Outlook 2013: Insert voting options into your email!
Need to take a quick poll? Maybe you need to find out how many people in the office are coming to lunch – and this quick how to will show
Need to take a quick poll? Maybe you need to find out how many people in the office are coming to lunch – and this quick how to will show
used with permission from Norton by Symantec, by Nadia Kovacs You may have noticed growing reports in the media about the dangers of using USB memory sticks. It is true,
used with permission from Norton by Symantec, by Nadia Kovacs Ransomware is a form of malware that will lock files on a computer using encryption. Encryption converts files into another
For most Windows 7 and Windows 8.1 PCs, the answer is Yes, but not now. The first step should be to click on the Windows icon at the bottom right
Have you ever signed up for an event and received a download link to “add this event to your Outlook calendar”? You can create your own! These files have a
used with permission from Microsoft for Work, by Rieva Lesonsky Whether you’re traveling for business or leisure this summer, chances are that as a small business owner, you’ll be working
used with permission from Microsoft for Work The genius that happens every day in the offices of the world requires a certain amount of focus. Unfortunately, most offices are awash
used with permission from Microsoft, by Terry Myerson Today, I’m excited to share the availability date for Windows 10. In fact, I thought I’d let Cortana, the world’s most personal
used with permission from Microsoft Safety & Security Center Does your phone know where you are? If you’ve used your phone to find directions or locate a nearby restaurant, you’ve used its
Sometimes you want to run a PowerPoint presentation on repeat – looping the slideshow so it can play in the background during an event, perhaps at a booth at a
Spring is the perfect time to clean out your business, get rid of clutter and
Did you know that you can remove your personal info from Google searches? There is
Cyber criminals keep finding new ways to attack. The latest method involves corrupting QR codes.