About Chris Wanamaker

This author has not yet filled in any details.
So far Chris Wanamaker has created 363 blog entries.

Ways virtual reality saves businesses time and money

Virtual reality (VR), the technology that immerses users in digitally created simulated experiences, is experiencing a surge in growth. There are now many more uses of VR than first realized. These include applications in academic research, engineering, design, the arts, and entertainment. It is also helping businesses save time and money. Find out how.

Create your own VR prototypes

With the help of VR, you’ll no longer have to rely on manufacturing when you want to see what your product physically looks like and how it might work. These virtual products allow you to make any changes before production. Model creation in VR, for example, can save company resources, as these virtual prototypes allow manufacturers to examine a product and make changes without the time and money of building a physical model.

VR for engineers

As with manufacturing, VR is also time- and cost-efficient for engineers, architects, and other professionals who work with building large structures. It replaces traditional approaches, such as rendering small […]

Ways virtual reality saves businesses time and money2020-01-27T08:00:10-07:00

How phishers harvest Office 365 credentials

With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected.

A phishing scam that harvests users’ credentials

The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials. Scammers use this previously unseen tactic by launching a phishing message to users, asking them to click on an embedded link. What makes this scam more insidious than traditional phishing scams is that the URL within the message links to a real Microsoft login page.

How does it work?

The phishing message resembles a legitimate SharePoint and OneDrive file-share that prompts users to click on it. Once they do, they are taken to an Office 365 login page where they will be asked to log in if they haven’t already.

After they’ve logged in, they’ll be prompted to grant permission to an app called “0365 Access.” Users who grant permission effectively give the app […]

How phishers harvest Office 365 credentials2020-01-23T08:44:48-07:00

What you need to know about Android accessories

Did you know that you can connect a mouse to your Android tablet and use it as you normally would on a desktop computer? A mouse is just one of the many accessories supported by many types of Android devices. Depending on which accessory you use, you can make your device easier or much more fun to use.

USB keyboards, mice, and gamepads

Android phones and tablets don’t usually have standard, full-size USB ports, so you can’t plug a USB accessory directly into it. To connect such an accessory to the device, you’ll need a USB on-the-go (OTG) cable. This is a micro-USB adapter that you can purchase from any computer store for a couple of dollars.

From there, your accessories should work without needing any further configuration. In fact, USB OTG allows you to use other USB devices, such as a flash drive, with your Android device.

Keep in mind that not every Android device has the port that’s required to support USB OTG. This is the case with some […]

What you need to know about Android accessories2020-01-23T09:10:10-07:00

Helpful Mac keyboard shortcuts you should be using

Pointing and clicking with a mouse is great. There are times, however, where using the mouse to perform simple tasks interrupts productivity and slows you down. Try these helpful Mac keyboard shortcuts to help you work more efficiently.

Minimizing (or “Docking”) the front app window: Command + M

Use this combination when you have several apps, browsers, or Finder windows open and want to minimize the active one. To minimize all open windows at once, press Option + Command + M.

Closing an active window: Command + W

This shortcut lets you close active apps or programs like browsers, Finder, Thesaurus, or any app that allows multiple tabs to be open simultaneously. To close all tabs without quitting the program entirely, press Option + Command + W.

Quitting a program: Command + Q

Clicking the red X button in most Mac apps and programs, like Mail, only puts them in the dock. This shortcut lets you fully quit an application.

Force quitting a program: Option + Command + Escape

If an app becomes unresponsive, you […]

Helpful Mac keyboard shortcuts you should be using2020-01-23T09:10:02-07:00

Guest Wi-Fi 101

People today expect Wi-Fi access when they’re visiting your office. However, setting up your Wi-Fi the wrong way can create a stressful experience for them. Additionally, this can also expose your confidential information to malicious hackers. So what’s the right way to do it?

Never give guests access to your primary Wi-Fi

Giving your guests access to your company’s main Wi-Fi connection might seem like a good idea, but you should avoid this at all costs.

