News

Friday IT Fun: Happy 100th Birthday to IBM

In honor of the tech company's centennial birthday, there will be no links having to do with IBM in this week's edition. If you've found something you think other IT pros will appreciate, send an e-mail to cpaoli@1105media.com so we can include it in next week's edition. Also, keep up with us all week long on Twitter.

  • Love/Hate Smartphones (TheOatmeal.com) - Remember the days of sitting through SportsCenter without already knowing the scores?  Thank you technology.
  • Next Comic Book Hero (PCWorld.com)In brightest day, in blackest night, no evil shall escape my sight.Let those who worship evil's might, Beware my power... Steve Jobs' light!

  • 5 Reasons Why Internet Access in the U.S. Is a Disaster (Cracked.com) – What we lack in broadband speeds we make up for in our amount of political scandals caused by carelessness on Twitter.

  • If You Have To Ask, You Can't Afford It (million-dollar-pc.com) – I don't think this bad boy will have any cooling problems. Seen any unique or crazy PC setups? Let me know at cpaoli@gmail.com.

About the Author

Chris Paoli is the site producer for Redmondmag.com and MCPmag.com.

Featured

  • Microsoft Bolsters Windows IoT with NXP and SQL Server Support

    Microsoft's Internet of Things (IoT) product line is continuing to grow, with a few new developments highlighted this week.

  • Tamper Protection Now Available to Microsoft Defender ATP Subscribers

    The Microsoft Defender Advanced Threat Protection (ATP) E5 subscription plan now has an optional "tamper protection" security feature, Microsoft announced on Monday.

  • Exploring OCR, a New Way To Get Data into Excel

    Microsoft recently added a new optical character recognition feature to Excel that lets users import data from a photograph taken from a smartphone. Here's how to use it.

  • Microsoft Authenticator App To Get Real-Time Phishing Protections

    Microsoft is working on adding capabilities to its Microsoft Authenticator app to help defeat security breaches enabled by advanced attack techniques, including phishing and man-in-the-middle methods.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.