Back to Top

Tech, Web, Cloud & Cabling Services

Category: Tips & Info

Tips & Info Category

Cyber Security Awareness

As school, socializing, and many aspects of life have moved online this year, it’s more important than ever that you protect your digital devices and steer clear of cybercriminals. Computer security threats are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.

Examples of Online Cybersecurity Threats

Computer Viruses

Probably the most eminent computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. A virus replicates and executes itself, usually doing damage to your computer in the process.

What can you do to avoid computer viruses? Carefully evaluate free software, downloads from peer-to-peer file sharing sites, and emails from unknown senders. These things are critical to avoiding viruses. Most web browsers have security settings which can be configured for top defense against online threats. But, as we’ll say again and again, the single most-effective way of fending off viruses is up-to-date antivirus software and monitoring agent, like we include in our Managed Service Plans.

Spyware Threats

A serious computer security threat, spyware is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information.

While many users won’t want to hear it, reading terms and conditions is a good way to build an understanding of how your activity is tracked online. As always, if a company you do not recognize is advertising for a deal that seems too good to be true, be sure you have an internet security solution in place and click with caution.

Hackers and Predators

People, not computers, create computer security threats and malware. Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change, or destroy information as a form of cyber-terrorism. These online predators can compromise credit card information, lock you out of your data, and steal your identity. As you may have guessed, online security tools with identity theft protection are one of the most effective ways to protect yourself from this brand of cybercriminal.

Phishing

Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages. Phishing attacks are some of the most successful methods for cybercriminals looking to pull off a data breach. Antivirus solutions with identity theft protection can be taught to recognize phishing threats in fractions of a second.

Cyber Safety Tips

  • Keep software systems up to date and use a good anti-virus program.
  • Examine the email address and URLs in all correspondence. Scammers often mimic a legitimate site or email address by using a slight variation in spelling.
  • If an unsolicited text message, email, or phone call asks you to update, check, or verify your account information, do not follow the link provided in the message itself or call the phone numbers provided in the message. Go to the company’s website to log into your account or call the phone number listed on the official website to see if something does in fact need your attention.
  • Do not open any attachments unless you are expecting the file, document, or invoice and have verified the sender’s email address.
  • Scrutinize all electronic requests for a payment or transfer of funds.
  • Be extra suspicious of any message that urges immediate action.
  • Confirm requests for wire transfers or payment in person or over the phone as part of a two-factor authentication process. Do not verify these requests using the phone number listed in the request for payment.

 

If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990.

Teams Vs. Zoom

6 Microsoft Teams features Zoom doesn’t have

One of the major news in March 2016 was that Microsoft was considering bidding $8 billion to purchase Slack. However, Bill Gates and the team decided that instead of buying Slack, they would develop their own chat app tool. Teams is mostly a Slack alternative, but it’s also meant to replace Skype for Business, which up until recently was Microsoft’s corporate video conferencing service. The app’s main functionality is the group chat that comes with plenty of features. Some of these features include editing, deleting, pinning messages, as well as starting a new thread and sharing files. You can even send .gif images, as well as emojis. Possibly due to Skype’s legacy, Teams includes a bunch of video features that Zoom doesn’t. There are real-time captions, built-in meeting notes, and a bizarre feature where you can pretend you’re in the same room as your coworkers!

To be clear: Zoom is a perfectly capable and liked solution. That doesn’t mean other apps are not offering anything interesting, and Microsoft in particular is trying a bunch of new things in the space. Here are a few highlights.

  1. Built-in meeting notes
  2. Persistent chat with rich formatting
  3. Blurred background
  4. Virtual classroom with your coworkers
  5. Live captions
  6. Included with Microsoft subscription

1. Built-in meeting notes

Zoom is a video conferencing app—and that’s about it. What happens if you’re in the middle of an important meeting, but need a way to take some notes? You think you’d have to use Microsoft Word or another program, but did you know that Teams has its own meeting notes feature, too? Microsoft Teams is built around the idea that it will be the all in one tool you use for all collaboration: team chat, video calls, and even internal documentation.

