Blog

Office 365 allows guests to collaborate

Office 365 allows guests to collaborate

Office 365 is constantly evolving. What started as an online extension of Microsoft’s flagship productivity suite has evolved into one of the best pieces of cloud software currently on the market. Last month we saw the next stage in that evolution, and it came in the form of allowing guests to collaborate on your 365 projects.

Huawei to make Google’s new Android tablet

Huawei to make Google’s new Android tablet

Although Apple gets all the attention, Android tablets have plenty of loyal fans to keep the gossip mill running. The most recent of these suggests that Google may be bringing back one of its most revered devices: the Nexus tablet. With a rumor that Google and Huawei will be collaborating to make this happen, we couldn’t be more excited.

The next big thing in endpoint security

The next big thing in endpoint security

As virtualization becomes a household name for small- and medium-sized business owners, more and more services are being introduced. Hardware virtualization, storage virtualization, and even network virtualization all aim to capitalize on the trend of creating virtual versions of physical technology.

9 cybersecurity terms everyone must know

9 cybersecurity terms everyone must know

Everyone, from doctors to lawyers, needs to continue learning to stay ahead of the times. Business owners might have it worst of all, oftentimes needing to stay on top of several industries to keep their company running. Keep reading for a refresher on all the latest trends and buzzwords used in the cybersecurity sector.

Enhance networking with LinkedIn Alumni

Enhance networking with LinkedIn Alumni

Catching up with your friends at your high school reunion is all well and fun before the conversation turns to work. It seems like all your friends have well-paying jobs, and you’re stuck with a demanding one that’s underpaid. What if there were a way you could land better jobs or further your career path? No sacrificial ceremonies needed.

How to avoid your own Delta IT disaster

How to avoid your own Delta IT disaster

Earlier this year, thousands of Delta passengers worldwide were grounded due to a power outage that halted critical IT operations. This was a huge problem not only for the many delayed travelers, but also for the airline company itself. Within three days, the airline company cancelled around 2300 flights and paid over millions of dollars in downtime costs.

Android Nougat’s top 9 features

Android Nougat’s top 9 features

What gets you out of bed each day? Is it the smell of freshly-brewed coffee or the sounds of bacon sizzling on the pan? Now apply this toward smartphones: What gets you really worked up? Could it be the new, sleek design or its upgraded selfie camera? Regardless of the reason, we are all drawn to novelty like moths to a flame.

New security patches for VMware machines

New security patches for VMware machines

While virtualization still has a host of security advantages over its localized counterparts, it isn’t exempt from the attention of cyber attackers. Most recently, one of the industry’s leading software vendors, VMware, was forced to release a patch for a critical vulnerability that allowed underprivileged users to attain access to administrative rights.

New heights in data compliance penalties

New heights in data compliance penalties

The tech industry is littered with buzzwords: overused jargon generally meant to inspire feelings of hope and accomplishment. Not all have positive connotations however, and data compliance is one of those spooky buzzwords that many small- and medium-sized businesses have scant specific knowledge about.