Change, whether you’re referring to that of your technology or any other business process, is often a point of contention between management and the rest of the business. Let’s explore this resistance to change that so many feel, and how you can help them overcome it
Tech Minutes
Every time something goes terribly wrong, and you are left assessing the damage of some seemingly unfortunate situation, you typically find that by taking a bit of time preparing for the worst would have kept you from the disaster you are just now dealing with. Those small acts are what we want to talk a little bit about today, because they can save your business.
There are over two billion active devices currently using Android. Most of them that have been purchased in the past year or so have come with, or have been subsequently updated to, Android 9.0 Pie. With the introduction of their newest mobile OS, Google has ensured that their software powers more mobile phones than any other software in the world. Today, we’ll take a look at some handy tips you can use to get the most out of your Android Pie experience.
Data management is exceptionally important for any business, and companies that use the cloud in any sort of capacity need to be considerably more cautious in the way that it’s managed than a business that only hosts data on an internal server or network. The cloud makes things more complicated at times, but if managed correctly, it can lead to unprecedented efficiency for your organization.
Your time is valuable, so you don’t have time to waste on waiting for your Windows operating system to boot up. In the interest of saving time, today’s tip will go over three ways to speed up your Windows 10 boot time.
There are plenty of technical terms and solutions that, while heard of frequently enough, it may not be completely clear what they mean or refer to. A proxy server is an excellent example of such a solution. This week, we’ll examine this tech term and review how utilizing proxy servers can help your business.
You don’t need us to tell you that it’s extremely dangerous to hand out information to just anyone that contacts your business. This is important to keep in mind, especially considering how the majority of threats can be sent via email. You’ll likely encounter situations where you need to consider whether or not to click on attachments, as you could potentially put your business at risk.
IT is filled with jargon and terms that are likely to bamboozle someone without hands-on experience with the solutions that power a business. One such term is network attached storage, or its shorthand, NAS. Today, we’ll examine this tech term to learn more about it, and what influence - if any - it should have on your business.
Regardless of where it is kept, your data’s security is of paramount importance. However, this doesn’t mean that the decision between leveraging the cloud or an on-premise server for your data storage needs isn’t an important one. For this week’s tip, we’ll weigh these options against each other to help you establish which is the better option for your business’ needs.
We all love the Internet. We all use it almost every day. For this week’s tip, we’ll review a few ways to help keep yourself from getting in trouble while browsing.
With more and more businesses relying on mobile devices for their business they have to be sure that the use of these devices doesn’t present security issues for the company. With all that is happening in business computing today, finding out how you can protect yourself in lieu of the prevalence smartphones play in the business world is important. Here are a few tips on how to lock it up or lose it, altogether.
As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.
2017 was filled with security issues ranging from threats and small attacks to major security breaches. You can learn a lot from the misfortunes of other ill-prepared organizations about how to prepare for and handle cybersecurity issues. This week’s tip is dedicated to learning a bit from some of the security problems that may have flown over your radar last year.
It’s no secret that, if given the choice, many users would elect to use Google Chrome over Microsoft Edge. To remedy this, Microsoft has adjusted Edge to be more customizable to the user’s preferences. For this week’s tip, we’ll look at how these features and settings can be set up.
Google Drive provides its users with a considerable amount of utility. However, when combined with extensions made for Google’s Chrome browser, users have the tools to make their use of Drive’s capabilities even more efficient. For this week’s tip, we’ll go over a few Chrome extensions that your business might find useful.
The Internet of Things is now a commonality. IoT devices are in our homes, in our offices, and in our pockets. While these devices are incredibly convenient, they also contribute to some major security risks. For today’s tip, we’ll review some of the ways to reduce these risks while still leveraging the IoT.
Considering how often smartphones are replaced, you’re bound to have a couple of them stashed away for a rainy day. These devices are particularly helpful in the event that your smartphone breaks unexpectedly, but there are other purposes that you might want to keep in mind. Here are three ways you might be able to use your old mobile devices around the office.
Modern businesses rely pretty heavily on the Internet--so much so that, should the Internet go down, many employees will find themselves at a loss as what to do. However, there’s no need to sacrifice productivity just because your Internet isn’t cooperating. There are plenty of ways to get something done on a day that the Internet calls in sick, which we’ll go over for today’s tip.
There are times when using Microsoft Word that will require the addition of an outside element, usually something like an Excel sheet, PowerPoint slide or other visual aid. A common issue faced by users is having to significantly alter the size of the external element to fit between the margins of the portrait orientation, ultimately detracting from its impact.
