ในที่สุดงาน Microsoft Build developer 2023 ทาง Microsoft ได้ปล่อยฟีเจอร์ใหม่ ๆ ของทั้ง Edge และ Windows 11 ซึ่งเกี่ยวข้องกับ AI มากมาย และสำหรับ Windows 11 ก็มีหนึ่งฟีเจอร์ที่หลายคนอาจรอมานาน นั้นคือการรองรับไฟล์ RAR สืบเนื่องจาก libarchive ที่เป็น Open-Source ซึ่งรองรับการอ่านไฟล์ tar, 7-zip, gz และอื่น ๆ อีกมากมาย รวมไปถึงไฟล์ RAR ด้วย จากแต่เดิมต้องใช้โปรแกรมอื่นช่วยอย่าง WinRAR หรือ 7-zip เป็นต้น การอัปเดตใหม่นี้จะทำให้ Windows 11 อ่านไฟล์ RAR ได้ตั้งแต่ต้นตัวอัปเดตดังกล่าวยังไม่เผยกำหนดปล่อย อย่างไรก็ตาม Microsoft กำลังมีอัปเดตครั้งใหญ่ ซึ่งอาจทำให้ Windows 11 มีฟีเจอร์ที่เกี่ยวกับ AI และการปรับปรุงอื่น ๆ มากกว่าเดิม นอกจากการอ่านไฟล์ RAR แล้ว เราอาจได้ใช้งานฟีเจอร์ใหม่ ๆ ที่ว้าวไม่แพ้กันก็เป็นได้ที่มา : https://www.techhub.in.th/windows-11-supports-rar-files/Cr : EngadgetCr : Techhub
The number of apps and web tools that employees use on a regular basis continues to increase. Most departments have about 40-60 different digital tools that they use. 71% of employees feel they use so many apps that it makes work more complex. Many of the apps that we use every day have various alerts. We get a “ping” when someone mentions our name on a Teams channel. We get a notification popup that an update is available. We get an alert of errors or security issues.App fatigue is a very real thing and it’s becoming a cybersecurity problem. The more people get overwhelmed by notifications, the more likely they are to ignore them. Just think about the various digital alerts that you get. They come in: • Software apps on your computer • Web-based SaaS tools • Websites where you’ve allowed alerts • Mobile apps and tools • Email banners • Text messages • Team communication tools Some employees are getting the same notification on two different devices. This just adds to the problem. This leads to many issues that impact productivity and cybersecurity. Besides alert bombardment, every time the boss introduces a new app, that means a new password. Employees are already juggling about 191 passwords. They use at least 154 of them sometime during the month.How Does App Fatigue Put Companies at Risk? Employees Begin Ignoring UpdatesWhen digital alerts interrupt your work, you can feel like you’re always behind. This leads to ignoring small tasks seen as not time-sensitive. Tasks like clicking to install an app update. Employees overwhelmed with too many app alerts, tend to ignore them. When updates come up, they may quickly click them away. They feel they can’t spare the time right now and aren’t sure how long it will take. Ignoring app updates on a device is dangerous. Many of those updates include important security patches for found vulnerabilities. When they’re not installed, the device and its network are at a higher risk. It becomes easier to suffer a successful cyberattack.Employees Reuse Passwords (and They’re Often Weak)Another security casualty of app fatigue is password security. The more SaaS accounts someone must create, the more likely they are to reuse passwords. It’s estimated that passwords are typically reused 64% of the time. 10 Credential breach is a key driver of cloud data breaches. Hackers can easily crack weak passwords. The same password used several times leaves many accounts at risk.Employees May Turn Off AlertsSome alerts are okay to turn off. For example, do you really need to know every time someone responds to a group thread? Or just when they @name you? But, turning off important security alerts is not good. There comes a breaking point when one more push notification can push someone over the edge. They may turn off all the alerts they can across all apps. The problem with this is that in the mix of alerts are important ones. Such as an anti-malware app warning about a newly found virus.What’s the Answer to App Fatigue? It’s not realistic to just go backward in time before all these apps were around. But you can put a strategy in place that puts people in charge of their tech, and not the other way around. Streamline Your Business ApplicationsFrom both a productivity and security standpoint, fewer apps are better. The fewer apps you have, the less risk. Also, the fewer passwords to remember and notifications to address. Look at the tools that you use to see where redundancies may be. Many companies are using two or more apps that can do the same function. Consider using an umbrella platform like Microsoft 365 or Google Workspace. These platforms include several work tools, but users only need a single login to access them.Have Your IT Team Set up NotificationsIt’s difficult for users to know what types of notifications are the most important. Set up their app notifications for them. This ensures they aren’t bombarded yet are still getting the important ones.Automate Application UpdatesA cybersecurity best practice is to automate device and software updates. This takes the process out of employees' hands. It enhances productivity by removing unnecessary updates from their view. Automating device updates through a managed services solution improves security. It also mitigates the chance there will be a vulnerable app putting your network at risk. 11Open a Two-Way Communication About AlertsEmployees may never turn off an alert because they’re afraid they might get in trouble. Managers may not even realize constant app alert interruptions are hurting productivity. Communicate with employees and let them know they can communicate with you. Discuss how to use alerts effectively. As well as the best ways to manage alerts for a better and more productive workday.Need Help Taming Your Cloud App Environment?Today, it’s easy for cloud tools to get out of hand. Get some help consolidating and optimizing your cloud app environment. Give us a call today. Article used with permission from The Technology Press
