Back to Top

Tech, Web, Cloud & Cabling Services

Author Archives: Website Admin

10 mechanical keyboards to help make you more productive at work

1. Unicomp Ultra Classic

unicomp-SJTechies

Mechanical keyboards started as a trend among PC gamers but have crossed over into the realm of developers and IT pros. Here are 10 models worth checking out.

Modeled after the grandaddy of all mechanical keyboards, the IBM Model M, the Unicomp Ultra Classic offers the same buckling spring design and a similar aesthetic (which makes sense because Unicomp bought the technology behind the Model M in the 1990s). If you want the reliability of a classic Model M, but don’t want to deal with decades of keyboard funk on a vintage model, go with the Unicomp. But, if you want the nostalgia factor, you can probably find an old Model M on eBay.

2. Das Keyboard 4 Professional

das-SJTechies

Known for its sleek designs and strong build quality, Das is one of the biggest names in mechanical keyboards. The Das Keyboard 4 Professional uses cherry MX switches with gold contacts, and has a design that would fit well in an office environment.

3. Ducky Legend

duckylegend-SJTechies

Ducky is better known for its Shine series of keyboards, but the aluminum case Legend would be more at home in an office setting. The keys are backlit by LEDs and users can choose which switches they want to use.

4. Logitech G710

logitech710-SJTechies

The G710 is a good middle-of-the-road selection from Logitech’s G series keyboards. The G710 uses Cherry MX blue switches for a good mechanical feel, but operates quietly so you won’t disturb your coworkers.

5. Kinesis Advantage

advantagekinesis-SJTechies

The Kinesis Advantage combines the tactile comfort of Cherry MX brown switches with the support of an ergonomic design. It’s a little on the pricey side, but it comes with a 60 day guarantee.

6. Ultimate Hacking Keyboard

uhk-SJTechies

The Ultimate Hacking Keyboard bills itself as a split design mechanical keyboard for professionals. This keyboard uses Cherry MX switches and has additional modules that can be snapped into place to customize it.

7. Cooler Master MasterKeys Pro L

coolermaster-SJTechies

If you’re after cool lighting options and good performance, consider the Cooler Master MasterKeys Pro L. This keyboard is powered by a ARM Cortex M3 processor and brings a minimal design.

8. Razer BlackWidow

razerwidow-SJTechies

Razer is a big name in the gaming world and their BlackWidow is a mechanical keyboard built for gaming. It uses proprietary Razer switches and gold contact points, and offers lots of lighting options.

9. ErgoDox EZ

ergodox-SJTechies

ErgoDox initially made noise in the keyboard market with its ErgoDox kit that required a lot of assembly, including soldering all the points by hand. The ErgoDox EZ, however, is a ready-made kit based on an open source design that is a nice split design option.

10. CODE Mechanical Keyboard

code-SJTechies

The CODE mechanical keyboard was designed with developers in mind. Using 6-Key USB rollover, it opens up many options for shortcuts.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

The best new features coming to Microsoft’s latest OS: Windows 10

Windows10

Microsoft continues to build out Windows 10 – with a bumper crop of new features announced at its Build conference last week.

These enhancements will be pushed to to Windows 10 users over the coming months, with many arriving in summer when the OS will get a major upgrade dubbed the Windows 10 Anniversary Edition.

Here are the key upgrades heading to Windows 10.

The write stuff

ink-SJTechies

Using a digital pen to write and scribble on the screen of Windows 10 PCs and tablets will get easier.

In a boost to devices that support such pens, such as the Microsoft’s Surface tablet, the OS’ new Windows Ink feature will allow users to jot down notes on the screen without unlocking the device.

Windows Ink will also allow users to write messages on sticky notes and, if appropriate, have them automatically translated into calendar appointments and reminders.

Support for Windows Ink in Microsoft Office, Maps, the Edge browser and other apps will allow users to draw, write and annotate using their pen. Windows Ink will make using the pen in Office more satisfying than it currently is, for example tidying up highlighted marks on documents so they neatly align with text.

Windows 10 will also gain the Ink Workspace, a hub for launching apps that support writing and sketching using the Surface Pen.

Ink everywhere

win10-inking-SJTechies

Support for drawing, writing and annotating using digital pens will likely come to many apps.

Microsoft says that support for Microsoft Ink will be easily added to Universal Windows Platform apps, requiring just two lines of XAML code.

Digital ruler

win10-ruler-SJTechies

It sounds simple, but the new on-screen ruler should prove to be a useful addition for those who want to draw straight lines using a digital pen.

Smarter Cortana

cortana-SJTechies

The attraction of a virtual assistant is the simplicity with which they allow you to carry out tasks.

To ease the process of using Windows 10’s Cortana, the voice-controlled assistant will no longer require you to log into Windows, with users able to make a note, play music or set a reminder from the lock screen.

Cortana will also become more proactive and make suggestions based on a user’s past behaviour – offering to order lunch or to arrange transportation.

More apps will also be able to use Cortana to automatically complete tasks for users or to carry out actions based on context, such as the user’s current location or time of day.

Windows Hello comes to apps and the web

hello-SJTechies

Windows 10 already lets you log into the OS using your face.

