Blog

Subscribe to Office 365 from iPad

Subscribe to Office 365 from iPad

A common feature in many new apps is enabling users to purchase or subscribe to features in-app. This is especially true for developers like Microsoft and their Office for iPad apps which require a subscription in order to use the full versions. In a recent announcement from the Redmond tech giant, Office for iPad users can now subscribe via the app.

How to avoid juice jacking!

How to avoid juice jacking!

What do you do when your smartphone needs to be charged but your charger is not at hand? A handy solution is to turn to a public charging kiosk. But what you might not be aware of is the fact that this can lead to juice jacking of your smartphone. To avoid this security threat, it’s time to get a comprehensive view of what juice jacking is and how you can protect your smartphone from it.

Computer monitor categories

Computer monitor categories

Businesses today rely heavily on technology on a daily basis. And regardless of the industry you’re involved in, an essential piece of hardware is the computer monitor, whether used at work or in the home. While computer monitors come in a variety of shapes, designs, and colors, did you know that they can also be categorized broadly into three different types based on the technology used to make them?

CRT (cathode ray tube) monitors

These monitors employ CRT technology, which was used most commonly in the manufacturing of television screens.

Effective business impact analysis

Effective business impact analysis

While it’s important for businesses to perform risk assessments, it’s equally important to initiate a business impact analysis (BIA) in order to maximize business continuity. Why? Simply because the crux of any recovery is about whether it is achieved in a reasonable time, and BIA, if performed effectively, will determine exactly that.

3 Cloud service models

3 Cloud service models

The cloud has become one of the most talked about, and arguably most important, tech concepts of the past decade. Many business owners and managers are aware of the benefits it can bring, but often stumble when they decide to implement a solution. It is really important to be aware of the different types of cloud services out there to make the right decision.

Getting digital camera pics on Instagram

Getting digital camera pics on Instagram

Businesses in many industries rely on visuals to sell their products. From that bicycle shop on the corner to the bakery down town, and even the local electronics retailer, having high quality images of your products will help attract customers. What many business owners want to know is how some businesses have such appealing images and how they can add these quality visuals on platforms such as Instagram.

Turning off Android location settings

Turning off Android location settings

While location services on your Android smartphone make it easier for you to use certain apps or functions like photo tagging, sometimes it’s best to hide your location since they can affect your device’s security. With that in mind, isn’t it time you took a look at how to change different location settings on your Android smartphone to enhance its security?

Photos and GPS tagging

Your Android smartphone gives you the ability to attach GPS coordinates to the pictures you take, known as geo-locating or GPS tagging.

Common VoIP issues to be aware of

Common VoIP issues to be aware of

As with any technological systems, Voice over Internet Protocol (VoIP) can offer businesses some intriguing benefits, including decreased costs and easier management. Because of these advantages, many businesses have already switched over. For those who are considering making the move, there are a few points you should be aware of first.

1.2 billion accounts compromised

1.2 billion accounts compromised

Since the advent of the Internet, hackers have been actively trying to exploit it. Over the past few years, many have targeted different websites to obtain user account details like usernames and passwords. There seems to be a trend where the number of accounts compromised with each new security announcement is rising.