Click and DragIf you have your files placed in one location, like on your desktop, you can click and drag your mouse to create an boxed area of effect. Any files within this box can be moved through a simple click and drag function. Select the files you want to move, then drag any one of them to the location to move all that are selected. Select the CheckboxesIn Windows 10, you have little checkboxes that you can click to select the individual file. If you have several files that you need to move you can click the checkboxes for all of them, then move just one to move them all. This can save you considerable time and effort. The Click-ShiftYou can select files that are horizontal and adjacent to each other by using the Click-Shift method. Basically, you select the file that you want to move, and then hold down the Shift key while selecting the last one you want to move. Anything in between will be selected. All you have to do is click and drag the files to their new location. Hold CtrlWhen you hold down the Ctrl key, you can click on files that you want to move. Once they?re selected, all you have to do is move them to the appropriate folder. Select All FilesIf you decide that your desktop is much too cluttered, and you need to move everything on it to a new location, the same Select All keyboard shortcut that works in most word processors can be used to select all of your files at once. Just hit Ctrl+A to select all files in your current window, or desktop. Just click and drag them, and you?re all set. Just remember that some of these keyboard shortcuts also work with Mac OS X. All you have to do is substitute the Ctrl key for the Command key, and they should work in generally the same way. Fun Fact: You know how Windows is bundled with Solitaire? No, we aren?t assuming that you are playing it at work. Microsoft decided to bundle their OS with Solitaire as a way to get users more accustomed to dragging and double clicking objects with their mouse. For more great tips and tricks, subscribe to White Mountain IT Services?s blog.
The term ?meme? was originally coined by a British evolutionary biologist, Richard Dawkins, in his 1976 book The Selfish Gene. Its official definition is ?an idea, behavior, or style that spreads from person to person within a culture.? Dawkins initially used it to discuss the way that ideas and values are adopted by people within a society, but an Internet meme is somewhat different from the scientific approach (though the definition certainly suits the way a meme spreads around the Internet). While the evolutionary idea of a meme is based on sporadic and seemingly random change, an Internet meme defies this principle, often as the result of a ?hijacking? of the original intended purpose of the image or video that is the subject of the meme. To put it in simpler terms, think of it this way. Internet memes often take the form of popular images that were originally used somewhere else, like in popular culture, TV shows, etc. For example, the ?Futurama Fry? meme takes a silly image of the show?s protagonist in deep thought, and uses it to explain confusion or indecision. Another example is the ?Matrix Morpheus? meme, which uses an image of Morpheus from The Matrix to discuss a revelation that, according to KnowYourMeme, ?belittles futile or petty behavior.? In fact, some memes are funny just because they aren?t funny. Take, for example, the ?Anti-Joke Chicken? meme, which tells the beginning of a joke, and ends with a rather obvious statement, something that makes logical sense, or something completely unexpected. (It?s funny because it?s not funny) Makings memes for your business isn?t difficult, and it?s free. There are many meme generators online that you can use to make memes. In order to effectively use memes for your business (or just pass them amongst your coworkers), keep the following rules in mind: Stay relevant to your goods or services: If you want to use memes, you need to first figure out what theme you want it to follow. It should be aligned with the services that you offer. Use the right image: Once you?ve figured out the theme for your meme, you can proceed to find the right image for it. We recommend doing some research and looking at examples of previously existing memes, but be warned; the Internet has many memes, some of which may be offensive. Keep the audience in mind: Your memes should appeal to your target audience, especially if that audience consists of young people that frequent the Internet. Be funny: At their very core, memes are meant to be funny and humorous. If they aren?t, you?re not doing it right. Share it on social media: The point of a meme is to bring light-hearted attention to your brand and to be shared. You can do both by exposing it to many followers on social media. For an example of how you might apply a meme to the real world, we?ve made this one using the ?Disaster Girl? meme character: Two things to note: 1) Get your point across by finding a meme that?s relevant to your goods and services, and 2) Use an odd combination of humor and terror to inspire action from the viewer. If you came across this on a social media page, would you snicker and give it a […]
The promise of autoscaling for your cloud solution is pretty straightforward. Somehow, workloads automatically know how to scale in size the specific amount of resources needed in order to perform a task. The idea here is that this feature is always-on and always monitoring network activity, thus alleviating bottlenecking issues and traffic spikes without any human intervention. If only this were true. In actuality, achieving autoscaling to this degree requires a whole lot of human oversight and technical know-how, thus, eliminating the ?auto? part of the scaling equation. ITProPortal explains, ?To create a truly automated and self-healing architecture that scales with little or no human intervention requires custom scripts and templates that can take months for a skilled team to get right, and many organizations have neither the time nor those resources to make it work.? Instead, a better approach is to have human oversight of your cloud solution. This is achieved by entrusting IT administrators to respond to increased network traffic with intelligent scaling decisions. Having oversight like this for a cloud platform is important for any business, especially when it comes to the unpredictable nature of network computing. For example, if your website is hosted in the cloud and your business is featured on a spot in the local news, then your website may crash from a spike in unexpected visits. Also, any solution connected to the Internet is at risk of being overwhelmed by a DDoS attack. Proper oversight of a network by an administrator will allow them to take needed scaling actions to safeguard against such an attack. However, having a dedicated IT technician constantly overseeing your network is still a bit of a stretch for an SMB. If you?ve spent any time with an IT technician, you might recall just how busy they are. ITProPortal explains: ?They don?t have time for this either. Couple it with the fact that they are chastised when systems are under-provisioned or fail, that re-starting a system may land it on an unfortunate server filled with noisy neighbors, and that all of this is happening at the scale of dozens or hundreds of servers at a time ? and this feels like a great time to just over-provision everything and leave well enough alone.? Therefore, in view of true autoscaling being difficult-to-impossible to achieve, and onboarding a new IT technician to oversee your servers being out of reach for the average SMB, the most reasonable and effective option left is a managed cloud service. Managed IT provides the best of both worlds; you get oversight of your cloud solution by having an automated system in place to catch any traffic and performance abnormalities, along with a human technician to make the proper scaling adjustments as soon as they?re notified. This affordable option is how White Mountain IT Services manages our clients? technology. To find out how you can take advantage of managed IT, call us at (603) 889-0800.
