Recent Blog Posts
It Seems Android Wants Its Users to Get a Better Night?s SleepIf you commonly use your phone?s alarm clock, you might have already noticed this rather irritating new feature. When you put your phone on Silent (though Android?s new setting title, ?Mute,? seems more apt), it literally puts an end to just about any sounds or notifications you might receive. If you put your phone in Silent mode, you?ll notice this settings box. It clearly reads that it silences alarms, which might put getting up on time in the morning in jeopardy. Thankfully, there?s a pretty simple way to fix this issue, but it?s not an incredibly obvious one. Instead of simply allowing your alarms to function in Mute mode, you have to set your phone to only go off for ?Priority interruptions.? Alarms are always considered priority interruptions, so as long as your phone is set to only go off for them, you shouldn?t have any problem making sure your alarm goes off in the morning. To set your phone?s sound to only go off for priority interruptions, turn up your volume to Sound or Vibrate by using your volume buttons. Then, select Only allow priority interruptions. This will open up a menu beneath your selection. Click Settings. You?ll finally be able to view the Priority interruptions settings. Despite it looking like you can set your phone on silent and still keep your priority interruptions settings, don?t be fooled; these only work when your phone is in Sound or Vibrate mode. Although, it should be said that unchecking messages, phone calls, and reminders in Sound mode is essentially the same as being in silent mode, while still allowing you to use your alarm clock. A star will appear next to your alarm clock symbol in the top part of your screen if you?ve successfully set your priority interruptions. Afterwards, make a test alarm to make sure you?ve configured your device correctly. It would be a shame if you went to all of that trouble just to miss your alarm and be late to work. Or, you know, you could buy an alarm clock dedicated to waking you up in the morning; but what fun is that when your smartphone performs the same function? For more best practices and technology tips, keep your eyes peeled for next week?s tip of the week.
As explained by Gartner?s IT glossary, ?The Internet of Things (IoT) is the network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.? With more devices connecting to the Internet than ever before, concern for the topic of network security is at an all-time high; and considering how these devices are designed to interact with one-another, it?s no wonder why. The Internet of Things presents a number of challenges to the modern business, but all of them involve some sort of data security concern. Naturally, you want to prepare your business?s network to protect sensitive data and other confidential corporate information. Due to the way The Internet of Things exchanges data and communicates with other devices, protecting this data is no small task. The same protective measures that work against other types of threats aren?t nearly as effective when it comes to the IoT. According to Brian Partridge of 451 Research, there are a couple of variables that are common throughout the vast amount of different IoT devices: a device, a network, and a cloud service. Furthermore, there are three challenges posed by The Internet of Things that plague IT professionals: Confidentiality Challenge: Limiting access to data on a user-by-user basis. For example, the average employee doesn?t need access to your financial records. Integrity Challenge: Making sure that data is sent and received securely, without being altered, detected, or stolen while in transit. In other words, this is making sure that your data isn’t vulnerable to attack while it?s moving from one system to another. Authentication Challenge: Making sure that received data is coming from a legitimate source. To this end, we highly recommend that you call White Mountain IT Services for any and all concerns you might have about The Internet of Things and network security. We can equip you with security tools like a Unified Threat Management (UTM) solution, which is designed to take a multilayered approach to keeping your data safe. For more information, give us a call at (603) 889-0800.
According to CNet, 3D scanners have been used for all sorts of tasks, including mapping historic buildings and recreating crime scenes for forensic specialists. Now, handheld scanners can help fossil-diggers get a good look at the remains of ancient creatures. The scanner allows professionals to create 3D models of the fossils for later study, without putting the real ones at risk. The scanners were created by Artec, the company responsible for the Shapify 3D-printed selfies. Unfortunately, the climate of Kenya, specifically the Turkana Basin, isn?t the most hospitable environment for technology. The harsh sun beats down on electronics and causes them to overheat, restricting what can be done. The scorching wasteland was so hot that laptops, which would normally receive the 3D scans were practically useless. It doesn?t help that there is no nearby power supply, either. With the help of two 3D specialists, the excavation team was able to make the batteries of the 3D scanners last for two whole days. Despite the circumstances, the power of 3D technology pulled through, and over the course of two weeks, the excavation squad was able to uncover and scan a crocodile skull, another full crocodile skeleton, a massive tortoise, and a species of elephant known to be extinct. Due to the incredibly damaged nature of the fossils, the team had to make haste and get them put away before more damage could occur. The 3D models will allow scientists to study the remains while the real skeletons stay safe in a museum, away from the punishing elements of heat and wind erosion. This is just one of the many things that the latest technology can do for modern practices. Innovators all over the world are constantly creating solutions that help people of all industries perform their day-to-day duties without a hitch. We at White Mountain IT Services feel that it?s our responsibility to help small and medium-sized businesses like yourself improve efficiency and productivity with modern managed service solutions. By taking advantage of the multitude of solutions White Mountain IT Services can provide, including server hosting, remote maintenance, backup and disaster recovery, and VoIP phone systems, your business can emerge from the prehistoric computing age and take its first step into the future. Give us a call at (603) 889-0800 to learn more.