The anniversary edition will extend this biometric log-in to Windows apps and websites via Microsoft Edge. As with the OS, users will be able to authenticate their identity using a facial, iris or fingerprint scan.

Another new feature will allow users to unlock a PC running Windows 10 Enterprise Edition by tapping a Windows Hello-enabled phone, although Microsoft has said the feature will only be available on “select premium phones”.

Android app notifications on Windows 10

android-SJTechies

In future, notifications on Android devices will be able to show on Windows 10 PCs.

Any notification popping up on the Android notification panel can, via the Cortana Android app, also appear as a notification on a linked Windows 10 desktop.

Microsoft demoed the ability at its recent Build conference for developers.

Browser extensions

extensions-SJTechies

Microsoft’s Edge browser will soon gain support for extensions.

Extensions are small programs that can be downloaded to add new functionality to a browser, and are already found in Chrome, Firefox and other browsers today.

Support for extensions has already been added to Edge for those testing pre-release builds of Windows 10 under the Insider program.

The first extensions to be supported by Edge are Microsoft Translator, an extension that automatically translates pages in over 50 different languages, an extension to augment mouse gestures support, and a preview version of the Reddit Enhancement Suite.

Microsoft promises more extensions will be added later this year, including AdBlock, LastPass and Evernote.

Pinned browser tabs

pinned-tabs-SJTechies

Microsoft is also adding to Edge the ability to pin your favorite sites and web apps so they always have a tab open in the browser.

Updated Maps app

maps-app-pc-SJTechies

The Maps app has several new features, as well as UI and performance improvements.

Additions include one-tap access to search and directions, the ability to view multiple searches and directions at the same time, labels for search results on the map and turn-by-turn directions read by Cortana.

The improved app is available now to those testing Windows 10 under the Insider program.

Access Linux command-line tools in Windows

bash-win10-SJTechies

More one for developers, Microsoft is also bringing the ability to run the Bash shell to Windows.

The Bash shell is a command line interpreter that is available on many different Linux distributions, as well as Mac OS X.

The shell includes a host of tools that allow power users to carry out and orchestrate complex chains of commands.

Bash will be available via a Universal Windows Platform app, which will provide an image of the Linux distribution Ubuntu and run on the Windows 10 desktop.

Users will be able to use the Bash shell to download and install programs from the command line, as they do from inside Ubuntu. Microsoft says Ubuntu software will run as fast in the Windows app as it does natively, thanks to a software subsystem for handling Linux system calls.

Microsoft has described the app as offering a developer toolset. While it has access to the files on the Windows PC, the app only provides access to a command line — not a graphical desktop — and reportedly has limits on what it can be used for, such as not being able to run a server.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

10 of the latest security products that can help you fight the bad guys

1. IBM z13s mainframeIBM z13s mainframe

Image: IBM

Security standards are constantly changing. Here are some of the latest software and hardware products to help keep your organization secure.

In February 2016, IBM announced the IBM z13s, a mainframe with cryptographic features built directly into the hardware. According to IBM it can decrypt at twice the speed of the generations before it.

2. Cisco Firepower NGFW

Cisco Firepower NGFW

Image: Cisco

Cisco recently announced its Firepower series appliances with its next-generation firewall (NGFW) technology. There are 16 models in the series that include integrated NGIPS and advanced malware protection.

3. Illumio

Illumio

Image: Illumio

Illumio is a startup that provides adaptive security for the data center and cloud environments. The company recently achieved unicorn status as its value topped $1 billion, and it is consistently named a top enterprise security provider.

4. GOTPass

GOTPass

Image: University of Plymouth, H. Alsaiari, M. Papadaki, P. Dowland, and S. Furnell

GOTPass is a graphical authentication system developed by researchers at the University of Plymouth. It uses images to authenticate instead of traditional passwords.

5. Skyport Systems SkySecure

Skyport Systems SkySecure

Image: Skyport Systems

SkySecure is an out-of-the-box enterprise security solution to protect application workloads. The systems includes hardware, software, and management tools.

6. Spikes Security Isla

Spikes Security Isla

Image: Spikes Security

The Isla is an enterprise appliance that “isolates and eliminates all browser-borne malware.” It was launched in mid-2015, but it was independently certified as invulnerable to web malware exploits in early 2016.

7. Blackphone 2

Blackphone 2

Image: Zack Whittaker/CNET

The Blackphone by Silent Circle is an Android-powered smartphone with a built-in security center to lock down your data. The most recent iteration, the Blackphone 2, released late last year.

8. Imation IronKey Enterprise H350

Imation IronKey Enterprise H350

Image: Imation

The IronKey Enterprise H350 is a rugged, military-grade encrypted hard drive. It is available in multiple capacities and is FIPS 140-2 Level 3 certified.

9. Bitdefender Total Security 2016

Bitdefender Total Security 2016

Image: Bitdefender

For home users and small businesses, the Total Security 2016 by Bitdefender is a great option. It stacks up well against key competitors and includes device anti-theft features.

10. Qubes OS 3.1 rc2

Qubes OS 3.1 rc2

Image: Qubes

Qubes OS is a Linux-based, security-oriented OS that is focused on compartmentalization using VMs. It’s been around for a few years, but the latest version released in January 2016.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

40+ Cloud computing terms you should know

A familiarity with cloud computing terminology will help you follow the industry’s developments. This glossary offers a rundown of more than 40 cloud terms.

