Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Getting to Know Technology: Application Programming Interface

Getting to Know Technology: Application Programming Interface

Software runs the world, or so they say, and it’s all thanks to the ability to integrate with one-another through the use of APIs. This tech term, which stands for application programming interface, and it’s crucial to understand what these do in today’s technology environment.

Continue reading
0 Comments

Microsoft Ending Support for Major OS Titles

Microsoft Ending Support for Major OS Titles

Windows is the most popular operating system in the world, and as such, developers are always hard at work on the next new version of the OS. However, organizations are often stuck in a tricky situation whenever end of support occurs for any popular operating system. When your reliable technology solutions finally stop receiving updates and patches, what do you do? Well, users of Windows 7 and Windows Server 2008 R2 will have to answer this question next January.

Continue reading
0 Comments

Google Docs Finally Adding Microsoft Office Support

Google Docs Finally Adding Microsoft Office Support

Businesses generally have to make an important choice about which brand of productivity software they will implement for day-to-day operations. Two of the heavy hitters in today’s business environment are Google and Microsoft utilizing their respective productivity solutions. While the choice of which service to work with seems exclusive, Google is making strides to break down this barrier and allow certain file types to be edited in Google Drive.

Continue reading
0 Comments

How Automation Rejuvenates Productivity

How Automation Rejuvenates Productivity

There are some cases where productivity is a challenge, especially in the case where you’re being asked to work on something repetitive or monotonous. To make these tasks more bearable, automation solutions can be used. Although, depending on the purpose, they can become an integral part of your business’ productivity strategy.

Continue reading
0 Comments

Getting to Know Technology: Plug-In

Getting to Know Technology: Plug-In

The Internet is an amazing tool in and of itself, but like many tools, it can sometimes work better if other tools are used alongside it. These additional tools are called plug-ins. Here, we’ll discuss what a plug-in is, and how they all help us use the Internet a little better.

Continue reading
0 Comments

Three Keys to Proper Software Management

Three Keys to Proper Software Management

Nowadays, every company relies on some kind of software in order to properly function, so you need to ensure that this software is properly managed in order to maintain operations. While this may sound like a grand undertaking, software management is relatively simple and can be whittled down into three steps: leveraging the assets available, testing your strategies, and understanding what it is you have.

Continue reading
0 Comments

Tip of the Week: How To Put A Table Of Contents In A Google Doc

Tip of the Week: How To Put A Table Of Contents In A Google Doc

If you author a long document, having a table of contents can help your readers get the information they need fast. Here is how to insert a table of contents into a Google Doc.

Continue reading
0 Comments

Google Pixel Is First to Come with Zero-Touch Provisioning--Will Your Favorite Be Next?

Google Pixel Is First to Come with Zero-Touch Provisioning--Will Your Favorite Be Next?

Does your business use Google’s line of Android devices for business purposes? Well, you might be happy to hear about Google’s new zero-touch solution for enterprises for their Pixel line of smartphones. If you provide smartphones for your business’ employees, you know how much of a hassle it is to set up these devices. This new zero-touch policy attempts to make a change to this.

Continue reading
0 Comments

How To Keep Your Company Out Of The BSA’s Crosshairs

How To Keep Your Company Out Of The BSA’s Crosshairs

Let’s say that you have an employee who wants to do some good for your business and save your IT some cash on a piece of business software. They find a “free” version of it on the Internet, thinking they have found you a bargain deal. Little do you know that there is an agency out there that’s specifically looking for businesses like yours that don’t keep track of their software licensing, just to make a quick buck off of copyright infringement.

Continue reading
0 Comments

You Need To Be Familiar With Patching Terminology

You Need To Be Familiar With Patching Terminology

Over the past several months, while watching the news or reading about business and technology, you’ve probably encountered a few words, such as ‘ransomware’ ‘exploit weakness’, and ‘security patch’. These terms are used often, and you may be confused as to what they really mean, and how they relate to you and the security of your business’ data.

Continue reading
0 Comments

Businesses Running Outdated Software are Taking a Huge Risk, Study Finds

Businesses Running Outdated Software are Taking a Huge Risk, Study Finds

It goes without saying that businesses that don’t want to invest in the latest and greatest software solutions will be denying themselves the opportunity for more productivity and efficiency, but most of all, security will be put on the line. A new study has proven that there is a direct correlation between businesses that run older versions of out-of-date operating systems and web browsers, and organizations that suffer from data breaches.

Continue reading
0 Comments

“The Worst” Windows Bug Discovered... and Thankfully Fixed

“The Worst” Windows Bug Discovered... and Thankfully Fixed

Microsoft has resolved what a security researcher tweeted was “the worst Windows remote code exec” in his memory. This vulnerability allowed a targeted file to implement remote code execution processes, manipulating the infected system and spreading the infection to other machines. In other word, it’s a bad problem to have. The scariest part: the attack would be triggered if a particular file were to be scanned by the Microsoft Malware Protection Engine.

