Categories
Laptops

HP Elite Slice and Wave Pavilion at First Glance

Available in USA, Soon to be available in the UK. Call GEEX on 0121 285 0098 for more Information

 

HP-Pavilion-Wave-and-Elite-Slice-PCs hp-elite-slice-020916

 

The close of August 2016 saw the unveiling of the new HP Elite Slice and the HP Pavilion Wave desktop, bringing the modular concept to desktops. The most publicized feature of these two new desktops is the ability to snap on additional devices without having to install new software, purchase new hardware or worrying about the technicalities. So no more engineer visits for installation of new components.
Though complete specifications are still awaited, here is a first Glance at the latest from Hewlett Packard.

The Semantics

The HP Elite Slice has unique and intriguing name. Rather than simply call it a modular PC, HP elected to give it a more exotic name of Elite Slice. The name presumably reflects its generation as well as capability – Elite because it comes in the era of the GenX where DIY is preferable to calling in service and the fact that it brings a new concept to the world of desktops. Slice because of its ability to “slice” components in a way that you can easily snap them on and off.

The Outside

The Wave Pavilion comes in a unique triangular tower cabinet covered with woven fabric which is “engineered for acoustic transmission” which means it is sensitive to sound. There is a parabolic reflector and a speaker on the top. The Elite Slice unit is 6.5 x 6.5 x 1.38 inches in dimension with a weight of 2.31 lbs. It has a USB port, a Display Port and HDMI. The Desktop comes in the standard HP colours with copper accents. The desktop is modular and can be connected using a 3.1 USB cable. HP has also promised a QuadHD display which can also be connected with a 3.1 USB cable.

 

The Inside

 

The new HP gadgets come with greater than ever capacity to accommodate the snap on components without much upgradation. The Wave Pavilion has a quad core processor with 2TB hard disk, 16GB DDR memory, and 128 GB SSD. You can also add on a Radeon R9 M470 for some gaming if you wish. The Slice is powered by a 35W quad core i7-6700T CPU, has 512 GB storage, and an 802.11ac, Gigabit, USB, DisplayPort, and HDMI.

Oh and it can charge your phone too.

 

HP-Elite-Slice-Modular-PC-04

 

The Modularity

 

HP-Elite-Slice-1 hp-elite-slice-stacked-720x720 hp-elite-slice-bando-mod-570 hp-elite-slice-front-570 HP-Pavilion-Wave-and-Elite-Slice-PCs-4
The most unique and the most publicised feature of the new desktop is its modularity, that is, its ability to stack on capabilities based on need. You can add on audio with Bang and Olufsen speakers. The cover can charge the device wirelessly and the collaboration cover is great for conference calls. You can also add on an ODD (Optical Disk Drive) if you need to port a large amount of data.

The Meeting Room

 

hp-elite-slice-meeting-720x720
HP has also announced the HP Elite Slice for Meeting Rooms; – we at Geex have dubbed it The Meeting Room (MR). This is a device that combines the Slice, the Collaboration Cover, and the Audio Module to facilitate video calling for meetings with a single touch. What this means for you is that your conferences are easier even from distant geographical locations.

The Pricing

dollar-sign

All three devices are expected to be available come September. The Wave Pavilion has an expected price range of $529.99 USD while the cost estimate for the Elite Slice is $699. The Elite Slice for Meeting Rooms is estimated at $949 a pop.

Summing Up

 

lets-sum-it-up

 

 

Says Brett Howes of Anandtech, “I think it would be hard to dispute that HP has really turned a corner, with some innovative designs that stand out from the desktop crowd.” And we agree! As with anything new though the pricing is high. It remains to be seen how businesses adopt and adapt to this new concept in desktops. Stay tuned for more on this in forth coming blogs.

 

Categories
Blog Laptops

How 2 Install Your Apps onto Windows 10

appsWindows_10_Apps

Introduction

Techxperts claim that new technology is born of the desire of consumers to have new features. This only underlines the old adage, “Necessity is the Mother of Invention” and it’s just as true for Windows 10. All the problems with Windows 10 not withstanding, one good thing about it is that it has further narrowed the gap between mobile devices and PCs by making apps portable across devices. However there is   really nothing dynamically different from the earlier version – Windows 8. Windows 10 for the most part brings you the same features that Windows 8 brought but with a difference. You will find yourself doing the same things but in a better way with improved apps. What’s confusing is that Windows 10 uses the same apps on all devices. Installing apps can therefore be slightly tricky given that mobile devices function differently from stable devices not to mention the grey area of laptops and palm tops or iPads. Here is an overview of the best way to install apps on your new OS.