 

CloudSolutions

Advertising-based pricing model

A pricing model whereby services are offered to customers at low or no cost, with the service provider being compensated by advertisers whose ads are delivered to the consumer along with the service.

Amazon Elastic Compute Cloud (EC2)

Part of Amazon Web Services (AWS), EC2 provides scalable computing capacity in the cloud, which developers can use to deploy scalable applications.

Amazon Simple Storage Service (S3)

Part of AWS, S3 allows for the storage and retrieval of data. It can also be used to host static websites.

Apache Hadoop

An open-source software framework for distributed storage and processing of large sets of data.

AWS

The organizational unit of Amazon that provides a variety of cloud services. AWS operates from 11 physical locations across North and South America, Europe, Asia, and Australia.

Content delivery network (CDN)

A distributed system consisting of servers in discrete physical locations, configured in a way that clients can access the server closest to them on the network, thereby improving speeds.

Cloud

A metaphor for a global network, first used in reference to the telephone network and now commonly used to represent the internet.

Cloud portability

The ability to move applications and data from one cloud provider to another. See also Vendor lock-in.

Cloud provider

A company that provides cloud-based platform, infrastructure, application, or storage services to other organizations and/or individuals, usually for a fee.

Cloudsourcing

Replacing traditional IT operations with lower-cost, outsourced cloud services.

Cloud storage

A service that allows customers to save data by transferring it over the internet or another network to an offsite storage system maintained by a third party.

Cloudware

Software that enables creating, deploying, running, or managing applications in the cloud.

Cluster

A group of linked computers that work together as if they were a single computer, for high availability and/or load balancing.

Consumer cloud

Cloud computing offerings targeted toward individuals for personal use, such as Dropbox or iCloud.

Consumption-based pricing model

A pricing model whereby the service provider charges its customers based on the amount of the service the customer consumes, rather than a time-based fee. For example, a cloud storage provider might charge per gigabyte of information stored. See also Subscription-based pricing model.

Content Management Interoperability Services (CMIS)

An open standard for controlling content and document management systems and repositories using web protocols.

Customer self-service

A feature that allows customers to provision, manage, and terminate services themselves, without involving the service provider, via a web interface or programmatic calls to service APIs.

Disruptive technology

A business term that describes innovations that improve products or services in unexpected ways. These innovations change the methods used to accomplish a task, and re-shape the market for that task. Cloud computing is considered a disruptive technology because of its elasticity, flexible pricing models, and maintenance cost compared to traditional IT service provisioning.

Docker

Open-source software that automates the deployment of applications inside virtualized software containers.

Elastic computing

The ability to dynamically provision and deprovision computing and storage resources to stretch to the demands of peak usage, without the need to worry about capacity planning and engineering around uneven usage patterns.

External cloud

Public or private cloud services that are provided by a third party outside the organization.

Google App Engine

A service that enables developers to create and run web applications on Google’s infrastructure and share their applications via a pay-as-you-go, consumption-based plan with no setup costs or recurring fees.

Google Apps

Google’s Software as a Service (SaaS) product includes an office productivity suite, email, calendar, and file storage and sharing. Google Apps for Businessincludes an enterprise administration interface and archiving tools, and support for legal holds document discovery compliance. Google Apps for Education includes additional collaboration and reporting tools for classroom environments.

Hardware as a Service (HaaS)

Also see IaaS.

Hosted application

An internet-based or web-based application software program that runs on a remote server and can be accessed via an internet-connected PC or thin client. See also SaaS.

Hybrid cloud

The combination of a public cloud provider (such as AWS) with a private cloud platform. The public and private cloud infrastructures operate independently of each other, and integrate using software and processes that allow for the portability of data and applications.

Infrastructure as a Service (IaaS)

Cloud infrastructure services in which a virtualized environment is delivered as a service by the cloud provider. This infrastructure can include servers, network equipment, and software, including a complete desktop environment such as Windows or Linux.

Internal cloud

A private cloud instance provided and supported by an IT department for internal use.

Microsoft Azure

Microsoft’s cloud platform that provides a myriad of Platform as a Service (PaaS) and IaaS offerings, including Microsoft-specific and third-party standards, for developers to deploy cloud applications and services.

Microsoft Office 365

Microsoft’s software plus services model that offers Microsoft Office on a subscription-based pricing model, with cloud storage abilities. For business and enterprise use, Office 365 includes email and SNS, with cloud-hosted instances of Exchange Server and Skype for Business, among others.

Middleware

Software that sits between applications and operating systems, consisting of a set of services that enable interoperability in support of distributed architectures by passing data between applications. So, for example, the data in one database can be accessed through another database.

Multitenancy

The existence of multiple clients sharing resources (services or applications) on distinct physical hardware. Due to the on-demand nature of cloud, most services are multi tenant.

On-demand service

A model by which a customer can purchase cloud services as needed; for instance, if customers need to utilize additional servers for the duration of a project, they can do so and then drop back to the previous level after the project is completed.

OpenStack

A free and open-source cloud computing software platform used to control pools of processing, storage, and networking resources in a datacenter.

