One Email Protocol to Rule Them All

Email has been around for a long time now and has since branched out and found a strong foothold in modern business. The email systems of the past are shades of what they are today – yet it’s surprising to me that people are still oblivious to the 3 major protocols that our power our mail services. This is especially shocking given the important nature of these services so today we will be discussing what these major 3 email protocols are, and what differentiates them from one another.

Best Geek Gifts.png
Our Favorite Gadgets for the Techie in Your Life

With the holidays coming up there has been one thing on everyone’s mind: what do I get for the geek in my life? Techie oriented people can be difficult to shop for so we have complied a list of all the best gadgets and cool technology to make your life easier this Christmas season. There are lots of fun, new gadgets available today so picking between them can be tricky. Don’t settle on a BestBuy giftcard, get them something they will truly enjoy… or just treat yourself! 

Internet Explorer End-of-Life

Coming mid-January Internet Explorer web browser will come to the end of its life. According to Microsoft, starting on January 12th 2016 Internet Explorer 8, 9, and 10 will no longer be supported making IE11 the only version available. This is more than likely an attempt to transition away from Internet Explorer and into Microsoft????????s new Edge browser. This means you will have to upgrade to the newest version of IE or move right to Microsoft edge. There are also other internet browser options such as Google chrome, Mozilla Firefox, and more. If you feel like switching there are plenty of options available. IE 11 offers better security and performance compared to the previous versions and since it????????s still being supported there will be more security and performance updates to come. Those that opt to stay on unsupported versions will face compliance issues and potential exposure to digital vulnerabilities, and pose a greater risk for malware infections and data/identity theft.

1 2 5