What Dropbox Dropping Linux Support Says

Posted on Wednesday August 29, 2018

Jack Wallen, writing for TechRepublic: For a company to support Linux, they have to consider supporting: Multiple file systems, multiple distributions, multiple desktops, multiple init systems, multiple kernels. If you're an open source developer, focusing on a single distribution, that's not a problem. If you're a company that produces a product (and you stake your living on that product), those multiple points of entry do become a problem. Let's consider Adobe (and Photoshop). If Adobe wanted to port their industry-leading product to Linux, how do they do that? Do they spend the time developing support for ext4, btrfs, Ubuntu, Fedora, GNOME, Mate, KDE, systemd? You see how that might look from the eyes of any given company? It becomes even more complicated when companies consider how accustomed to the idea of "free" (as in beer) Linux users are. Although I am very willing to pay for software on Linux, it's a rare occasion that I do (mostly because I haven't found a piece of must-have software that has an associated cost). Few companies will support the Linux desktop when the act of supporting means putting that much time and effort into a product that a large cross-section of users might wind up unwilling to pay the price of admission. That's not to say every Linux user is unwilling to shell out the cost for a piece of software. But many won't.

 

Quick Guide to Virtualization as a DR plan

Posted on Wednesday August 29, 2018

Although many business owners think that Virtualization and Disaster Recovery (DR) are two separate services, the former can actually be used as a legitimate solution to the latter. Here's how it works, along with some pointers to keep in mind should you choose virtualization as your disaster recovery plan.

 

Utilize these VoIP features more often

Posted on Tuesday August 28, 2018

Voicemail, Do Not Disturb, and call recording are some of the obvious reasons why companies choose VoIP services for their communication needs. But other VoIP features are often underutilized, like customizable hold music or in-call coaching. For a more efficient work flow, check out these overlooked features.

 

New Office 365 cyberattack on the loose

Posted on Monday August 27, 2018

Phishing scams disguise malicious links and emails as messages from trusted sources. The most recent scam to watch out for almost perfectly imitates a trusted invitation to collaborate through Microsoft SharePoint. It's a three-step attack that's easy to avoid if you know how it works.

 

7 Ways to personalize your Windows 10

Posted on Friday August 24, 2018

Whether you want to have a darker color scheme, run several apps at the same time, or display multiple desktops, Windows 10 gives you many options to personalize your PC. And while some customization options are less obvious than others, it is worth the effort to get your Windows 10 to look and function the way you want it to. Here are a few things you can do to personalize your PC.

 

4 Security risks of the BYOD strategy

Posted on Thursday August 23, 2018

Taking work home, or practically anywhere, has never been easier. The bring your own device (BYOD) strategy has become a popular approach for many businesses to conduct work more efficiently and flexibly. But this strategy is not without risks. BYOD, if not implemented correctly, can make your system susceptible to a number of attacks. Here are a few security hazards you should keep a close eye on.

 

Page:   1...286287288289290291292293294...424

Celebrating 35+ Years

Managed Computer Support Services

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016