PaaS

Cloud platform services, whereby the computing platform (operating system and associated services) is delivered as a service over the internet by the provider.

Pay as you go

A cost model for cloud services that encompasses both subscription-based and consumption-based models, in contrast to the traditional IT cost model that requires up-front capital expenditures for hardware and software.

Private cloud

Services offered over the internet or over a private internal network to select users. These services are not available to the general public.

Public cloud

Services offered over the public internet. These services are available to anyone who wants to purchase the service.

Software as a Service (SaaS)

Cloud application services, whereby applications are delivered over the internet by the provider so the applications don’t have to be purchased, installed, and run on the customer’s computers. SaaS providers were previously referred to as application service providers.

Salesforce

An online SaaS company that is best known for delivering customer relationship management (CRM) software to companies over the internet.

Service migration

The act of moving from one cloud service or vendor to another.

Service provider

The company or organization that provides a public or private cloud service.

Service level agreement (SLA)

A contractual agreement by which a service provider defines the level of service, responsibilities, priorities, and guarantees regarding availability, performance, and other aspects of the service.

Social networking service (SNS)

Used in enterprises for collaboration, file sharing, and knowledge transfer; among the most common platforms are Microsoft’s Yammer, and Salesforce’s Chatter. Often called enterprise social software to differentiate between “traditional” SNS platforms such as Facebook or LinkedIn.

Software plus services

The combination of cloud-hosted services with locally running software. This method allows for using the local system for processing power while relying on cloud operations for software license verification, portable identities, syncing between devices, and file storage.

Subscription-based pricing model

A pricing model that lets customers pay a fee to use the service for a particular time period, often used for SaaS services. See also Consumption-based pricing model.

Utility computing

A provisioning model in which services are available as needed, and users are charged for specific usage, in a manner similar to municipal utilities such as electricity or water.

Vendor lock-in

Dependency upon a particular cloud vendor and low ability to migrate between vendors due to an absence of support for standardized protocols, APIs, data structures (schema), and/or service models.

Vertical cloud

A cloud computing environment optimized for use and built around the compliance needs of specialized industries, such as healthcare, financial services, and government operations.

Virtual private data center

Resources grouped according to specific business objectives.

Virtual private cloud (VPC)

A private cloud that exists within a shared or public cloud, e.g., the Amazon VPC that allows Amazon EC2 to connect to legacy infrastructure on an IPsec VPN.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Eight advanced tips for Word headers and footers

Microsoft word

Even a novice Word user can display page numbers in a document’s header of footer. The process is fundamental. Advancing beyond the basics is easier than you might think, and you might be surprised how many things you can do with a header or footer! In this article, you’ll find eight tips that will move you from basic user to advanced, at least with headers and footers.

1. Display page numbers in shapes

Most documents over a few pages display a page number in the header of footer. If the document warrants a bit of visual appeal, you can display that number in an interesting and colorful shape. First, add the shape to the header using an easy-to-use built in gallery. Next, use the header’s current position property to add the number.

To add the shape, do the following:

  1. Open the footer by double-clicking the footer area. In Word 2003, choose Header and Footer from the View menu.
  2. While in the header, click the Insert tab. In the Illustrations group, click Shapes and choose one, such as the diamond shape in the Flowchart section (Figure A). In Word 2003, use the Drawing toolbar to access shapes.
    Figure A

figure A

  1. Click inside the footer and drag to create the shape. It’s okay if the shape extends beyond the footer border a bit.
  2. With the shape inserted, use the contextual Format tab to format the shape. I used the Shape Fill options to change the color to lettuce green; I used the Shape Outline drop-down to change the outline to dark green; I used the Shape Effects Reflection option to add a full reflection (Figure B) that fades off the bottom edge (which might not be possible to print but works fine for electronic viewing). In Word 2003, choose AutoShape from the Format menu (with the shape selected).
    Figure B

figure B

With the shape inserted and formatted, add the page number as follows:

  1. Right-click the shape and choose Add Text from the resulting submenu. In Word 2003, use the Header and Footer contextual toolbar to insert the page number, and then format as you normally would.
  2. Click the contextual Design tab. In the Header & Footer group, click Page Number.
  3. Choose Current Position from the drop-down.
  4. Choose Plain Number (the first option) from the gallery (Figure C).
    Figure C 

figure C

  1. Select the number and format it. I applied black font color (Figure D).
    Figure D

figure D

This simple example shows you how to display the page number in a shape. It’s up to you to determine whether doing so is appropriate for your document.

2. Insert a graphic

A header is a good place to display your organization’s logo or some other branding graphic. To do so, open the header or footer as you normally would and then do the following:

  1. With the document in edit mode, click the Insert tab. In Word 2003, choose Picture | From File from the Insert menu, and then skip to step 3.
  2. In the Illustrations group, click Picture.
  3. Use the Insert Picture dialog to locate the file
  4. Select the file, and then click Insert

You probably didn’t realize how easy that would be! While graphics in the header and footer might sound like a great idea, use them sparingly.

3. Use header graphic as a page tab

You can use the header or footer to display a graphic on every page, but you don’t have to leave it in the header or footer. For instance, you might want to use a graphic as a page tab. To do so, insert the graphic as you normally would (see tip 2). Then, drag it out of the header or footer area as shown in Figure E. If the graphic won’t move, click the Layout Options icon and choose a text wrapping option. The Layout Options icon is new to 2013. In earlier versions, you’ll find these options on the contextual Format tab. You might want to rotate the graphic as well.