Continue reading
0 Comments

What You Should Be Mindful of Before Hosting Your Software in the Cloud

What You Should Be Mindful of Before Hosting Your Software in the Cloud

Businesses have focused on efficient utility software deployment for the better part of 30 years. Today, developers are increasingly offering software titles “as-a-service”, which gives users access to these powerful tools, via the cloud, for a consistent monthly payment. Distributing solutions through cloud technologies, be they a private cloud server or a reputable public cloud provider’s platform, can give your business considerable benefits.

Continue reading
0 Comments

Keeping All of Your Company’s Technology Up-to-Date is a Chore... that You Can Outsource!

Keeping All of Your Company’s Technology Up-to-Date is a Chore... that You Can Outsource!

Updating your company’s software is a big responsibility that shouldn’t be overlooked. When it comes down to it, applying security patches and updates are some of the best preventative measures you can take to ensure the safety of your company’s data. Do you have a plan in place to handle all of your technology updates, or are you going about it haphazardly?

Continue reading
0 Comments

Why You Should Read the Fine Print Before Downloading Adware

Why You Should Read the Fine Print Before Downloading Adware

Has this ever happened to you? You come across a free app online that seems interesting, entertaining, or helpful so you decide to download it? However, as soon as you click the download button you regret it as it begins to install browser toolbars, adware, and other annoying (and potentially dangerous) software onto your device? How can you keep this “crapware” from getting too out of hand, and why is it so popular in the first place?

Continue reading
0 Comments

DroidJack Malware is Super-Effective Against Impatient Pokémon Go Users

DroidJack Malware is Super-Effective Against Impatient Pokémon Go Users

Augmented reality is a growing trend in the technology industry, and perhaps one of the best known uses of it today can be found in the extremely popular mobile device app, Pokemon Go. However, hackers have seized the opportunity to infect players who want to “catch ‘em all” with a backdoor called DroidJack - something that certainly won’t help gamers “be the very best.”

Continue reading
0 Comments

Microsoft Now Pushing Into the Technology as a Service Market

Microsoft Now Pushing Into the Technology as a Service Market

One of Microsoft’s latest moves to appeal to business owners has been to establish a Technology as a Service program, allowing small businesses to purchase Surface products, accessories, and support by subscribing to a monthly payment plan. What’s more, when time comes to upgrade, customers can do so, although some fees may apply as dictated by the lease.

Continue reading
0 Comments

3 Talk-to-Text Apps that are Well Worth the Money

3 Talk-to-Text Apps that are Well Worth the Money

The development of mobile platforms have led to the development of hundreds of apps that give users the ability to capture websites, take notes, and do just about anything else as it pertains to a person’s daily business tasks. Some users of modern smartphones (and other mobile devices) routinely complain about the reliability of the on-screen keyboard interface, as communication is as important to the development and outcome of projects as ever. For this reason, some developers have begun creating applications that allow users to dictate to their devices; turning spoken words in to text. Here are three of the most reliable options to turn your voice into text.

Continue reading
0 Comments

Alert: Users of 7-Zip Should Immediately Upgrade to the Latest Version

Alert: Users of 7-Zip Should Immediately Upgrade to the Latest Version

One of the latest vulnerabilities in open-source software can be found in 7zip, a file archiver and decompresser. 7zip has been found to have several security vulnerabilities which have software developers rushing to fix their products. The damage done extends far beyond 7zip, reaching both people who use 7zip itself, and developers who have used the technology in the creation of their own tools and software.