The Internet has enabled businesses to establish relationships on a global scale. Now, an upscale restaurant in Minneapolis can use the Internet to order ingredients from a vendor in Bordeaux. However, there can easily be a language difference when doing business internationally. This is when it is fortunate that Windows 10 makes it so easy to change your device’s language.
Downloading an application on an Android device is fairly simple: access the Google Play store, find the app you want to download, and press the button that says install. However, it is also too easy to simply hit ‘Allow’ once the app starts asking for ambiguously-worded permissions. Today, we’ll examine what these permissions actually mean.
Excel is the premier spreadsheet builder, and it’s extremely valuable that your organization get the most out of it. Spreadsheets are ideal for showcasing information in a compact manner, but without a couple of charts, your users will just be staring at cell after cell of boring old numbers. By using charts in Excel, you can take your spreadsheet building to the next level.
As a business adopts certain “best practices,” it is important for business leaders to consider why they are adopted, and more importantly, are they really for the best? There are many problems that subscribing to false best practices can produce, and so it becomes important to identify, adjust, and resolve them.
Losing Internet can be a large problem in the business world, as we all become more and more reliant on it. Downtime of this kind can be immensely frustrating. However, not all hope is lost, as there are ways to troubleshoot the cause of an Internet outage.
Cortana, Windows 10’s built-in personal assistant, has proven to be useful for those users who have taken advantage of her services. Sometimes, however, the Cortana interface will answer when another person in the room beckons her. For Cortana to work for one person, and to obey only one voice, the software needs to get to know that voice.
It’s true that email is such a common solution that most people don’t think twice about how it works. However, it’s imperative that you at least understand the concept, as it can provide you with a considerable advantage when it comes time to optimize email access on your mobile devices. First, we’ll discuss the ways in which the two major message exchange protocols differ, and then dig into the specifics of why you should choose one over the other.
How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.
It’s no industry secret that one of the most important pieces of IT any business should have is a data backup solution. However, this is like saying that every business should have a plant: the type of plant, and (by extension) the type of data backup, matters. You want a data backup that is more like a peace lily or a cactus, hardy and resilient, and less like a basil plant or orchid, high-maintenance and requiring very specific conditions to prosper.
Your computer is mostly just a machine used to accomplish specific tasks. This doesn’t mean that you shouldn’t know all of the advanced tips that help you get the most out of it, though. Here are some of the best shortcuts that you can use to take full advantage of your workstation.
There are good emails, and there are bad emails. You know them when you see them, but can you write an email that’s more likely to be read and acted upon? There are a few key steps to writing them more effectively. For this week’s tip, we’ll walk you through five steps to improving your emails.
Business security is a common issue for many small organizations with limited budgets, but it doesn’t have to be an issue. We’re here to help you master the seemingly endless threats and security problems that major vulnerabilities present to the small business environment, and it all starts out by understanding how even basic security solutions protect your organization.
Mistakes happen, especially where technology is involved. There are plenty of ways that user error can occur when using a computer--many of which are avoidable through simple preventative measures. For our tip this week, we’ll go over some behaviors to avoid when using a computer.
If you use the Internet every single day, you’ll start to realize that you can use it more effectively for achieving your goals. In cases like this, it’s important to look at ways you can improve your overall use of the Internet, as it’s the key way you access important information, applications, and contacts. Here are some day-to-day tips that you can use to help improve your mastery of the Internet.
Google Drive folders will appear in a gray color by default, but you can change the way they look to make things easier to see. This week’s tip is dedicated to helping you set up a color system in your folders so that you can easily navigate your Google Drive.
Your smartphone is an incredible tool, capable of doing so much for you as you go about your personal and professional days. For this week’s tip, we’ve put together some of our favorite ways to squeeze even more function and convenience out of your mobile device.
If you are a dedicated user of Google Calendar, you’ll have realized that it’s recently undergone a significant improvement. Google has pushed out an update that has really polished their calendar in terms of both visual appearance and functionality, which is something that you’ll really appreciate, especially if you are a G Suite user. How can you use this new version of Google Calendar for your business?
Whenever you download a file from the Internet, the file will, by default, go to an aptly-titled folder in Windows called Downloads. Unless you change the default settings, your files will always be saved here. But what if you want to make it so that your downloads go somewhere else? You can accomplish this pretty easily. We’ll walk you through how to do it for some of the most popular browsers, including Google Chrome, Microsoft Edge, and Mozilla Firefox.