Meeting Notes in Microsoft Teams

Click Meeting notes, and a new tab for meeting minutes will be created in the current channel.

Notes get saved as part of the meeting itself, and can go anywhere with you, and will be saved for later or for sharing with your coworkers.

Meeting notes link in the Teams channel

This is a quick way to ensure there’s a written record of the meeting in a place where everyone can access it, which is very slick.

2. Persistent chat with rich formatting 

Zoom chat is very simple. Microsoft Teams’ chat for meetings, on the other hand, has more formatting features than AIM.

Formatting in Teams' meeting chat

We’re not sure if you have the multitasking skills to format text during a meeting, but it’s there if you want it. And this is just the beginning—there’s a large sticker collection and, for some reason, a meme creator. Imagine how much fun this can make your meetings!

Meme generator in Microsoft Teams

Microsoft Teams also keeps a record of the chat from every meeting and posts all comments in the channel.

Meeting chat record in Microsoft Teams

Have you ever lost track of helpful links and information during a Zoom meeting? With Teams, you can review the comments after the meeting, and any points made there can be found using search alongside the rest of your chats. It’s easy to see why this is useful.

3. Blur your background

Zoom backgrounds are, at this point, an important part of our collective human culture—the ultimate form of self-expression. With this best practice, you can have your meeting almost anywhere, and disguise whatever happens in the background around you. Naturally, Microsoft Teams offers custom backgrounds for meetings.

4. Pretend you’re in the same room as your coworkers

Zoom  has two views that you can switch between. Speaker View and Gallery View: essentially, you can see the person talking right now or see everyone at once. Microsoft Teams adds another: Together Mode. Everyone on the call is shown as though they’re sitting next to each other in some kind of classroom, or sporting event like we’ve seen on TV with the NBA,MLB, NHS and NFL.

Together Mode in Microsoft Teams

This is optional, and turning it on only changes things on your screen. 

Is this useful? No. Will it make you feel slightly less alone during a year in which in-person interaction is rare? No. Is it somewhat amusing? Yes.

5. Live captions

Teams can detect what’s said in a meeting and present real-time captions. And, if you’ve turned on the new meeting experience, your captions will include speaker attribution—so you’ll see not only what’s being said, but who’s saying it. 

Zoom offers a closed captioning feature, but someone has to manually type them out. Microsoft’s system recognizes speech automatically. Live captions can make your meeting more inclusive to participants who are deaf or hard-of-hearing, people with different levels of language proficiency, and participants in loud places by giving them another way to follow along.

6. There’s a good chance you’re already paying for it

Zoom is free, but the free version limits meetings to 40 minutes. Microsoft Teams’ free version has no such restrictions for video meetings.

There’s also a good chance you’re already paying for the full version. Microsoft Teams is included with every version of Microsoft 365 for business. This means that, if your company pays for a Microsoft Office subscription, you already have access to Teams. You should probably give it a chance and consider not paying for Zoom and/or Slack on top of it.

Features

  • Group and private chat.
  • Video calling, audio calling, and screen sharing.
  • Schedule video calling.
  • Thread messaging.
  • Works seamlessly with any other Office app.
  • Up to 250 people per video call.
  • Over 270 integrations.
  • Available in 53 languages.

Best for

  • Microsoft-centric teams.
  • Organizations that want to keep ideas organized and compartmentalized.

If you have any questions, please email us at support@sjtechies.com or call us at (856) 745-9990.

 

Changes to SSL Certificates Industry Wide

SSL Certificate Industry Change

There’s a pretty big change coming for SSL Certificates. And, we think it’s really important to keep you in the loop on these changes.

The biggest change you need to be aware of: if you have an active SSL certificate with an intranet name (e.g.’server1?, ‘mail’, ‘www’, ‘server2.local’, etc.), or a reserved IP address, it’s going to be revoked by October 1, 2016.