Background

One thing that both Windows 8 and Windows 10 have in common is a single place where users can go to find the apps they need. The windows store in the latest version is better than its predecessor in that there is better device portability. This means that the same app can run on most of your devices. Another good thing is that it has done away with the need to download a lot of stuff like iTunes to be able to download and use the apps. You still need your Microsoft account though! So how would you install apps on your Windows 10 device? Let’s find out.

Installing Apps

Default-Windows-Store-app-behavior-in-Windows-10

 

If you are using a PC click on the windows button (Start Menu). If you are using a touch screen device tap on the Windows button in the task bar. Once you see the Windows Store Live, click or tap on it. You can now see all the apps available for purchase or download. You’ll also see a search bar which you can use to find the app you are looking for. Check the pricing and reviews to make sure you really want to install the app. You can also see the various platforms on which the app will work as well as the languages available for the particular app. Once you are sure you want to install the app just tap or click install. When the apps are installed, they automatically appear on your start screen or menu depending on which device you are using. Right click or tap and hold to pin them. That’s about it. This method of installation works for games too. Remember though, there are a few important points to keep in mind when selecting games or apps to download.

Some important information to note

logo

 

While you can have many games and apps for free there are some that are chargeable. These may be one time buys or may demand in-app payment. Most apps will sync data automatically, but you will probably have an option to turn it off. On a note of caution, you should check out the app’s rating to see if the app is suitable to download. Most apps come with inbuilt feedback requests which force users to rate the app on a scale of five. When installing they will most likely show you the average rating. Generally you may presume an app is safe if it has more than 50% (3.5) average rating. This means that more than half the people who used it found it good, safe, and suitable. Don’t forget Pokémon Go though! So stay cautious. Apps and games will also show you other details such as device compatibility, and appropriate age group, to help you decide. These are usually on the mark and if they do err, they do so on the side of caution since the developers are concerned about their reputation. Be warned that there is no clear indicator for Xbox One support in most apps. So if that’s your primary objective, check again. One great thing about Windows 10 is that it allows you to install any game or app on 10 devices once you have downloaded it. So one download can serve the whole family. Great news isn’t it? Of course you will need Microsoft account on all of them.

"Summary" handwritten with chalk on a blackboard

 

On its website, Microsoft gives you the standard procedure for downloading and installing any program on Windows using the exe file. There is a lot more to it though. Through this blog we bring you the correct way to install not just apps and games but any software. We at Geex are always here to help you download and do a lot more!

Categories
Apple Blog Laptops Leasing

Bring Your Own Device to Work or NOT

TO BYOD OR NOT

cell-phonebyod

 

According to Bob Egan of Forbes, the concept of BYOD (Bring Your Own Device) for business died a natural death nearly two years ago. The concept was however extremely popular when smart phones, iPhones, and Blackberry first came on the scene, primarily because of the convenience it offered for both employers as well as employees. As time passed, the thrill wore off and problems emerged. The question then remained was – Is BYOD good for business? Well the simple answer is “Yes it is.” Egan qualifies his opinion about the death of BYOD by saying “BYOD as we know it is dead”. There is little doubt though, that the phenomenon has changed the way businesses function. Let’s see what has changed and whether BYOD is still a good business practice.

The Good

 

tee-shirt-femme-ilove74-authentique-sep7qu4treSmartphone voicemail%20sent%20via%20email

 

Let’s begin with some stats. One survey by Entrasys shows that BYOD is practiced by 74% companies. IDC 2011 however differs by saying this figure is underestimated by about 50% which means more than 74% companies are using it. Roger Bjork, of Dell Enterprise Mobility Solutions says that employees who are allowed to bring their own device to work put in more hours as compared to those who are not. These figures show that BYOD is definitely good for business. Simply put BYOD facilitates easy access to CRM, knowledge base, database and other resources allowing employees to work from anywhere. Surely it is advantageous for this reason alone.

Another major plus is that your database / knowledge base stays up to date right up to the minute which in turn means you have access to real time data that you can effectively use for lead generation, conversion, and increasing ROI. You can also effectively reduce costs – particularly hardware costs – by allowing employees to use their own hardware devices. BYOD means your employees – and you too – can work even when the office is closed.

Expansion is another area where BYOD will work in your favour. Expanding across time zones is much easier if you just allow those working with you to use their own device instead of insisting that they have one dedicated to your business. With so much in its favour, why did the practice lose steam?

