Blog

Take notes the modern way with OneNote

February 5th, 2019
Take notes the modern way with OneNote

Note-taking is an essential skill for students and professionals. Whether it’s a board meeting, a conference, or a lecture, you will inevitably need to list, quote, and summarize certain points. Fortunately, you no longer have to rely on longhand to record your notes. With Microsoft OneNote, not only can you can type important notes, but […]

The pros and cons of EHRs

February 4th, 2019
The pros and cons of EHRs

The healthcare industry has been increasing its adoption of electronic health records (EHRs). The technology claims to improve on current paper-based methods. However, EHRs are not flawless. Learn more about the pros and cons of EHRs and decide for yourself. What is an electronic health record? An electronic health record (EHR) is an individual’s official […]

The risks posed by Windows 10 bloatware

February 1st, 2019
The risks posed by Windows 10 bloatware

Have you bought a new PC or laptop recently? Don’t be too impressed by so-called value-added pre-installed software, as these take up storage space and use up processing power. More than this, a new report shows that free trial versions of browser toolbars, video games, and antivirus programs can make you vulnerable to cybersecurity threats. […]

Autocomplete password risks

January 31st, 2019
Autocomplete password risks

Advertisements and “helpful” suggestions based on your internet browsing habits can be troubling. But what’s even more alarming is that hackers have found another way of tracking you via seemingly harmless autocomplete passwords. Here’s what you need to know. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion internet users […]

Should you get an SSD for your Mac?

January 30th, 2019
Should you get an SSD for your Mac?

Solid state drives (SSDs) are now standard issue across Mac computers. But if you have an older Mac, you can easily upgrade it with an SSD and benefit from the many performance advantages of this type of storage device. They’re faster SSDs have the clear advantage over HDDs in terms of data access speed. To […]

The cloud and virtualization explained

January 28th, 2019
The cloud and virtualization explained

Cloud computing and virtualization are similar but that doesn’t mean that one can be substituted for the other. Each has its own benefits, so it pays to know how both work, so you can take advantage of them. Virtualization Imagine a company with five servers, each assigned a single task such as storage, email, etc. […]

CRM optimization best practices

January 25th, 2019
CRM optimization best practices

The effectiveness of your business’s day-to-day operations is the best indicator of whether your customer relationship management (CRM) software is performing to expectations. CRM is revolutionizing the way businesses interact with customers, but are you integrating CRM into your business in the best possible way? Learn how you can transform your business with the following […]

Android 9 Pie: Presenting cool new tricks

January 24th, 2019
Android 9 Pie: Presenting cool new tricks

The last few versions of Android offered mostly small modifications. But with Android 9 Pie, Google made sure to add more functional features users will find handy. Let’s take a look at some of the things that have made Android 9 Pie such a welcome addition to Android’s lineup. Enhanced security features In Android 9 […]

The biggest mistake to avoid with VMs

January 23rd, 2019
The biggest mistake to avoid with VMs

Virtual machines (VMs) make IT resource management effortless. By making a few simple adjustments in your virtualization console, you can easily create a virtual instance with enough resources to run even the most demanding apps. But this simplicity also introduces a new risk called VM sprawl. The problem with VM sprawl VM sprawl is a […]

How to protect your iPhone from phishers

January 18th, 2019
How to protect your iPhone from phishers

While iOS is relatively more difficult to penetrate than other operating systems, clever criminals have found a way to breach its security. Through voice phishing, scammers are tricking iPhone users by pretending to be from Apple Support and asking for their login credentials. Here’s what you can do so you don’t fall prey to these […]