Also, on July 1, 2012, customers will no longer be able to purchase, renew, rekey, or manage their SSLs with intranet names or IP addresses that expire past November 1, 2015.

This is an industry-wide decision, not one specific to our company.

For more information on the Certification Authorities Browser Forum guidelines, go here.

For more information on which IPv4 Addresses are reserved, go here. We do not support any certificates using IPv6.

Our highly trained, courteous support staff is waiting to take your call. Whatever time it takes to assist you, that’s the time you’ll receive. We’ll resolve any issue to your complete satisfaction.

Call (888) 505-1532 to get started now

Is Your Organization Using SHA-1 SSL Certificates? If so here’s what you need to know and do:

ssl

 

Following a recommendation by the National Institute of Standards and Technology (NIST), Microsoft will block Windows from accepting SSL certificates encrypted with the Secure Hash Algorithm-1 (SHA-1) algorithm after 2016. Given the number of mission-critical SSL certificates that are allowed to expire from inattention, administrators have their work cut out for them. By knowing what will happen, why it’s happening, and what you need to do, you won’t be surprised by these important policy changes.

What’s Happening?

On November 12, 2013, Microsoft announced that it’s deprecating the use of the SHA-1 algorithm in SSL and code signing certificates. The Windows PKI blog post “SHA1 Deprecation Policy” states that Windows will stop accepting SHA-1 end-entity certificates by January 1, 2017, and will stop accepting SHA-1 code signing certificates without timestamps after January 1, 2016. This policy officially applies to Windows Vista and later, and Windows Server 2008 and later, but it will also affect Windows XP and Windows Server 2003.

SHA-1 is currently the most widely used digest algorithm. In total, more than 98 percent of all SSL certificates in use on the Web are still using the SHA-1 algorithm and more than 92 percent of the certificates issued in the past year were issued using SHA-1.

Website operators should be aware that Google Chrome has started warning end users when they connect to a secure website using SSL certificates encrypted with the SHA-1 algorithm. Beginning in November 2014 with Chrome 39, end users will see visual indicators in the HTTP Secure (HTTPS) address bar when the site to which they’re connecting doesn’t meet the SHA-2 requirement. Figure 1 shows those indicators.

 

Figure 1: Visual Indicators in the HTTPS Address Bar

 

Google is doing this to raise end users’ awareness and to help guide other members of the Internet community to replace their SHA-1 certificates with SHA-2 certificates.

Why Is Microsoft Deprecating SHA-1?

SHA-1 has been in use among Certificate Authorities (CAs) since the U.S. National Security Agency (NSA) and NIST first published the specification in 1995. In January 2011, NIST released Special Publication 800-131A, “Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths.” This publication noted that SHA-1 shouldn’t be trusted past January 2016 because of the increasing practicality that a well-funded attacker or government could find a SHA-1 hash collision, allowing them to impersonate any SSL website.

Realizing that it’s highly unlikely that CAs and the industry at large will adopt more powerful encryption algorithms on their own, Microsoft is leading the charge by making Windows reject certificates using SHA-1 after January 1, 2017. Doing this will lead website operators to upgrade to stronger SHA-2 certificates for the betterment of all Windows users and the broader public key infrastructure (PKI) community. The Windows PKI blog post “SHA1 Deprecation Policy” noted that, “The quicker we can make such a transition, the fewer SHA-1 certificates there will be when collisions attacks occur and the sooner we can disable SHA1 certificates.”

In the end, the issue isn’t if SHA-1 encryption will be cracked but rather when it will be cracked.

What Do I Need to Do?

January 1, 2017, might seem like a long way away, but now is the time to understand the problem and how to mitigate it.

As per Microsoft’s SHA-1 deprecation policy, Windows users don’t need to do anything in response to this new technical requirement. XP Service Pack 3 (SP3) and later versions support SHA-2 SSL certificates. Server 2003 SP2 and later versions add SHA-2 functionality to SSL certificates by applying hotfixes (KB968730 and KB938397).

