Posted on Jan 31, 2012
Are you ready for another change to Facebook? Well, it seems we don’t have much of a choice.
This means Timeline, the reverse-chronological display of a user’s history on Facebook and other life events, which replaces and combines a user’s Facebook Wall and Profile, will become non-optional. No specific date was given, and the language used (“roll out”) suggests that the change won’t occur on one single date for all users, but that batches of users will be transitioned on different dates.
Before Timeline strikes your Facebook account, there are a number of key things to know about the feature.
Basically, until recently, users were able to opt-in to Timeline; now they will be automatically switched over. When you get Timeline, however, you’ll have a seven-day preview period, during which you can delete the content that is on your profile and hide what you don’t want displayed.”
From the time you receive notification that you’ll be getting Timeline, whether you want it or not, you have seven days—or until you hit “publish,” whichever comes first—to check it out privately, before anyone else can see it. You can also jump the queue and turn Timeline on now , but do note that once you turn it on, you can’t turn it off.
Check out more information about things you need to know about Facebook Timeline and some suggestions.
If you have any questions about Facebook Timeline then contact us at FedSolutions to better assist you.
Posted on Jan 31, 2012
Loyalty to a phone carrier is definitely news with all the hoops customers regularly deal with. T-Mobile has decided to reward their customers.
Although Apple has been reluctant to offer an iPhone deal to the fourth US carrier, many T-Mobile subscribers have decided to stay behind their favorite carrier instead of going to Sprint, AT&T or Verizon to get the latest iPhone.
More than one million T-Mobile customers have bought unlocked iPhones with which they access T-Mobile’s compatible 2G EDGE network, which is far slower than those offered by rivals.
According to TmoNews:
T-Mobile has decided to repay the customers’ loyalty and offer improved support for iPhones running on its network from January 30th, although this doesn’t mean faster speeds will be available.
As TmoNews discovered from a leaked internal document, T-Mobile’s new strategy towards unlocked iPhone owners, includes providing “common procedures, information about features and specifications and other basic device questions.” In addition, iPhone owners who are also T-Mobile customers will have dedicated support pages on the carrier’s Community webpages.
It’s it important to know which Mobile devices are best, especially in a work environment. IT Departments support mobile devices and work to secure a organizations environment. Talk your you IT Support about securing mobile devices in your environment. Have a chat with us at FedSolutions!
Posted on Jan 30, 2012
This is pretty cool stuff! The President is participating in Google’s “Hangout”, it goes to show how important it is to use up to date technology to communicate. IT has come along way and it’s being embraced from the top.
President Barack Obama plans to “hang out” in a video chat room to answer questions about his upcoming annual State of the Union address, part of a White House effort to test new social networking tools and the latest evidence of the growing intersection of social media and politics.
Posted on Jan 30, 2012
The cyber security attacks are still active and and they don’t seem to be going away anytime soon. Case in point: the recent Symantec breach.
Last week, Security software publisher Symantec confirmed it was the victim of a cyber attack, resulting in the theft and disclosure of critical product source code. Earlier this month, the online-collective Anonymous stated, via Twitter, that it possessed portions of the code in question and planned to release it in support of a class-action lawsuit filed by consumers. The suit claims Symantec employed scare tactics to encourage users to purchase its security software. Via its website, the company affirmed Anonymous’ claims, citing a source code heist dating back to 2006. As a result of the breach, Symantec strongly recommends that users apply the latest maintenance patches. This recommendation applies for Norton Antivirus Corporate Edition, Norton Internet Security, Norton SystemWorks, Symantec Endpoint Protection 11.0, and Symantec AntiVirus 10.2.
Equally important, Symantec confirmed that their pcAnywhere solution is at increased risk. They recommend using that software for “business critical purposes” only.
As always, don’t hesitate to contact us at FedSolutions if you have any questions about this security breach.
Posted on Jan 27, 2012
Here we go! Things may not always be what they seem, but Google seems to have an answer for us.
