Blog

Outlook Web App boosts collaboration

Outlook Web App boosts collaboration

When people send files as attachments, they’re often looking to collaborate with others for feedback and improved work quality. This, however, has been a time consuming process up until now. For example, when you send an email to your colleague, they must download the file, make their edits, re-attach the file to a new email and then send it back to you.

How Mac and PC differ: Part 2

How Mac and PC differ: Part 2

We’ve explored how Mac and PC differ in terms of specifications, operating system and software; and in this article we continue to dig into other differences between the two rivals. Buying a computer is more than looking into design and specs, but also about models, availability, security, customer satisfaction and of course price.

Better data collection

Better data collection

As businesses continue to become increasingly networked, there is an exponentially increasing amount of data being made available to them. While this data can be really useful, a lot of it can also be less so, or even useless. However, you are going to continue to collect data, and in order not to be overwhelmed with the sheer volume you should have a well defined data collection system in place.

Part 2 – Increasing content shares

Part 2 – Increasing content shares

In the first part of this article, last month, we began to take a look at the content companies create for social media and how they can go about not only getting it shared but also increasing the overall shareability of the content they create. From creating longer blog articles, to using images, and playing on certain emotions, we shared five useful content sharing tips.

Office 365 roadmap launches

Office 365 roadmap launches

For many businesses, the cloud and cloud-based solutions are becoming increasingly popular. Microsoft Office 365 is one of the most commonly integrated cloud-based solutions amongst small to medium businesses. With a suite of familiar and powerful apps, it offers a wide variety of features.

5 myths of virtualization security

5 myths of virtualization security

Virtual machines are just gateways to a server, and cyber criminals want access to data on those servers. While you might think you’re keeping your virtual environment safe, there are several virtualization security myths which if believed can have a serious impact on your platforms, leaving them susceptible to attack.