Web administrators must request new certificates to replace SHA-1 SSL and code-signing certificates that expire after January 1, 2017. As of this writing, that would probably affect only public SHA-1 certificates that were purchased with a long expiration date (three years or more) or long-duration certificates issued by internal SHA-1 CAs. Most third-party CAs will rekey their certificates for free, so you simply need to contact the CA to request a rekeyed certificate that uses the SHA-2 algorithm.

When ordering new SSL certificates, you should confirm with the CA that they’re being issued with the SHA-2 algorithm. New certificates with expiration dates after January 1, 2017, can only use SHA-2. Code-signing certificates with expiration dates after December 31, 2015, must also use SHA-2.

Note that the algorithm used in SHA-2 certificates is actually encoded to use SHA-256, SHA-384, or SHA-512. All of these are SHA-2 algorithms; the SHA number (e.g., 256) specifies the number of bits in the hash. The larger the hash, the more secure the certificate but possibly with less compatibility.

It’s important that the certificate chain be encrypted with SHA-2 certificates. (A certificate chain consists of all the certificates needed to certify the end certificate.) This means that any intermediate certificates must also use SHA-2 after January 1, 2017. Typically, your CA will provide the intermediate and root CA certificates when they provide the SHA-2 certificate. Sometimes they provide a link for you to download the certificate chain. It’s important that you update this chain with SHA-2 certificates. Otherwise, Windows might not trust your new SHA-2 certificate.

Root certificates are a different story. These can actually be SHA-1 certificates because Windows implicitly trusts these certificates since the OS trusts the root certificate public key directly. A root certificate is self-signed and isn’t signed by another entity that has been given authority.

For the same reason, any self-signed certificate can use the SHA-1 algorithm. For example, Microsoft Exchange Server generates self-signed SHA-1 certificates during installation. These certificates are exempt from the new SHA-2 policy since they aren’t chained to a CA. I expect, however, that future releases of Exchange will use SHA-2 in self-signed certificates.

What About My Enterprise CAs?

If your organization has its own internal CA PKI, you’ll want to ensure that it’s generating SHA-2 certificates. How this is done depends on whether the CA is running Windows Server 2008 R2 or later and if your CA has subordinate CAs.

If you have a Server 2008 R2 or later single-root CA without subordinates, you should update the CA to use SHA-2. Doing so will ensure that subsequent certificates generated will use the SHA-2 algorithm. To check which hash algorithm is being used, you can right-click the CA and go to the General tab. If SHA-1 is listed, you can run the following certutil command to configure the CA to use the SHA-256 algorithm:

certutil -setreg ca\csp\CNGHashAlgorithm SHA256

You must restart the CertSvc service to apply the change. Now when you view the CA properties, you’ll see that the hash algorithm is SHA-256. All future certificates issued by this CA will use SHA-256, but keep in mind that existing certificates will still be using SHA-1. You need to renew any SHA-1 certificates issued by this CA to upgrade them to SHA-2 certificates.

If your CA is older than Server 2008 R2, you can’t upgrade the CA to use SHA-2. You’ll need to rebuild it with a newer version.

If your organization’s internal CA is multi-tiered with one or more subordinate CAs, you’ll need to reconfigure them to use SHA-2. This is done using the same certutil command just given on each subordinate or issuing CA. Keep in mind that if you use subordinate CAs, you’re not required to update the root CA to SHA-2 since that certificate is at the top of the certificate chain, but it won’t cause any problems if you do. You still need to renew any SHA-1 certificates issued by the subordinate CAs to upgrade them to SHA-2 certificates.

