Exclusive offer from BigBeagle.com

Exclusive offer from: BigBeagle.com  |  24/7 Support: 8885051532
Amit Shah — Customer Number: 57156051

BigBeagle is a reseller of GoDaddy and offers GoDaddy products at a discounted price. Don’t forget to visit our coupon page at http://bigbeagle.com/coupons for the latest and greatest promotions.

Save upto 10% on new purchases of $40 or more and get everything you need. Hurry before the offer expires.

Coupon-5-16

Use promo code rs6558a in your cart when you order.

*Some limitations apply. Applicable to new purchases only. Enter promo code into shopping cart to see full details. Minimum purchase of $40 required. Offer expires Wednesday, May 25, 2016 at midnight (Mountain Time).

Copyright © 2016 BigBeagle.com. All rights reserved.

Exclusive offer from BigBeagle.com

Exclusive offer from: BigBeagle.com  |  24/7 Support: 8885051532
Amit Shah — Customer Number: 57156051

BigBeagle is a reseller of GoDaddy and offers GoDaddy products at a discounted price. Don’t forget to visit our coupon page at http://bigbeagle.com/coupons for the latest and greatest promotions.

Save upto 15% on new purchases of $80 or more and get everything you need. Hurry before the offer expires.

Coupon-5-2016

Use promo code rs6447a in your cart when you order.

*Some limitations apply. Applicable to new purchases only. