Back to Top

Tech, Web, Cloud & Cabling Services

Category: News

Microsoft Stream: The future of secure business video

Microsoft is previewing Stream, a new service for publishing and managing business videos. One day it will be the default video publishing system for Office 365.

MicrosoftStream

 

On July 18, 2016, Microsoft announced that a preview version of a new service called Microsoft Stream was available. Like most of you, I passed over the news with an indifferent “whatever” attitude. But later I realized that the news was actually more important than I had first thought.

Microsoft Stream fulfills a niche by providing a secure place to share videos created within, and for, businesses. By using a cloud-based service like this, businesses can reap the benefits of video communication without the threat of anonymous forum trolls trashing the brand or harassing employees.

Upload and forget it

While it is still a preview version, Microsoft Stream seems mostly ready for prime time. All you have to do is set up an account with a valid business email—One can use a personal domain email—and then log in. To test how easy Stream is to work with, you can make a 10-second video with a smartphone. Upload your video to Google Drive and then drag and drop it on the Stream portal website.

The web service processes the video while you give it a title and a brief description. Stream then asks if you are ready to publish and when you say yes, it publishes the video after a few seconds of grinding. It takes all of two minutes from start to finish and requires nothing more technical than knowing how to drag and drop a file.

Gone are the days of worrying about file format, aspect ratio, preferred playback applications, and all the other minutia we had to go through in years past to get a video published. You just take the video and then publish the video.

Video management

The key features of Microsoft Stream have to do with managing videos after they are published. Videos can be classified and placed into specific channels. Those channels can have their access restricted to certain individuals or certain groups, like a specific department, for instance. Access is controlled via the Azure Active Directory system.

According to the blog post, Microsoft plans to integrate Stream into the existing Office 365 Video system. Once the integration is complete, Microsoft Stream will be the default system for publishing video in an Office 365 environment.

There are plans in the works to add intelligent search to Stream by taking advantage of tools like audio transcription and face recognition. Developers are also working on ways to integrate Stream with other tools, like PowerApps, Microsoft Flow, and SharePoint.

Bottom line

We are aware of Microsoft Bookings and how that application attempts to cut out other third-party developers by integrating appointment scheduling for small businesses with the standard Office 365 subscription. By offering Stream, a secure video publishing and management service, Microsoft is attempting to execute the same strategy for video publishing.

Microsoft Stream gives businesses a secure system for publishing videos. Through Stream, businesses control access and manage who can see what and when they can see it. And because it is all handled internally, problems with anonymous forum trolls are likely to be reduced.

It seems that Microsoft’s grand strategy is to become the only software company a business needs—ever. The glaring application that Office 365 is missing now is a double-entry accounting system that includes payroll, accounts receivable, accounts payable, and the general ledger. Should we be looking for an announcement regarding those applications soon, Microsoft?

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Here’s how Microsoft will integrate LinkedIn into its products

Microsoft’s massive $26.2 billion acquisition of LinkedIn finally closed, and CEO Satya Nadella explained how the companies will begin working together.

Microsoft’s $26.2 billion purchase of professional networking site LinkedIn officially came to a close on Thursday, after the deal was approved by regulators. Following the close, Microsoft CEO Satya Nadella penned a blog post on LinkedIn detailing how the website would begin integrating with Microsoft’s products.

For starters, LinkedIn identity and network capabilities will be coming to Microsoft Outlook, and to the Office suite in general, the post stated. Additionally, LinkedIn notifications will be available to users in the Windows action center as well.

Since LinkedIn is known as a digital CV of sorts, Microsoft will enable LinkedIn members who draft a résumé in Word to directly update their LinkedIn profile page, and more easily search for and apply to relevant job postings, the post said.

One of the potentially troubling integrations is “extending the reach of Sponsored Content across Microsoft properties,” as Nadella wrote on his blog. Whether that means that users will begin seeing ads in their Office apps remains to be seen, but it sets the stage for a potentially tricky user experience.

Enterprise LinkedIn Lookup will soon be powered by Active Directory and Office 365, which could make it easier for employees to connect with one another. Nadella’s blog post also noted that LinkedIn Learning will be made available across the Office 365 and Windows ecosystem, giving Microsoft shops access to new forms of training and continued learning that could prove valuable to their employees.

Additionally, Nadella wrote that the two companies would begin developing a business news desk across their existing ecosystem of content, and for MSN.com. Sales Navigator and Dynamics 365 will also be integrated in hopes of improving social selling capabilities.

Since the acquisition was first announced, it’s been fairly clear that data was the driving force behind the deal. The two companies had non-overlapping, complementary data graphs, and these integrations show just the first steps that Microsoft is taking to leverage LinkedIn’s data, along with its own, to build out a more holistic ecosystem of business technologies and services.

Current LinkedIn CEO Jeff Weiner will continue to lead the company after the acquisition, and theNew York Times reported that roughly 10,000 LinkedIn employees will join Microsoft.

The 3 big takeaways for readers

  1. Microsoft closed its $26.2 billion acquisition of social networking site LinkedIn on Thursday, with Microsoft CEO Satya Nadella outlining how the two companies will merge.
  2. LinkedIn features and services will be coming to Outlook, Office 365, Dynamics 365, and even MSN.com, with LinkedIn search getting a boost from Active Directory.
  3. The deal has always been about data, and the integrations are just the start of how the two companies will merge their individual data graphs.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Microsoft hints at September release of Windows 10’s next feature upgrade

Based on the current progress for Windows 10 version 1903, due to arrive next spring, it now looks like the fall update for the OS will arrive around Sept. 10 or Sept. 24.

Microsoft last week released the first preview of what will become Windows 10 version 1903, the opening feature upgrade of next year, slated to ship in the spring.

The debut of what Microsoft calls the “Skip Ahead” build for Windows 10 1903 also hints that the release of this fall’s upgrade, aka 1809, will take place in September. If so, it would be the first time since late-2015 that the actual delivery date matched the numerical label.

On July 25, Microsoft forked the 1809 preview of Windows 10 – as it’s done before when a feature upgrade approaches – so developers could continue to deliver betas for that build while also beginning to work on the next-in-line, 1903. (Microsoft uses a yymm labeling system to mark its Windows 10 feature upgrades; 1809 should indicate a September 2018 release, while 1903 would be a March 2019 release.)

When it forks preview code, Microsoft provides the even-further-in-the-future build, in this case, 1903, to Windows Insider participants who earlier volunteered for Skip Ahead. As the current feature upgrade gets close to release, Microsoft switches Skip Ahead users to the following upgrade, so that engineers can start collecting feedback on that version even as they keep polishing the one set to launch soon. The bulk of Insiders remain on the latter.

Think of the Skip Ahead debut as a warning bell, like the one rung at track meets when racers start the final lap: When Microsoft begins to ship Skip Ahead code, it’s close to wrapping up the impending feature upgrade.

In 2017, as Windows 10 1709 (aka “Fall Creators Update”) neared completion, Microsoft first forked the preview code and distributed a different build to Skip Aheaders on Aug. 31. Windows 10 1709 began its release cycle on Oct. 17, or 47 days later. With this year’s version 1803, Skip Ahead debuted Feb. 14, or 75 days before the April 30 release of that upgrade.

(Windows 10 1803’s original launch date, reportedly April 10 – which was one of two dates Computerworld had forecast in February – was postponed by 20 days after a deal-breaking bug was uncovered at nearly the last minute.)

For one estimate of the release date for Windows 10 1809, Computerworld added 47 days to July 25, arriving at Sept. 10. A second estimate was generated by adding 61 days – the average of the two previous Skip Ahead triggers – to July 25, resulting in a Sept. 24 rollout.

Because the last three feature upgrades launched on either a Monday or Tuesday – April 11, 2017 for version 1703; Oct. 17, 2017 for 1709; April 30, 2018 for 1803 – Sept. 10 or 11 would be the most likely release dates for 1809, absent a show-stopping problem like the bug before 1803’s launch. Computerworld’s alternate forecast would be September 24 or 25, also a Monday/Tuesday combination, because it would match the previous upgrades’ average time-between-Skip-Ahead-and-release.

If Microsoft does release Windows 10 1809 in September, it would be the first time since November 2015 that the company has matched delivery date and the upgrade’s label. Version 1511 debuted Nov. 10, 2015. The four subsequent upgrades, 1607, 1703, 1709 and 1803, all missed their release months by between 2 and 30 days. (Version 1607 came the nearest, releasing Aug. 2, 2016.)

Although Microsoft has never expressly tied itself to March and September release months – in a support document, it gives itself wiggle room by stating that feature upgrades will be released “twice per year, around March and September [emphasis added]” – the disconnect between release and numerical designation has always seemed odd.

Issuing feature upgrades during the appointed months would be a sign that Microsoft has gotten a better handle on the rapid development tempo it has at times struggled with executing. It would also be a step toward a more predictable schedule, which was the point of the pledge it made over a year ago to issue a pair of feature upgrades annually.

Ransomware-as-a-service is exploding: Be ready to pay

RaaS has outgrown smaller targets and now threatens governments, NGOs, and SMBs.

ransomware

It starts with a fast click on a link in a harmless-looking email. Then your PC slows to a crawl. A message suddenly pops up and takes over your screen. “Your files and hard drive have been locked by strong encryption. Pay us a fee in 12 hours, or we will delete everything.” Then a bright red clock begins counting down. No antivirus will save your machine. Pay the fee or lose everything.

You’re the latest victim of a ransomware attack. The scary thing is, you’re not alone. The ransomware market ballooned quickly, from a $400,000 US annual haul in 2012, to nearly $18 million in 2015. The average ransom—the sweet spot of affordability for individuals and SMBs—is about $300 dollars, often paid in cash vouchers or Bitcoin.

The ransomware market scaled up so quickly, claims a recent report by Imperva, due to the rise of ransomware-as-a-service, or RaaS. Here’s how it works:

  • Ransomware authors are marketing on-demand versions of code, using traditional malware distributors in a classic affiliate model.
  • The ransomware author collects the ransom and shares it with the distributor.
  • Malware is distributed through spam email messages, malicious advertisements, and BlackHat SEO sites.
  • According to the Imperva report, “in classical affiliate marketing, the larger cut goes to the possessor of the product. In RaaS … the ransomware author gets a small cut of the funds (5%-25%) while the rest goes to the distributor (affiliate).”
  • Using the deep web, TOR, and Bitcoin, the report says, “this model, based on TOR and Bitcoins, is designed to keep the identity of the author and the distributor hidden from law enforcement agencies.”

Phishing in particular, is a highly effective tactic for malware distribution.

The well-worded email appears to come from a legitimate email address and domain name, and raises very few irregularities. The email comes with a demand for money for an arbitrary service, along with a link that purports to be an “overdue invoice.”

Click that link and open the file (which looks like a Word document), and you’ll become the latest victim of ransomware — that is, malware that encrypts your files and locks you out of your computer until you pay a ransom.

Phishing attacks have also helped ransomware move into the enterprise. In 2015 the medical records system at Hollywood Presbyterian Medical Center was attacked. The hospital paid $17,000 in Bitcoin to unlock the sensitive records. In early 2016 the Lincolnshire County Council was snagged by a phishing scheme and held up for 500 dollars.

To prevent your business from attack, make sure the IT department and communication team are in sync, keep your company’s security systems updated, and remind employees to use caution when clicking on email links from unknown addresses.

If you’ve been hacked, the ransomware rescue kit provides a suite of tools designed to help clean particularly pugnacious malware.

Businesses that suffer ransomware attacks face a tough choice. Paying the fee could restore access to mission-critical data, but there’s no guarantee the extortionists will honor the deal. And of course, paying a ransom provides incentive to hackers and validates the attack.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

The 10 most important lessons IT learned in 2015

Every year brings with it new challenges, and new lessons, for IT in the enterprise. Here are 10 of the lessons IT learned this past year.

IT lessons

 

The end of a year is always a good time for reflection, especially so if you’re evaluating what your business did right and what you can improve upon. In an increasingly digital world, IT has quickly become one of, if not the most, important aspects of an organization. So, it should be with great care that executives and admins look back on their year and try to glean some wisdom about what can be done differently in the year to come.

Here are 10 of the most important lessons that IT learned in 2015.

1. BYOX is here to stay

As smartphone use grew to near ubiquity in the enterprise, it brought with it the trend of BYOD, or, bring your own device. While that originally referred to mobile devices such as smartphones and tablets, it spawned as host of “bring your own” everything else.

“BYOX is the new mantra with consumers bringing their own applications, cloud sharing tools, social media into the enterprise; essentially bringing their own expectations of which technology they want to use and how and where they want to work in a corporate environment,” said Chuck Pol, president of Vodafone Americas.

2. DevOps is no longer just a buzzword

The term “DevOps” gained huge popularity in 2015 as a reference to an agile method that stresses the collaboration of development and operations. The goal is to connect the writers of the code with those who maintain the systems that run it. However, DevOps continues to evolve and, although it has its own set of challenges, it could be poised to become the method of choice for enterprise IT starting in 2016.

3. Data is currency

Data, especially as it relates to big data has been steadily growing in value but 2015 felt like a tipping point. Tools for both structured and unstructured data exploded in popularity and major data service providers went public, adding credibility to the field and likely creating a better inroad into the enterprise. Also, businesses got better at distinguishing between relevant and irrelevant data.

“It is no longer credible to look at data as big static objects in a deep lake, but rather be considered a set of fast moving assets in a raging river,” said Neil Jarvis, CIO of Fujitsu America. “In 2016 and beyond, companies need to look at the data that creates business-relevant information for today and tomorrow.”

4. Finding talent is problematic

Talent shortages don’t just affect startups on the West Coast. CompTIA CIO Randy Gross said that current estimates suggest there are more than one million IT job opening across the US alone, ranging across skill level from support specialists to network admins. Enterprises are going to have to work harder to attract and retain talent.

“Wise employers with IT jobs to fill have engaged in a self-examination of the tactics and strategies they’re using to attract new talent—and adjusting accordingly,” Gross said. “For some companies, new telecommuting and remote work options have helped them fill their talent gaps.”

5. SMAC is still relevant

The SMAC stack, which stands for social, mobile, analytics, and cloud, is also known by some as the “third platform.” As all of these individual components continue to grow and thrive in the workplace, their interdependencies will grow along with them.

“Senior management must become well versed about these technologies and their possibilities to create new value and new competitive advantages in their own business and markets,” Pol said.

6. Cloud lost its fear factor

Cloud acceptance was a mixed bag for a long time, but 2015 brought a more widespread embrace of cloud technologies and services in the enterprise. In fact, some trends are making it almost a necessity.

“The complete adoption of virtualization, as well as investigation into cloud and other strategies, is far more advanced than expected—particularly amongst SMBs,” said Patrick Hubbard, technical product marketing director at SolarWinds. “Making operating systems and applications truly mobile is redefining how companies think about their IT infrastructure.”

7. The security mindset is changing

Anthem BlueCross BlueShield and Harvard University were among the major organizations that dealt with a public security breach in 2015. With today’s social media, you can almost guarantee any data breach that occurs in the enterprise won’t stay a secret. And, with the risk of a breach high, Intel Security CTO Steve Grobman said that teams must adopt a new way of thinking.

“IT must embrace the mindset that they have already been breached, now how do you protect your environment with this new default outlook?,” Grobman said.

8. Shadow IT is a line item

Shadow IT carries nowhere near the same amount of scorn it once did in the enterprise. Some organizations are even openly embracing it, and making it a foundational part of their IT strategy. And, as shadow IT continues to grow, Pol said, it needs to be properly accounted for in the budget.

“As technology continues to transform business, IT infrastructure will become more complex and more difficult to have a complete view of technology across the business,” Pol said. “The role of IT will need to become more strategic and set clear lines of accountability between IT and line of business budget holders.”

9. Employees are the biggest security risk

When most people think about security risks to their organization, the image of the hooded hacker furiously typing away in a dark room. However, employees themselves pose a real threat to the security of an organization as well. Issues such as poor password practices and using unsecured networks with company devices are a real problem. Kelly Ricker, senior vice president of events and education at CompTIA, said mobile, while helping with agility and productivity, is a cybersecurity nightmare.IT

“Every device that employees use to conduct business—smartphones and smartwatches, tablets and laptops—is a potential security vulnerability,” Ricker said. “Companies that fail to acknowledge and address this fact face the very real risk of becoming a victim of cyber criminals and hackers.”

10. Commoditization is a threat

With the plethora of tools available to build and replicate popular tech, it is increasingly important for organizations to guard against the threat of commoditization.

“As development cycles become shorter and the potential for intellectual property to be recreated and copied increases, it is becoming more difficult to create a sustainable competitive advantage for your products and services,” Pol said.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Obama Wants To Build The Most Powerful Supercomputer In The World By 2025

Super Computer

Yesterday, on July 29, the White House made a pretty big announcement for the computing world: by 2025, the U.S. hopes to have on its hands a supercomputer so powerful that it can perform one quintillion, or 1018, operations each second. For those baffled by that unfathomably large number, it’s a billion billion.

This plan is part of an Executive Order, issued by President Obama, to see the creation of an ambitious scheme called the National Strategic Computing Initiative (NSCI). The ultimate aim for the next decade is to maintain the U.S.’s current position as world leaders in the development of High-Performance Computing (HPC) systems.

Marrying incredibly powerful computers with vast amounts of storage, supercomputers have been pivotal in a variety of research fields, helping scientists to model an array of physical systems and natural phenomena. For example, researchers can simulate what happens when galaxies collide, or when molecules interact with one another. They can even help us to predict short- and longer-term trends involving different scenarios, such as the potential impacts of climate change, or what could happen during a disease outbreak.

Although the performance of these computers can be assessed in a variety of ways, a common measure is “flops,” or the number of calculations that can be performed each second. As it stands, the speediest supercomputer is China’s Tianhe-2, which, running at 33.86 petaflops, is capable of quadrillions of calculations per second, BBC News reports. But Obama wants to reach the next level, stepping into the exascale realm. Exascale computers are those capable of at least an exaflop, which is about a thousand times the speed of petascale systems. So that’s a pretty big leap.

But the potential of such systems could be huge. With the capacity to rapidly analyze such vast amounts of data, scientists could make significant progress in fields such as personalized medicine. By processing huge medical databases, scientists could better predict how certain drugs may interact with different populations of people or individuals with certain genetic variations, identifying those that may be particularly susceptible or unsuitable for various therapies. Furthermore, the storage and processing capacities could allow scientists to combine real data with simulations, which could allow for better predictions of weather or climate change, for example.

Although there seems to have been a focus on speed, the President’s Council of Advisors on Science and Technology has pointed out that high-performance computing isn’t just about flops, but also ability. In order for the field to progress, researchers need to create systems that are capable of keeping up with huge amounts of rapidly growing and changing data. There is clearly a lot of work to be done, but the ambitious goal does not sound unachievable.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

What You Need to Know About the Big Chip Security Problem

According to Intel Corp.,most of the processors running the world’s computers and smartphones have a feature that makes them susceptible to hacker attacks. The chipmaker, working with partners and rivals, says it has already issued updates to protect most processor products introduced in the past five years, but the news sparked concern about this fundamental building block of the internet, PCs and corporate networks.

The revelation of the so-called Meltdown and Spectre vulnerabilities spurred a scramble among technology’s biggest players, from Apple Inc. to Amazon.com Inc., to enact fixes and reassure customers they were on top of the problem.

1. What’s the problem?

Modern processors guess what they’ll have to do next and fetch the data they think they’ll need. That makes everything from supercomputers to smartphones operate very fast. Unfortunately, as Google researchers discovered, it also provides a way for bad actors to read data stored in memory that had been thought to be secure. In a worst-case scenario, that would let someone access your passwords.

2. How bad is it?

The vulnerability won’t stop your computer working and doesn’t provide an avenue for hackers to put malicious software on your machine. Though it could put important data at risk, there’s been no report so far of anyone’s computer being attacked in this manner. More broadly, though, the new fears could undermine longtime assurances that hardware and chip-level security is more tamper-proof than software.

3. How was it discovered?

The weakness was discovered last year by folks Google employs to find such issues before the bad guys do. Usually, solutions are developed in private and announced in a coordinated way. This time the news leaked before the companies involved had a chance to get a fix in place.

 

 

4. What’s being done to fix it?

Chipmakers and operating system providers, such as Alphabet Inc.’s Google and Microsoft Corp., are rushing to create software patches that will close the potential window of attack. Intel said that it expects to have issued updates for more than 90 percent of recently introduced processor products. Amazon.com Inc. said “all but a small single-digit percentage” of its servers have already been protected. In a blog post, Google said its security teams immediately “mobilized to defend” its systems and user data. Some customers of Android devices, Google Chromebook laptops and its cloud services still need to take steps to patch security holes, the company said. Patches for Windows devices are out now and the company is securing its cloud services, Microsoft said in a statement.

5. Is this just an Intel problem?

No, though that seems to be what panicky investors initially thought. Intel says it’s an issue for all modern processors. But rival Advanced Micro Devices Inc. stated that its products are at “near-zero risk.” ARM Holdings, which has chip designs that support all smartphones, said that, at worst, the vulnerability could “result in small pieces of data being accessed” and advised users of its technology to keep their software up to date. Google fingered all three companies. Apple said all Mac computers and iOS devices — including iPhones and iPads — were affected, but stressed there were no known exploits impacting users and that steps taken to address the issue haven’t dented performance.

6. What will the fallout be?

Some computers, mostly older ones, could be slowed down by the software patches that will make them more secure. Intel said that in common situations software might be slowed down by as much as 3 percent or not at all. But in other rare situations, performance might be reduced as much as 30 percent. The company doesn’t expect any financial impact and said it thinks customers will keep buying. As the fixes haven’t been widely deployed yet, it’s unclear whether anyone will even notice or whether computer slowdowns will be widespread. Intel has only done lab tests.

iPhone 7 rumors: Goodbye 16GB, hello 256GB and ‘Pro’ line

The new iPhone doesn’t come out until September, but that won’t stop the rumor mill from churning at a furious pace.

iphone-7

Now that WWDC is over, the iPhone 7 rumors are getting even louder, since its expected unveiling in September is probably the next time we’ll see Tim Cook on stage. Yes, that’s still a good while from now. To help keep track of all the scuttlebutt, we’re collecting every rumor we’ve heard so far—and every new one that crops up between now and the day Tim pulls the new iPhone out of his pocket. Then we’ll assess whether each rumor seems legit or absurd, and we’d love to hear your thoughts too. Sound off in the comments.

What’s the latest?

The rumor: Pricing specs for the upcoming iPhone 7 have allegedly leaked on Weibo, according to 9to5Mac. If believed, the specs show that Apple is looking to release a 256GB model of the iPhone 7 that will be the same price as the 128GB model of the current generation iPhone 6s. Furthermore, Apple would drop the meager 16GB models, offering instead 32GB, 64GB, and 256GB for the iPhone 7 and 32GB, 128GB, and 256GB for iPhone 7 Plus. And that’s not all, the rumor on Weibo has it that Apple is gearing up an iPhone 7 Pro line. This Pro model would be the only one to offer the dual-camera system that’s been rumored before, and a Smart Connector for accessories similar to the iPad Pro.

Plausible: Generation after generation, Apple has mostly retained the same pricing for iPhone models, so the fact that the 256GB iPhone 7 would cost the same as the current 128GB wouldn’t be unheard of. However, we’re a little skeptical that Apple would get rid of the 16GB base models, especially since iOS 10 seems to have been designed to optimize storage. And the Pro line would be an interesting addition, and would certainly make up for the fact that the iPhone 7 is rumored to be almost-identical to the 6s models. Apple is also making some strides in enterprise software, so an iPhone Pro would be a logical next-step.

Headphone jack after all?

The rumor: Via Engadget comes some component photos from Rock Fix, a smartphone repair shop in China. They allegedly show a dual-SIM tray, another shows a dual-lens camera for the larger Plus model, and curiously, there’s even an Lightning assembly that still has the headphone jack attached. People who need a lot of storage will be pleased to hear another photo shows SanDisk memory ships up to 256GB, which would be the most storage Apple’s ever offered in an iPhone.

Plausible? It’s hard to give much weight to photos of components, and as reported in the same Engadget article, conflicting rumors about the dual-lens camera surfaced within days. But it is plausible that these components could be for the iPhone 7—and we know plenty of people who would be thrilled if the new phone had a headphone jack after all.

New colors?

navy-blue-iphone-7-concept

The rumor: It’s not easy being green, and iPhone owners might be starting to get envious of how many colors you can get an Android phone in. iPhones used to be pretty monochromatic, until Apple added gold and then an even brighter splash of color with last year’s rose gold hue (OK, OK, it’s pink). Japanese blog Macotara is reporting that Apple is switching it up this year, swapping the space gray color for navy blue instead.

Plausible? This is absolutely plausible. Apple’s iPhones have never been colorful, but the iPod touch comes in beautiful colored aluminum, and Apple has also set a tradition recently of switching up its Apple Watch bands to fit the season. One of the latest additions is a handsome navy Sport Band, and the Classic Buckle, Leather Loop, Modern Buckle, and two of the Hermès bands come in navy too. Navy looks great on both men and women, but we can’t help being a bit surprised it’s the “basic black” space gray color that’s rumored to be replaced.

A flat Home button?

The rumor:  Blurry, possibly fake spy photos from mobipicker (via 9to5Mac) seem to show a very flat-looking Home button. As in, maybe it’s not a button, maybe it’s just a touch-sensitive place you touch (and/or 3D Touch) instead of physically clicking it.

A fully flat Home button could have 3D Touch potential too.

Plausible? The Touch ID button got a lot faster between the iPhone 6 and 6s, but any button that physically clicks is another opportunity for hardware failure. With the rise of installment plans and the iPhone Upgrade program, we expect Apple to keep making little tweaks that make its phones more durable, so they’re turned in good enough shape to be possibly refurbished and resold. So yes, this is very plausible, and we think Apple could pull it off where the experience is the same, perhaps even using a little haptic feedback to make it feel like the button is clicking but it’s not—just like the Force Touch trackpad.

What about storage size?

The rumor: Apple is ditching the 16GB base model iPhone at long last, at least according to an IHS Technology analyst. The analyst posted on Chinese social media that the base model iPhone 7 will start at 32GB of storage space and 2GB of RAM, based on supply chain research.

Plausible? We sure hope so. Long-time Apple watchers have criticized the company for years over refusing to drop the 16GB model and forcing buyers to choose between the paltry base model and a 64GB option, with no 32GB in between. This is a tale as old as iPhones. In fact, when iOS 8 was released two years ago, many 16GB iPhone owners had to choose between offloading some of their apps, photos, and other files to upgrade to the space-hogging new version or hold off. Apple made iOS 9 a smaller, smarter upgrade, with temporary app deletion making the process easier. But apps easily eat up storage space, and Apple has improved its camera with Live Photos and 4K video-recording, both of which create large files. Sure, you can accept reality and choose the 64GB model, but it’s a lot more expensive. A 32GB base would hit the sweet spot and show Apple can change with the times.

Leaked photos show conflicting design tweaks?

iphone_7_plus_rear

The rumor: Forbes reported on leaked photos that allegedly depict the iPhone 7 chassis. First posted on French tech site NowhereElse.fr, the photos suggest that Apple’s forthcoming iPhone with have double speakers on the top and the bottom, created quad array audio experience similar to the iPad Pro. The photos also seem to confirm, yet again, that the iPhone 7 will not have a headphone jack. Lastly, this iPhone 7 chassis has the flash repositioned underneath the camera, instead of right next to it.

But hold on… according to another recent iPhone 7 photo leak picked up by 9to5Mac, the flash will remain where it is on the 6s. So now we have conflicting rumors. Both sets of photos, however, do show that Apple has redesigned the antenna lines. Instead of horizontal lines, the antenna lines on the iPhone 7 will allegedly be traced along the top and bottom edge of the device.

Plausible? These conflicting Apple rumors could mean a few things. Either both leaked photos are fake, one of them is fake, or both of them are real. According to Forbes, Apple is known for creating several different prototypes of its upcoming products to test, so these photos could both be depicting early but different iterations of the iPhone 7. That both of them would leak, however, seems unlikely.

Smart connector?

The rumor: New images and renderings have surfaced allegedly depicting the iPhone 7 and 7 Plus models. Quoting the Japanese site Mac Otakara, MacRumors reported that these images could be the “real thing.” The leaked image of the iPhone 7 Plus shows a Smart Connector, hinting at the possibility of a Smart Keyboard. While the Mac Otakara report seems to confirm previous rumors the iPhone 7 and 7 Plus will have a similar design to the current generation 6s and 6s Plus, the website also contests previous reports. Most notably, Mac Otakara now refutes the rumor that these new iPhones will have a second speaker to create stereo sound.

Plausible? Apple has been releasing a lot of accessories in the last few months, especially for the iPad Pros. It’s possible the company wants to continue this trend and adding Smart accessories to the 7 Plus. However, a Smart Keyboard suggests that the larger iPhone could have some Pro-style features, and we’re not sure if Apple would want to have it compete with the just-released 9.7-inch iPad Pro.

No headphone jack, really?

beatsheadphones.1.medium

The rumor: Here it is: a leaked iPhone 7 case… allegedly!9to5Mac reported the leaked images as first posted on the@OnLeaks Twitter account. The leaks seem to corroborate a few other rumors about the iPhone 7. For example, the case has no slot for a 3.5mm audio jack, signaling that Apple might be pushing for only Bluetooth and Lightning-connected headphones. The case also has two equally sized speaker grills on each side of the Lightning port slot, confirming that the iPhone 7 will be the first to sport two speakers for stereo sound. Other than that, the purported case points to an iPhone 7 hardware design that’s nearly identical to the iPhone 6s.

The no-headphone-jack rumor has been around for a while, previously reported by Fast Company and others. Apple is said to be developing wireless EarPods to be sold separately, alongside the iPhone 7. The premium EarPods will reportedly support Siri and wireless phone calls and ship with a carrying case that doubles as a charger.

Plausible? The larger design of the iPhone 6 and 6s lines have proven very successful for Apple, so we can see why the company would want to play it safe design-wise with the iPhone 7. But this similar design may not offer enough reasons to upgrade as we’ve seen with previous numbered upgrades—and if the major innovation requires a lot of people to ditch their 3.5mm headphones or use an adapter, get ready to hear some major griping.

This is the most controversial iPhone rumor in years, even more than the change of sizes with the iPhone 6. Some people love the idea. Others hate it. There’s even a petition to convince Apple that people still love the headphone jack. That petition has just over 300,000 signatures.

How does the dual-lens camera work?

The rumor: We previously reported on the rumor that Apple is looking to bring a dual-lens camera to forthcoming iOS devices. Based on LinX camera technology that Apple acquired last year, the dual-lens incorporates a wide-angle lens and a telephoto lens. According to MacRumors, a recent Apple patent shows for a a split-screen viewfinder where users can see the full image in the wide-angle lens and zoom in with the telephoto lens. The camera will be able to take two separate pics, or use one of the lenses to shoot video and the other to take stills. More impressively, the camera could also implement LinX’s technology to stitch it all together into one really crisp image.

Plausible? The race for bringing DSLR-quality cameras into smartphones is on. Samsung’s recently-unveiled Galaxy S7 garnered rave reviews for its use of Duo Pixel Technology to take photos. Apple may be feeling the heat to create an equally-stunning photo experience to the iPhone 7. If the dual-lens technology as outlined in this patent comes to fruition, it would help the iPhone regain its reputation as the best camera phone on the market.

How thin will the iPhone 7 be?

iphone-7-thickness

The rumor: Macotakara reported this week that the iPhone 7 will be 6.1mm thick. That’s one whole millimeter thinner than the current iPhone 6s, which measures 7.1mm. This new thinner model will be accompanied by a flush rear camera (so not protruding) for a design that’s sleeker overall.

Plausible? If this rumor is true, Apple seems to be under the impression that thinner is better. Apple has already made a device that measures just 6.1mm: the iPod touch. So it makes sense that the company would want to try to make the newest iPhone be just as thin. Hopefully, the iPhone 7 won’t be affected by any “Bendgate” issues because of this thinner design.

Will the thinner Lightning port mean I have to get new cables?

The rumor: In addition to getting rid of the 3.5mm headphone jack to achieve this new thinness, the iPhone 7 is rumored to integrate a thinner Lightning port. This will not affect the actual Lighting cables, however, so you won’t have to get all new connectors for the iPhone 7. What Apple is doing is simply making the cutout around the port smaller, so it should only affect case-makers, according to 9to5Mac.

Plausible? If Apple is already going insofar as to removing the headphone jack, which has already sparked plenty of controversy, then a slight redesign of the Lightning port doesn’t seem like a big deal. Especially if our current Lightning connectors will still be able to hook up to it.

Camera differences between the 7 and 7 Plus?

iphone-7-plus-dual-camera-1

The iPhone 7 Plus might have the most amazing smartphone camera ever.

The rumor: The iPhone 7 Plus will have a better camera, to the chagrin of small-handed amateur photographers around the world. According to MacRumors, the 7 Plus may have a dual-lens camera with optical zoom, which means this phone will take better photos than many traditional cameras. Instead of pinching to zoom in digitally, which usually results in a terrible grainy photo, the 7 Plus camera will have an optical zoom. That’s where the second camera lens comes in: It’s essentially a zoom lens.

Plausible? Yes. The iPhone 6s and 6s Plus have most of the same features, but the larger phone has a small but key difference: optical image stabilization. That feature uses the Plus’s gyroscope and camera array to steady your photos even if your hand shakes. The 6 and 6s rely on camera software to achieve the same effect, though the resulting images aren’t quite as clear. If the 7 Plus has a dual-lens camera with optical zoom, it would be a huge differentiator—the Plus could become the phone to beat for serious photographers.

Is that unsightly camera lens bulge going away?

The rumor: Apple redesigned the 6 and 6s models to be thinner and lighter than ever before, but there’s one big problem: The rear-facing camera lens juts out of the body, so the phones won’t sit flat on a surface. For a company that’s all about the details, this seemed like a strange design decision. The iPhone 7 is reportedly getting a camera that sits flush against the phone, according to MacRumors, so your eyes won’t be offended any longer.

Plausible? We sure hope so. That camera protrusion had to happen for a reason, but even Apple design chief Jony Ive is not a fan.

Will the iPhone 7 be waterproof?

The rumor: Making the iPhone thinner than ever and adding a DLSR-quality camera aren’t game-changing enough for Apple, apparently, so the company is reportedly working on ways to waterproof the iPhone 7. Ambitious? Yes. Possible? Definitely. Without a headphone jack to trap water, Apple could coat the iPhone with a waterproof coating and make those third-party rugged, waterproof cases obsolete.

Plausible? Actually, yes. Apple took several steps to waterproof the iPhone 6s without actually calling it waterproof, as detailed here, and word on the street from people who have accidentally submerged a 6s indicates that those techniques worked. All Apple needs is some waterproof buttons (which it’s reportedly working on), and they’re set.

Next year’s iPhone

Yes, you read that right. In this craziest of iPhone rumor cycles, we’re been reading rumors for the 2017 iPhone mixed in with rumors of the iPhone that should come out in September of 2016. Just to keep them all straight, here are the things we may have to look forward tonext year.

