Blog

5 Types of virtualization

December 13th, 2017
5 Types of virtualization

The age-old proverb “There’s more than one way to skin a cat” is especially relevant when budgeting for IT services. With the right technology consulting and support, any business can afford customized solutions that employ creative methods to achieve its end goals.

How to master Microsoft Office!

December 8th, 2017
How to master Microsoft Office!

Despite Microsoft Office’s easy-to-use interface, mastering all the features in this suite of productivity tools requires time. But fret not, the following training videos will help you become a Microsoft Office expert fast.

Office Basics is a series of free Office training videos from Microsoft which cover different features and functionality.

Here come crapware-free PCs

December 7th, 2017
Here come crapware-free PCs

Bloatware, trialware, crapware — the unnecessary software usually pre-installed by the manufacturer on your brand new PC. Besides being annoying, this type of software also slows down your machine and can tamper with security. Microsoft is fed up with it too, which is why they’ve come up with Windows 10 Signature Edition PCs. Read on to find out more.

Cybersecurity Essentials: VPN

December 6th, 2017
Cybersecurity Essentials: VPN

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN).

What is VPN?

Simply put, a VPN is a group of servers you connect to via the internet.

How to extend your laptop battery life

December 1st, 2017
How to extend your laptop battery life

These days, we get a lot of our work done on laptops, which means battery life is a huge priority for any laptop user. Wouldn’t it be good, then, to learn how to prolong the life of your laptop battery? Here are a few useful tips to do just that.

Some truths about your laptop battery

Batteries in many devices nowadays are lithium-based — either lithium-ion or lithium-polymer — so users must take note of the following guidelines for their proper maintenance:

They can’t be overcharged, even though you leave your battery plugged in for a long period of time.

Microsoft’s new productivity apps are live

November 30th, 2017
Microsoft’s new productivity apps are live

In July 2017, Microsoft announced three brand new apps for Office 365: Connections, Listings, and Invoicing. They were designed for businesses with fewer than 300 employees and after a few months of beta testing, they’re finally available to Business Premium users.

How do idle VMs cost businesses

November 27th, 2017
How do idle VMs cost businesses

Thanks to virtualization software, the time it takes to bring virtual machines (VMs) online is faster than ever. You could deploy a fleet of them in minutes, but as with most technologies, there are some drawbacks. Experts say too many VMs can cause a logistical nightmare and cost your business a lot of money.

Outlook on Mac and Windows gets redesigned

November 23rd, 2017
Outlook on Mac and Windows gets redesigned

Microsoft is redesigning Outlook for Mac and Windows to reduce clutter and improve user experience. The design changes will be patterned after the iOS version of the app, which is much easier to use and more modern-looking than its desktop counterpart.

Recruit talent using Google!

November 22nd, 2017
Recruit talent using Google!

The last thing you want when hiring new candidates is your competitors poaching them. This is why you need to post your job listings quickly on the right platform. If you’re not already doing that using Google for Jobs, here’s why you should.

What is it?

Google for Jobs is a search feature that sorts and prominently displays job listings from career sites in Google Search.

Google studies effects of leaked logins

November 21st, 2017
Google studies effects of leaked logins

Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. Here are the results.