It’s football season once again, and this year, we want to show you how to set up Cortana to follow your favorite teams--football or otherwise. It’s actually easier than you might think! Before we begin, remember that this only works on devices that have Cortana, so it will likely need to be set up on your Windows PC.
There is no denying that, of all the application suites in the world, Microsoft Office is the most famous and most popular. Regardless of their size, businesses rely on these programs in order to function--so much so, that a working knowledge of Microsoft Office is often a prerequisite for employment. However, despite so many people using these programs on such a regular basis, few understand their full capabilities. Take, for example, Excel, Microsoft’s spreadsheet program.
Most people don’t think to try and print something out from their smartphone--particularly because it’s such a new concept. With smartphones quickly becoming just as fast as desktops from just ten years ago, it shouldn’t be such a stretch to suggest printing from them. Thanks to the cloud, you can use your Android smartphone to print something directly from the device.
If you author a long document, having a table of contents can help your readers get the information they need fast. Here is how to insert a table of contents into a Google Doc.
The latest version of Android, Oreo (version 8.0), was released earlier this year. Has your phone received the update to it yet? Either way, you’ll want to know what features it has, including how it can help you get more done. Here are five of the many new additions offered by this update to Android Oreo operating system.
Many computer users are afraid for their privacy--and judging by the discussions surrounding the FCC and Net Neutrality, they should be. Now that users are responsible for the privacy of their online activity, they are finding new ways to make sure that corporations aren’t taking advantage of their Internet activity--namely through the use of a Virtual Private Network, or VPN.
With all of the talk about the FCC and Net Neutrality in the recent news, a lot of computer users are concerned about the amount of privacy afforded them by their Internet service providers--and rightfully so. Regardless of whether the net neutrality ruling was justified (hint: it wasn’t), users are finding that they have to take their privacy into their own hands. The easiest way to do so is with a Virtual Private Network.
Have you ever used Google Maps as a GPS system to help you navigate a trip you are taking? In a lot of ways, Google Maps is even more dynamic than other dedicated online applications, and it’s certainly a better alternative than trying to decipher the lines of an atlas. Google Maps even lets you chart the distance between your location and your destination, which is a great way to get the total distance of your upcoming trip.
Have you ever been working on writing a blog article or trying your hand at a formal proposal letter and wondered if your writing was appropriate for your audience? You’re not alone. The readability of a document is such a concern for people that Microsoft Word added a feature that will automatically calculate a document’s readability using the Flesch Reading Ease formula and tells approximate reading level using the famous Flesch-Kincaid Grade Level scale.
Have you ever felt like talking to someone in the technology industry was like speaking with someone who spoke a different language? You’re not alone. It’s no secret that the IT industry loves their jargon - and has dozens of buzzwords at any given time. These are a few such words that have the industry buzzing right now!
Back to school is upon us and then it’s a hop, skip, and jump until the holidays arrive. With more companies allowing their employees to work remotely, holiday travel will mean that people are going to be taking their work on the road with them. Preventing credit card and identity theft has been a priority for shoppers during the season for many years. It’s important that the same security considerations be given to technology being used for business while traveling.
Does your business have trouble keeping data on the company network? This can be an issue if your employees use their mobile devices to do work while on the go. In order to keep this from becoming an issue, you should encourage your employees to not keep sensitive data on their mobile devices, and establish policies that give you control over your data and email on personal devices. That said, let’s show you how to get your data off of your Android device and back on your network where it belongs.
With Adobe ending support for Flash by 2020, many web browsing tools have begun to shift away from using Flash as their default media player. For example, Google Chrome has made the jump to HTML5 for the most part. The problem with this is that there are still quite a few websites and other online tools still use this technology. In the event that you want to enable it on a case-by-case business, here’s how to do so.
Does your business use Windows 10? If so, there are all sorts of hidden tips and tricks that can help you gain even more value from your workstations that are running Windows 10. Here are a few of these secrets and how they can help your staff save time.
Each worker within an organization is delegated some sort of responsibility based on their role. Managers are responsible for managing, while human resources keep all workers accountable for their responsibilities. Yet, there are multiple responsibilities designated to all employees who use technology for their everyday duties.
Microsoft Excel is more or less synonymous with spreadsheet creation. However, even power users may not know all the tricks that are hidden in the program that can help them save significant time. For this week’s tip, we’ll go over some Excel shortcuts that you may not have known about.
