Microsoft Launches Outlook for IOS and Android

Microsoft announced the release of Outlook for IOS and a preview of Outlook for Android on January 29, 2015. The launch came less than two months after Microsoft acquired Acompli, a company that built high quality email apps for both IOS and Android, for over $200 million in December.

In the long run, the new Outlook apps will replace all of Microsoft’s current range of Outlook-branded apps, including the app for Android and the rather limited OWA apps for Android and IOS that only work for paying Office 365 subscribers. The users are recommended to switch to the new Outlook apps even those older apps are still available for the time being.

Since the new Outlook apps are based on the technology from Acompli, it’s no surprise then that the Outlook apps will look and feel quite a bit like the original Acompli apps. One of the popular features of Acompli is the ability to swipe and archive or delete emails, and even schedule a time that’s convenient to come back and read an email or send a reply. The new Outlook apps now also support various swipe gestures. Swiping left or right lets you take actions like archive, delete, move, flag and mark as read/unread. You can also customize the swipe gestures to your need if you do not like the default settings, which gives the Outlook app a leg up above the competition.

Just like Acompli before it, Outlook for IOS and Android will support Office 365, Exchange,, Yahoo! Mail and Gmail, and other major email providers. The Outlook app also allows you to send attachments through many cloud services, including Microsoft’s own OneDrive, as well as Dropbox and others.

There’s also a Focused inbox that aims to remove clutter and surface emails that matter. The important e-mails will be placed in the Focused inbox. If you move your e-mail in or out of your Focused inbox, Outlook will start to learn which type of messages are important to you.

The free app is available now in the Apple’s App Store and the Google Play Store.

Windows 7 or Windows 8: Which is the Better Choice?

We know that Microsoft is ending support for Windows XP on April 8, 2014. So, you may choose to update your system to a safer one to protect your computer from malware or other attacks. There are two options in front of you: Windows 7 and Windows 8.1. You may find it hard to make the choice. Don’t be worry, read the text below; you will get some useful suggestions.

The biggest benefit to Windows 7 is familiarity. The pop-up Start menu is still intact, and the basic functionality is similar enough that you don’t have to relearn much. You can even make Windows 7 look like Windows XP with just a few tweaks.

To say that some users dislike Windows 8 would be putting it lightly. The drastic interface changes have polarized critics and alienated mouse-and-keyboard users, who feel Microsoft put too much emphasis on touchscreens.

In fact, recent market share statistics revealed that users choosing to move on from Windows XP are actually opting for Windows 7 rather than Windows 8 or 8.1, with Microsoft’s latest operating system not being welcomed as quickly as had been hoped. Until Microsoft stops support for Windows 7, people will continue to choose it over the alternative.

Additionally, even some people are not optimistic about Windows 8; Microsoft took a different approach when it designed Windows 8 compared to all of the firm’s previous operating systems. Instead of designing for a desktop or laptop – predominantly controlled by a mouse – Windows 8 was designed for a touchscreen, creating big ‘tappable’ tiles in place of small, fiddly buttons.

Now let’s talk about several features to illustrate the difference between windows 7 and windows 8.

1. Boot time

Windows 8 machines only take 10-15 seconds to boot up, with some switching on even faster depending on the SSD. Gone are the days when you have to distract yourself by going to make a cup of tea while your system wakes up.

2. Interface

Windows 7 – The classic, familiar desktop remains popular for a reason, and thus wins the day. Windows 8 simply tries to do too much too quickly and, even though the 8.1 update allows users the option of booting straight to desktop, Metro still has a nasty habit of popping up when it’s not welcome.

3. 3D Graphics Performance

3Dmark 11 is used primarily to measure 3D graphics performance – meaning graphics card drivers play a vital role here. Still, the performance was very similar on both operating systems, though the more mature Windows 7 was slightly faster.

4. Apps for Everything

One of the biggest differences in Windows 8 vs. Windows 7 is the way that apps are handled. Forgotten but not gone are the apps we’ve been used to seeing for years. Instead, Windows 8 gives you apps that take up the entire screen and look great whether you’re using a tablet or a PC.

Old apps still work as they did in Windows 7; Windows 8 has a desktop mode that lets legacy apps use the window style we’re used to. However, there’s still no Start Menu in the desktop mode, and you can’t do everything you need to in that mode, so you’ll still need to use some of Windows 8’s new features in your day-to-day computing.

Now you have to check what your requirements are. If you are just trying to get rid of XP or Vista and looking for a faster and securer computer experience, Windows 7 would be best for you. However, if your computer is enough robust and you want something new, I would suggest you to go for the latest.

Ways to Keep Your Datacenter Secure

Nowadays more and more people pay attention to the protection of their privacy, the same on the internet. Online data contains a lot of sensitive content; we all should know ways to keep our datacenter secure.

Your datacenter of your business houses vital equipment and their components. This equipment is vital for planning and management of day-to-day operations. The datacenter also houses vital and highly confidential data such as customer information, financial records, etc. This is the reason why hackers are always on the lookout for opportunities to break into the system.

IT managers are increasingly looking to ensure completely secure transactions, which means securing everything from the desktop and network to applications and storage. Data center practice manager for Apptis Technology Solutions. Traditionally, the network support team secured the networks, and the application team would handle data encryption. But the present and emerging environments call for new methods.

Here are five steps you can take to improve your security plan.

Step #1: Learn where your data lives. You can’t complete your security plan until you know exactly what you’re protecting and where it’s stored.

Step #2: Implement a “need-to-know” policy. To minimize the risk of human error (or curiosity), create policies that limit access to particular data sets. Designate access based on airtight job descriptions.

Step #3: Beef up your network security. Your network is almost certainly protected by a firewall and antivirus software. But are those tools up-to-date and comprehensive enough to get the job done? New malware definitions are released daily, and it’s up to your antivirus software to keep pace with them.

Step #4: Monitor and inform your data’s lifecycle. By creating a data lifecycle management plan, you’ll ensure your enterprises secure destruction of old and obsolete data.

Step #5: Educate everyone. Data security is ultimately about people. Every employee must understand the risks and ramifications of data breaches and know how to prevent them, especially as social engineering attacks increase.

So while data storage vendors like Sun, EMC, HP and IBM debate encryption key management standards, here are some steps you can take to protect your data now.

1. Start with a Good Data Protection Policy

a. Instituting good security and privacy policies for collecting, using and storing sensitive information.
b. Using strong encryption when storing information on computers and laptops.
c. Limiting who has access to sensitive information.
d. Safely purging old or outdated sensitive information.
e. Having an incident response plan in case a breach occurs.

2. Encrypt, Encrypt, Encrypt

The Trusted Computing Group (TCG), an industry organization that develops specifications for computing security across the enterprise, also believes that good encryption is essential for properly protecting data. Data protection vendors have taken note and are busy developing new and improved software- and hardware-based encryption solutions, on both the client (such as laptops and USB drives) and enterprise level.

3. The Data Destruction Dilemma

On the topic of safely destroying data, what Thibadeau refers to as cryptographic erase, not only can self-encrypting hard drives make the process easier, it can make destroying data faster and also more cost-effective.

4. Scan for application vulnerabilities

At JPL, if someone wants to deploy an application, it must undergo a scan before administrators release it in the production environment. AppScan tests for vulnerabilities that hackers can easily exploit and provides remediation capabilities, security metrics and dashboards, and key compliance reporting.

On the other hand, developers who write their own code must run it through a code scanner, which could be a Perl script that looks for specific functions or a fortified product that scans source code for buffer overflows or other vulnerabilities that crept into the code.

For information security, please select the correct ways to keep your datacenter secure.