Blog

Is Apple’s ‘Pie’ platform a game changer?

Apple is making a change to its cloud services that intends to cut down on bugs and better compete with its rivals, Amazon and Google. By combining all its cloud teams into one location, Apple will undoubtedly help to facilitate major improvements. According to sources, Apple is in the process of transferring the infrastructure behind its services to a proprietary platform with the code name ‘Pie.

Why you should upgrade to an iPhone 7

Whether or not to buy an iPhone 7 is a personal decision, and an especially difficult one if you’ve owned a previous version of the device. There are several pros and cons to consider when deciding whether an upgrade is worth the investment. Other than being influenced by reviews, tech lovers may make their decision based solely on bragging rights.

Google Pixel: is it worth it?

Google is well known for developing the Android operating system and pairing it with hardware manufactured by Samsung and HTC. But this year, Google will be taking a new course -- creating its very own smartphone, which can compete with other hi-tech hardware giants like Apple.

Office 365 and machine learning

Technology is ever-evolving and always improving. And with its new machine learning features, Office 365 is bringing new meaning to that aphorism. Long gone are the days of Clippy, Microsoft’s Office assistant, which has been replaced by far less personal, far more effective ‘intelligent’ tools.

Virtualization enhances Edge’s security

Microsoft has found a way to incorporate virtualization protocols into the security of its Edge browser. With the protection of internet browsing inside a virtual container, hackers have a harder time exploiting unsuspecting web users. Read on to discover whether this development will compel you to switch internet browsers in your office.

Social engineering and personal security

The technology of crime is evolving, and criminals get smarter every day. But when technology proves too difficult to exploit, criminals resort to manipulating information from their targets via social engineering. This burgeoning field allows criminals to trick people into disclosing sensitive information such as passwords and bank information.