Technology Advice for Small Businesses

Outlook Web App’s added features

Ever wonder how we managed without email? Having been a vital part of businesses for over a decade, email not only simplifies communication processes but has evolved into a versatile platform for collaboration too. One such service is the Outlook Web App for Office 365, which has just made document collaboration easier through its added… Continue reading Outlook Web App’s added features

Mac and PC differences: Part 2

Now that we’ve looked into the differences between Mac and PC in terms of operating system, software and specifications, let’s continue to dig deeper in determining the differences between the two rivals. It is vital that you look into all aspects before deciding which one you want to go for since you’ll likely be using… Continue reading Mac and PC differences: Part 2

How Mac and PC differ: Part 2

We’ve explored how Mac and PC differ in terms of specifications, operating system and software; and in this article we continue to dig into other differences between the two rivals. Buying a computer is more than looking into design and specs, but also about models, availability, security, customer satisfaction and of course price. Models Apple… Continue reading How Mac and PC differ: Part 2

Differences between Mac and PC: Pt 2

In the last article, we looked at how Mac and PC differ in terms of specifications, operating systems and software; and here we continue to explore other differences between the two rivals. When it comes to buying a computer, it’s not just about design and specs, but also about models, availability, security, customer satisfaction, and… Continue reading Differences between Mac and PC: Pt 2

Hibernation tips for Windows 8/8.1

While computers and laptops are useful tools in helping you get your work done, waiting for them to boot-up or having to rush and save your work before your battery runs out can be a pain. If this sounds familiar then you might want to familiarize yourself with the hibernate mode on Windows 8, and… Continue reading Hibernation tips for Windows 8/8.1

Windows 8/8.1 hibernate mode

Microsoft’s operating systems (OS) have seen additions of several highly useful features throughout the evolution cycle of the OS. The hibernation feature, first introduced with Windows XP, is a solid example of one of the most useful power features. Ironically, with Windows 8 the hibernation feature is not readily visible but it is still a… Continue reading Windows 8/8.1 hibernate mode

Windows 8/8.1 hibernation 101

How did we ever manage without hibernation in the past? The feature was first introduced with Windows XP and is one of the operating system’s (OS) most useful power functions. However, with Windows 8 this feature is not readily visible, so you need to find out not just what this feature is about but also… Continue reading Windows 8/8.1 hibernation 101

Virtualization security myths

Businesses are relying increasingly on virtual machines to handle more critical data and tasks than ever before. Still, many are misguided about their security needs in a virtual environment. There are several myths that if believed can have serious consequences; leaving your organization vulnerable to an attack. Understanding these issues is key to helping you… Continue reading Virtualization security myths

5 myths of virtualization security

Virtual machines are just gateways to a server, and cyber criminals want access to data on those servers. While you might think you’re keeping your virtual environment safe, there are several virtualization security myths which if believed can have a serious impact on your platforms, leaving them susceptible to attack. It’s vital that you are… Continue reading 5 myths of virtualization security

Misguided virtualization security myths

The increasing number of businesses turning to a virtual environment is parallel with cyber criminals looking to breach that security. While many businesses think their virtual servers are safe and secure, some are unaware of major security myths that can leave your business vulnerable to attack. With that in mind, isn’t it time you familiarized… Continue reading Misguided virtualization security myths