An OLED screen and glass on both sides

The rumor: Remember the iPhone 4, encased in glass on both sides, so you’d have twice as many surfaces that could shatter every time it slipped out of your hand? Apple might bring back an all-glass design in 2017. Hopefully it’s a bit more durable this time.

KGI Securities analyst Ming-Chi Kuo thinks that Apple is planning a major iPhone redesign for 2017—not this fall. In a note to investors, he predicted an iPhone with a 5.8-inch OLED screen that’s encased in glass on both sides, yet smaller than the current iPhone 6s Plus, meaning Apple would be looking to eliminate as much bezel and “chin” as possible. DisplayMate President Ray Soneira echoed Kuo’s OLED predictions in a recent report, citing the “rapid improvements” in OLED performance over the last six years.

“Apple simply has no choice in switching,” Soneira said, because OLEDs are thinner, lighter, more responsive, and can be curved or bent in ways that LCD displays just can’t.

Kuo also predicted the all-glass 2017 iPhone would have wireless charging, and some kind of biometrics, like face recognition or iris scanning. The Home button takes up a lot of space on the current iPhones, and replacing it with other biometrics for login and Apple Pay (along with deep-touch gestures for exiting apps) could let Apple expand the screen.

Plausible? In Apple’s usual “tick-tock” cycle, the 2016 iPhone would get a redesign, since the current iPhone 6s and 6s Plus are upgrades to the iPhone 6 and 6 Plus designs that launched in 2014. But if Apple really is switching to OLED, that’s a major shift that might need more time to perfect. It’ll be interesting to see what innovations Apple can add in 2016 to make the iPhone seem exciting even if the overall design stays the same—a better camera and a Smart Connector are a start.

More evidence of OLED

The rumor:  According to a recent Bloomberg report, Applied Materials, an Apple supplier, has received almost four times the amount of orders for its display-making machines. This jump is linked to Apple retooling the iPhone manufacturing process to include OLED screens in the fall of 2017.

Plausible? We’ve already bought into the general rumor that Apple would switch to OLED, and this report supports the 2017 timeline—according to Applied Materials, it takes about 3 quarters for their machines to be build, delivered, and installed.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft IIS: Disabling the SSL v3 Protocol

 

Depending on how your Windows servers are configured, you may need to disable SSL v3.

Note that older versions of Internet Explorer may not have the TLS protocol enabled by default. If you disable SSL versions 2.0 and 3.0, the older versions of Internet Explorer will need to enable the TLS protocol before they can connect to your site.

For a Simpler Way to Disable the SSL v3 Protocol:

DigiCert is not responsible for any complications or problems if you decide to use this .zip file to disable the SSL v3 protocol on your server.

  1. Log into your server as a user with Administrator privileges.
  2. Download DisableSSL3.zip, extract the .zip file contents, and then double-click DisableSSL3.reg.
  3. In the Registry Editor caution window, click Yes.
  4. Restart server.

If you prefer to do it yourself, follow the steps in the instruction below.

Microsoft IIS: How to Disable the SSL v3 Protocol

  1. Open the Registry Editor and run it as administrator.For example, in Windows 2012:
    1. On the Start screen type regedit.exe.
    2. Right-click on regedit.exe and click Run as administrator.
  2. In the Registry Editor window, go to:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\
  3. In the navigation tree, right-click on Protocols, and in the pop-up menu, click New > Key.
  4. Name the key, SSL 3.0.
  5. In the navigation tree, right-click on the new SSL 3.0 key that you just created, and in the pop-up menu, click New > Key.
  6. Name the key, Client.
  7. In the navigation tree, right-click on the new SSL 3.0 key again, and in the pop-up menu, click New > Key.
  8. Name the key, Server.
  9. In the navigation tree, under SSL 3.0, right-click on Client, and in the pop-up menu, click New > DWORD (32-bit) Value.
  10. Name the value DisabledByDefault.
  11. In the navigation tree, under SSL 3.0, select Client and then, in the right pane, double-click the DisabledByDefault DWORD value.Windows Registry Key
  12. In the Edit DWORD (32-bit) Value window, in the Value Data box change the value to 1 and then, click OK.
  13. In the navigation tree, under SSL 3.0, right-click on Server, and in the pop-up menu, click New > DWORD (32-bit) Value.
  14. Name the value Enabled.
  15. In the navigation tree, under SSL 3.0, select Server and then, in the right pane, double-click the Enabled DWORD value.
  16. In the Edit DWORD (32-bit) Value window, in the Value Data box leave the value at 0 and then, click OK.
  17. Restart your Windows server.You have successfully disabled the SSL v3 protocol.

For instructions about disabling browser support for the SSL v3 protocol, see Disabling Browser Support for the SSL 3.0.

 

South Jersey’s New Area Code Explained


“A New South Jersey area code is being introduced to the (609) area code region and it will affect dialing procedures”, Julia Marnin, Cherry Hill Courier-Post

The new area code (640) is being introduced to the (609) area code region in South Jersey and it will affect how local residents dial calls.

The new dialing procedures will be in effect on August 18th.

New phone lines will begin to be issued the area code (640) on September 17th.

CALL US NOW!