About Chris Wanamaker

This author has not yet filled in any details.
So far Chris Wanamaker has created 344 blog entries.

The guide to choosing the best Android tablet to gift

Gadgets are one of the most popular choices this season. Surely no one will be disappointed if they receive an Android tablet, but it is still ideal if they get one that best fits their lifestyle. If you’re considering giving an Android tablet as a present, you’ll quickly find the selection overwhelming. Here are some tips that can help you zero in on the right one.

What’s your budget?

Giving gifts shouldn’t burn a hole in your pocket. The great thing about Android is that there are tablets available for a wide budget range, from the ridiculously affordable yet highly praised Amazon Fire HD 10 (from $149.99 on Amazon.com) to the top-of-the-line Samsung Galaxy Tab S6 (from $795.99).

What do reviews say about the product?

Consider expert reviews before buying an Android tablet. There are a ton of websites dedicated to reviewing tablets and other mobile devices. Take for example the well-known Engadget, or Trusted Reviews. Sites like these generally give a good overview […]

The guide to choosing the best Android tablet to gift2019-12-11T08:00:20-07:00

Should you replace your Mac?

If you’ve owned a Mac for quite some time, it’s probable that you’ve gone through a few issues while using it. And after a while, using it can be more of a hassle than a convenience. If you’re already experiencing some major issues, it may be time to replace your Mac. Here are some telltale signs that you should.

Your device can’t support the latest macOS version

Apple releases a new version of macOS every September or October. Typically, Mac models from the past several years are supported. So if your device can’t update to the latest version, it’s a sign that you need to have your Mac replaced.

As of this writing, the latest macOS version is 10.15 Catalina. Here are the following Mac models that support the update:

  • MacBook (2015 and later)
  • MacBook Air (2012 and later)
  • MacBook Pro (2012 and later)
  • iMac (2012 and later)
  • iMac Pro (2017 and later)
  • Mac Pro (2013 and later)
  • Mac mini (2012 and later)

This means that devices made earlier than those in the list cannot install macOS Catalina. For […]

Should you replace your Mac?2019-12-09T08:00:33-07:00

What Wi-Fi router features to look for

Wireless routers are essential for operating a modern business. Routers allow one network connection to essentially be split into many and then shared by different users and devices — usually over a Wi-Fi connection. If you are looking for a new Wi-Fi router for your office, there are some important features you should be aware of.

Network type

Look at any router and you will quickly see that there are a number of different networks available. The four most commonly found are 802.1b, 802.1g, 802.1n, and 802.11ac. These designations indicate how fast the router can transfer wireless data, with 802.11ac being the fastest of these four. Those who want to connect multiple devices via Wi-Fi or cable may do better with 802.11ac router.

Throughput

This is closely associated with the router’s network type, and is usually one of the first things listed on router boxes and specifications. To spot the router’s throughput, look for Mbps. This indicates the speed at which the router is […]

What Wi-Fi router features to look for2019-12-06T08:00:43-07:00

Why telephony and VoIP attacks continue

Hackers will never stop looking for new ways to hurt your business. One way is through launching denial-of-service (DoS) attacks on Voice over Internet Protocol (VoIP) systems. Read on for a complete rundown of this cyberthreat.

Denial-of-service attacks

The end goal of any DoS attack is to overwhelm a system with so many requests that the system is eventually forced to shut down. Telephony DoS (TDoS) attack is a subcategory leveled at VoIP systems. Alarmingly, this attack is commonly used against hospitals and 911 phone lines. Much like ransomware, some TDoS attackers even demand a ransom to halt the attack. They take advantage of cryptocurrencies and caller-ID spoofing to make it incredibly difficult to identify attackers.

TDoS attacks generally employ fewer resources than the DoS attacks that are designed to cripple IT systems such as networks, servers, and software. At its most basic, all that a TDoS attack requires is an automated phone dialer that calls a target phone number and hangs up […]

Why telephony and VoIP attacks continue2019-12-04T08:00:35-07:00

Predictive forecasting in Office 365’s Power BI

People have always been intrigued by what the future holds. Seers use crystal balls and tarot cards, but business managers such as yourself need a tool that’s based purely on science. If you’re an Office 365 subscriber, you now have Power BI’s predictive forecasting at your disposal.

Predictive forecasting uses a variety of statistical techniques, such as modeling and data mining, to analyze current and historical facts to make predictions about the future.
The predictive forecasting function of Office 365 provides users with the skills to generate reports, interactive charts, and 3D visualizations of business performance.

Its built-in predictive forecasting models can automatically detect seasonality in the data, though users can override this by applying a non-seasonal algorithm if they so desire. It also enables users to see how results are affected by adjusting the parameters of the time or confidence interval assigned to be analyzed. Simply put, users can perform advanced forecasting without the complexity that usually accompanies these kinds of processes.