Figure E

figure E

4. Use sections

A large document might need to change information in the header or footer as the document evolves. The way to implement this requirement is to use section breaks. Simply click inside the document (not inside the header or footer) where you want the new section to begin. Click the Page Layout tab, click Breaks in the Page Setup group, and then choose the best break type for your document. Return to the header or footer of the new section and make the necessary changes. In Word 2003, breaks are on the Insert menu.

For a header that doesn’t repeat information from the previous section, click the Link to Previous option in the Navigation group on the contextual Design tab. Doing so breaks the connection between the two sections. Figure F shows the toggle option linked and not linked. When sections are linked, the option has a dark background and Word displays the Same as Previous tab to the right. When the link is broken, the option has no background and the tab is gone. In Word 2003, this option is on the Header and Footer toolbar (and available only if there’s more than one section).

Figure F

figure F

You must break the link between headers and footers separately.

5. Display custom info

The header or footer area is a great place to display custom information about the document or author using fields. To do so, open the document’s header or footer. Then, position the cursor and do the following:

  1. Click the Insert tab. In Word 2003, choose Field from the Insert menu and skip to step 4.
  2. In the Text group, click the Quick Parts option.
  3. From the drop-down, choose Field.
  4. Using the resulting dialog (Figure G), choose a field, such as Author. Set properties, if necessary, and click OK. (You could also use AutoText or Document Property.)
    Figure G

figure G

6. Gallery page number options replace existing header or footer

Be careful when using the Page Number option to display page numbers in the header or footer. If you’ve already created a header or footer, and you add the page number last, use the Current Position option. Other options from the gallery will replace the existing header or footer. (Galleries aren’t available in Word 2003.)

7. Modify the style

Word applies the Header and Footer style to header and footer text, respectively. Both styles are based on Normal. The easiest way to change the appearance of the text for either is to modify the appropriate style. Doing so will impact the entire document, so don’t change the style if you want to change the format for a single section.

8. Reference a content control

Sometimes, you want to repeat information from the body of the document in the header or footer. In later versions of Word, using content controls, this is easily done. First, you add a content control and create a custom style for it. To the header, you add a StyleRef field that references the style you applied to the content control. In this way, you can easily display the contents of the content control in the header. Let’s work through a simple example:

  1. Position the cursor where you want to insert the content control.
  2. Click the Developer tab and then click Rich Text Content Control in the Controls group.
  3. Click Properties in the same group and enter a meaningful name, such as ccName . The cc prefix identifies the object as a content control and Name describes its content.
  4. Check the Use a style to format text typed into the empty control option. Don’t worry about what’s in the Style control at this point.
  5. Click New Style.
  6. Name the new style appropriately, such as Content Control (Figure H). You can change the Style based on setting, but don’t for this example. In this way, you can see how easy it is to set this technique up without making a lot of unnecessary changes. It’s the same style used for the body of the document; it just has a different name.
    Figure H

figure H

  1. Click OK, and Word updates the Style control to reflect the new style you just created (Figure I).
    Figure I

figure I

  1. Click OK.
  2. Open the header and position the cursor where you want to display the contents of the content control you just added.
  3. Click the Insert tab.
  4. In the Text group, click Quick Parts, and choose Field from the drop-down list.
  5. In the resulting dialog, choose StyleRef from the Field names list.
  6. Choose Content Control from the Style name list
  7. Click OK.
  8. Double-click the content control to close the header.

Enter text into the content control, and the field in the header will update accordingly. Although this technique has a lot of steps, it isn’t difficult to implement.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Wi-Fi-enabled ‘Hello Barbie’ records conversations with kids and uses AI to talk back

Today, Mattel released Hello Barbie, a WiFi-enabled doll that detects language and ‘talks back.’ But how will this high-tech toy impact real-life relationships?

Hello-barbie

She wears black flats, a motorcycle jacket, and skinny jeans. Her curly, bleach-blonde hair falls just past her shoulders. She has a permanent smile and large blue eyes. And, when you talk to her, she listens.

But this young woman isn’t an ordinary friend. “Hello Barbie” is less than a foot tall, weighs just under two pounds, and is made of plastic. And she is on sale for $74.99.

Mattel’s latest Barbie, marketed for children six and up, has just hit the shelves. She is unlike any doll before her—not only does she listen, but she can talk back.

To get started, kids simply download the Hello Barbie companion app. And to turn her on, you push a button on her silver belt buckle. Hello Barbie’s necklace is both a recorder and a microphone. Using WiFi, the jewelry will pick up a child’s questions and conversations—and transmit them back to a control center for processing. Speech-recognition software, operated through ToyTalk, will detect the input. Then, Hello Barbie will reply, using one of 8,000 pre-programmed lines. Examples include:

  • You know, I really appreciate my friends who have a completely unique sense of style…like you!
  • Here’s what’s up: I’m worried my sister Stacie is having a hard time finishing her homework. Does that ever happen to you?
  • I think Santa is real. There’s something very magical about the holiday season and I think he helps bring that magic to all of us!
  • So if you were planning the biggest, raddest, most unforgettable party of the year, what would it be like?
  • Of course we’re friends! Actually, you’re one of my best friends. I feel like we could talk about anything!