 

The Bad

3d small people - smartphonebyod-security-100437152-primary.idgefuera

 

 

One thing about BYOD is that there is a lot of grey area. Who for example would provide technical support for the devices owned by the employees but used for office work? The employees would naturally look towards their employer which means additional costs for round the clock support. After all if you want them to work round the clock you should too. Another big thing going against BYOD is the fact that data on mobile devices is exposed. Most people leave their private phones lying around carelessly and many of them are not secured by passwords or pins, for the simple reason that they are personal. Loss of personal devices is another big threat when business data is available on personal devices.

Another argument against BYOD is that employees who quit carry sensitive data and information with them. They may still have access to your database unless you ensure their account is deactivated. Even then they may have data and information downloaded on to their device. This is a leak that can easily go unnoticed unless you are alert to the possibility.

Data on personal devices could therefore mean a ticking time bomb for your business. Data exposed in this manner means exposure to breach leading to loss of ROI and additional expenses for recovery. It is for these reasons that

business owners hesitate to adopt the practice of BYOD and why the practice petered out. We at Geex however feel that the advantages far outweigh the risks. After all there are ways to mitigate risks.

The Way to Go

 

byod_infographic  data-security-2012

 

 

So! Like everything else, there is a good and a bad side of BYOD. But the question still remains, how to mitigate the risks? Managed care is the simple answer to that one. At GEEX we can provide you complete BYOD management. Our services will help you mitigate the risk of data loss by defining and implementing protocol. We will provide you a single window service for all types of devices used by your employees. We can ensure secure data transfer through encryption. Enforcing protocol is achieved through monitoring access to corporate resources. Data loss is prevented by techniques such as need based access, automated memory wipe, remote locking, and device tracking. We also help you conduct periodic audits to identify potential leaks and plug them well in time. As your managed care consultant, Geex can help you establish and implement the protocol for all devices that your employees bring with them. Following these guideline, we can guarantee almost 100% security. Well we’re not God so 99%.

Categories
Apple Laptops Leasing Macbook Pro

Flash Storage – The Flip Side

hdd-ssd-2

Will HDD outlive Flash?

HDD (Hard Disk Drives) have held court for decades mainly because of their low price, easy availability, and seemingly unlimited capacity. The main and conceivably the only drawback is its inability to retain data in case of a power outage. For this reason flash storage is gradually displacing HDD. Flash drives on the other hand are portable, use less power, and are not susceptible to high power or magnetic fields. These are some of the reasons why flash storage is gaining the march over HDDs. As with everything though, there is a flip side. We have put together some of the things you should look out for when considering a switch.

Price vs. Performance

Rick Delgado on SmartDataCollective opines that though its high performance lures users to flash storage, there is a price tag – literally. The cost of flash storage is considerably higher than HDD. Solid State Drives come at an estimated price of £60 per TB as compared to 1 penny for HDD. True enough. But we feel the price will issue will resolve itself as the technology becomes more popular and gains advantage of bulk manufacture. So if you are considering a shift, allocate a high budget for hardware. It will surely generate ROI albeit in the long term.

Capacity

Big-small-boxing-gloves

HDDs come cheap with high capacity. The best flash storage devices can barely touch 1 Tetra Byte. Also reports show that flash storage with high storage capacity trades off on performance. This can be a big disadvantage for enterprises that have large volumes of data and high performance requirements. However, research has by no means stopped nor has advancement. As we mentioned (or did we?) earlier that as the technology becomes popular, many issues will be resolved and we hope that new research will find a way for flash storage to store large volumes of data.

Re-usability

The life of a HDD is almost equal to the life of the machine that uses it. Moreover HDDs can be easily replaced at low costs. Flash storage devices on the other hand have limited capacity for reusability. That is to say that you can write and erase to and from flash storage devices only so many times. After that the device must be scrapped and replaced. This means additional hardware costs – definitely a no-no.

Security

security-dog-t-shirt-135-p

Many flash storage devices have no write protection unlike CDs. This means that your data can be accidently overwritten. This is something that no business would like to risk. Security is a major concern for business enterprises big or small. Hence flash storage may not be the storage of choice for most businesses. Once again, at the cost of repetition, we hope this issue will be resolved in the near future.

Portability

Though its small size makes USB flash storage devices highly portable, this very characteristic makes it a great risk for business. Flash devices are small in size and easily lost. The metal tab may be broken or damaged if left exposed – and this is highly probable because the even smaller cover may be lost or misplaced. Losing a flash drive does not only mean losing data; it also means exposing your data to unscrupulous elements who may misuse it or sell it for a profit, not to mention the cost in terms of lost opportunity and the cost of recovering / recreating the data.

