Blog

Virtualization services safe from CPU flaws

Virtualization services safe from CPU flaws

You may have seen headlines highlighting the dangers of two recently discovered hardware flaws: Spectre and Meltdown. They create incredibly technical problems for just about anyone who owns a computer, even those with virtual machines in the cloud. Thankfully, most vendors have already fixed the issue.

AI-powered VoIP: what businesses can expect

AI-powered VoIP: what businesses can expect

Automating business processes is a necessity for most organizations. While the human element is still important, automation increases time to market and saves money. And because telecom is an essential part of businesses’ operations, AI developers are introducing advances in VoIP telephony that will take automation to a whole new level.

When Pre-installed Apps Create Risks

When Pre-installed Apps Create Risks

Bloatware is generally considered harmless, but what about when these unnecessary apps turn into a security risk? A recent report shows that a pre-installed app in some versions of Windows 10 had an alarming plugin flaw:

Tavis Ormandy, a researcher from Google’s Project Zero, recently discovered that a compromised password management app, Keeper, had been installed with some versions of Windows 10. For a brief period, Keeper’s browser extension, when enabled, allowed websites to easily steal login credentials.

New AI-driven Features For Office 365 Users

New AI-driven Features For Office 365 Users

Enriching Office 365 with more everyday AI functionalities, Microsoft has introduced ‘Insights Preview’ to MS Excel, ‘Acronyms’ feature for MS Word, and a Text-in-image search feature to help its users to do their best work. Learn more about the recent upgrades to Office 365 products and the new Microsoft Whiteboard Preview app in this article.

Beware of what you save in web browsers

Beware of what you save in web browsers

Passwords are a double-edged sword. If you make them too simple, they’ll be easy to guess; if you make them too complex, they’ll be impossible to remember. One solution is to create an uncrackable password and save it to your browser. Unfortunately, recent research suggests that tactic could drastically reduce your privacy.

5 social media trends to watch for!

5 social media trends to watch for!

With the tug-of-war between mammoth social media platforms for daily users, 2018 is poised to become the biggest year for technological advancements in the industry. As social norms related to social media change, here are the top 5 trends we expect to become mainstream this year.

2017’s most valuable IT solutions

2017’s most valuable IT solutions

It’s the perfect time of year to evaluate last year’s technology investments and make adjustments for the year to come. Whether 2017 left you with extra cash in your pocket or desperate for a better way to get work done, here’s a roundup of the best IT news from the past year.

How many types of VoIP services are there?

How many types of VoIP services are there?

Should your business deploy a cloud-based or on-premises VoIP system? What’s the difference between software-based VoIP and its mobile counterpart? Which type of VoIP services will suit you most? Featured below is a compilation of all VoIP options and their details to help you answer those questions.