Posted on March 27th, 2019
Posted on January 5th, 2019
(and What’s Overhyped)
Brian X. Chen, The New York Times, January 4, 2019
A.I. that responds to your voice. Next-generation wireless networks. If this year’s biggest consumer technology trends have a familiar ring, there’s a reason for that.
Posted on May 28th, 2018
An analysis by Cisco’s threat intelligence division found that hundreds of thousands of routers, from a range of manufacturers, were infected by the malware linked to the hacking group Fancy Bear. Credit Ozier Muhammad/The New York Times
By Louis ...
Posted on January 10th, 2018
We’re barely two weeks into the New Year. As mine has, your enthusiasm for big resolutions may have already dimmed. Still, there may be ways to hack the onerous New Year's resolution thing. How? Pick up a few good tech habits.
Instilled as habit...
Posted on December 18th, 2017
If you sometimes wonder why your computer runs so slowly, count the number of browser tabs you have open. Closing a few may be a simple fix. Try this:
Quit your browser. Then relaunch it and keep no more than a few tabs open at any one time.
Posted on December 15th, 2017
Q: Are VPN operators to be trusted?
A: My opinion is that VPN operators are at best a little shady. After all, they’re offering anonymity to anyone.
What do you really know about the scads of free and paid VPN operators promoting themselves onl...
Posted on November 1st, 2017
You’re surfing Facebook at home, but you can’t print.
Your laptop can play Apple Music from the cloud, but you can’t stream it to your Sonos speakers, Apple TV, AirPlay nor AirFoil speakers at home.
You’re trying to set up your Amazon Echo. Alex...
Posted on January 30th, 2017
To save money and give your consultant the best chance of meeting your expectations efficiently, prepare as best as you can the items below before your consultant arrives:
Outline items you’d like done, provide product documentation, installation ...
Posted on January 27th, 2017
Lee Mathews , Contributor, FORBES.com
Data Privacy Day is once again upon us. We've already taken a look at what private browsing is, and explained that it's not really all that private. At the end of this article, I mentioned two tools that offe...
Posted on December 8th, 2016
Adapted from an article by Thorin Klosowski on LifeHacker.comYou know how when you sit on your couch, the Wi-Fi on your laptop cuts out? Or when you’re in the bathroom your phone refuses to connect? From Google to Netgear, everyone’s rolling out e...
Posted on December 6th, 2016
By Michael Brown, Executive Editor, TechHive
Google delivers much more router than you’d expect for $129, but just one Google Wifi won’t be enough for most people. Unless you live in a studio apartment, you’ll want to avail yourself of two or th...
Posted on December 5th, 2016
Adapted from a Forbes.com piece by Anthony KarczIt's been a very productive year when it comes to home wireless solutions. Not only have innovative products come along to boost the market, consumers have finally accepted the fact that, if they wa...
Posted on March 21st, 2016
Startups, and Google, race to solve the ‘home-spectrum crunch’
Eero is among the startups trying to improve wireless networking. Photo: Emily Prapuolenis/The Wall Street Journal
Updated March 21, 2016 12:07 a.m. ...
Posted on March 9th, 2016
You know this already, but it’s worth saying again; a little planning goes a long way when tackling projects that involve more than a few simple steps to complete. The following tips, when reviewed before starting, will expedite setup of computer ...
Posted on February 23rd, 2016
Eero combats frustrating Wi-Fi dead zones with an armada of little wireless routers
A new Wi-Fi system called Eero combats dead zones with an armada of little routers. WSJ Personal Tech columnist Geoffrey A. Fowler explains how it works. Photo/Vid...
Posted on February 18th, 2016
Thomas Fox-Brewster is a staff writer at Forbes.com covering crime, privacy and security in digital and physical forms.
Across the world, hackers are taking control of networks, locking away files and demanding sizeable ransoms to return data to ...
Posted on January 26th, 2016
Jason Bloomberg is a contributor to Forbes.com
Opinions expressed by Forbes Contributors are their own.
Cybercriminals that mount ransomware attacks, where malware holds victims’ files or entire computers hostage until they pay a ransom, are inc...
Posted on April 21st, 2015
Call it a photography renaissance or narcissism run amok. The new rule is: "Pics or it didn’t happen."
Digital cameras, especially smartphones, entice us to snap, snap, snap with abandon. Yet all these moments we capture seem to vanish into a dig...
Posted on April 15th, 2015
Google said last month that it plans to build a small wireless service that would allow it to function sort of like Verizon, AT&T, or any other carrier.
Google's Sundar Pichai said at Mobile World Congress that the company would make its own wire...
Posted on March 19th, 2015
Avoid relying on Word’s Open Recent menu to reopen files. Recently opened files listed may be similarly named temporary files containing unsaved changes rather than the actual file you expect.
Recent files listed may also have been saved to a fla...
Posted on November 14th, 2014
This article originally appeared on Lifehacker in November 2014
Public Wi-Fi networks—like those in coffee shops or hotels—are not nearly as safe as you think. Even if they have a password, you're sharing a network with tons of other people, whic...
Posted on September 30th, 2014
Are iCloud Drive and iCloud Different?
Apple’s iCloud Drive and its iCloud service are both part of the online synchronization service collectively named iCloud.
But, iCloud does a lot of things so it’s reasonable to ask, "Is there a difference ...
Posted on August 21st, 2014
I love panoramas. And this summer's spectacular weather offered up great photo opps to test some neat mobile pano apps.
👏👏👏👏 Photo Sphere Camera from Google. Only last week after my summer wanderings and best photo opps were history did Google re...
Posted on July 16th, 2014
Clients ask for network plans when considering a remodeling project. Drawings are done. Conversations had.
Months later when the wallpaper is hung and paint is dry a call comes in.
Client: Hi Q, we’re ready to move back in and set up the compu...
Posted on June 3rd, 2014
Many of us wobble out of the Apple Store dazed after a session with a "Genius" only to resume using our iPhone as, well, a telephone.
Imagine then 6,000 geniuses attending six straight days of seminars devoted to the arcana of programming i...