Microsoft Word, an Odyssey

Development The first version of Microsoft Word, like many pieces of Microsoft Windows, could be characterized as ?borrowed?. Bill Gates and the late Paul Allen, the founders of Microsoft, hired a pair of programmers that had previously developed Xerox Bravo, the first ever WYSIWYG (What You See Is What You Get) word processor. The developers, Charles Simonyi and Richard Brodie released the first version of Word in 1983 for Xenix and MS-DOS operating systems. They followed with several new versions over the next few years, none of which were overly popular. As Microsoft (and personal computing) grew in popularity, developers for other OS platforms began to build graphic user interfaces. Microsoft followed suit, releasing Microsoft Windows in November of 1985. After a few versions of Windows, Microsoft released the first GUI-run Word platform for Windows 3.0 in 1990. At the time, WordPerfect was the most popular word processing application on the market, but Corel (the developer of WordPerfect) didn?t produce a WordPerfect version for Windows 3.0. As a result, the 1991 version of Word, called WinWord 2.0, was a major success. Additionally, Word was developed for the rival Macintosh operating system. This proved to be advantageous as well. It was easily the second most utilized word processing program available for the Macintosh OS. This strategy led to more people using Word across multiple platforms than any other word processing program. Microsoft Office The Microsoft Office productivity suite is well regarded as the most dynamic productivity tool in modern computing. The first version of Microsoft Office was released in 1990. It consisted of the Word 1.1 word processor, the Microsoft Excel 2.0 spreadsheet program, and the Microsoft PowerPoint 2.0 presentation builder. At the time it was the most comprehensive enterprise productivity suite on the market for both PC and Mac. One of its main competitors, Microsoft Works was also a productivity suite with a word processor, spreadsheet program, and presentation software, but it was marketed to individuals at a reduced price. It was discontinued in 2007 when Microsoft started offering the Office suite at a lower price point. With Microsoft Office adding email capabilities in July of 1991, Microsoft Office became the go-to productivity suite for the business professional. Then came a new build of Windows, Windows 3.1, which was the industry-leading OS. By outpacing its competitors with their operating system, the Office platform was now entrenched as one of the main business software tools of the early 90s. Word Innovation As Microsoft continued to develop and release industry-leading software, Microsoft Word started to gain features. No longer was there interoperability between the Macintosh versions and the Windows versions of Word. When Windows 95 launched, so did Word 95. No longer available for Macintosh, Word 95 was the first Word product to be developed exclusively for Windows. Word 97, introduced late in 1996, added Clippit (known as Clippy), which was an assistant as well as several new features, including new toolbars that provided a streamlined experience. It was also part of the first Office suite that included product activation, which would become the standard way to license software for much of the next two decades. Word 2000 added HTML tools and the very first Internet-based collaboration features. Since there was a great deal of trepidation that software would have problems working […]

Office Technology Seeing Innovative Change

Technology for MeetingsOrganizations use meetings to discuss important events, developments, and operations, so it?s important to keep in mind that you can augment these meetings to improve their quality through the use of technology. Conferencing software, video chat, and other options can make your meetings more efficient and effective, providing benefit for your organization. You can even use interactive whiteboards and cloud-based solutions to allow employees in disparate locations to collaborate with one another. Software Integration with APIs (Application Programming Interfaces)Integration has grown to be a key part of the workplace, a trend that seems to be setting the tone for the future. APIs have given software solutions more opportunities to connect and integrate with new and existing solutions than ever. The future will surely provide even more opportunities for your organization to leverage APIs and integration to the best of your ability, and with so many businesses relying on an assortment of software solutions (like time management, conferencing, productivity suite, and others), you can bet that any and all integration between these software solutions will be key to their continued success. Connecting with an IntranetAll of your organization?s assets should be centralized in a single location so they are easy to find, expediting productivity and making things convenient on the user?s end. An intranet can be the solution to any organization?s decentralization issues. You can place any important files, accounts, applications, or solutions in one location for ease of access. Think of it like a portal to all of the important information your business has, ready for your employees to utilize. Take Advantage of Cloud-Based ServicesThe cloud is an incredibly important part of many companies? business models, and it?s easy to see why. With access to data and applications in the cloud being so accessible, organizations can give their employees the option to free themselves from the desk, opening up opportunities to get work done out of the office. As long as the user has the right devices and permissions, productivity is not limited to the workplace. White Mountain IT Services has its fingers on the pulse of the latest innovations in modern office tech. To learn more, reach out to us at (603) 889-0800.

Is Having a Constant Stream of Notifications Necessary?