Take Action Now

Administrators and website operators should identify all the SSL certificates used in their organizations and take action, as follows:

  • SHA-1 SSL certificates expiring before January 1, 2017, will need to be replaced with a SHA-2 equivalent certificate.
  • SHA-1 SSL certificates expiring after January 1, 2017, should be replaced with a SHA-2 certificate at the earliest convenience.
  • Any SHA-2 certificate chained to an SHA-1 intermediate certificate should be replaced with another one chained to an SHA-2 intermediate certificate.

The following tools and websites are useful for testing and for further information about SHA-1 remediation:

  • Microsoft Security Advisory 2880823. This website discusses the deprecation policy for the SHA-1 hashing algorithm for the Microsoft Root Certificate Program.
  • Migrating a Certification Authority Key from a Cryptographic Service Provider (CSP) to a Key Storage Provider (KSP). The section “How to migrate a CA from a CSP to a KSP and optionally, from SHA-1 to SHA-2” in this TechNet web page provides detailed instructions for upgrading a CA to use SHA-2.
  • Gradually sunsetting SHA-1.” This Google Online Security Blog post explains how the transition to SHA-2 affects Chrome and details Google’s rollout schedule.
  • SHA-256 Compatibility. This GlobalSign web page lists OS, browser, server, and signing support for SHA-256 certificates.
  • DigiCert SHA-1 Sunset Tool. This free web application tests public websites for SHA-1 certificates that expire after January 1, 2016.
  • DigiCert Certificate Inspector. This tool discovers and analyzes all certificates in an enterprise. It’s free, even if you don’t have a DigiCert account.
  • Qualys SSL Labs’ SSL Server Test. This free online service analyzes the configuration of any SSL web server on the public Internet.

Prepare for removal of PPTP VPN before you upgrade to iOS 10 and macOS Sierra

Prepare for removal of PPTP VPN before you upgrade to iOS 10 and macOS Sierra

apple-beta-ios10-macossierra

System administrators preparing for iOS 10 and macOS Sierra should stop using PPTP connections for VPN. Learn about alternatives you can use to protect your data.

If you’ve set up a PPTP VPN server, iOS 10 and macOS Sierra users won’t be able to connect to it. iOS 10 and macOS Sierra will remove PPTP connections from any VPN profile when a user upgrades their device.

Even though PPTP protocol is still available on iOS 9 and earlier or OS X El Capitan and earlier, we don’t recommend that you use it for secure, private communication.

Alternatives to PPTP connections for VPN

Try one of these other VPN protocols for user-based authentication that are more secure:

  • L2TP/IPSec
  • IKEv2/IPSec
  • Cisco IPSec
  • SSL VPN clients on the App Store such as those from AirWatch, Aruba, Check Point, Cisco, F5 Networks, MobileIron, NetMotion, Open VPN, Palo Alto Networks, Pulse Secure, and SonicWall

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT ServicesWebsite Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

When will the cloud burst?

Cloud Burst

The ‘Cloud’ has been at the horizon for quite some time and is now slowly moving to the center stage. A lot has been written about this topic and spoken of at numerous meetings and seminars for long. Both business magazines and IT journals have carried stories on this subject and some have even put them on the cover page. Such is the importance that ‘cloud computing’ enjoys.

 

The Cloudy Outlook

CIOs have often been accused of ignorance or for resisting application of this new technological phenomenon. CIOs perhaps are not the only ones to blame, as technology vendors, service providers, and the media, all have played a part and have done their bit, to create confusion. The hype that surrounds this subject is phenomenal and perhaps equals or exceeds the buzz created on new technologies in the past. Articles in business magazines, discussions on television and direct mailers to senior corporate honchos touted ‘cloud’ as the single most important thing to happen and as a harbinger for all ills. Speakers were eloquent about the transformation that ‘cloud’ could bring to the enterprises.

To View Full Article Click Here

Google Fiber Offering Super Fast Internet

Google Fiber Offering Super Fast Internet for $70 Per Month

Google officially became a service provider with the launch of Google Fiber, which will provide 1 gigabit Internet access and TV service.

