Blog
Social Media Use Can Create Cybersecurity Risks for Your Company
Social media use by your employees may seem fairly harmless — a distraction,...
Edge Computing Pushes Forward
“Edge computing” is the latest subject of hype in the business and tech...
PowerPoint Charting – Webinar
Creating graphic displays from spreadsheet data is the most engaging way to...
EXCEL DATA TOOLS: DATA VALIDATION & DATA TABLES – WEBINAR
Data validation enables you to create drop-down lists for entering data in...
Defending Against Ransomware Attacks Like WannaCry
The aptly named “WannaCry” ransomware cryptoworm has been wreaking havoc on...
Rise of the Robot Workers — How Will Automation Affect the Economy?
When writer David Pogue attended this year’s automate conference in Chicago,...
Four Pet Care Apps That Offer Services Direct From Your Smartphone
One of the few drawbacks of owning a furry companion is having to leave them...
Study Reveals Just How Vulnerable Fingerprint Security Is to Hacking
With just one touch of your finger, you could unlock your phone and access all...
Beware: New Microsoft Office Vulnerability Installs Malware Through a Fake Word Doc File
Microsoft and McAfee have sent out an all-points-bulletin on a Microsoft...
Keeping Your Electronics Updated Keeps Them Safe
If you’re like many people, then you probably ignore the update notifications...
Word Document Sections: What are they? Do you need them? How do they work?
Sometimes, in creating a Word document, you may come across situations in...
Is it Possible to End Traffic?
One of the hottest topics among car enthusiasts is the possibility of...