Beringer Associates Technology Blog

Upgrading your PC to a Solid State Drive (SSD) can have a dramatic impact on an aging computers, overall usability and prolong its effective life. Many people talk about the performance (or lack thereof) of their desktop or laptop computers. If you have a computer that was purchased over 3-4 years ago, and you see that the memory and CPU seem to be doing ok, but the system is overall slow…consider upgrading to a Solid State Drive.

Share
...

There are many tools built right into the Google search field that you can use to narrow down the results that Google returns to you. Using these easy tools will save you time when searching and help you find exactly what you are looking for.

Share
...

In an effort to write about something that is off the beaten path and perhaps a bit useful in everyday life, we are going to discuss old photos.  If you have a bunch of old family or cherished photos lying around, and have no time to take them to an analog-to-digital service, then do what more and more people are doing these days.  Use your phone!

Share
...

We recently discovered an issue with Outlook classifying legitimate Emails as junk. Valid emails from clients as well as emails from within our organization were being sent to our junk folder. Mail is classified as Junk in Exchange Online and within the Outlook client separately. We had the Junk Filtering in Outlook disabled before this problem started so for our case we knew it was an issue with Junk Filtering in Exchange Online.

Share
...

Web Conferencing in today’s workplace is as common as making a phone call. An early innovator in the field, Cisco is still a top choice for most companies. Their WebEX platform is salable, secure, easy to use, and even free in some instances. Sometimes in the IT world, even with preview builds, and despite best efforts by large companies such as Microsoft and Cisco, technology takes awhile to catch up and mesh with each other.

Share
...

Often times as technicians we need to know the service tags and product numbers of the systems we support to do a warranty check on vendor websites.  In a world of remote support, asking the user for this information is not always the best option.  This information lies in the system BIOS and windows does not make it readily available for us to retrieve.  However, there is a way to get this information with little to no interaction from the end user.

Share
...

When using SQL Server, proper setup of the Database, Log Files, Memory and Disk I/O play a key part in the overall SQL Server performance. The same rings true when running SQL Server in the cloud, whether it be Azure, AWS or other. What complicates things is the myriad of choices you have for the underlying virtual infrastructure in the cloud.

Share
...

Smaller iPhone coming soon!

Posted by on in Uncategorized

If there was one thing about the iPhone 5 that I missed, it was the smaller size.  Yes the smaller size.  In a race to larger screens, it seems the advantages of a smaller screen are lost on designers.  Smaller screens, smaller sizes (aka just the right size) enables the phone to completely fit in your hand and let the average thumb go all the way around the screen without having to move the phone.

Share
...

The Surface Pro 4 was released at the end of 2015, along with it’s release came changes to the new dock. The new dock form factor is completely different in size and shape. The new size makes this dock portable and the shape allows for compatibility, regardless of changes to the size and shape of future Surface devices.

Share
...

So you’ve heard of Viruses and Phishing attacks, but have you heard of Ransomware? Ransomware is basically a combination of a virus and phishing attack that employs an application to encrypt your data to hold it for ransom. The phishing part of the attack is centered on an email with some type of attachment. An example would be “My Resume for your consideration” with a word document attached. The Word document has macros that will go out to the Internet, download and run an application that will search for and encrypt all of your data files (PDF, Office App files, photos, etc).

Share
...