“Google Fiber is 100 times faster than today’s average broadband. No more buffering. No more loading. No more waiting. Gigabit speeds will get rid of these pesky, archaic problems and open up new opportunities for the Web,” Google said in a blog post.

Initially, Google Fiber will only be available in Kansas City – Kansas and Missouri – and will only roll out after enough people in a given neighborhood sign up for the service.

Google today encouraged residents in the region to pre-register and get their neighbors to sign on, too. Pre-registration is $10 and is open until Sept. 9, at which point Google will see how many people have signed up and decide where Google Fiber will roll out. Neighborhoods need between 5-25 percent of homes to sign up for internet access in order for it to be cost effective, Google said.

Google is offering three service packages.

The Web-only Gigabit Internet plan is $70 per month and includes a network box with advanced Wi-Fi and 1TB of cloud storage. The selection includes a one-year service agreement, though you can waive that by paying the $300 installation fee.

With Gigabit + Google Fiber TV, Google promised hundreds of channels and on-demand shows, as well as 2TB of DVR storage and eight tuners. Subscribers will get a new Nexus 7 tablet, which will serve as a remote control. The package will cost $120 per month and include a two-year contract unless you pay the $300 construction fee.

A list of available TV channels is on the Google Fiber website and they include Viacom channels like MTV, BET, Nickelodeon, and Comedy Central. Missing at this point are Disney-owned channels like ESPN, the Disney Channel, and ABC Family, so Google has likely not secured a deal with Disney just yet. Premium channels like Showtime and Starz are on the list, but HBO and Cinemax are not.

“This channel lineup is only a representative lineup and is subject to change,” Google said in the fine print.

Google is also offering free Internet access to those who pay the $300 construction fee. Subscribers will get 5 Mbps Internet access at no monthly cost, though they can spread the $300 fee out over 12 months. Google promised that the free Internet option will be available for at least seven years.

None of the plans include data caps, Google said.

What if you have a service issue? Google said its customer support line will be open from 8 a.m. to 11 p.m. CST on weekdays and from 9 a.m. to 5 p.m. on weekends. The company also has a “Fiber Space” in Kansas City, MO. where customers can speak with a Google Fiber team member, but it’s unclear if Google Fiber technicians would be on call like other U.S. cable providers.

Google expects to have fiber connections built to the top 50 percent of “fiberhoods” by mid-2013. After Sept. 9, the company will publish a calendar with an estimated construction order.

Google first announced that it would develop ultra high-speed broadband networks back in Feb. 2010. At the time, it promised fiber-to-the-home (FTTH) connections that are “100 times faster than what most Americans have access to today.” By March 2011, Google selected Kansas City for its first network, and earlier this year there were rumors that the search giant would also be offering TV service.

In a statement, FCC chairman Julius Genachowski championed Google Fiber. “Abundance in broadband speeds and capacity – moving from megabits to gigabits – will unleash breakthrough innovations in healthcare, education, business services, and more,” he said. “Today’s announcement by Google, the Gig.U projects across the country, and similar continued advances by providers and municipalities are important and welcome developments that are pushing frontiers in speed and bandwidth, while also enhancing consumer choice.”

To View Full Article Click Here

Microsoft’s new Surface Laptops unveiled

Microsoft’s most direct shot at the MacBook yet

This slideshow requires JavaScript.

The one Surface product that fans have been clamoring over for years, a straight up Surface Laptop, is finally here. But, in taking design cues from both the Surface Pro and Surface Book lines, Microsoft has set lofty expectations for its first dedicated laptop device.

Priced at $999 (about £770, AU$1,330), the Surface Laptop clearly aims to chip at the MacBook and MacBook Air models that dominate college campuses practically worldwide. In fact, Microsoft claims that its cheaper (and larger) Surface Laptop can last far longer on a charge than Apple’s 12-inch MacBook: 14.5 hours.

However, every Surface Laptop shipped will come with Windows 10 S installed, Microsoft’s new version of Windows 10 that only accepts app installs downloaded from the Windows Store.