Power BI’s predictive forecasting can also help fill […]

Predictive forecasting in Office 365’s Power BI2019-12-04T07:23:25-07:00

Simple steps to protect data in the cloud

No business wants a data breach. According to IBM’s 2019 Cost of a Data Breach Report, a single data breach can cost organizations $3.92 million on average. If you plan to migrate your organization’s data to the cloud or if it’s already there, you may think that your data is now safe from data breaches. That couldn’t be further than the truth. Take a proactive stance in mitigating data breaches by following these simple steps.

The cloud opens up some great benefits for businesses and is here to stay. However, as with all technology advancements, you need to also be aware of its vulnerabilities and security issues. If you want to proactively prevent data security breaches in the cloud, then here are five tips to follow:

Know your cloud apps:

Get a comprehensive view of the business readiness of apps. Ask questions like: Which ones render you more or less prone to a breach? Does an app encrypt data stored on the service? Does it separate your data from […]

Simple steps to protect data in the cloud2019-12-04T07:23:19-07:00

BI is for small businesses too

Business Intelligence (BI) has conventionally been limited to big business; only they can afford pricey experts with specialist knowledge who can leverage BI’s value. But the rise of self-service BI tools has leveled the playing field, allowing small- and medium-sized businesses (SMBs) to get in on the game too. And with SMBs now producing far greater volumes of data than in the past, there’s never been a better time to put BI to use in your organization. Here’s what you need to know about BI.

You’ve already got the data you need

It’s easy to underestimate the amount of data your SMB already has at its disposal. In every area of your business, from finance and sales to customer relations and website management, the software packages you use to simplify your everyday operations are packed with reams of information that most of us don’t even think twice about. By talking to key stakeholders in your organization’s various departments, you can get an idea of the kind of data you […]

BI is for small businesses too2019-12-04T07:20:17-07:00

Windows 10’s November 2019 Update: What you need to know

Microsoft rolled out the latest Windows 10 update on November 12. And though it’s a relatively small update, it comes with new features that will improve your Windows 10 computer’s functionality and performance.

Also known as Windows 10 version 1909 or 19H2, the Windows 10 November 2019 Update can be installed by heading to Settings > Update & Security > Windows Update. Click Check Updates > Download and install now. Once the update is installed, that’s it — there are no long reboots and old Windows installation purges needed, unlike with previous updates. Just restart your PC and enjoy the small but helpful tweaks to your OS.

Windows Search and File Explorer integration

Previously, files on OneDrive were considered separate from those on your computer. Later versions of Windows 10 allowed file syncing between OneDrive and your PC. Doing a “This PC” search would show you a long list of the files stored on both OneDrive and your computer.

With Windows 10’s latest update, Windows Search indexes your computer. As such, […]

Windows 10’s November 2019 Update: What you need to know2019-12-04T07:20:08-07:00

BYOD tips to improve security

Lax bring your own device (BYOD) policies are a growing concern for businesses. If not managed properly, these can pose security risks to your organization. How can you mitigate the risks associated with the BYOD trend?

Whether your employees are using smartphones, tablets, or laptops, you need a BYOD security policy. Additionally, you need to be aware of the key BYOD security risks:

  • Loss or theft of device – Employees often bring their personal devices wherever they go. This means there’s a higher chance of devices being lost or stolen, and a greater risk of the company data that’s stored or accessed on these being compromised.
  • Data loss – In the event that a device is lost, stolen, or damaged, any locally stored data may be lost permanently if it’s not backed up in real time.
  • Man-in-the-middle (MITM) attacks – Public Wi-Fi spots are convenient for getting some work done, but they’re also popular hunting grounds for cybercriminals who use MITM to intercept data being transmitted over public […]
BYOD tips to improve security2019-12-04T07:20:01-07:00

4 Ways EMRs assist in medical operations

Electronic medical records (EMR) digitize your paper medical records and, when properly implemented, can generate a positive return on investment and improve organizational efficiency. The major drawbacks of paperwork are that it hinders a healthcare institution’s ability to treat patients, makes medical operations slower, and decreases overall efficiency. EMR eliminates the time required to record a patient’s medical information on paper, information that could also be misinterpreted due to poor handwriting. Here are just a few reasons to switch from paper records to EMR.

Better communication

Fast and accurate communication between medical departments is key to providing quality healthcare. From ambulance staff to emergency room doctors, a healthcare institution must have an effective means of communication, and this is where EMR comes in. EMR software enables frontline staff to quickly transfer a patient’s medical records to other departments in real-time. When the patient’s information is recorded in the system, other medical staff will no longer need to question his or her conditions again and can proceed to treat the […]

4 Ways EMRs assist in medical operations2019-12-04T07:18:17-07:00