Because Amazon Echo sold like hotcakes during the holidays, Alexa became the darling of Christmas 2017, taking over our homes and hearts. With the Android version of the app now enabled with voice control, Alexa can continue to smoothly make its way into our lives via our smartphones.
Android users, meet Amazon’s Alexa
Virtualization from Microsoft gets faster
Microsoft isn’t always the first company that pops into mind when talking about virtualization, but it does offer one of the best solutions in the industry. In an ongoing effort to compete with companies like VMWare and Amazon Web Services, Microsoft has released a massive upgrade for its virtualization platform -- and it’s totally free!
Azure: Microsoft’s virtualization platform
As a full-service cloud solution, Azure is a secure and flexible data center that businesses of all sizes can benefit from.
Differentiating Groups, Yammer, and Teams
Yammer, Outlook Groups, and Microsoft Teams have plenty in common. They’re all Office 365 tools designed for sharing files and communicating with colleagues. So what differentiates each from the other and when should you use them? Here's a quick rundown to help you decide.
Issues found for new Windows patches
Despite security being one of Microsoft’s top priorities, it has been recently discovered that there are two vulnerabilities in computer chips, named Meltdown and Spectre, that put private data in jeopardy. As a solution, Microsoft has released an update to fix this vulnerability.
How to stay safe from Spectre & Meltdown
Like many security flaws, the Spectre and Meltdown bugs can leak critical data from computers and mobile devices for hackers to exploit. What makes them unique is the vast number of PCs, laptops, tablets, and smartphones they affect. But if you use an Apple device, there are fixes that can help you temporarily protect against them.
Hardware flaws affect browser security
In the first week of 2018, security researchers announced that modern computer processors have a fundamental flaw called Spectre. If exploited, hackers could gain access to systems that store confidential information. And the most vulnerable to these attacks are outdated web browsers like Chrome, Safari, Microsoft Edge, and Firefox.
Gear up your network equipment with UPS
During a power outage, responsible business owners use emergency power to keep desktop computers from unexpectedly shutting down. While that’s certainly a good strategy for keeping machines operational and preventing data loss, there’s something else you can do to ensure that your staff remains productive while weathering a storm: uninterruptible power supply (UPS) for networking equipment.
Android File Transfer via USB Cable
There are many different ways to transfer files between Android phones and computers; however, most of these methods require an internet connection on both the phone and the computer during the process. So, if you are about to be off the grid for quite some time or would just rather transfer files without the internet, here’s how you can do just that with your trusty USB cable:
What you need:
Your Android phone
A computer with a USB port
A USB cable
What you need to do:
If you have a Windows computer…
Start by plugging your phone into the computer via USB port.
Spectre and Meltdown vs. virtual desktops
On January 3, 2018, two hardware flaws were announced that affect nearly every computer sold within the last 20 years. Every virtualization service available relies on vulnerable computers, but you needn’t worry -- almost every vendor has already protected your virtual machines.
Bloatware: From Annoying To Dangerous
Bloatware, junkware, trialware, third-party apps -- whatever you call it. There’s now yet another reason to get rid of these annoying pre-installed programs and plugins indefinitely: security threats. Learn more about the other risk that might do more than slow down your computer.
- 1
- 2