Several ways to quickly select a Word table

When working with tables, you often have to select the whole table to perform actions such as applying formatting or deleting the table. Actually, there are several methods you can use to select the entire table. Here’s a collection of your choices. To select a Word table, do one of the following: Place the insertion…

Details

What is Microsoft Azure?

In short, Azure is Microsoft’s cloud platform: a growing collection of integrated services—compute, storage, data, networking, and app—that help you move faster, do more, and save money. But that’s just scratching the surface…                            “With Microsoft Azure, we gain velocity because we can…

Details

3 Ways Excel Training Can Make You a Better Employee

Microsoft Excel and the Importance of Training Because of the seemingly mathematical, formula-oriented nature of its infrastructure, some people mistakenly assume that Microsoft Excel is a program only for people in the tech sphere. However, it’s potential applications extend far beyond that, to practically any business and any job that deals in data. Since nearly…

Details

Top 4 Benefits of Azure HDInsight

Apache Hadoop is open-source software for storing and analyzing massive amounts of structured and unstructured data–terabytes or more of everything from emails to sensor readings to server logs to Twitter feeds to GPS signals to just about anything else you can think of. Hadoop can process big, messy data sets for insights and answers–which helps…

Details

Tricks to running CMD commands in Windows PowerShell

While Windows PowerShell (powershell.exe) offers greater flexibility and programming sophistication compared to the Windows command line (cmd.exe), it’s also possible to use regular CMD commands within PowerShell. Even in cases where PowerShell has its own equivalents to these commands, it’s nice to know that you can use older commands that you’re used to and that…

Details

Why sandboxing isn’t sufficient for ruling out malware

One technique for determining if a file is dangerous is to experiment by executing it on an isolated virtual machine. While this approach can help detect malicious software, it can also lead to false negatives. For example, malware may only perform malicious actions in certain situations, such as after a long or random time period,…

Details

Easily provision resources amongst multiple clouds

The cloud offers many advantages, such as the ability to scale quickly and to outsource maintenance tasks. However, the plethora of cloud choices can get dizzying, and managing all these options becomes its own challenge. To facilitate managing infrastructure across public, private, and hybrid clouds, Cisco has created a set of tools called Intercloud Fabric.…

Details

One simple way to reduce the risk of hacked routers

A common avenue through which hackers can compromise routers is remote management. If you manage the devices through your network, you may need remote management enabled. Unfortunately, hackers can use brute force attacks or hidden vulnerabilities to hijack this capability and gain full control of the device. However, you can minimize the risk by configuring…

Details

Don’t flip flop between RGB and CMYK (CS3/CS4/CS5/CS6)

Multiple conversions between RGB and CMYK color space can degrade your image file since Photoshop rounds off the color values each time it makes a conversion. The best workflow is to make all of your image adjustments in RGB mode, then convert images to CMYK if you need the files separated that way for printing…

Details

How to enable higher levels of JavaScript

It’s easy to think of JavaScript as a static thing, but actually it’s continually changing. For example, JavaScript 1.7 added the concept of iterators and generators, and 1.8 gives you generator expressions. Even if the user’s browser supports these JavaScript versions, accessibility to their features isn’t automatic. You need to declare the version of JavaScript…

Details

Why include CSS with the @import rule?

As with most web development techniques, you have multiple options when it comes to applying CSS styles. One of the lesser used techniques is the @import rule. This allows you to load styles from external files (optionally restricted by the current media type) within an external stylesheet, or inside the style element, like so: @import…

Details

Give your slicers a face lift (MS Excel 2010)

Excel 2010’s new PivotTable filters, slicers, can give your worksheet a dashboard-like feel. While your slicers have their own tab on the Ribbon that lets you control a great deal about how they look and operate, you might have noticed something missing. There’s no group for adjusting a slicer’s font settings. Fortunately, you can change…

Details

The MCSA: Office 365 Is Now A Path to 3 MCSEs

The Office 365 MCSA Certification Opens Doors to Three Other MCSEs To better align with how technology professionals deploy Lync, Exchange and SharePoint, the Microsoft certification team has updated the following MCSE Certifications: 1. MCSE: Communication (Lync Server) 2. MCSE: Messaging (Exchange Server) 3. MCSE: SharePoint Candidates can now satisfy the prerequisites for pursuing three…

Details