Hello Barbie’s dialogue, while perky and fashion-focused, reflects an attempt by Mattel to create a more well-rounded character than in the past. In 1992, Mattel pulled its string-operated Teen Talk Barbie from shelves after being criticized by The American Association of University Women for the inclusion of an unfortunate line: “math class is tough.” It is no mistake that Hello Barbie’s lines includes: “Oh nice! Fun with numbers! Teaching math sounds like a lot of fun. What kinds of things would you teach—Counting? Addition? Subtraction?”

Still, the implication that Barbie is being sold as a ‘friend’ is unsettling. “Hello Barbie can interact uniquely with each child by holding conversations, playing games, sharing stories, and even telling jokes!” boasts Mattel’s website. Hello Barbie, claims Mattel, is “Just like a real friend. [She] listens and remembers the user’s likes and dislikes, giving everyone their own unique experience.”

But is she really listening?

While Barbie may appear to listen and respond, “pretend empathy is not empathy,” said Sherry Turkle, professor at MIT and author of Reclaiming Conversation. Turkle worries about how children will understand their new ‘friend.’

“They are drawn into thinking that pretend empathy is the real thing,” said Turkle. “But objects that have not known the arc of a human life have no empathy to give. We put our children in a compromised position.”

Beyond the social implications of the doll, the capabilities of the recording technology raise privacy issues.

Using Hello Barbie involves recording voice data (see the privacy policy here) and requires parental consent. However, Mattel states that “parents and guardians are in control of their child’s data and can manage this data through the ToyTalk account.” The company also states that the recordings are protected under the “Children’s Online Privacy Protection Act,” and recordings containing personal information will be deleted once they “become aware of it.”

Still, the potential for misuse of this private data is a legitimate concern. “Obviously it is a security and privacy nightmare,” said Roman Yampolskiy, director of the Cybersecurity Lab at the University of Louisville. “[The] company [is] collecting data from kids—hackers [could be] getting access to private info.”

However, like Turkle, Yampolskiy is “more concerned about social development of the children interacting with it.”

“We are basically running an experiment on our kids and have no idea if it will make them socially awkward, incapable of understanding body language, tone of voice and properly empathize with others,” he said.

It all raises the question of what is meant, exactly by ‘real’ conversation? Turkle said, “Why would we take such risks with something so delicate, so crucial: Our children’s ability to relate to each other as human beings?”

Despite concerns, Hello Barbie is here, being shipped to homes across the globe beginning today. She is being turned on, spoken to, and listened to. And when children are finished with her, she is shut down, stood on a charger (Hello Barbie cannot stand on her own) and charged back up.

When she is turned on again, Barbie might ask: “Did you miss me at all?”

“Not even an itsy bitsy, eensy weensy bit?”

How children will respond remains to be seen.

Mattel did not respond to repeated requests for comment for this story.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

The 15 most frightening data breaches

data breaches

 

Ashley Madison (2015)

All data breaches are scary, but some just have that extra scream factor.

In arguably the most embarrassing data breach of the bunch, a group calling itself “The Impact Team” stole 37 million records from adultery website Ashley Madison, including many records that customers had paid to have deleted.

Virtually all of the company’s data was stolen in the hack, including records that suggest most female accounts on the site are fake, and that the company used female chat bots to trick men into spending money.

LivingSocial (2013)

Daily deals company LivingSocial had its network compromised in 2013, with hackers stealing roughly 50 million names, email addresses, birthdays, and encrypted passwords from its SQL database.

Sony PlayStation Network (2011)

Game over, man. In April 2011, hackers raided Sony’s PlayStation Network (PSN) service, stealing personally identifiable information from more than 77 million gamers.

Sony was further criticized for delaying the release of public information about the theft and for storing customer data in an unencrypted form.

The attack took Sony’s PSN out of service for 23 days.

Internal Revenue Service (2015)

Nigerian scammers pilfered more than $50 million from the U.S. Treasury via an embarrassingly simple 2015 hack of the Internal Revenue Service website.

Information scraped from previous data hacks was used to steal Americans’ identities and request copies of past tax returns on the IRS website. The crooks then filed new tax returns with falsified data, requesting big refunds.

The hack caused massive nightmares for the estimated 334,000 people whose records were stolen before the IRS shut down the transcript request service.

Target (2013)

Hackers installed point-of-sale malware on Target’s computer network sometime in 2013, resulting in the theft of more than 70 million customer records. Stolen data included payment card numbers, expiration dates, and CVV codes.

The retailer reached out to affected customers by offering free data monitoring (standard practice) and a 10% off discount on a future shopping trip. But it was too little, too late; same-store sales slid in the quarter following the hack.

Anthem (2015)

Anthem, the United States’ second largest for-profit health insurer, disclosed in February 2015 that it had lost 78.8 million unencrypted customer records to criminals. Names, social security numbers, email addresses, and income data was stolen.

The rare piece of good news: Financial and medical records were not affected.

Adobe (2013)

Adobe revealed in October 2013 that hackers had stolen 38 million active customer IDs and passwords, forcing the company to send out a wave of password reset warnings.