Privacy, is the issue at hand. The web is changing and the way of doing business has changed online. Where do the limits of privacy stand with you? It seems there is an uproar with their announcement of “One Policy, One Google Experience”.
March 1st, 2012, 60 different privacy policies across Google will come into play. This policy is raising eyebrows among users and now lawmakers.
A leading lawmaker on privacy issues said on Thursday he would ask for a probe into whether recently announced changes in how Google handles consumer data violated an agreement it made with the U.S. Federal Trade Commission.
Representative Edward Markey was also one of eight U.S. lawmakers who sent a letter to Google expressing concern that a planned consolidation of user information may make it more difficult for consumers to protect their privacy.
The lawmakers said the announcement raises questions about whether consumers will have enough power to opt-out of data sharing systems. They also asked what security steps are being taken to ensure the safety of customer data.
“While Google suggests that the purpose of this shift in policy is to make the consumer experience simpler, we want to make sure it does not make protecting consumer privacy more complicated,” the lawmakers said in a letter to Google Chief Executive Larry Page.
Stay tuned as things move forward. We’ll keep you posted.
At FedSolutions, being an IT Consulting & Management organization, we believe Technology is a fundamental tool that significantly impacts the ability of an organization to achieve its mission. An important aspect within that belief is Privacy and Security that we provide to our clients. We’re open to a good conversation.
Have a great weekend!
Posted on Jan 27, 2012
Check this! Someone is looking out for you. This app from Lookout Mobile is a secure tool to keep Malware out of your Mobile phones.
Lookout Mobile Security’s latest project app peels away some of the secrecy and uncertainty surrounding mobile threats. The Threat Tracker provides information about mobile threats going back two weeks.
The app is meant to help people understand that mobile threats do exist, explained Derek Halliday, senior product manager for Security at Lookout. “We’re showing people what they’re being protected against,” he said. It was originally created by a Lookout summer intern in 2011.
Here’s how it works. Tap the home screen that opens when the app launches, and the app jumps to a spinning blue globe of Earth. It populates the globe with green dots, representing people around the world that Lookout says it has protected from threats. You can drag the globe around to see how different parts of the world are affected.
Below the globe is a timeline chart of mobile malware threats over the past two weeks. It gets updated hourly, and you can slide your finger along it to change the map of blocked threats above. At the top of the app are three links. The one in the upper left corner goes to the Lookout Mobile Security listing in the Android Market, while the question mark explains the app’s features.
Talk to us FedSolutions about your Mobile device needs for your IT Consulting needs. Malware threats are going to be a norm especially as predicted this year. So stay in the know and let us advise you on the best Business tools to keep your organization secure.
Posted on Jan 26, 2012
Ready or Not, here it comes! Another Hack!
Just like the President addressed in the State Of The Union speech about growing dangers of Cyber Threats. This is just the beginning of the battle to come, if we don’t get organized and combat these type of threats.
Another dangerous escalation of hackers sabotaging infrastructure, an alleged attack from overseas disrupted service on three unnamed Pacific Northwest railway lines. In the attack, the hackers managed to change railway signals, causing short delays in schedules.
The information about the attack was included in a government e-mail from the Transportation Security Administration obtained by the NextGov website.
According to the e-mail, the TSA uncovered three IP addresses that were linked back to the intruders, which is what lead the organization to believe that “some of the possible causes lead to consideration of an overseas cyberattack.” However, no specific country was named.
The purpose of the e-mail, which came several days after the attacks, was to update everyone in the transportation sector of the events that took place and lay out the nature of the attack.
The e-mail stated one railroad, which the TSA declined to name, “was slowed for a short while,” — actually 15 minutes in duration — by disrupting railway signals. The attack lasted intermittently for two days. On the second day, Dec. 2, 2011, another railroad was targeted.
The serious nature of the attack was emphasized by the fact that the captured IP address were sent out as an alert to hundreds of railroad companies and transportation agencies across North America.