What is Caching?If this term isn?t ringing a bell, all you need to know is that it?s basically a component that stores data so that you can view it faster in the future. The main goal of this is to drastically reduce the amount of bandwidth and processing required to deliver the content of the web page to the viewer, ultimately making it a much smoother experience. Loading Cached Chrome PagesYou want to use the cache to your advantage to view pages while you?re offline. Since Chrome doesn?t automatically enable this feature, you have to activate it yourself. To do so, type chrome://flags into the search bar. After reading the slightly humorous tidbit about these add-ons being experimental, locate the feature called Enable Show Saved Copy Button. If you aren?t using the latest version of Chrome, try looking for Enable Offline Load Stale Button. Select Enable from the dropdown menu. You?ll then be prompted to restart Chrome. The next time you visit a web page while you?re offline, so long as you have previously visited the page, you can load the cached version of it. All you need to do is click on the blue button labeled Show Saved Copy. Keep in mind that due to the nature of website caching, you won?t be able to see any updates made to the page since you last visited it. This is the one true downfall of offline viewing. However, this is most useful if you are trying to finish reading an article where you won?t have Internet access. At White Mountain IT Services, we?re all about providing quality tips that help you better understand and operate the technology you work with on a daily basis. Subscribe at the top of the blog to enjoy White Mountain IT Services?s future IT and business tips.
There are three major factors that will see Windows-based tablets become more relevant for business computing. They are integration, security, and simplicity. Microsoft has developed platforms that present options that other mobile computing platforms cannot match, and as the technology becomes more commonplace for productivity, you?ll likely see the Windows-based tablets substantially increase their mobile market share. The first element of Windows-based tablet computing is the availability of machines that allow users to actually be productive while they?re on the go. Tablets are mostly known as consumption-first devices. This traditionally has more to do with their lack of decent software with which to complete work, as well as the touchscreen interface that?s difficult for users to enter commands. Security is strong on Windows 8.1 tablets. Since the OS was developed to run on PCs and mobile devices alike, the software comes with some of the best security features that come on a mobile OS. These include comprehensive device encryption to secure data and a tamper-resistant booting process that prevents unauthorized access and low-level malware infections, respectively. This kind of static computing interface allows users to learn one set of software, which is important when using mobile devices for productivity. Many of today?s Windows tablets run full versions of Windows 8.1, which, unlike other tablet OSs, comes with the very same interface that you would get on a PC. This allows users to familiarize themselves with one piece of software instead of many. The ease-of-use factor significantly contributes to the viability of the device, and with a stylus, the Windows 8.1 tablet is familiar and simple. While Windows tablets have failed to generate the demand that Apple?s iPad or devices running the Android environment have, there has been a pretty drastic shift recently. To alter this course, Microsoft has made a dedicated effort to promote their line of Surface tablets as able to provide a consistent computing interface on each environment, while providing users with a state-of-the-art computing interface for productivity, not just consumption. DevicesThree of the most popular tablets available with the Windows 8.1 OS include:Microsoft Surface Pro 3 – This is Microsoft?s flagship device. They?ve been positioning this device as a completely viable laptop replacement, and if your laptop is a couple of years old, they certainly have a point. The device has a 12.6? screen and comes with a proprietary stylus. The available type cover has been renovated from other versions of the Surface line of tablets. ASUS Transformer Book – ASUS manufactured, running full Windows 8.1, the Asus Transformer Book T200 has a large 11.6? display and comes with a keyboard.Samsung XE500 – The world?s largest mobile device manufacturer has gotten in on the action as well with the XE500. Also with an 11.6? display with an attachable keyboard, it also comes with a Livescribe Smartpen stylus. Windows 10: Microsoft?s Next All-In-One StrategyAs Microsoft begins rolling out their newest OS, Windows 10, the plan is for all levels of the platform to provide the same computing environment, essentially merging the tablet and the PC like never before. This shift is going to change the game for companies that are searching for ways to improve its mobility. Microsoft has announced its Windows 10 release date: July 29, 2015. Subsequently, they have already sent notifications to users of older […]