Weeks after, the news got worse for the company: The thieves also made off with the source code for its popular Adobe Photoshop software.

eBay (2014)

Talk about an inside job: In 2004, online auction house eBay suffered the largest hack in U.S. history, losing 145 million login credentials to a hacker using an internal eBay corporate account.

Names, email and street addresses, phone numbers, and birth dates were compromised, but thankfully, passwords were stored in encrypted form.

Home Depot (2014)

In September 2014, Home Depot admitted that it fell prey to hackers who installed antivirus-evading malware on its self-checkout registers. An estimated 56 million sets of customer payment card data were stolen in the attack.

The company’s losses related to the event are expected to top $1 billion when all of the lawsuits are finally settled. Only $100 million of that will be covered by insurance.

JP Morgan Chase (2014)

The September 2014 breach of JP Morgan Chase proved that even the largest U.S. banks are vulnerable to data theft. Online banking login details were not stolen, but crooks did get their hands on 76 million sets of names, emails, addresses, and phone numbers of bank customers, creating serious phishing concerns.

A group of Russian hackers is believed to be responsible for the attack.

PNI Digital Media (2015)

PNI Digital Media, the company that handles online photo printing for CVS, Walgreens, Rite Aid, Costco, and many more national chains, lost an unknown number of customer records to hackers in 2015.

Given that the company boasted more than 18 million transactions in 2014, it’s likely that this breach affected tens of millions of Americans.

Heartland (2008)

Credit and debit card processing firm Heartland Payment Systems became one of the largest data breach victims in U.S. history when hackers compromised more than 130 million accounts in 2008.

The criminal ring involved in the Heartland data theft was also found to be responsible for the 2005 hack of TJX Companies involving 94 million records.

TJX Companies (2005)

In a 2005 scheme dubbed “Operation Get Rich or Die Tryin,” a group of hackers used an unsecured Wi-Fi network at a Marshalls store to break into parent TJX Companies’ computer system and steal 94 million customer records, including payment card data.

Albert Gonzalez, the ringleader of the hack, is serving a 20-year sentence in Leavenworth.

U.S. Office of Personnel Management (2015)

Earlier this year, the United States Office of Personnel Management admitted that hackers had taken 21.5 million records belonging to those who had undergone government background checks or otherwise applied for federal employment. The hackers stole a wealth of sensitive data, including security clearance information and fingerprint data belonging to secret agents.

The Washington Post reported that the attack is believed to have originated in China.

Zappos (2012)

In January 2012, online shoe retailer Zappos stated that cybercriminals had stolen data of 24 million customers, including names, addresses, and the last four digits of their payment cards.

After the announcement, Zappos had to disconnect its phone lines to keep upset customers from calling in and overloading its phone system.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

The 18 scariest computer viruses of all time

virus

 

Anna Kournikova (2001)

The Anna Kournikova virus is so named because it tricked its recipients into thinking they were downloading a sexy picture of the tennis star. Financial damages associated with Kournikova were limited, but the virus had a big pop culture impact: It became a plot point in a 2002 episode of the sitcom Friends.

Sasser (2004)

In April 2004, Microsoft issued a patch for a vulnerability in Windows’ Local Security Authority Subsystem Service (LSASS). Shortly after, a teenager in Germany released the Sasser worm to exploit the vulnerability in unpatched machines. Multiple variants of Sasser took out airline, public transportation, and hospital networks, causing $18 billion in damage.

Skulls.A (2004)

The Skulls.A is a legitimately spooky mobile trojan that affected the Nokia 7610 smartphone and other SymbOS devices. The malware was designed to change all icons on infected phones to Jolly Rogers and disable all phone functions, save for making and receiving calls.

F-Secure says Skulls.A caused little damage, but the trojan is undeniably creepy.

Zeus (2009)

While many malware programs on this list are little more than nuisances, Zeus (AKA Zbot) was a tool used by a complex criminal enterprise.

The trojan uses phishing and keylogging to steal online banking credentials, draining a cumulative $70 million from the accounts of its victims.

Melissa (1999)

Named after a Florida stripper, the Melissa virus was designed to propagate by sending itself to the first 50 contacts in its victims’ e-mail Outlook address book. The attack was so successful that the virus infected 20 percent of the world’s computers, causing an estimated $80 million in damage.

Virus creator David L. Smith (shown) was caught by the FBI, served 20 months in jail, and paid a $5,000 fine.

Sircam (2001)

Like many early malware scripts, Sircam used social engineering to trick people into opening an email attachment.

The worm chooses a random Microsoft Office file on victims’ computers, infects it, and sends it to all the people in the victims’ email contact list. A University of Florida study pegged Sircam cleanup costs at $3 billion.

Stuxnet (2009)

Stuxnet is one of the first known viruses created for cyberwarfare. Created in a joint effort between Israel and the U.S., Stuxnet targeted nuclear enrichment systems in Iran.

Infected computers instructed nuclear centrifuges to physically spin until they broke, all while providing fake feedback that operations were normal.

SQL Slammer/Sapphire (2003)

Taking up just 376 bytes, the SQL Slammer worm packed a lot of destruction into a tiny package. The worm slowed down the Internet, disabled 911 call centers, took down 12,000 Bank of America ATMs, and caused much of South Korea to go offline. It also crashed the network at Ohio’s Davis-Besse nuclear power plant.