The Solution

solution-clipart-solution-hi

There is little doubt that the time is ripe to move on to a more advanced storage system. However flash storage is apparently not the solution of choice because of its many disadvantages. As technology advances however, we would likely see an improvement in this storage method. Data Reduction technology is perhaps the next step towards taking full advantage of flash drives. Look out for our blog on Data Reduction and Alternative Modes of Storage next month.

Inspired by:

http://www.smartdatacollective.com/rick-delgado/281126/reviewing-benefits-and-drawbacks-flash-storage

Categories
Apple Blog Laptops Leasing

Your Network is Your Business – Keep it Secure

Ensuring Complete Network Security

social-network

 

Network security has gone from being static to dynamic within the past decade. Traditionally, security lay at the bottom of the priority list with a few routine tasks associated with it such as backup and clean-up. That is until networking, virtualization and cloud computing came along and changed things. In the earlier scenario, when a security breach occurred, only the computer on which the breach occurred was affected. With more and more devices being connected, the entire network is at risk even if just one device is compromised. Networking and virtualization have also posed some new security risks as has cloud computing. We at Geex make it our business to find out what these risks are and how you can deal with them. Here’s a list of precautions you can take to protect your network.

Virus Scans

virus_scan

The oldest and the most trusted way to avoid virus, worms, and other malware, is to use a security suite. Yes its tiresome when you boot up and your computer makes you wait while it runs the virus scan but remember its not just your computer or node but the entire network that’s at risk. Also remember to keep your security suite up to date so that it can take care of all the new malware that is released almost every day! At Geex we have a practice of monitoring the update of every security suite we install or manage. We also keep track of any new malware that has emerged and its antidote.

SPAM and Phishing Filters

Spam

Although harmless, spam has a high nuisance value when it keeps appearing in your in-box. Phishing on the other hand can be really harmful if it succeeds in extracting personal and sensitive information. Most email service providers have built in filtering for spam and phishing. There are also some commercially available filters that you can use. Stay up-to-date on the latest about these filters and ensure that you are not bothered by Spam and Phishing.

Encryption

1.2.3-EncryptionandSecurity-encryption

Some unscrupulous individuals use a program known as a packet sniffer to cull information from data packets flying across the internet. If your information is encrypted though, the sniffer will be unable to make sense of the information culled. Make sure all information you send out is encrypted. Many sites and service providers have inbuilt software for encryption and decryption. If your data is really sensitive, you can purchase stronger software – or have your own code written – to make the transmission even more secure. We at Geex can help you obtain the software and keep it up to speed.

Mind the Hardware

One much ignored breach is loss of hardware. With more and more people using mobile devices, loss of hardware can lead to a serious breach in the database. Cloud computing complicates things further since many of the devices are logged on to clouds which house business databases. The solution to this problem is not as simple as installing a software – though you may need that too. What is required is a complete security protocol for one and all. We at Geex can study your business and recommend the best protocol for you.

Sign Out and Stay Secure

remember-sign-in-and-sign-out-every-day

“Do you want staff to to remember the password for this site?” Sounds familiar? And we all too often hit yes thinking “What if I forget the password?” But this can be a dangerous practice especially if you are using a shared computer on a network. Never leave a computer signed in. And of course you should never ask your computer to remember your password for you. Change your password frequently. Clear the cache frequently. Check the Delete History box on your browser setting. Phew! That’s a lot to remember right? We can help by establishing the protocol for you.

Pssst! BYOD

This one is really tricky! When employees change jobs, they often carry their mobile device with them. The best thing to do for this is to present your employees with office devices which they leave back when they quit. What happens when you upgrade though? Well back to protocol! Esta     blish a clear protocol for disposing obsolete hardware safely. Make sure all sensitive data is deleted before it leaves your office premises.

 

executive-summary

Summing up ….

In today’s world where people conduct their day to day transactions using their mobiles, security becomes a great concern. However, as the risks increase, the security solutions improve too. We at Geex can help you manage your network ensuring complete security for your data. Just leave your name and number and we’ll tell you how.

