Display table headings at the top of every page in MS Word

When you create a lengthy table, Word doesn’t display the table’s headings (i.e., the table’s first row) at the top of each page that contains a portion of the table. This can make multi-page tables hard to read. However, you can easily configure Word to repeat a table’s heading row wherever the table breaks across…

Details

How to keep iPhone and iPad data safe from loss

As iPads, iPhones, and other handheld devices are used more frequently in work settings, keeping the data on them safe becomes a greater priority. While these devices are often used merely to access various remote resources, they may also contain important information such as notes, contacts, apps, settings, and other resources. Unfortunately, these devices can…

Details

Dispelling the myths about POST and PUT

One of the most common myths about HTTP and REST Oriented Architecture is to think of the use of POST and PUT in terms of which one is used for a create operation, and which is used for updates. Depending on the source, you may hear it both ways. However, the actual distinction between POST…

Details

Export Illustrator files in PSD format for seamless integration with Photoshop (Illustrator CS5/CS6/CC/CC 2014, Photoshop CS5/CS6/CC/CC 2014)

You can copy and paste Illustrator artwork into Photoshop, but that doesn’t preserve layers or text editability. For a better option, export it instead. To export your Illustrator files as editable PSD files, choose File > Export. In the Photoshop Export Options dialog box, set the options to suit your needs, including color model and…

Details

Is your data electromagnetically secure?

Servers and other electronic, magnetic, and wireless equipment emit and are affected by electromagnetic radiation. This gives rise to three potentially serious problems: snooping, interference, and electromagnetic pulse (EMP) susceptibility. Fortunately, all three problems can be easily mitigated with a faraday cage. The idea is that surrounding your equipment on all sides with a grounded…

Details

Simple command to test if your Linux or Mac is safe from Shellshock

Security problems are not just the domain of Windows machines; Linux and Mac machines can also be affected by serious vulnerabilities, such as Bash’s “Shellshock” bug, known in the National Vulnerability Database as CVE-2014-6271. This bug, affecting GNU Bash through version 4.3, allows hackers to remotely execute arbitrary code on the machine. In some cases,…

Details

Have it both ways with CDNs and local copies

Many websites use CDNs (Content Delivery Networks) to load external libraries and frameworks, on the theory that this will speed up performance, since the CDN resource may already be cached on the user’s machine. Unfortunately, this approach can backfire if there are connection problems that temporarily make the CDN unreachable. Fortunately, you can easily get…

Details

4 Key Benefits of Desktop Virtualization

Desktop Virtualization Can Help Solve Business Problems Desktop virtualization is an increasingly important technology for many organizations. As businesses face restrictive budgets, uncertain funding, demands for BYOD  strategies and pressures to collaborate over a dispersed workforce, desktop virtualization allows companies to provide a simple, cost-effective and secure way for employees to access applications and resources…

Details

Where Virtualization Does and Doesn’t Make Sense

Be Selective With Your Virtualization Virtualization can provide some big cost savings and reduce network complexity. But according to Wayne Cullen, Cisco Senior Manager, Service Provider Architectures, “Virtualization is like chocolate. You eat too much and some bad things can happen.” Along with cloud computing, machine-to-machine (M2M), collaboration, and hoodie sweatshirts, virtualization is a trend…

Details