WSL isn’t the only official way to run Linux code on Windows systems. Find out how to take advantage of Azure IoT Edge for Linux on Windows.
5 online brain games to help WFH employees improve mental function
Working from home has advantages, but it also can create a decline in mental health. The good news is, there are online games that can help improve mental function.
Top 5: The best Samsung phones of 2021
Samsung — arguably the best Android-based smartphone maker — released an array of phones this year. Here’s the best of the lot.
Hackers reported 21% more vulnerabilities in 2021 than in 2020
HackerOne reports that hackers are reporting more bugs and earning bigger bounties, but is an increase in testing or an increase in software vulnerabilities the cause of the jump?
AWS has gone down before, as have other providers; Fastly has lessons to share from its own outage
Fastly’s mid-2021 outage took some huge sites offline. Its Chief Product Architect Sean Leach shares why he thinks outages continue to happen, and how to reduce your own risks.
Study: Most phishing pages are abandoned or disappear in a matter of days
Research from Kaspersky finds that a quarter of phishing sites are gone within 13 hours — how in the world can we catch and stop cyber criminals that move so quickly?
5 steps to help your users get started with Google Workspace
A walk-through of the basics will help new employees get set up to use Google Workspace on a Windows or macOS system. Here are some areas to cover that will help them get off to a great start.
Home office 3.0: Use these 9 gift ideas to make your desk a better place to work
You may not know you need a monitor lamp or a foot rest or a plant but these changes will make it easier to complete your daily shift.
Money is still #1 motivation but developers want time and location flexibility too
A recent Stack Overflow survey finds that salary, flexibility and opportunities to learn are the top reasons engineers look for a new job.
5 tips to protect your NAS from cybercriminals
NAS has become an increasingly common way to handle file and backup storage. But no matter how it’s used, the information it contains must be protected from a variety of threats.