used with permission from Microsoft for Work Windows 10 is the productivity software that individuals and corporations have been asking for. It has been built collaboratively with customers, and embraces its history while learning from the past to create something...
SpireTech Company News and Tips
Avoid Hackers, Spammers, and Identify Thieves With 5 Simple Tips
used with permission from Microsoft at Work Whether at work, home, or mobile, keeping your computer and other devices secure is important. There are any number of threats to security on the web, but keeping your personal and work data safe is relatively easy. It may...
Embarrassing watches nobody wears anymore
In honor of the recent release of the Apple watch, I thought I'd take a look back at the electronic stuff I've worn on my wrist over the years. I'm embarrassed by most of this now, but I can laugh at myself - so here goes: Timex LED watch. Mine was black plastic of...
I’ve seen the future and it is 4k
A.K.A. how I weaned myself off my iPad for good. 4k Viewsonic monitor connected to Surface Pro 3 So recently I upgraded my old boat-anchor notebook for something small and light, eg a Surface Pro 3. Unlike my old laptop, which had a 21" screen (yes) and matching...
Methods for Searching Your Email in Outlook 2013
Do you have thousands of emails stored in your Outlook account? Do you sometimes need to find the one email from five months ago that mentions the access key for a software program you didn't think anyone was still using? We all have times when we need to dig through...
Malware 101: What Is Malware?
used with permission from Norton by Symantecby Nadia Kovacs Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal...
Planning for Windows Server 2003/R2 End of Support
used with permission from Microsoft On July 14, 2015, Microsoft will end support for Windows Server 2003 and Windows Server 2003 R2. Organizations that fail to migrate from Windows Server 2003/R2 before this date will be out of compliance with certain existing...
The Importance of Two-Factor Authentication
used with permission from Norton by SymantecNadia Kovacs The significance of employing secure passwords is more important than ever. Hackers are hungry for passwords, as they have substantial monetary value. Stories are constantly developing in the media about high...
Are You Feeling Disconnected?
used with permission from HP Technology at Work These days, a notebook without an internet connection is like a bicycle without pedals. You can still use it, but you won’t get very far. That’s why it’s all the more frustrating when you lose your wireless internet...
6 Golden Rules for Building Your Business with Social Media
used with permission from SBA.govby Caron Beesley Is your small business on social media? Is it working for you? Tried it but not convinced? Social media is the top online activity in the U.S., according to Marketing TechBlog it also has a huge influence on consumer...