I’m looking forward to this announcement on Monday!
The people who made Siri are readying another big leap in AI
Here is a link to the VIV site.
05 Thursday May 2016
I’m looking forward to this announcement on Monday!
The people who made Siri are readying another big leap in AI
Here is a link to the VIV site.
05 Thursday May 2016
Posted in GCC, Integrated Technology, New Technology, Windows 10
Get updated while it is free!!!
Microsoft stays true to its word, will end free Windows 10 upgrades on July 29
05 Thursday May 2016
Posted in Excel, Integrated Technology, Intro to Computers, New Technology
Interesting list and I mostly agree with it.
04 Wednesday May 2016
Posted in Future Technology, GCC, Integrated Technology, New Technology
03 Tuesday May 2016
Posted in Future Technology, GCC, Integrated Technology, New Technology
03 Tuesday May 2016
Posted in GCC, Integrated Technology, New Technology
Here are a number of links for Google Now, Siri, and Alexa
The complete list of ‘OK, Google’ commands
9 useful Siri commands for your Apple TV
The complete list of Alexa commands
28 Thursday Apr 2016
Posted in GCC, Integrated Technology, Internet, Intro to Computers, New Technology
Interesting…I’m going to give this app a try!
28 Thursday Apr 2016
Posted in Future Technology, GCC, Integrated Technology, New Technology
21 Thursday Apr 2016
Posted in GCC, Integrated Technology, Internet, New Technology
19 Tuesday Apr 2016
Posted in Family info, GCC, Integrated Technology, Internet, Intro to Computers, Outlook, Security Issues
Here is a nice little article from Microsoft….
Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.
Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.
Here is an example of what a phishing scam in an email message might look like.


Links might also lead you to .exe files. These kinds of file are known to spread malicious software.
Cybercriminals also use web addresses that resemble the names of well-known companies but are slightly altered. For more information, see Protect yourself from cybersquatting and fake web addresses.
Cybercriminals might call you on the phone and offer to help solve your computer problems or sell you a software license. Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes.
Once they’ve gained your trust, cybercriminals might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable.
Treat all unsolicited phone calls with skepticism. Do not provide any personal information.
For more information, see Avoid tech support phone scams.
If you receive a fake phone call, take down the caller’s information and report it to your local authorities.
Whenever you receive a phone call or see a pop-up window on your PC and feel uncertain whether it is from someone at Microsoft, don’t take the risk. Reach out directly to one of our technical support experts dedicated to helping you at theMicrosoft Answer Desk. Or you can simply call us at
1-800-426-9400 FREE or one of our customer service phone numbers for people located around the world.
You can use Microsoft tools to report a suspected scam on the web or in email.
You can also download the Microsoft Junk E-mail Reporting Add-in for Microsoft Office Outlook.
18 Monday Apr 2016
06 Wednesday Apr 2016
Posted in Future Technology, GCC, Integrated Technology, New Technology
06 Wednesday Apr 2016
Posted in Future Technology, GCC, Integrated Technology, New Technology
06 Wednesday Apr 2016
05 Tuesday Apr 2016
Posted in Future Technology, GCC, Integrated Technology, New Technology
23 Tuesday Feb 2016
Posted in Future Technology, GCC, Integrated Technology, New Technology
22 Monday Feb 2016
Posted in Future Technology, GCC, Integrated Technology, New Technology
12 Friday Feb 2016
Posted in Future Technology, GCC, Integrated Technology, New Technology
Here is a very interesting article about new rules and laws that will have to be modified for driverless vehicles.
27 Wednesday Jan 2016
Posted in Future Technology, GCC, Integrated Technology, New Technology
Here is an interesting article that shows we are making significant progress in Artificial Intelligence. There are major implications to this breakthrough. Here is the article.
25 Monday Jan 2016
Posted in Future Technology, GCC, Integrated Technology, New Technology
25 Monday Jan 2016
Posted in Family info, GCC, Integrated Technology, New Technology, Security Issues
Your phone is a more secure form of payment than your credit card. Here is a quick video.
19 Tuesday Jan 2016
Tags
You are going hear and see a lot about these this year. Here are the headsets to look at…
19 Tuesday Jan 2016
09 Wednesday Dec 2015
Posted in GCC, Integrated Technology, Internet, Intro to Computers, Security Issues
03 Thursday Dec 2015
Posted in GCC, Integrated Technology, Security Issues
If you have a virus or security problem in Windows, here is the site you should check out.