iCloud

Automatically log in to your Mac when you’re wearing your Apple Watch

Get right to work with Apple Watch This new feature in macOS Sierra lets you use your Apple Watch to

Microsoft

Multi-Factor Authentication for Office 365 – How to do?

Microsoft added multi-factor authentication to Office 365Midsize Business, Enterprise, Academic, Nonprofit, and standalone Office 365 plans, including Exchange Online and

Software

PowerBI – Custom visual developer tool now available

Power BI extensibility team has been actively listening to the users, and they’ve redesigned the developer experience based on your feedback.

Gmail

Windows 10 Mobile – Gmail issue has been fixed

Windows 10 Mobile users began reporting that they were unable to add a Gmail account to the Mail and Calendar

Garage-Mouse without Boarder

Mouse without Boarder

One of my personnel favourite… Mouse Without Borders is a Microsoft Garage project by Truong Do. Garage projects are side

DKIM

DKIM (DomainKeys Identified Mail) – Explained

Forged email is a serious threat to all parties in an email exchange. DomainKeys Identified Mail (DKIM) is an authentication

According to the Wi-Fi Alliance, "Wi-Fi" is not an abbreviation. The confusion may arise from the fact that the Alliance briefly used "The standard for wireless fidelity" as a slogan for Wi-Fi.. The term Wi-Fi was created by Wi-Fi Alliance as "Hi-Fi," an abbreviation for "high fidelity," which referred to high-quality audio reproduction. Similarly, Wi-Fi is often thought to be short for wireless fidelity. A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. Here's what happens: A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. A wireless router receives the signal and decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection. The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter.

USB 3.0 is the third major version of the Universal Serial Bus (USB) standard for interfacing computers and electronic devices. Among other improvements, USB 3.0 adds the new transfer mode SuperSpeed (SS) that can transfer data at up to 5 Gbit/s (625 MB/s), which is more than ten times faster than the USB 2.0 standard. USB 3.0 connectors are usually distinguished from their USB 2.0 counterparts by blue color-coding of the receptacles and plugs, and the initials SS

Physically, the Type-C port and connector is about the same size as that of the Micro-B USB. Set to be widely available starting 2015, Type-C USB will support USB 3.1 with the top speed of 10Gbps and has much high power output of up to 20V(100W) and 5A. Type-C USB also allows for bi-directional power, so apart from charging the peripheral device, when applicable, a peripheral device could also charge a host device. All this means you can do away with an array of proprietary power adapters and USB cables, and move to a single robust and tiny solution that works for all devices. Type-C USB will significantly cut down the a amount of wires currently needed to make devices work.

The display resolution or display modes of a digital television, computer monitor or display device is the number of distinct pixels in each dimension that can be displayed. It can be an ambiguous term especially as the displayed resolution is controlled by different factors in cathode ray tube (CRT), flat-panel display which includes liquid-crystal displays, or projection displays using fixed picture-element (pixel) arrays. It is usually quoted as width × height, with the units in pixels: for example, "1024 × 768" means the width is 1024 pixels and the height is 768 pixels. This example would normally be spoken as "ten twenty-four by seven sixty-eight" or "ten twenty-four by seven six eight" More Info: click here 

Soft lifting is making illegal copies of software. Common reasons people give for soft lifting are to make extra copies to use on other machines in the office, to take home, or to give to another person. For most software licenses, one purchased license is required for each installed copy. Since software is protected under the Copyright Act of the US Code, unauthorized duplication of software is a Federal offence.

Exchange Server Blogs