with thousands of startups. Toronto is poised to be the next tech hub because it offers startups access to some of the world’s best and brightest innovators. According to Michael Katchen of Wealthsimple, “The best thing about running a start-up in Toronto is that it’s the real world, not a tech la-la land. When you’re building a product for real, diverse people, it’s important to do it with and among real, diverse people.”
Huffington Post reports that in the last few years, Toronto has become home to the most high-volume tech companies in the country. In fact, 40 percent of the top 250 technology companies in Canada is headquartered in Toronto.
Pittsburgh, Pennsylvania
Once an old steel town, long gone are the days of smoky skies and working mills. In its place is a more modern and high-tech city backed by colleges such as The University of Pittsburgh and Carnegie Mellon University. Brilliant researchers and students at CMU are developing new computer interfaces, glare-reducing headlights, robotic-assisted prostheses, 3D editing of 2D images, and much more.
Community leaders have established a robust environment to support new companies from the planning stage through startup funding and full growth. Local organizations like the Allegheny Conference on Community Development, Pittsburgh Technical Council and the Regional Investors Council work to ensure that businesses, especially startups, have what they need to get established, grow and — most importantly — stay in southwestern Pennsylvania.
Since 2000, the city’s population has skyrocketed by 40% and the residents are getting younger. Not only that, but the cost of living in Pittsburgh is extremely reasonable, and it’s been named one of the most livable cities year after year.
Austin, TX
Austin is a growing region that has been a hotbed of activity for young people in recent years. The music scene is huge and now it’s also home to a mix of larger companies and shrewd entrepreneurs filing in from California. There are a number of veteran executives operating here as well as startups and large players alike. It’s a market for high-growth companies to thrive. A study conducted by Forbes.com found that one-third of the companies that are moving to Texas originated in California, where the high cost of doing business often sends companies looking for better opportunities. Companies like Dell started in Austin, and other businesses have flocked there including Apple, Microsoft, AT&T, and Samsung.
Thinking Outside the Box
While Silicon Valley is still number one in the technology game, it isn’t running away with the race anymore. As more and more cities compete for technology-based companies to move in, North America will see other major cities benefitting from the high-tech modern world. Independent IT companies in these areas can take advantage of startups while they’re still small and growing, all the while adding to the economy of these five cities. The possibilities are endless, and the future is bright.