Categories
Blog Laptops Leasing

Windows 10 – The Good, The Bad, and The Ugly

Windows 10 Update What to Expect

 

“Windows Updates aren’t always a good thing”, says Sarah Tew of CNET while narrating the story of Teri Goldstein, travel agent from California and her experience with the latest version of Windows. The new update for Windows 10 rolled out on 29th July last year. Many Windows 7 and 8.1 OS users received free updates. The anniversary update is expected on August 2nd this year. Those who have not yet upgraded are being shown the pop up screen informing them that the free upgrade is soon to end. Geex has put together the good, bad, and the ugly about Windows 10 for your convenience.

wintpupd_big

 

Feature Highlights

The anniversary update (2nd August), is expected to improve Cortana, Ink, and windows Hello. The IE browser will be replaced by Edge so if you decide to upgrade you should upgrade your browser too. Edge supports biometrics so you can use your fingers to login.

Cortana and other applications will be more tuned in to the Surface Pen to make your work easier. This means that you can simply write down a note as you would on paper and Cortana will add the reminder for you. Similarly you can use the pen for drawing a route on your Google Map.

Google devices can be unlocked with wearables in the new OS. Other features include pre-loaded Skype apps, better menus, coloured title bars, additional features in the Start menu, messaging via Cortna if you have a Windows 10 phone, and better browsing using Edge. Although Edge extensions are not supported, this is expected to be included in updates in the new future.

What Users Say

Business Discussion

Windows 10 had more than its share of teething troubles. Some claim that the product was launched prematurely without fine tuning. While this claim is disputed, the fact is that the new version of Windows is significantly different from its predecessors. With the new release, Windows OS has moved to the category of service rather than software – at least conceptually so you can expect regular updates. Automatic updates bring on board new features and services. The next one is expected on the anniversary and one may assume there would be several more to come.

Says Matt Egan of PC Advisor, though the fall update had many new features, they were insignificant. Users have been asking whether or not to install the new update but apparently they do not have a choice.

Installation

Of those who have already installed the updates, many are happy and enjoying the new features. Others discovered to their peril, that all was not good and dandy with the updates. Some users complained that the update never ran beyond 44%. This bug was reported and resolved. Apparently you need to free up space – not an easy task considering Windows 10 requires 20 GB to install! Another fault (?) noticed by users is that the installation changes or deletes existing software, most of which is monitoring software. There are those who questioning,  “Is Microsoft removing potential rivals to pave the way for their own offering?” One really quirky thing about Windows 10 is that you have to wait a month before you can install the next update. Naturally people ask why? Some unlucky users simply do not see the update despite waiting the required 31 days! These users have to find a round about way to install the new update. And finally when all is well, the welcome installation dialog box will appear. But wait! Make sure you have taken a complete back up just in case some of the apps or software gets changed or deleted remember?

Do you really need it?

Summary Word Written By Hand

Good Question! As of 29th July 2016, it will no longer be free. It will cost you a good £99.99 for the home version while the professional one is priced at £189.99. That’s one good reason not to install right? Well Microsoft is really pushing for an upgrade with its “Sorry to interrupt…” screen. And why not? There are some great features included in the new OS. Besides older versions like Windows XP and Windows 7 may no longer be supported so you really have no choice.

What you need to know though is when the right time to install is. If you are the type who never installs paid software, then the time is ripe for you to upgrade. What about the problems with installation you ask? Well woes betide if your system crashes like Goldstein’s! We at Geex offer you a way out by planning your upgrade and installing it with care so that your system rem

Categories
Apple Blog Laptops Leasing Macbook Pro News

WWDC 2016 – Expectations and Revelations

WWDC-2016

 

WWDC 2016 – Expectations and Revelations

The World Wide Developers Conference (WWDC) is one of Apple’s most awaited events every year. Held in San Francisco, the 2016 conference was a huge success right from the start. Entry tickets cost 1599 USD and were sold by lottery. As usual the event was preceded by a lot of speculation. Expected were the launch of the new iOS, the new OS X and the new versions of tvOS and watchOS among other things. Read on to find out what emerged …

True to form, Tim Cook and company met most of these expectations, unveiling their latest equipment at Bill Graham Auditorium during the WWDC 2016 event from June 13th to June 17th this year. With thirty million registered members, the event was a huge success. Tickets sold out within a short while after opening. Scholarships were awarded to 350 students. More than a 100 attendees were underage with the youngest being just 9 years old.

News about the Apple Car and Apple Watch 2 was eagerly awaited. Other highlights included Apple Music, iOS 9, and OS X EI Capitan. New MacBook and the much discussed, much awaited, larger than life Apple Television.