You wouldn’t think a child’s toy could lead to a breach of your personal data. But this happens all the time. What about your trash can sitting outside? Is it a treasure trove for an identity thief trolling the neighborhood at night? Many everyday objects can lead to identity theft. They often get overlooked because people focus on their computers and cloud accounts. It’s important to have strong passwords and use antivirus on your PC. But you also need to be wary of other ways that hackers and thieves can get to your personal data. 9 Here are six common things that criminals can use to steal your information.Old Smart Phones People replace their smartphones about every two and a half years. That’s a lot of old phones laying around containing personal data. Just think of all the information our mobile phones hold. We have synced connections with cloud services. Phones also hold banking apps, business apps, and personal health apps. These are all nicely stored on one small device. As chip technology has advanced, smartphones have been able to hold more “stuff.” This means documents and spreadsheets can now be easily stored on them. Along with reams of photos and videos. A cybercriminal could easily strike data theft gold by finding an old smartphone. They often end up at charity shops or in the trash. Make sure that you properly clean any old phones by erasing all data. You should also dispose of them properly. You shouldn’t just throw electronics away like normal garbage. Wireless Printers Most printers are wireless these days. This means they are part of your home or work network. Printing from another room is convenient. But the fact that your printer connects to the internet can leave your data at risk. Printers can store sensitive documents, such as tax paperwork or contracts. Most people don't think about printers when putting data security protections in place. This leaves them open to a hack. When this happens, a hacker can get data from the printer. They could also leverage it to breach other devices on the same network. Protect printers by ensuring you keep their firmware updated. Always install updates as soon as possible. You should also turn it off when you don’t need it. When it’s off it’s not accessible by a hacker. USB Sticks Did you ever run across a USB stick laying around? Perhaps you thought you scored a free removable storage device. Or you are a good Samaritan and want to try to return it to the rightful owner. But first, you need to see what’s on it to find them. You should never plug a USB device of unknown origin into your computer. This is an old trick in the hacker’s book. They plant malware on these sticks and then leave them around as bait. As soon as you plug it into your device, it can infect it. Old Hard Drives 10 When you are disposing of an old computer or old removable drive, make sure it’s clean. Just deleting your files isn’t enough. Computer hard drives can have other personal data stored in system and program files. Plus, if you’re still logged into a browser, a lot of your personal data could be at risk. Browsers store passwords, credit cards, visit history, and more. It’s best to get help from an IT professional to properly erase your computer drive. This will make it safe for disposal, donation, or reuse. Trash Can Identity theft criminals aren’t only online. They can also be trolling the neighborhood on trash day. Be careful what you throw out in your trash. It’s not unusual for garbage to enable identity theft. It can include pre-approved credit card offers that you considered “junk mail.” Your trash can also hold voided checks, old bank statements, and insurance paperwork. Any of these items could have the information thieves need to commit fraud or pose as you. A shredder can be your best friend in this case. You should shred any documents that contain personal information. Do this before you throw them out. This extra step could save you from a costly incident. Children’s IoT Devices Electronic bears, smart kid watches, Wi-Fi-connected Barbies… all toys that hackers love. Mattel’s Hello Barbie was found to enable the theft of personal information. A hacker could also use its microphone to spy on families. These futuristic toys are often what kids want. Parents might think they’re cool, but don’t consider their data security. After all, these are children’s toys. But that often means they can be easier to hack. Cybercriminals also zero in on these IoT toys, knowing they aren’t going to be as hard to breach. You should be wary of any new internet-connected devices you bring into your home. That includes toys! Install all firmware updates. Additionally, do your homework to see if a data breach has involved the toy. Schedule a Home IT Security Audit & Sleep Better at Night Don’t let the thought of identity theft keep you up at night. Give us a call today and schedule a home IT security audit. You’ll be glad you did. Article used with permission from The Technology Press