However, if you?ve already applied the latest security patches, you have little to fear. We thought we?d share some background information on the nature of the vulnerabilities, and why Microsoft had to patch them in the first place. If you haven?t yet applied these patches, it will be good to know what you?re exposing your systems to, and why it?s important to get them fixed. For Microsoft Office, Internet Explorer, and Edge, they are critically in danger of being exploited remotely through web pages or Office documents. This could allow hackers to execute malicious code and do your business harm. Read more about these patches on Microsoft?s security bulletin: Patch for Microsoft Office: MS16-099Patch for Internet Explorer: MS16-095Patch for Edge: MS16-096 Even more critical vulnerabilities were found to affect Windows, Microsoft Office, Skype, and Lync, which have to do with the Windows Graphics Component. This could allow hackers to execute malicious code through malicious web pages or documents. Patch for Windows, Microsoft Office, Skype, and Lync: MS16-097 In another security bulletin, Microsoft claims that a critical remote code execution flaw exists in Windows PDF Library, which is bundled with Windows 8.1, Windows RT 8.1, Windows 10, Windows Server 2012, and Windows Server 2012 R2. This vulnerability affected Edge in a different way from usual, and allows attackers to take advantage of malicious PDF documents hosted on a website, and then trick users to loading the file within their Edge browser. Patch for Windows PDF Library: MS16-102 Other patches that have been flagged by Microsoft as ?important,? rather than ?critical,? can be found below. However, it?s important to note that even if they aren?t critical, they certainly shouldn?t be ignored. MS16-101 MS16-100MS16-098 If you haven?t yet updated your system with these security patches, you should reach out to White Mountain IT Services at (603) 889-0800. Our technicians will work with you to ensure that your systems are protected and patched against the myriad of threats that can be found both online and offline. Of course, if you already have White Mountain IT Services?s remote monitoring and maintenance services, chances are that your systems have already been patched. In fact, we apply the patches for any product of Microsoft, so that you don?t have to. It?s just one way that managed IT service can help your business stay focused on what really matters.
Age of the Hard DriveThe most crucial component of any computer is its hard drive. It can be difficult to assess the condition of the hard drive just by looking at it, so be sure to keep this guideline in mind; the average lifespan of a hard disc drive is five years. Therefore, purchasing a hard drive that?s four or more years old may not be worth it, due to the fact that it has a higher-than-normal chance of crashing. Although, just because a hard drive is five years old, doesn?t technically disqualify it as a useful purchase. The five-year rule only applies to hard drives that see continuous use, so a hard drive that?s been used sparingly will have more life left on it than its age would indicate. Plus, the five-year rule isn?t a hard and fast rule. Some hard drives can go for more than 10 years without experiencing any issues. Plus, the five-year rule doesn?t apply to solid state drives which are built to last a very long time. At the end of the day, you?re going to want to take into consideration what you?re buying the used hard drive for; if it?s for a mission-critical task, then you may want to avoid the risks associated with buying used, or at the very least, have a reliable data backup and recovery solution in place like a BDR. Additionally, if the hard drive is making some weird noises, leave it be. Clean Up and HygieneComputers are magnets for grime, germs, and dust, you?ll want to keep this in mind when buying used. For example, a PC that?s caked in dust will need to be thoroughly cleaned before you put it or one of its components to use. Depending on how much time it takes to clean the used component, it may be more hassle than it?s worth when it?s all said and done. Plus, there are some pieces of computer equipment that are just too germy to be passed on to other users, even if it works just fine. For example, keyboards have more germs than toilet seats, so it?s in your best interest to just buy a new one. There?s No Guarantee that Used Parts Won?t Come DamagedUnlike new PCs and PC parts which often come with warranties, used equipment have a chance that they may be damaged, or may not even work at all. If you sink time and money into shopping for and installing a used part that turns out to be a lemon, then you?ve wasted your time and money. You would have been much better off just going with a new part to begin with, but hindsight is 20/20. Ultimately, buying used technology is all about risk management. Obviously, some sources provide less risk for buying used computers than others, like a reputable online dealer that tests its used parts and offers warranties, versus Craigslist. Consult the ProsOne last piece of advice for procuring quality used computer equipment is to consult the IT professionals at White Mountain IT Services. We?re able to provide you with a clear risk assessment, point you to some quality sources for used IT equipment, and there?s even a chance that we?ll be able to accomplish what you need with a new and affordable solution that you didn?t know about. Hey, […]