The event revealed…

 

cvxcv

watch OS 3

Major improvements were seen in the watchOS 3. A new version of the Apple Watch OS with improved features and promises to overcome some of the glitches and complaints of users which included speed, background updates, a dock to keep your favourite apps, and faster refresh. Another interesting new feature is the ability to swipe between apps just as you do on an iPod. Messages now have built in replies that you can select from or you can install scribble and create your own replies. Activity sharing is one more new feature in the watchOS 3.

 

gdfgdfg

tvOS

For those who are allergic to the Apple TV remote, Apple has introduced a new feature whereby you can use your iPhone as a remote for your Apple TV. You can also use your phone gyroscope for gaming. Siri has gained approval for Apple TV. You can now search for movies and You Tube by categories such as “high school comedies”. Video channel apps have been enhanced for ease of use. Downloading apps on your phone will automatically download them on the big screen too.

MacOS Sierra

OS X is now a thing of the past. MacOS – which is OS X with Siri – is the new Apple OS. This one is named MacOS Sierra. The focus in the new OS is continuity, Siri, and iCloud. Continuity does away with the need to enter a password every time you unlock your Mac. If you are wearing your Apple Watch, your Mac will unlock automatically when you come close. The universal clipboard is another new continuity feature which allows you to copy and paste between your Mac and iPhone. The overall Mac experience has been enhanced with tabs for multiple windows. Siri has been permitted on the mac OS. It will reside on your dock and you can use your voice to operate your Mac. You can do a lot with Siri on your Mac such as pin your results to notification, drag the results into docs, and send messages. Basically it works the same as on your iPhone. Though the full release is expected in the fall, the beta version is immediately available to developers.

Apple Music

Apple Music has been completely redesigned making it easier to use with a host of new features. The use of 3D has been enhanced in the iOS 10. The phone now wakes up merely by raising your hand. Notifications have become interactive. You can even manage them without unlocking your phone. Messaging is also possible without unlocking. There is a much bigger space for music on your lock screen. Access to widgets, music, and the camera is easier.

Siri

Siri is now being offered to developers, which bodes well for app development. Siri has also been linked to WhatsApp as has Slack. Uber and Lyft can also use Siri as can Pinintrest, MapMyRun, Skype, and Runkeeper. Quicktype has become more intelligent offering location and calendar enhancements like auto-fill and pre-fill.

 

siri_pro

Pictures and Photos

Facial recognition has been introduced and you can pin your picture to a map to know where you took the photo. You can also search your picture based on its contents such as mountains, sea-shore and so on. The picture enhancement comes bundled with Memories, a new UI.

Maps

Similar to Google, Apple maps will now suggest alternative routes based on traffic. Information about restaurants close by and turn by turn directions have also been introduced. Apple Maps is also being offered to developers among other things.

printable-treasure-map-for-kids-1

 

News

After a somewhat bumpy beginning, Apple hopes to enhance this feature by dividing it into sections. The topics have been revisited as have the subscriptions. You can now see subscribed content in your app.

Homekit

Like News, Homekit did not have a great start. But the new updates have enhanced this feature. There are now cameras and door locks within Homekit. It has a new name too. It’s now simply called Home. You can personalize it and keep all your accessories linked to it. Scenes, a new feature, allows you to have different scenes for bed time and day time. Siri has been linked to home. The app is available in Control Centre and you can use it on the go. So when you are close to home, it will turn on the lights, heating etc. for you even before you arrive. Voicemail transcription, another new feature transcribes your voice mail so that you can read it instead of listening to it. Spam labelling has been introduced. Links can be played inline and images will pop up from links directly. Emojis have become predictive and three times their size. Words which can be turned to Emojis will be highlighted as you type.

Summing Up…

The biggest thing that emerged, considering that the WWDC is a developers’ conference, is the new iOS 10, the enhanced MacOS, and the fact that Siri has been opened to developers. The new iOS 10 which comes out this fall, has many new features, some useful some not so useful. Same for the MacOS. A preview will be available in the next month. We are waiting for users reactions to the new features and hoping for many more in the next conference.

References

http://www.macworld.co.uk/feature/apple/apple-spaceship-campus-facts-pictures-video-info-video-3489704/

http://www.in.techradar.com/news/computing/apple/WWDC-2016-everything-on-the-gigantic-changes-Apple-announced/articleshow/52156103.cms

 

Categories
Blog Laptops Leasing

The Dreaded Blue Screen of Death!!!!!!