Scheduling appointments is a common activity. Salespeople often set up virtual appointments to answer questions about a product. Software companies allow people to schedule live demos. Telehealth therapists allow clients to book video sessions. Those are just a few examples of some groups that are going to love a new Microsoft Teams feature. Virtual Appointments was recently added to the platform. It adds a new meeting style tailored for engagements with customers.Have you’ve been using Teams and a different online appointment app? This new feature will streamline the experience. What Is Virtual Appointments in Teams? Virtual Appointments gives you an all-in-one meeting platform for customer engagements. You can schedule, manage and conduct B2C meetings in Microsoft Teams. This new feature brings together the scheduling component with the video conference interface. Anyone with the link can join the virtual appointment. They do not need a Teams account. Image is from Microsoft The power of Microsoft’s scheduling app, Bookings, connects to Teams. This makes the Virtual Appointments function as seamless as possible. 10 Some of the features below will be available with any Microsoft 365 plan. Some are available with a premium plan.Teams Virtual Appointments FeaturesManage Scheduled Appointments You can see your scheduled appointments in a single view. Manage cancellations and time changes easily. Send Customized Confirmations & Reminders You can send customers a customized message via SMS or email. This personalizes the experience for them. You can also use automation to give that personal touch without having to send each one manually. Automated appointment reminders are another timesaving function. Customized Waiting Room Add a personal touch to your virtual engagements. You can customize the Teams waiting room. You can use themes and logos to brand your business. You can also chat with attendees while in the lobby waiting room. This is helpful if your current appointment is running a little long. You can let them know you’ll be right with them. Meeting Follow-ups You can send meeting follow-ups after a virtual appointment. This helps you reduce the time it takes to send any promised follow-up information. You also keep all details in a single place. This makes your client communication trail easier to follow. Organization & Department Analytics How effective are your appointments? It’s hard to know if your demos are resulting in sales if you don’t have a good tracking system. It’s also important to have visibility into customer appointments across the organization. You can do this with a premium analytics feature. It gives you helpful reporting. The reporting provides insights into B2C virtual appointments in all departments. How to Use Virtual Appointments To start using Virtual Appointments in Teams, admins must set up a few things. Note, they must be a Bookings admin to access these settings. Create a Calendar 11 In the Virtual Appointments app choose to “Create a calendar.” You can find this option on the Home tab. Larger organizations may wish to create different calendars for different departments. Add Staff Next, add staff members. You can add up to 100. You will also need to assign them a role. Once you’ve added your staff, you can view their availability in both Teams and Outlook. What's another nice thing about using an integrated platform like M365? It's the cross-app compatibility. Your calendar syncs across apps. Create Appointment Types You’ll next set up your appointment types. You can choose from these two options: • Scheduled: You schedule the day/time. The system adds this information to the email confirmation. • On-demand (Teams Premium): Customers can choose when to meet from your booking calendarImage is from Microsoft Set Up SMS Notifications (If desired) If you choose to use SMS notifications and have the right Teams plan, you can set this up next. This allows you to easily send appointment confirmations and reminders via text message. Note: Attendees currently need a valid U.S., Canadian, or U.K. phone number to receive the SMS notifications. Link Forms (If desired)If you would like your attendees to fill out any forms, you can link them now. Virtual Appointments allows linking up to four cloud-based forms. These would be forms you have created in Microsoft Forms.Publish Your Booking Page 13 If you want to give customers the ability to book on-demand appointments, take this next step. You will need to publish the booking page. You do this on the “Manage” tab of Virtual Appointments. Select “Booking page,” and turn on “Publish booking page.”Get Help Using Your Microsoft 365 Tools More EffectivelyMicrosoft 365 is a platform with many possibilities. Often, companies aren’t using all the features they could. As a result, their team may be less effective. They could also be wasting money on apps they don’t need. Are you interested in help supercharging your Microsoft 365 experience? Give us a call today to set up a meeting. Article used with permission from The Technology Press