With the ability to switch from Windows 10 S to the 100% open Windows 10 Pro for $49 if you miss the chance in 2017 for free, should you need an app outside of the Windows Store that badly (spoiler: you probably will).

Regardless, at that price, can Microsoft garner enough interest from college students (or more likely their parents), who are often already strapped from the cost of an education?

The Surface Laptop in traditional ‘Platinum’

Design

Clearly, part of Microsoft’s plan is to lure those folks in with an incredibly gorgeous, and potentially trendsetting, design. The 13.5-inch Surface Laptop may very well be Microsoft’s most attractive computing product yet.

And, with four colors to choose from – Burgundy, Platinum, Cobalt Blue and Graphite Gold – there’s bound to be one that appeals to you.

A full aluminum lid and base wrap the laptop in much the same way it does a Surface Book, but ditches the aluminum in the keyboard deck for a Alcantara fabric that surrounds every plastic key and meets with the aluminum base in a seemingly airtight seal.

The fabric, according to Microsoft, is imported from Italy and laser cut to fit every Surface Laptop. Now, while many of the design elements are the same, the 13.5-inch (2,256 x 1,504) PixelSense touch display, the smooth glass-coated Precision touchpad, the chrome logo centered on the aluminum lid, we’re told that very few parts from previous parts are found within the Surface Laptop.

That much is obvious in the nature of the felt used for this keyboard deck compared against that which the Type Covers from Microsoft utilize. It’s smoother and more plush than those Type Covers, and we’re told it’s spill resistant.

The Surface Laptop’s keyboard deck is awfully comfortable

Plus, the additional height afforded by this traditional laptop design allowed Microsoft to equip the keyboard with 1.5mm of travel, and the difference in typing between that and the Surface Pro 4 is night and day. Finally, Microsoft devised a speaker system beneath the keyboard that radiates sound through the spaces between the keys and the keyboard deck.

The result isn’t much better audio than you’d find in a MacBook Air, perhaps a bit fuller, but at least it’s consistently in an uninterrupted position. Naturally, the audio gets a bit muffled when typing, but since the sound radiates throughout the laptop base, there isn’t a major loss in audio detail.

That leaves the side of the laptop base to house Microsoft’s proprietary power and docking port found on other Surface devices, as well as a USB 3.0 and Mini DisplayPort, not to mention an audio jack. If you’re already asking, “where’s the USB-C,” we’ve already been there.

Microsoft tells us that it intends for its own port to handle concerns of connectivity expansion via the Surface Connect port and its Surface Dock, while refraining from alienating customers that have yet to completely update to USB-C.

A fine explanation, but that doesn’t tell us why USB 3.0 and not USB 3.1 at least, as you’re missing out on some major data transfer speed improvements there.

Those strange strips of plastic on the base? They’re Wi-Fi antennae

Performance and battery life

Microsoft can pack the Surface Laptop with the latest Intel Core i5 or Core i7 processors (Kaby Lake), up to 512GB of PCIe solid-state storage (SSD) and as much as 16GB of RAM.

That’s a mighty powerful laptop on paper, likely stronger than either the MacBook Air or 12-inch MacBook, while rising above even the latest 13-inch MacBook Pro that still utilizes Skylake processors.

(The $999 model comes packing a 128GB SSD and 4GB of RAM with the Intel Core i5.)

As for how Microsoft fit that kind of power a laptop just 0.57 inches (14.48mm) thin, a brand new, proprietary vapor chamber cooling system helps a whole lot. The system changes the physical state of the heat as it’s taken in through the center of a fan vent in the rear of the laptop base and spits it out of the sides of that same vent.

While we obviously weren’t able to stress-test the Surface Laptop, we were able to test out how it feels to use. For starters, at just 2.76 pounds (1.25kg), this thing is super light, which is all the more impressive considering it’s a 13.5-inch, Gorilla Glass 3 touchscreen you’re looking at.