The Department of Homeland Security (DHS) at first acknowledged the breach, or what it called “anomalous activity,” affecting railroad train schedules but it later recanted, according to a DHS statement given to Wired. Rather, the Department said it did not appear to be a targeted attack, characterizing it instead as a “random” incident that accidentally affected the railway system.
A spokesperson for the Association of American Railroads also denied that the attack was meaningful.
It’s time to get with the program and really address the vulnerability of Cyber Threats. It’s real and there’s only more to come. This year alone you can expect the unexpected, so don’t be left hanging a by a shoe string. We can help you right here at FedSolutions with a simple conversation about our IT Consulting Services, to combat Cyber Threats. Let’s get talking now!
Please feel free to make comments below or simply contact us!
Posted on Jan 26, 2012
Forget online backups! Now files can be updated automatically so that users have their up to date work ready to go.
Cloud storage service Mozy, announced public beta availability of Mozy Stash, a new feature that provides customers with a method of accessing files across multiple computers and mobile devices.
Stash combines MozyHome’s online backup service with the ability to synchronize files across devices in near real-time. Data can be viewed from any computer, regardless of the operating system, as well as mobile devices including iPhones, iPads and Android devices.
“All your data is in the cloud, so that you can access it anywhere,” said Gytis Barzdukas, director of product management at Mozy, which is now part of EMC-owned VMware.
According to Computerworld.com
“Stash uses a simple single-folder model which complements your online backup, so that all your data is available where and when you need it, even if you choose not to synchronize it,” said Russ Stockdale, Movy’s general manager, in a statement. “Stash makes it easy to move from your computer at the office to your computer at home, without having to email files to yourself or mess around with USB drives.”
Stash draws storage from the user’s MozyHome plan. For example, with a 50GB plan and where 30GB is already used or online backup, the remaining 20GB is available for Stash. Similarly, for MozyHome Free subscribers, Stash draws from the user’s 2GB of storage.
The Stash feature doesn’t allow file-sharing between different users, but that option is expected to be added later this year, Barzdukas said.
While Mozy apps, also a file sync service, already allows Android and iOS devices to access data protected with MozyHome via iOS and Android devices, Stash goes a step further.
Let talk more about Mozy Stash at FedSolutions. We’re always here to help a lending hand with our IT Support skills.
Posted on Jan 25, 2012
Did you know that Hotmail shoots at a height of 2 million users of iOS with the release of iOS 5 and iPhone 4S? Every day there are 100,000 new activations.
The arrival of iOS 5 has enabled Microsoft to further extend its network of users who use Hotmail mobile. It has grown enormously in fact, the number of users with accounts that Hotmail receives from iPhone, iPod Touch and iPad, reaching 2 million.
That number was back in November 2011, now the numbers have reached to a grand 12 million users.
Hotmail is manageable by default in iOS and is not necessary to use any external software, even with the arrival of management notifications on the fifth version of Apple’s mobile operating system; users can more easily see the arrival of any new emails.
Among the devices with iOS heart, the most used to access the Hotmail account are in order the iPhone 4, iPhone 4S, iPhone 3GS, the iPad 2 (WiFi version only), iPod Touch 4 and follow all other versions of the device of Cupertino.
Gmail is Hotmail’s main competitor, and landed on iOS but was immediately withdrawn for technical reasons. Microsoft has certainly enjoyed the launch of iOS 5 and iPhone 4S for certainly hinder further expansion of Windows Phone, it must be said that thanks to the release of two new Apple has skyrocketed the number of those who use the product for the management of electronic mail.
Talk to us about Mobile devices that best fit your IT departments needs at FedSolutions.com
Thanks for reading!
Posted on Jan 25, 2012
It was all a dream, then this….Microsoft Office for my iPad.
It has been a few years now since I first moved to the Mac and iOS platforms and I remember all too well the concern I had over not having a compatible copy of Microsoft Office. How would I get things done? I was able to learn from a Mac savvy friend, that Microsoft Office was available.
Now, with my new iPad, I was asking myself the same thing all over again? Solution is here and made easy!