At the beginning of each year, a group of global innovators meets. They introduce and show off breakthrough technologies. It’s done at the Consumer Electronics Show (CES), which is typically held each January in the U.S This year, over 3,200 exhibitors from 173 countries showed off the future. Giving us a glimpse of what could show up in our homes offices, living rooms, or kitchens. The show includes both wacky and very sensible inventions. All designed to push the limits and expand how we use technology.People love their gadgets, so it’s always exciting to see the new tech that CES showcases. It’s estimated that the global smart home household penetration was 14.2% in 2022. By 2027, it’s expected to more than double to 28.8%. What new gadgets did innovators introduce at this year’s Consumer Electronics Show? Here’s a rundown of some standouts that you may want to check out.Loona – Intelligent Petbot Do you love the thought of having a pet, but not the mess? Can’t have one because of where you live? Loona might be your answer. The developer promotes this smart gadget as “the most intelligent petbot.” It’s currently gathering funding through a Kickstarter campaign. Image from Loona’s Kickstarter page The cute little motorized pseudo pet can welcome you. It can also follow you when you walk around, sneeze, scratch, and much more. Just like a dog or cat, Loona investigates suspicious objects. Unlike most pets can beatbox, pose for pictures, and dance. Ring Car Cam Another consumer IoT device displayed at CES is already for sale on Amazon. It’s the Ring Car Cam, which takes the popular doorbell cam concept on the road with you. 10 This small internet-connected video cam has dual-facing cameras. It can capture images in the car and on the road. It includes two-way talk to connect with loved ones at home. It also has motion detection and real-time motion alerts. AtmosGear Electronic Skates If you’re feeling brave, you can soon strap on a pair of electric inline roller skates. AtmosGear introduced the skates at CES. It expects to begin shipping them starting in May of 2023. The skates can get up to speeds of 25 km/H (15.5 MPH) and can reach a full charge in about an hour. The “skate” is actually a motorized frame that you can attach to “all roller boots.” Tilt Five Augmented Reality Glasses If you’ve been waiting to use augmented reality (AR) outside a video game, your chance may be here. Tilt Five introduced an AR glasses system that connects to a computer device. It can be used on board games as well as video games. Ready to bring some holographic life to your tabletop play? The system includes the glasses and a board game. The glasses look somewhat like heavy-duty safety glasses. Both interact to bring an AR element into the real world. Image is from Tilt Five 11 Jabra Enhance™ Plus This earbud/hearing aid combo can be very helpful to those with hearing loss. Jabra Enhance Plus are earbuds that offer a 3-in-1 experience. You can use them for listening to music, phone calls, and for hearing enhancement. The small design makes them discrete, and they are also designed to be easy to use. They include state-of-the-art technology to provide superior audio clarity. Hasbro Selfie Series Figures Have you secretly wished to have your own action figure…of you! Hasbro has you covered with its new Selfie Series. You can use your phone’s camera to upload a pic and choose from figures based on several franchises. Make a figure of yourself from these universes: • G.I. Joe • Ghostbusters • Power Rangers • Marvel • Star Wars Use your smartphone and Habro’s app to customize your new digitized figure. Then all you have to do is buy it and wait for it to arrive. Twinkly Squares Twinkly Squares are like the Lite-Bright toy all grown up. The squares allow you to add panels of colored and automated lights to any wall. They’re great for a home office or to add a pop of color to any space. Because these are IoT gadgets, you can also program and control them. Create digital artwork, have them sync with music, or use their voice feature. Xebec Tri-Screen 2 Do you wish you had more screen space on your laptop? Don’t like the uneven feel of using a second monitor that is higher than your laptop screen? Then Xebec’s Tri-Screen 2 may be your answer. 12 Image from Xebec site This gadget enables you to expand your laptop screen on both sides. It sits behind the screen and expands the screen space both left and right. Don’t Introduce Smart Tech Into Your Home without Security New electronic gadgets and home tech can be great. They can also expose your network to security risks. Get help from a pro. Give us a call for a home security audit. Article used with permission from The Technology Press