Anyone with a little technical know-how can potentially access everything on your company network, including confidential data. In addition, if any of your visitors’ mobile devices have been compromised, it’s possible that they can transmit malware to your entire network.

Ways to create secondary Wi-Fi for guests

If your router comes with built-in guest Wi-Fi support (you can check this feature through a quick web search), you can use it to create a separate “virtual” network. This means guests will have access to the internet without directly connecting to your company’s primary network.

If your router doesn’t […]

Guest Wi-Fi 1012020-01-23T09:09:54-07:00

Unified communications defined

Communications is an integral business component that no enterprise can survive without. At the forefront of modern business communications is the all-in-one, internet-powered communications solution: unified communications.

What is unified communications?

Unified communications (UC) allows you to manage all your communications as one piece of architecture rather than as several different components patched together. It integrates computer-related communication technologies like instant messaging and video conferencing with Voice over Internet Protocol (VoIP), which allows you to make and receive calls using the internet.

What can be integrated?

Just about every medium of communication can be integrated. This includes voice communication in all its forms — voicemail, email, or fax — as well as multimedia services like video chat and web conferencing. Real-time communication like call screening and call conferencing can also be integrated. On top of these, even data services and transactions like eCommerce and online banking can be added to a UC system.

What are the benefits of UC to small businesses?

One of the most evident benefits is having a single and […]

Unified communications defined2020-01-23T09:18:15-07:00

Increase productivity with Office 365 and Surface

Microsoft recently showcased Surface, a line of touchscreen-based laptops and tablets that run on the latest version of Windows. These gadgets boast compact builds, sharp displays, and other top-of-the-line specifications. And the best part is, all of these devices can integrate seamlessly with Office 365 to help you achieve optimum productivity. Here’s what you can expect.

Audio transcription in Word

This new feature allows audio files to be uploaded into Word, which will then be broken down and transcribed on a side panel using Azure Speech Technology. If you want, you can also record directly on Word using the Dictate function. The app will automatically transcribe it. To review the accuracy of the transcription, simply select a piece of the transcribed text and the audio version of that part will be played back.

This technology will be available in Word for web in early 2020, and can be enjoyed on desktop and mobile in the spring. This feature isn’t free, but researchers, students, and professionals will find that this feature is […]

Increase productivity with Office 365 and Surface2020-01-10T08:00:05-07:00

An essential checklist for WordPress users

Wake up. Take a shower. Get dressed. These are just some of the numerous tasks we do every single day. They may not be fun, but they are essential to our daily routine. Managing a website is very much the same. By going through certain necessary steps, you can ensure the speed and security of your WordPress website. The best part? They don’t take long to complete!

Make backups

It’s crucial to perform a daily off-site backup of your WordPress files and database. This ensures data security in the event of a network breach or natural disaster, and it will facilitate the resumption of your business’s regular operations. Although plugins like BackUpWordPress and hosting servers like SiteGround automate the backup process, manual backups are still necessary.

Verify backups

Not only should you be making backups, but you should also be verifying them. By doing so, you are making sure that the backed up files are going where they are supposed to, and backups are being updated. The last thing […]

An essential checklist for WordPress users2020-01-23T09:18:07-07:00

Identity and access management 101

Whether it be cloud, mobile, or on-premises, every technology you use stores confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyberthreats like identity theft, phishing attacks, and more? Identity and access management (IAM) is the answer, and here’s why.

What is IAM?

Identity and access management is a system that secures, stores, and manages user identities and access privileges. It ensures that users are who they say they are and will grant access to applications and resources only if they have permission to use them. System administrators can make it so that employees can only access apps and data they need for work.

Other solutions that go into identity and access management include single sign-on (SSO) and multifactor authentication (MFA). The former allows users to securely log in to multiple applications that they are authorized to access. Meanwhile, MFA sets an additional method of user verification other than passwords. This includes […]

Identity and access management 1012020-01-23T09:17:53-07:00