Storm Trojan (2007)

Storm Trojan is a particularly sinister piece of email-distributed malware that accounted for 8 percent of all global infections just three days after its January 2007 launch.

The trojan created a massive botnet of between 1 and 10 million computers, and because it was designed to change its packing code every 10 minutes, Storm Trojan proved incredibly resilient.

Code Red (2001)

The Code Red worm, named after the Mountain Dew flavor preferred by its creators, infected up to one-third of all Microsoft ISS web servers upon release.

It even took down whitehouse.gov, replacing its homepage with a “Hacked by Chinese!” message. Estimated damages due to Code Red were in the billions of dollars worldwide.

Nimda (2001)

Released just after the 9/11 attack, many thought the devastating Nimda worm had an Al Qaeda connection (never proven).

It spread via multiple vectors, bringing down banking networks, federal courts and other key computer systems. Cleanup costs for Nimda exceeded $500 million in the first few days alone.

ILOVEYOU (2000)

The ILOVEYOU worm, AKA Love Letter, disguised itself in email inboxes as a text file from an admirer.

But this Love Letter was anything but sweet: In May 2000, it quickly spread to 10 percent of all Internet-connected computers, leading the CIA to shut down its own email servers to prevent its further spread. Estimated damages were $15 billion.

Cryptolocker (2014)

Computers infected with Cryptolocker have important files on their hard drives encrypted and held at ransom. Those who pay approximately $300 in bitcoin to the hackers are given access to the encryption key; those who fail to pay have their data deleted forever.

Netsky (2004)

The Netsky worm, created by the same teen who made Sasser, made its way around the world by way of email attachments. The P variant of Netsky was the most widespread worm in the world even more than two years after its February 2004 launch.

Conficker (2008)

The Conficker worm (AKA Downup, Downadup, Kido), first detected in December 2008, was designed to disable infected computers’ anti-virus programs and block autoupdates that may otherwise remove it from computers.

Conficker quickly spread to numerous important computer networks, including those of the English, French, and German armed forces, causing $9 billion in damage.

Michaelangelo (1992)

The Michelangelo virus itself spread to relatively few computers and caused little real damage. But the concept of a computer virus set to “detonate” on March 6, 1992 caused a media-fueled mass hysteria, with many afraid to operate their PCs even on anniversaries of the date.

Sobig.F (2003)

The Sobig.F trojan infected an estimated 2 million PCs in 2003, grounding Air Canada flights and causing slowdowns across computer networks worldwide. This tricky bug-in-disguise cost $37.1 billion to clean up, making it one of the most expensive malware recovery efforts in history.

MyDoom (2004)

In September 2004, TechRepublic called MyDoom “the worst virus outbreak ever,” and it’s no surprise why. The worm increased the average page load time on the Internet by 50 percent, blocked infected computers’ access to anti-virus sites, and launched a denial-of-service attack on computing giant Microsoft.

The worldwide costs associated with cleanup of MyDoom is estimated to be just shy of $40 billion.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft Snip brings Windows screenshots to life with voice and ink

Microsoft released a free app for capturing, annotating, and explaining screenshots.

Snip

In late August 2015, Microsoft released a free screen capture and annotation application called Snip (Figure A). But the twist in the story is the fact that Snip is not part of some master strategic plan.

Figure A

Snip

Snip

While the name is a bit confusing, Snip is not the same thing as the improved Snipping Tool that comes free with Windows 10. The Snipping Tool will capture screenshots, but it does not have any annotation features.

Snip, on the other hand, is a free tool developed through a Microsoft Garage project that allows users to capture screenshots and then annotate them (Figure B). With the Snip app, users can draw on their captured screenshots using a software pen, which is available in various colors and sizes.

Figure B

Snip

Snip can also record the annotation, and your vocal description of it, to create a short video that users can share as a URL or as an MP4 video (Figure C). These features make Snip very useful for creating and sharing short instructional videos.

Figure C

Snip

Cultural shift

The important thing to note about Snip is the way it was developed and released. Under the Garage program, Microsoft employees are encouraged to work on projects outside of their official duties. The idea is to create an environment where employees can experiment, innovate, and exercise their creativity.

Releasing an app like Snip in beta form to the general public indicates a shift in attitude when it comes to app development at Microsoft. Snip has been released without worrying about whether it will generate a revenue stream or ever make a profit. As far as I can tell, there are no expectations regarding Snip and how it fits into the overall corporate strategy.

Snip is just a nice little program that Microsoft thinks people will find useful, and they’d appreciate some feedback on how to make it even better. No promises, no expectations, no quid pro quo. Microsoft is trying hard not to be the stodgy old software company anymore.

Snip also fits in well with Microsoft’s major theme for Office 365, which postulates that a modern productive workforce needs better collaboration tools. When you consider recent app releases like Edge, Sway, and now Snip, you can begin to see where Microsoft is heading.

If you need to communicate an idea in a simple but effective way, Microsoft is saying it has the tool you seek. It would not  be a surprise if Snip become an integrated part of Office 365 in the near future.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

CALL US NOW!