How Managed Care can help you avoid BSoD

 

2012_12_04_72_windows8upg.bVv1018-01-weddingzillas-taming-the-grrom-stressed-man_listressed-shutterstockkeep-calm-and-don-t-break-your-computer

 

If you’ve ever experienced a system crash you’ll understand the frustration that goes with it. BSoD (Blue Screen of Death) so named because of the blue screen displayed when the phenomenon occurs is a system failure of a windows PC when there is a problem with the hardware or software which causes the system to shut down. When a BSoD occurs, you could lose important data that can cost you a pretty penny to recover, not to mention the loss in business because of down time. Read on to find out how you can avoid this disaster.

Run a virus scan

 

Webroot-SecureAnywhere-Antivirus-1Y1U-500x500

A virus in your computer can cause your software to mal-function resulting in a critical error which cannot be resolved by your OS. The only option then is to re-boot which means data in your RAM will be lost. The best thing you can do to avoid such a situation is to ensure there are no viruses in       your computer. This is easily done by running periodic virus scans. If you have managed care for your business, your technician will ensure that your anti-virus software is up to speed and will run scans every time he visits.

 

Install all Windows and other updates

Every device your computer uses such as a mouse keyboard or printer requires software called a driver to use it. Older versions of drivers may not necessarily be compatible with new devices. This can cause problems which older versions of OS may not be capable of resolving, resulting in the dreaded BSoD. Regularly updating your hardware and software will ensure that there is no incompatibility. Upgrade to newer versions of OS as they are released. OS manufacturers usually ensure that newer versions are compatible with new software. This will help you avoid a crash and loss of valuable data.

 

support-11

Uninstall unnecessary applications

We often download applications that we think may be useful but are never actually used. Some applications are downloaded simply while surfing the internet. Consider what happens when you try to run a video. You will usually be offered the latest version of Flash Player for download. Clicking on the download button will download the software which may intrude into your presentations and other media files you may have in your system. If your OS or other media applications are not compatible with the latest version of Flash, your system is likely to crash. Such situations can be avoided by regularly checking for applications that are not frequently used, and uninstalling them from your computer. Your managed care technician will check for unused applications when he visits and let you know which ones may be uninstalled.

 

Disable-Unnecessary-programs

Don’t change settings you don’t understand

Remember the days when you could not paste something you had copied from excel into word? Well now you can and it’s convenient. What we don’t realize is that the two applications have been synched to work with one another and changes to one may affect the other. This is true of many applications running on windows today. Applications often prompt us to change settings and we click yes thinking that it can do no harm even if it does no good. This is a big mistake since settings for one application can affect another in a windows set up. Your managed care technician will suggest the ideal settings for your software based on your requirements.

 

Computer-GeekPC-Help

Make sure you have enough RAM for any applications you install

As you probably know, applications reside on your hard disk and run in the RAM of your computer. Modern applications incorporate more and more user requirements and hence require more space to run. Ensure that your machines have enough RAM to house not only the application itself, but also the data that it will be using. Consider a simple task of writing a blog. At the very least you will have a browser and MS-Word open. That’s a good deal in and of itself. In addition to this you will have the data you typed into word and the data downloaded through your browser. You will also have your OS already residing on the RAM along with any other applications such as virus scan or clean up running in the background. Quite a lot for the RAM to handle don’t you think? So it’s important to have a big RAM if you expect your computer to handle multiple tasks and still stay up to speed. Your managed care technician will let you know when you need to upgrade your RAM so that you do not run into problems.

To Sum Up…

 

You need GEEX ManGEEX ManGEEX Man

Categories
Apple Blog Laptops Leasing Macbook Pro

Ransomware Will Seriously Ruin Your Day!

 

 

dfsxdf   Ransomware 101   fake-ransomware

 

 

What Ransomware is and what it can do to your business?

Alternate Titles: Understanding Ransomware and its business risks

What Cryptoware (Ransomware) can do to your business

Business Risks of Ransomware / Cryptoware

The increasing cases of ransomware threats has made it necessary for business persons to understand what it is and how it might affect their business. Quite simply ransomware is software that takes charge of your data or applications, encrypts them, and then offers you decryption solutions for a fee. That’s the reason its also called cryptoware. The risks? Well here goes…

Introduction

Ransomware is an out an out criminal activity. Its not merely an attempt to steal your data. It’s a blatant kidnapping of your computer and possibly your entire network! Not only is your data encrypted, the criminals – yes it’s a criminal activity – have access to that data and they can use it as they please! One thing to remember though is that they are after money and not the data itself. Often the data may be of no use to them.