Microsoft Outlook can be a fantastic way to communicate, but only if you know how to best use it. When you’re using it to reach out to clients or vendors, you need to consider all of the best practices and shortcuts you can to make the most of it. We’ll discuss some of the best ways that you can use Microsoft Outlook to help your business function better as a whole.
Everyone has a right to privacy. However, with the popularity of social networks, the Internet is a very hard place to remain a private individual. Digital communication is everywhere. Cybercrime has become a fairly regular event. This week’s tip of the week takes a glance at three websites that you can use to help enforce your right to privacy.
The use of a browser’s tabs has become the default way that many people move around the web. In fact, there’s a good chance that this blog is just one of many browser tabs you have queued right now. However, there’s an equally good chance that you aren’t using browser tabs to their full potential. For this week’s tip, we’ll explore some of the features that browser tabs offer.
Consumers can now take full advantage of a data backup system that’s both affordable and convenient, allowing them to keep their data as safe as can be in the event of a disaster. While it might not be ideal for business purposes, the average PC user can surely benefit from Google Drive’s new backup system, which takes advantage of the Backup and Sync application.
If there’s any experience that’s universally shared by the modern worker, it’s the sensation that there aren’t enough hours in the day. Fortunately, there are some habits that can be developed that can help to mitigate these feelings by enhancing productivity. For this week’s tip, we’ll discuss some of these practices to help boost your office’s time management capabilities.
If you use Google Drive as your preferred cloud provider, you know that it’s a dynamic service that offers everything from word processing to spreadsheets to file storage. However, there are many other ways to use Google Drive that you may not even be aware of. Here are three secret tips that can help you get a little more value out of Google Drive.
Have you ever gotten the feeling that your mobile device’s screen is just too small to be used effectively, despite the fact that smartphone screens are bigger than ever before? Well, there is a way to mirror your phone’s screen to a larger screen, like your PC monitor. Here’s how you can do this with your Android device.
Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.
It’s seems unbelievable just how much thought and effort hackers can put into their attacks. Scammers are all over the place, and you can never truly be safe. Here are six scams that you should always be on the lookout for.
Looking for a way to protect sensitive files on your PC? For Windows users, one easy safeguard you can take is to encrypt the files and file folders containing your sensitive information.
Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.
If you use Google Chrome as your preferred browser, you’ll notice that its performance might dip considerably at times. Thankfully, there are ways to see just what’s causing the problem, and issues can be mitigated easily enough with a little bit of knowhow.
The term ‘spyware’ has some clearly negative connotations to it, and rightly so. This variety of malicious software can cause no small amount of trouble if left unchecked. What follows is a brief overview of spyware, and what measures you can take to protect yourself and your business from it.
Have you ever come across a great soundtrack or album on YouTube that you would love to put on repeat, but can’t because YouTube doesn’t offer this feature? Well, fear not--there are a ton of services available that you can use to put your favorite videos on repeat, allowing you to save plenty of time on clicking that play button so that you can stay productive.
How many monitors do you use? How many do your employees use? If they only have one monitor to be productive with, it could be hampering their ability to work efficiently. By incorporating a second monitor you can provide the construct to overhaul your employee’s productivity and efficiency.
Here’s something that you might have noticed about opening Windows applications on your desktop; by default, they will generally open in a smaller window, giving you the ability to customize their size as you see fit. If you want a full size Window, it’s as easy as clicking on the maximize button in the top-right corner, but what if you didn’t want to go through this every time you open the app? There’s a solution for this, and we’ll help you find it.
For the average PC, most of its noise comes from its fans. Computers are typically built with cooling fans that are meant to operate at acceptable noise levels. Although, as machines age, they tend to require more work out of the installed fans in order to keep the components cool, which may explain why your old machine is much louder today than when you first got it.
If your employees are still working at workstations with a single monitor, you may be doing your workplace productivity a disservice. While adding a second screen to their desk may not seem like an effective efficiency booster at first, the benefits it can have are very real.
Have you ever received unsolicited calls from unknown numbers? Sometimes you might receive them at incredibly inconvenient times, such as while you’re home and trying to wind down after a long day’s work. While Caller ID and voicemail have allowed users to keep unwanted calls to a minimum, there are other ways that you can block a caller entirely from reaching your smartphone.
