SpireTech Blog - Category: Hardware
News related to computers, mobile, and accessories.
used with permission from Tektonika (HP), by Karen Gilleland
Unlike fine wine, your cyber assets don’t get better with age. Any PC more than four years old is not only costly to keep, but it’s also hack-friendly tech that could pose serious office security risk. Old PCs lack the built-in security triggers needed to repel the thousands of malware threats discovered each hour. With new technology, you could avoid 70–80 percent of the top malware detected.
Down-level hardware could potentially jeopardize your business—and that risk carries a price tag far exceeding an investment in state-of-the-art technology. As Two River Community Bank put it, “The risk just isn’t worth it.” There’s no reason to stick with outdated hardware, especially when computing power is growing exponentially and faster than ever. Older hardware may be costing you precious time, and the longer you delay updating old equipment, the further behind you’ll fall in the skills, knowledge, and technology needed to compete with companies on top of the curve. Read more...
used with permission from HP Tech@Work
Workstations have been around long enough now that it’s safe to start talking about how modern versions of these machines are nothing like the pricey behemoths grandpa used back in the ‘90s.
Today’s workstations are vastly improved with processing, graphics and storage capabilities being enhanced on a continual basis. At the same time, they have become much more compact, mobile, stylish and affordable over the years, with prices on some models starting at less than $1,000.
Considering all these benefits, it should come as little surprise that small- to mid-sized businesses are starting to consider workstations as an alternative to the consumer PCs they’ve traditionally favored.
But how can SMB owners determine if workstations are right for them and, if so, how to select the best machines for their particular needs? Read more...
used with permission from FTC.gov., by Phoebe Rouge
You’ve read recent news stories about a vulnerability discovered in the WPA2 encryption standard. (Some reports refer to it as KRACK – Key Reinstallation Attack.) Should this be of concern to your business? Yes. Does it warrant further action at your company? Absolutely.
If you or anyone at your business uses a smartphone, laptop, or IoT device connected to a Wi-Fi network, the information sent over that network could be at risk. Researchers have found a bug that lets attackers “break” WPA2 – the encryption that protects most wireless networks – leaving data you send exposed.
The bad news is that this isn’t just a problem with a specific device or manufacturer. It’s a problem with the encryption standard nearly all Wi-Fi devices on the market use to scramble communications, prevent eavesdropping, and deter tampering. The chilling upshot is that if anyone at your business uses a device to connect to a wireless network at work, at home, or on the road, this bug means they can’t rely on that connection being secure. Read more...
used with permission from the Microsoft Devices Blog
Writing a report, research paper or even a novel is easy on your Surface.
The Surface family of devices is known for its versatility, and nowhere is that more evident than in the many ways you can interact with your Surface. Whether it’s through the keyboard, Surface Pen, or by voice, you can always connect with loved ones, friends, and colleagues.
Taking notes on your Surface is a great example. Jotting a quick note or even writing a long-form story can be done by typing, writing by hand, or even by dictation.
And with Windows 10, your Surface continually collects and assesses your handwriting and voice so it can improve character recognition and provide you with a personalized user dictionary and text completion suggestions.
For most people, typing is the easiest way to take notes on a Surface device. On a Surface 3, Surface Pro 3 or Surface Pro 4, make sure you attach a Type Cover or, if using a Surface Book, ensure that the display is locked into the keyboard. Read more...
The postmortem and what you need to know
We’ve known for some time that there are a finite number of writes that a solid state hard drive can endure. This is because the type of memory commonly used for SSD data storage can only be erased a certain number of times.
SSD drive manufacturers publish this specification as Life expectancy, Endurance, or Mean time between failures. More expensive Data Center type SSD’s have a longer endurance specification.
To mitigate drive failures and extend drive life, manufacturers set aside a certain number of blocks beyond the published capacity and use these as spare blocks. When a block of memory wears out, a spare block is used in its place.
To complicate matters, if you use SSD’s in a server application behind a RAID card, drive health information is hidden from monitoring by typical operating system tools. This is why we were caught by surprise with a recent failure – normally we would have been alerted by our monitoring tools. Read more...
