Blog
Mozilla and Microsoft abandon root certificate authority under a cloud of suspicion
Mozilla and Microsoft have announced that they will stop trusting a root certificate authority (CA) that has been accused...
Louisiana's OMV data breach exposed the personal information of nearly all residents
Louisiana drivers face risk of identity theft after massive OMV data breach...
Skype Business: What it is and why you should have it
Microsoft 365 had another service outage on Monday, affecting users who rely on apps...
AI will kill these jobs (but it will also create new ones)
Generative artificial intelligence (AI) tools like Chat GPT are rapidly gaining ground, allowing technology to...
AWS, Microsoft and Google offer different cloud solutions: this is how they compete in the market
Cloud computing is a rapidly growing industry that offers various services and benefits to businesses and...
Ransomware attacks declined in April, but remained at record levels
Ransomware is a type of malicious software that encrypts the victim's data and demands a ransom for...
Google introduces AI updates to Workspace collaboration suite
Google has announced a host of new features and enhancements to its AI-powered Workspace collaboration suite...
How to use Excel formulas and functions
A formula is an expression that operates on values in a range of cells in Excel. Using formulas, you can perform...
Handy keyboard shortcuts in Outlook for Windows and Mac
If you use Outlook for your email and calendar, you might want to learn some useful keyboard shortcuts...
Google Pixel Fold: 7 unfiltered thoughts after 8 days with the device
The Google Pixel Fold is one of the most anticipated devices of the year, and I was lucky enough to own one...