Windows 10 might not be free anymore, but there are still a lot of computers that will need to upgrade over the coming years. With that in mind, we wanted to offer a few quick words of advice on what to watch out for when you upgrade to Windows 10.
We’re a little more than a week into the Rio 2016 Summer Olympics. I’ve seen Prophet’s IT team pull off miracles that rival Penny Oleksiak’s gold medal in the 100M Freestyle, so I think it’s time we put the talents of IT professionals on display for the world to see.
Like your hot water heater or your brakes, you probably don’t think much about your server until it’s broken. The problem is that replacing a server takes more than a call to the plumber or your mechanic so you probably want to know whether it’s on its last legs.
Microsoft has finally rolled out a Canadian data center. So, whether you need your data stored in Canada or just prefer it that way, you can finally start taking advantage of cloud offerings like Azure, Office 365 and Dynamics CRM Online.
Windows 10 released, to much fanfare, last year on July 29th. Now we’re just about six weeks from the free upgrade deadline and, if you were planning to upgrade, it’s time to pull the trigger.
Exchange 2016 was released a few weeks ago. It’s always a big deal when a new version of everyone’s favorite email server debuts but, if you though Microsoft’s much touted new direction (Surface Book! HoloLens!) meant big changes to Exchange, prepare to be disappointed.
In the weeks since Windows 10 I’ve been giving a lot of presentations on what it is and what’s different about it. I’ve upgraded personally and I think it brings back what we loved about Windows 7 without completely eliminating the best ideas from Windows 8. Of course, not everybody is the Windows 10 booster that I am and there are some compelling reasons to hold off… for a while.
Microsoft recently announced that there’s a critical vulnerability affecting all versions of Windows. The issue is related to how Windows handles certain special fonts. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.