Used with the permission of http://thenetwork.cisco.com
by Marc Solomon, Vice President of Security Marketing
As connectivity continues to expand, security must advance right along with it.
More than thirty years ago, John Gage of Sun Microsystems coined the now famous phrase: “The network is the computer.” Indeed the true power of the computer comes from being connected, and with more devices connected the power grows exponentially. We see this today with cloud computing and increasingly with the Internet of Everything (IoE) which is creating unprecedented opportunities for networked connections among people, processes, data, and things.
Largely because of this exciting evolution, we are now facing a similar inflection point with respect to security. To capture opportunities made possible by ever-expanding connectivity, security must evolve in lock-step. In effect: “The network must become the security device.” Let me explain.
The widespread adoption of the cloud and the IoE brings new business opportunities in the form of greater speed, efficiency, and agility, while also changing the game on where data is stored, moved, and accessed. Read more...
In honor of the recent release of the Apple watch, I thought I’d take a look back at the electronic stuff I’ve worn on my wrist over the years. I’m embarrassed by most of this now, but I can laugh at myself – so here goes:
Timex LED watch. Mine was black plastic of some sort, not this shiny stuff. I think my parents got one for me so I’d be on time for classes or know when to come home. Pretty nasty looking now, but very common in its day. This one reminds me of Battlestar Galactica – maybe it’s the metal, or the red LED.
The Casio calculator watch. Highly coveted in days gone past. Looks like you can still buy one of these, but I’m not sure why you’d want to. I remember pushing on the little rubber buttons with my fingers, and how sometimes a pencil or eraser was easier to get in there. Read more...
A.K.A. how I weaned myself off my iPad for good.
So recently I upgraded my old boat-anchor notebook for something small and light, eg a Surface Pro 3. Unlike my old laptop, which had a 21″ screen (yes) and matching wheel-bag to haul it around with, the Surface sports a little 12″ screen.
So I needed a new external monitor, and was contemplating a two-monitor setup like many of us use here. I determined that for the price of two smaller monitors, I could buy one 28″ 4k monitor (yes, that’s 3840×2160 resolution) and hook it up to the Surface’s mini displayport connector.
I had some concerns that text might be too small at that resolution, but on the 28″ monitor it is just fine for me. I can use the windows-right and windows-left arrow keys to dock programs on the left or right side of the screen and simulate a two-monitor setup. Read more...
used with permission from HP Technology at Work
These days, a notebook without an internet connection is like a bicycle without pedals. You can still use it, but you won’t get very far. That’s why it’s all the more frustrating when you lose your wireless internet connection and your IT department or helpful officemate aren’t there to provide a quick fix.
A savvy user, however, doesn’t have to be at the mercy of other people’s schedules. With a few simple troubleshooting tips—and a basic understanding of how your wireless network is set up—you can easily take care of many common issues yourself and quickly return to peak productivity. Here’s how .
Looking for trouble
Fixing your wireless internet connection is in large part a process of elimination. You need to check each link in the chain that takes you online and determine which link is—or is not—causing the issue. For most environments, you’ll find the problem in one of these four areas:
used with permission by HP Technology at Work
Do you feel like you spend as much time evaluating new technologies as you do performing your job responsibilities? An over-exaggeration for sure, but carefully choosing network and computing technology obviously helps to determine whether your business operates as efficiently, productively or competitively as possible. That said, what’s the deal with Microsoft® Windows Server 2012?
Introduced last September in Datacenter, Standard, Essentials and Foundation editions—the latter two specifically targeted at small businesses with a maximum of 15 and 25 users, respectively—Windows Server’s sixth release has received mostly favorable reviews for its installation options, user interface, task manager, IP address management and active directory. It’s also received high marks for its inclusion of Microsoft’s newest Hyper-V, resilient file system (ReFS) and Internet Information Services (IIS) 8.0, as well as its overall scalability.
Naysayers lament the elimination of the popular Windows Small Business Server, Windows Home Server and Microsoft Exchange from the new lineup. Read more...