Continue reading
0 Comments

40 Microsoft Software Titles to Reach End of Life/Extended Support in July 2016

40 Microsoft Software Titles to Reach End of Life/Extended Support in July 2016

All business owners should be aware of which Microsoft products they use. It’s one of the many complex and confusing parts of managing your technology. Of course, all great things must eventually come to an end, and the same applies to your mission-critical applications and operating systems. When your solutions can no longer be considered secure and are no longer supported by the developer, you know it’s time to move on and upgrade to something better.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingSoftwareHackersEfficiencyBusiness ManagementGoogleInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderProductivityMalwareNetwork SecurityMobile DevicesBusinessIT ServicesHardwareUpgradeComputerwindowsEmailDataGadgetsSmartphonesCommunicationIT SupportMiscellaneousSaving MoneyVirtualizationWindows 10SmartphoneAppsDisaster RecoverySmall BusinessNetworkBusiness ContinuityServerMobile Device ManagementBrowserVoIPHealthMicrosoft OfficeTech TermSocial MediaAndroidMobile ComputingInformation TechnologyQuick TipsPasswordsMobile OfficeData BackupOffice 365CybersecurityHolidayWindows 10Operating SystemData RecoveryGoing GreenSave MoneycommunicationsChromeOfficeBYODCollaborationspamCybercrimeOutsourced ITUsersAppApplicationInternet of ThingsAlertBest PracticeEmployer-Employee RelationshipData SecurityMarketingLaw EnforcementSearchManaged IT ServicesIT SupportRansomwareWirelessTabletRemote ComputingWearable TechnologyPhishingAppleVendor ManagementWiFiThe Internet of ThingsFacebookBring Your Own DeviceiPhoneAutomationAvoiding DowntimeRisk ManagementCost ManagementMaintenanceMoneySaving TimeHackingRouterWireless TechnologyBDRHistoryOneNoteUser ErrorRemote MonitoringMobilityUnified Threat ManagementAntivirusHard DrivesOffice TipsPasswordIT SolutionsCloud ComputingTech SupportComputersBig DataData ManagementEncryptionCustomer Relationship ManagementSocialTelephone SystemsGovernmentArtificial IntelligenceBandwidthCurrent EventsPhone SystemVPNTwo-factor AuthenticationInformationHumorManaged IT ServicesWebsiteNet NeutralityUpdateSocial NetworkingUnsupported SoftwareEducationPrinterWi-FiShortcutOutlookVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveProactive ITFirewallBudgetLithium-ion batteryRecoveryBlockchainAugmented RealityPersonal InformationLaptopContent FilteringIT COnsultantIdentity TheftComputer RepairWordTelevisionRetailExcelWork/Life BalanceManaged ServicePaperless OfficeVirusMobile DeviceMeetingsTraveladministrationTelephonyPoliticsDisasterSocial EngineeringStreaming MediaInstant MessagingTrendingApplicationsAuditManaged ITEntertainmentIntranetBatteryWindows 7ValueSaaSAutomobileCleaningPoint of SalePrinter ServerPrintingHaaSSave TimeData ProtectionTwitterComputer CareProgrammingManaging StressStorageGoogle AssistantConferencingIT ManagementhackerDisplayYoutubeAmazonDevicesLegalOneDriveTransportationHosted SolutionSalesPatch ManagementHard DriveEnd of SupportBusiness IntelligenceUninterrupted Power SupplyFax ServerCommerceData LossFlexibilityCustomer ServiceComputingBiometricsFraudGoogle DocsVirtual RealityPrivate CloudScamBusiness TechnologyData StorageHIPAAWireless ChargingInternet ExlporerHuman ResourcesAccess ControlMobile SecurityWindows 8File SharingDDoSEmailsWannaCryData BreachProject ManagementOnline CurrencyTouchscreenCortanaHybrid CloudEvernoteSportsSamsungBenefitseWasteComputer AccessoriesOperating SysytemVirtual AssistantLifestyleCommunityNanotechnologyWorkersFilesSafetyPayrollTrainingTabletsBrandingISPChromebookVoice over Internet ProtocolIT solutionsComparisonIntrantetMouseChromecastHBOAlexa for BusinessRoot Cause AnalysisUpdatesIdentitiesSecurity CamerasTutorialCompany CultureNFLWIndows 7Co-Managed ServicesBloggingNetwork CongestionSabotageWindows 10sSpecificationsReputationRegulationsMicrosoft WordLanguageMachine LearningBluetoothTelephoneAdministratorjunkPCNokiaSolid State DriveWorker CommuteKeyboardCamerasSoftware as a ServiceGift GivingCo-managed ITSettingsDevice SecurityDowntimeWindows InkSharePointVideo GamesUserHyperlinkAccessfilterComputer ForensicsSmartwatchHard Disk DriveGiftsHiring/FiringWIndows Server 2008Virtual DesktopPresentationMicrobloggingProactiveE-CommercePrint ServerGoogle MapsTeamworkBest AvailableWasting TimeScienceManagementServer MaintenanceCredit CardsSmart TechnologyVendorSpywareEbayWebsitesPayment CardsAccessoryRobotWireless InternetInvestmentFAQWebinarSyncImagesBuisnessAdvertisingEmployee-Employer RelationshipData TheftEmployeeRunning CableScalabilityPeripheralData storageGamificationROIiOSChargerExperiencePDFNear Field CommunicationEdgeApp storeBreak/FixUpgradesMicrosoft ExcelHow To3D PrintingMemoryWindows Server 2008 R2Computer FanMusicDebateSurge ProtectorEmployer Employee RelationshipAdobeHelp DeskText MessagingIT consultingTestingScreen MirroringCiminalMedical ITConsultantTouchpadFinancialDevelopmentBooksReliable ComputingCameraCastAdminComplianceIdentity5GDistributed Denial of ServiceBlack MarketBloatwareMicrsosoftMonitorsElectronic Medical RecordsIT budgetKeyboard ShortcutsLicensingProjectsInbound MarketingData PrivacyEmployeesWebinarLegislation