Note the Surface Connect dock port – Microsoft’s answer to USB-C

Microsoft chalks this up to, in part, the thinnest LCD touch module ever used in a laptop design. This, in turn, helps the lid to lift with just one finger. However, perhaps the hinge design needs refinement.

While you can open the display with just a finger, that slightness in the hinge is felt when the screen bounces with every tap of the touchscreen. It’s the very reason we question the inclusion of touchscreens in traditional laptops to begin with. Unfortunately, it seems Microsoft hasn’t found a better solution here.

That said, typing on the keyboard is the best time we’ve had doing such on a Surface product yet, and the portability of the whole thing is right there with Apple’s best.

As for battery life, Microsoft is, again, claiming 14.5 hours on a single charge. Microsoft later clarified for us that this number was achieved via local video playback with all radios but Wi-Fi disabled.

That testing environment sounds very similar to how TechRadar tests for battery life, so we might see battery life results in a full review fall much closer to this claim. If so, then Surface Laptop will be very tough to beat in longevity and be a potentially major driver for sales.

This is the Surface Laptop in Cobalt Blue

Early verdict

The fact that the Surface Laptop ships with a limited – sorry, “streamlined” – operating system and costs more than some previous Surface systems that come with full fat Windows 10 cannot go unnoticed – regardless of the free upgrade through this year. Unless Microsoft changes its tune come 2018, folks buying one of these with holiday gift money at the turn of the year would be wise to tack 50 bucks on top of whichever configuration they choose to get Windows 10 Pro.

While this switch will be free for any Surface Laptops bought in the education sector, that won’t help the Surface Laptop’s target audience come 2018: late high school and college students.

That said, the Surface Laptop’s incredible, potentially trendsetting design cannot go unnoticed either. Frankly, this is a laptop that appears to outclass the MacBook Air and 12-inch MacBook – and possibly even the 13-inch MacBook Pro – for hundreds less.

Save for a questionable platform versus pricing decision, the Surface Laptop has all the makings of yet another winning piece of hardware from Microsoft.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows Tip of the week: How to turn hibernation on and off

How to turn hibernation on and off:

When your PC goes to sleep, it enters a low-power state, ready to spring back into action when Windows detects a tap on the keyboard or determines that it’s time to run a scheduled task. If you’re planning to be away from the PC for a while, you might prefer to save the current state so that you can restore it quickly, without the chance that the computer will wake up on its own.

There’s an option that lets you save the contents of memory to a hibernation file and then shuts down the PC, so it uses no power at all. When you restart, Windows restores the system state from the hibernation file.

To enable or disable hibernation, open a Command Prompt window and enter the powercfg command with the -h switch. Type powercfg -h on to enable hibernation; substitute the word off to disable it.

Normally, the Hibernate option is hidden from the Shutdown menu. To make it visible, open Power Options in Control Panel and then click Choose What The Power Buttons Do. Under the Shutdown Settings heading, select the Hibernate checkbox to display it in the Power menu.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Windows Tip of the week: How to wipe a disk clean

 

 

Wipe a disk clean:

If you’re planning to dispose of a PC by giving it away, selling it, or discarding it, your top priority should be making sure that no personal information is left on the device. The same is true if you’re recycling a hard disk drive or USB flash drive.

The first step with a PC is to reinstall Windows, using the option to delete the existing partitions on the device and then do a clean install. For a secondary disk, you can use the Format command to erase any existing content. But that still leaves the possibility that some data will still be available in the erased space, where a determined spy could recover it using a disk utility.

The solution? Encrypt the disk before formatting it. Without a recovery key, any recovered data will be unreadable. The easiest way to accomplish this on the system drive is to open an elevated command prompt and run the following command:

cipher /w:c:

If you’re working with a secondary disk, substitute the drive letter for that drive.

The /w switch stands for wipe, and the result is the effective obliteration of every bit of data in unused disk space, leaving existing files untouched.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

CALL US NOW!