Fact: your PC has a limited amount of storage space. When a user runs out of space or comes close to it, they need to come up with a solution. Without taking any action, performance will lag and saving data for future projects will be impossible. By using a helpful tool like WinDirStat, you can free up space by easily identifying and then taking action with your PC’s biggest files.
In recent years, the familiar hard disk drive has slowly been losing ground to the much faster solid state drive. As they operate through very different processes, there are a few critical differences that you need to be aware of: SSDs have a limit to how many times data can be rewritten on the drive. This limit isn’t small, a standard consumer SSD drive is rated to sustain 40 gigs of data writing per day for 10 years. This may seem like a lot, but you’ll only get good results if you meet certain requirements and practices.
You know Microsoft Word as the great word processor that your business relies on to compose documents of all kinds. However, Microsoft Word is much more flexible and versatile than you might think. Did you know that you can perform simple calculations in your Microsoft Word document in a quick and efficient way?
A crucial step of setting up your business is the implementation of a physical infrastructure, including cabling and electrical lines. Unfortunately, the same setup won’t work for two very different businesses, so you’ll need to put considerable time and effort into the cabling process as a whole. Here are a few ways that you can make the process easier.
While you are probably spending a fair amount of time thinking about your business’ security, can you confidently say the same about those that you’ve employed? Unfortunately, your workers may not put much thought into network security. This could very possibly lead to some severe issues potentially harming your business operations.
Netflix is a great way to keep yourself entertained while on the go, but you can’t take it wherever you want. One great example of such a restriction is while you’re on a flight, where Wi-Fi isn’t permitted (or unnecessarily slow and expensive). Thanks to a couple of innovations implemented by Netflix, you can download videos for offline viewing through its mobile app.
It’s no secret that finding a particular program or file on your computer can be a pain, especially when you don’t have the time to hunt it down by clicking through folders. However, there is a much easier way to locate your desired data. All you need to do is use the search option found in the Start menu, which is the subject of this week’s tip.
WHOOPS! This might be one of the more PG-rated things you would say if you dropped your phone, and perhaps additional colorful words would follow the moment you discovered that your phone’s screen is now cracked. If you find yourself in such a predicament, what do you do next? We’ll help you deal with this unfortunate circumstance in the best way possible.
The average employee and business owner relies on various hardware solutions to go about their day-to-day duties. These hardware devices--think keyboards, wireless mouses, external microphones, and any USB devices--utilize drivers which allow for inter-device compatibility. What happens when these drivers aren’t installed or kept up to date? Your technology suffers, and so does your productivity.
A connectivity to the cloud is a great opportunity that your organization can leverage to its advantage, but only if it’s done well. No two businesses will have the same exact configuration when it comes to cloud, as the needs and responsibilities that are accomplished through that cloud solution will change. This week’s tip is dedicated to helping you discover which cloud solution is right for you.
An Internet connection is one of the most crucial parts of running a modern business. However, this type of reliance can be crippling in the event that the Internet goes down. What can you do to make sure that downtime is limited to a minimum?
Managing your company’s email can be a complex endeavor, due to the sheer volume of messages being sent and received, as well as the need to have a way to prioritize which messages are important. It’s safe to say that all organizations can benefit from email management solutions, such as email archiving and spam protection, and multi-factor authentication.
Security issues can have any number of causes, meaning that every business needs to have a comprehensive security solution. This doesn’t mean, however, that there aren’t additional, small measures to implement that can give your organization’s security an added boost. Here, we’ll talk about two: keeping your software patched, and identifying social engineering attempts.
Throughout human history, cartography served as an exciting and specialized field for knowledgeable scribes. Today, the entire planet has been mapped and apps like Google Maps allow any Joe Schmo with a smartphone to have the world at their fingertips. Consequently, you can effectively be a cartographer of sorts, just by knowing how to best use Google Maps.
When you turn on your device’s Wi-Fi capabilities, do you ever take the time to look at some of the names of your neighbors’ connections? You’ll see some rather boring names as well; some might just use the name of their organization or the family’s name, or even just the default SSID used by the router. The fact of the matter is that a wireless network name that’s easy to gloss over is a best practice for network security.
Providing outstanding customer service is a requirement to be successful in today’s business environment. If you ignore this valuable tenant of business, then you’ve got a competitor who will gladly jump on the opportunity to steal away your customers and prospects by offering better service. What steps is your business taking to make sure that your customer service is second to none?