The Threat

Cryptoware encrypts your data using code which has a key. The criminals then offer you that key for a specified amount of money or else. They will threaten to make all your data unrecoverable after some time. Your data will then be in their control and they may publish sensitive information that could harm your business. Some of these criminals even pose as law enforcement officials and threaten to prosecute you! As time passes, they’ll increase the amount of ransom and worse harm even your bootstrap software so that your machine crashes. They will warn you that your entire network may become useless unless you purchase the key from them. They will give you deadlines by which you must purchase the key or risk losing your data.

ransomware  ransomwarevbcvb

The Impact

When ransomware targets individual machines, it affects only that one machine but when it targets your business, if even one machine is affected, it can spread quickly over the entire network. This means all data on the server and cloud plugins like

OneDrive, Dropbox and Livedrive is affected. Once a gateway is opened through one computer on a network, the data on the entire network can be encrypted and your business held to ransom.

ghvghvgh

The Consequences

Says Mitchell Berenson of Intermedia, the dilemma for a business affected by ransomware is whether to pay ransom or spend precious hours recovering data from backup – which often is slack because of lack of time in the first place! Whatever you do, you’ll face serious downtime which means lost business. The downtime is anywhere from 2 days to more than 5 days. Imagine all the customers that would turn to competitors in that time, not to mention all your employees being paid for sitting around doing nothing! Add to that the overtime you would pay your IT staff for recovery. And if your backup procedure is slack…

 

Some Hard Facts

Cryptoware is not limited to individuals or SMEs. It can impact big business just as easily. A survey by Intermedia found that 60% of the businesses impacted by Ransomware had 100 or more employees. 25% had more than a thousand employees. The impact began with 2 or more computers and quickly spread to over 20 in 86% of the cases. Quoting Luke Skibba – Gigabitgeek on Twitter, “After shutting down the computer of the affected user and taking her off the network, we determined she had been hit with the CryptoWall ransomware. We had 90 percent of our files be encrypted. This impacted every user in our whole company.”

Don’t Panic

Ransomware is a rapidly growing threat to businesses with even IT firms falling victim. The attacks are expected to increase in complexity. The time to take action is sooner rather than later. As they say, a penny in prevention is worth a pound in solution. Walter Chamberlee, Director (IT) from Signaturefd.com says, “Ransomware attacks are on the rise and are growing in complexity. Without the right protection measures in place, ransomware can be majorly disruptive to a business. In these cases, it’s the user downtime and the hassle for IT that’s far costlier, even if you pay the ransom.” That is not to say these attacks cannot be prevented. Managed antivirus protection can help you avoid an attack. So go for it now before it’s too late.

 

 

Call GEEX today and we can protect you from Ransomware and many other types of virus’s

Categories
Blog Laptops

ASUS All-In-One PC

Apple’s iMac is our number one best seller and whilst its functionality is important, a large part of its appeal is the statement it makes when sat on your office desk. For PC users though the choices are characterised by dull black boxes that lack the wow factor of the iMac.

However, when we blogged last year about the upcoming launch of the ASUS ET2321 we thought that things could be about to change. Now that we can provide this machine we thought it was time to take a closer look.

Saying ET2321 is nowhere near as catchy as saying iMac, but the ASUS really does make a design statement. It stands at 570mm wide and 445mm tall, but with a body that is only 50mm at its narrowest point coupled to a discreet stand means that it is sleek. Unlike the all silver iMacs the ASUS is black on silver and it is striking. So many All in One PC’s are all black and instead of looking sleek they so often end up being dull, a criticism you couldn’t level at the ASUS.

The machine features a 23-inch 1920 x 1080 LED IPS display, with a 178-degree viewing angle and 10-point multi-touch display. Beneath the metallic stand lies a fourth generation Intel Haswell processor and Iris graphics that provide all-round performance. It also gets SonicMaster audio technology with built-in speakers.

For those needing a little bit more in the graphics department it can be fitted with a dedicated Nvidia GeForce GT 740M GPU and can be specified with up to 16GB RAM. Storage options include a 2TB HDD, 128GB SSD, or a hybrid 1TB HDD and 128GB SSD configuration. As you would expect the machine has great connectivity with three USB 3.0 ports, three USB 2.0 ports, HDMI, WIFI and Bluetooth.

To conclude we really see the ASUS as an All in One PC that will appeal to the PC market. For those companies who want to make a statement when people walk into their office but don’t want an iMac this machine is perfect.

The ET2321 is available to lease from GEEX now for just £8.49 + VAT per week. If you are interested in this model please call us on 0121 285 0098 or email info@localhost