No matter how early you got wise to this strategy, you still have notifications from at least one or two apps that don?t serve any practical use. Today we?ll pull out all the stops, literally. That is, we?ll help you limit your notifications so that you are faced with fewer distractions, and less worthless information. The Problem with Notifications Inherently, there isn?t a problem with having notifications. They are programmed into the software to help the user get the information they want when it happens. With today?s society so connected, and with business reacting by embracing this connectivity, some notifications are necessary. Collaborative work relies largely on cooperation in real time, which is why notifications can be viewed in a positive light–in some way other than as constant annoyances that aim to break your concentration and keep you on edge all day. Notifications in general have changed over the past several years. Initially the only notifications a user would receive are ones that had to deal with direct communications. These were easy enough to manage. Sometime in the last few years, more app developers have incorporated direct information about the ongoing development of the application and application promotion. By sending reminders from an app, even if it?s rarely used, developers are hoping that marketing the app to the user that already possesses it will get them to use that app more. These are the notifications that need to be turned off if you hope to co-exist in a workspace with a smartphone around. Here is how to manage notifications in the two most popular mobile operating systems. Android In Android, notifications are found many places and, in modern versions, they don?t stop when the phone is locked. Developers have made this system much more intuitive (which they had to with the increased number of notifications people receive) by allowing the user to set the priority of the notifications that they receive. Before Android 8.0 Oreo, this priority was set by the perceived usefulness of that notification to the user. Most high-end phones that run Android, use 8.0 Oreo. Some have been upgraded to 9.0 Pie. We?ll show you how to turn notifications off in each. 8.0 Oreo Before we get into the Settings menu, We should mention that in the notifications tray (the list of notifications you get when you swipe down from the top of any android device) you can swipe left to dismiss the apps, but if you swipe halfway, either right or left, you will reveal two icons, a gear and a clock. Pressing on the gear icon can open a setting that will allow you to block notifications for that app. To review and set notifications any way you want to go to Settings > Apps & Notifications > App notifications, then tap on the individual apps as they are listed and what notifications you want them to send. You can also turn off lock screen notifications by going to Settings > Apps & notifications > Notifications > lock screen and pressing on the Don?t show notifications at all option. 9.0 Pie In Android 9.0 Pie, stopping notifications is even simpler. All you need to do is long press on any notification and you?ll see an option to Stop notifications. You can also simply pull down […]

ALERT: Over a Million Asus Laptops Could Have Been Hacked

Numbers are still coming in as far as how widespread this issue is. As of Monday, cybersecurity firm Kaspersky Lab said potentially thousands of Asus computers were infected, but on Tuesday that number has potentially broken a million. How Could My Asus Laptop Get Hacked? This type of attack is called a Supply-Chain Compromise and is one of the most frightening kinds of cybersecurity threats out there. Asus?s software update system was compromised by hackers, putting a backdoor into consumer devices. The scariest part is that this backdoor was distributed last year and it?s just being noticed now. The good news is this has given Asus plenty of time to plug up the security holes on their end, but if you own an Asus device there is still a chance that it is infected with malware from the initial attack. What Do I Do Now? First and foremost, no matter what brand of computer or laptop you have, you need to make sure you have antivirus, and that antivirus needs to be licensed and kept up-to-date. If you have an Asus device, Asus has released an update in the latest version of their Live Update Software. They?ve also patched their internal systems to help prevent similar attacks from happening in the future. You?ll want to make sure you have Live Update 3.6.9 installed. Asus has also released a security diagnostic tool that will check your system to see if it has been affected. Click here to download the tool. We HIGHLY encourage you to reach out to White Mountain IT Services if you are running any Asus hardware. It?s better to be safe than sorry.

Businesses Need to Feature a Virtual Private Network

The modern work environment is a scary place, and you never know when someone is looking. Hackers have used spyware for ages to lurk on a device and collect data for various purposes, but the threat needs to be directly installed on the device in order for this to work. It doesn?t work when the data is most vulnerable–while it?s in transit. This is the issue that created the need for a virtual private network. A virtual private network is an encrypted network that gives you a secure way of connecting to your organization?s in-house infrastructure. In this case, the encryption protects your data by scrambling it into an undecipherable mess of characters while it?s in transit. The only way that anyone can unscramble the data is by having the decryption key that goes with the encrypted message. In essence, only those authorized by your organization can make heads or tails of the data. Otherwise, it?s just a jumble of something useless to hackers. This is why a virtual private network is so important to the security of your business. Often times data can be intercepted while it?s in transit to or from a device, placing it at risk. With the VPN, the tunnel between your infrastructure and the receiving device is a bit more opaque, meaning that it?s not as easy to see the true data, as it will be obscured and unreadable should it be stolen by anyone who doesn?t have the encryption key. VPNs are useful for any business correspondence where sensitive or proprietary information is sent over an unsecured Internet connection. This provides the security needed to send files and data when being asked to connect to wireless or other Internet connections that may be risky. White Mountain IT Services can help you implement the right VPN for your business. To learn more, reach out to us at (603) 889-0800.