Blog

Coming soon: Office 365 upgrade!

Coming soon: Office 365 upgrade!

Remember when spellchecker became widely popular in the late ‘70s and was considered a lifesaver for many people using word processors? You may ask “What does this have to do with Office 365?” The point is new technological features continue to transform the way we work, saving us both time and money.

Citrix virtualized applications get a boost

Citrix virtualized applications get a boost

Virtualization has taken the IT world by storm, and if you’re not up to speed on exactly what that means, it’s time to change that. The service is no longer a paragon reserved for enterprise-level businesses, and with Microsoft and Citrix’s most recent announcement, it will soon be more accessible than ever.

Schedule meetings with Microsoft FindTime

Schedule meetings with Microsoft FindTime

The art of organizing a meeting is much like chess. Each player has different possible moves, or availabilities; and it’s up to you to strategize which pieces to move where, or which events to schedule (or reschedule) when. The objective is to land on a square wherein all participants can attend, but achieving this goal often demands a tiring and time-consuming process.

Virtualize your network with telecom giants

Virtualize your network with telecom giants

Although merely mentioning the word ‘virtualization’ has the power to make people’s eyes glaze over, its value and relevance can’t be denied. Since VMware first launched their workstation client in 1999, the industry has seen steady expansion and engulfed a number of legacy network solutions.

Fiat Chrysler Program to Pay Good Hackers to Find Security Flaws

Fiat Chrysler Program to Pay Good Hackers to Find Security Flaws

A year ago, hackers shocked the public and Fiat Chrysler Automobiles by demonstrating how they could take control of a moving Jeep. This demonstration raised concern and plenty of questions about vehicles safety and what would be done about it. Fiat Chrysler Automobiles recently announced that they would be utilizing organized hacking to find and repair security flaws in their software.