Blog

Google OKs HTML5 as the default in Chrome

Google OKs HTML5 as the default in Chrome

Google is out to make the user’s experience more secure and efficient with its recent announcement that it will disable Flash and implement an HTML5 default browsing protocol. This change won’t be implemented all at once, but will start by changing the settings of 1% of Chrome users in December 2016 before eventually expanding that number over the next year.

AWS creates “Glue” service for data analysis

AWS creates “Glue” service for data analysis

Recently, Amazon Web Services (AWS) announced the creation of a new data analytics tool to lighten the burden on businesses when analyzing data in the cloud. This tool, referred to as “Glue,” is meant to clean up and organize data that comes into the cloud from various sources so that it can be analyzed by business intelligence software and data analytics experts.

Containers Vs. VMs: performance variations

Containers Vs. VMs: performance variations

Virtual containers have incrementally increased the ability of users to create portable, self-contained kernels of information and applications since the technology first appeared in the early 2000s. Now, containers are one of the biggest data trends of the decade — some say at the expense of the virtual machine (VM) technology that preceded them.

Sharing business data: SharePoint/OneDrive

Sharing business data: SharePoint/OneDrive

Office 365 comes with a variety of storage and sharing options that promise to make life easier and more productive for business owners. OneDrive and SharePoint share many of the same features, but differ in some of their basic management options. Unless you know what to look for, it might be hard for you as a business owner to choose the best option for your company.

New year, new cyber-threats

New year, new cyber-threats

Have you had to deal with security issues in the past year? Brace yourself, as there are more to come. For this reason, security experts have become indispensable members of society, who guard tech-dependent individuals and businesses against malicious attacks that pose threats to their privacy and livelihood.