Facebook Messenger updated for iPad

Mobile devices and the apps we use on them have drastically changed the way we communicate. With platforms like Facebook, many people are simply not calling each other anymore, instead relying on Facebook’s messaging feature. In an effort to make this easier to use on mobile devices, especially the iPad, the app has recently been…

Details

Android tablets in the office

The tablet is easily one of the most indispensable devices for many business managers and owners. These highly mobile devices allow you to stay in touch with the office and also work without having to lug around a heavy or bulky laptop. Because of this, many businesses are looking to integrate tablets, especially Android tablets.…

Details

How Mac and PC differ: Part 2

We’ve explored how Mac and PC differ in terms of specifications, operating system and software; and in this article we continue to dig into other differences between the two rivals. Buying a computer is more than looking into design and specs, but also about models, availability, security, customer satisfaction and of course price. Models Apple…

Details

4 BYOD integration tips

As technology continues to expand and improve, many people have come to prefer to use their own systems over their office’s tech offerings. This is largely because many of us have newer personal devices that allow us to do so much more than the computers we use at our office. As a result, the issue…

Details

Google announces Android L

Whether you are a big Google fan or not, the tech giant is now one of the biggest companies on Earth. Each year they host an annual conference to highlight what you can expect in the coming year from the company that promises to “do no evil”. Their annual conference, I/O, is usually held in…

Details

Great LinkedIn profiles in 8 steps

There are numerous social networks a company can join, but if they are looking to connect to other businesses, colleagues or potential hires the network of choice should be LinkedIn. This powerful network is designed for professionals and offers many benefits that other networks, like Facebook and Twitter, don’t or are not able to. As…

Details

5 myths of virtualization security

Virtual machines are just gateways to a server, and cyber criminals want access to data on those servers. While you might think you’re keeping your virtual environment safe, there are several virtualization security myths which if believed can have a serious impact on your platforms, leaving them susceptible to attack. It’s vital that you are…

Details