Do you remember the day that you purchased your current workstation? Maybe it was last week, last month, last year, or several years ago. At one point, it was pristine, untouched by the demands of the workday, but those days have long since passed. Over time, your computer collects all sorts of stuff on it, from unnecessary files to outdated, unused software.
Oh no! You start slapping your pockets, already knowing what you’re about to confirm--your mobile device is missing. With the reliance we have on these devices, losing yours is enough to send you into a relative panic. However, this panic may be avoided by implementing a reliable solution specifically for locating a lost device.
Modern office technology is breaking down office barriers left and right. With the proper tools, workers can perform their daily duties anytime, anywhere. This trend is prompting businesses to hire remote workers in order to find the talent they need without being limited by geographical location. Unfortunately, finding a good candidate for a remote worker is easier said than done.
Not all Internet search tools are created equal. For example, sometimes you may use a website’s search feature, only to discover that it doesn’t provide the quality of results you’re used to getting from a major search engine like Google Search. When finding yourself in such a predicament, you’ve got a few options to help narrow down your search.
To give you a better idea of the problem we’re referring to, let’s shine a light on an all-too-common example; website search features that don’t support quotation marks. With a more robust search tool like Google Search, users have the ability to search for exact phrases by adding quotation marks before and after the phrase. Without this quotation mark feature, a search tool will provide results pertaining to every word in the phrase, making the results potentially worthless.
Make Use of Ctrl+FFor websites lacking this search feature, you can combine the in-site search with your browser’s search tool to narrow down what you’re looking for. To do this, simply enter your query into the website's search form like you normally would, then hit Enter to display the results.
If the results provided aren’t to your liking, you can narrow the results down by selecting Ctrl+F. This will cause a drop down menu to appear where you can enter a second word relating to what you’re looking for. Upon doing this, every corresponding word that’s specifically displayed on the web page will be highlighted. You can then cycle through these highlighted words to better find what you need.
Use Google to Specifically Search a Website Another way to accurately search the content of a website is to bypass the website’s search feature altogether by using Google Search. With the website selected that you want to search, enter its URL into Google Search, minus the “http://” and “www.” Before the URL, you will add “site:” to end up with an entry looking like this: site:website.com.
An active Google user will inevitably accumulate a stockpile of photos and videos via their account’s Google Photos app. For this week’s tip, we’ll show you how to download all of this media to a local device.
There’s a host of reasons why you would want to do this. Two common reasons are; backing up your media locally, and using software on your PC to edit your photos and videos. Thankfully, Google makes it easy to download all of your media in one shot.
To do this, you’re going to want to utilize a tool called Google Takeout. Once you’re logged into your Google account, go to this URL:
https://takeout.google.com/settings/takeout
We should note that your Google account may not be able to take advantage of Takeout if it’s connected to your company’s network and your domain administrator has disabled this feature in order to prevent employees from pulling an Edward Snowden and making off with a ton of valuable files.
Like many mobile devices, iPhones don’t have a slot for an external memory card, which means the device can easily become too full to use. When this happens, pictures can’t be taken and some apps just won’t work. If you’re experiencing this issue with your iPhone, just rent a movie. It works. Seriously.
Any business that deals with online technology needs to be aware of the dangers that come with the territory. Hackers are more common nowadays than ever before, and organizations that don’t take a proactive approach to keeping threats out of their systems will have to suffer the consequences. Unfortunately, some organizations won’t be aware that they’ve been hacked until it’s far too late.
March 31st is World Backup Day! Just as important as having a plan in place to backup your data is having a way to recover your files. Do you have a way to restore files that get lost, corrupted, or accidentally deleted? To highlight this need, we want to explain how a deleted file can actually be recovered.
Google Contacts is a useful tool that allows you to share your contacts with other users. In fact, it’s a great tool in general for any professional who is always on the move, and has to have access to a set of work contacts through an Android device. Today, we’ll help you import and export your Google Contacts to a different Google or Outlook account.
Does your business use Google Drive? Google Drive provides several applications that are great for getting work done in the office, similar to Microsoft Office (Want to know the differences? Be sure to contact us). With Drive, there are easy ways to leverage it to your advantage in the form of keyboard shortcuts and other tips and tricks. Here are some of our favorites.
Safe Mode has long been a troubleshooting method for Windows operating systems, but Windows 10 has done away with the classic method of booting up in Safe Mode. Instead of simply pressing F8 during Windows startup, you now have to go into your settings and manually configure your computer to do so. Here’s how it’s done.



