VoIP’s future is bright for businesses

VoIP is the funny-sounding phone system that’s been around for over two decades. Though that may seem surprising, it actually makes sense, because that’s about how long the internet has been mainstream, and “Voice over Internet Protocol” needs internet in order to function.

Don’t connect your phone to rental cars

Source: McDonald Hopkins

It is a great convenience to connect (or just charge) your smartphone when traveling in a rental car. But this convenience brings significant risks, as evidenced by a recent warning from the Federal Trade Commission (FTC) as well as a research paper from George Mason University.

Office 365 allows guests to collaborate

Office 365 is constantly evolving. What started as an online extension of Microsoft’s flagship productivity suite has evolved into one of the best pieces of cloud software currently on the market. Last month we saw the next stage in that evolution, and it came in the form of allowing guests to collaborate on your 365 projects.

Increased storage at lower prices for iPads

Those considering purchasing a new iPad may have been nudged a little closer to doing so by Apple’s most recent keynote. The new iPads now have more storage while retaining the price point of their smaller predecessors. If you’re looking for more information on all of the storage and price announcements for Apple’s flagship tablet, we’ve got all the details right here.

Huawei to make Google’s new Android tablet

Although Apple gets all the attention, Android tablets have plenty of loyal fans to keep the gossip mill running. The most recent of these suggests that Google may be bringing back one of its most revered devices: the Nexus tablet. With a rumor that Google and Huawei will be collaborating to make this happen, we couldn’t be more excited.

The next big thing in endpoint security

As virtualization becomes a household name for small- and medium-sized business owners, more and more services are being introduced. Hardware virtualization, storage virtualization, and even network virtualization all aim to capitalize on the trend of creating virtual versions of physical technology.

Tame Windows 10 notifications in 3 steps

Microsoft has equipped Windows 10 users with a comprehensive set of tools to get their action center settings under control -- even if most users don’t know it. Unfortunately, most desktops are coming with more software and features that result in more notifications, without ever providing users the opportunity to personalize their desktop and get the stream of information under control.

Can others access deleted Google history?

The reason we part ways with certain things is that we don’t wish to see them ever again. But in this modern day and age, is that possible? Imagine that the deleted search history you believed to be dead and gone rose from the IT grave like zombies bent on causing you nothing but embarrassment and awkwardness.

9 cybersecurity terms everyone must know

Everyone, from doctors to lawyers, needs to continue learning to stay ahead of the times. Business owners might have it worst of all, oftentimes needing to stay on top of several industries to keep their company running. Keep reading for a refresher on all the latest trends and buzzwords used in the cybersecurity sector.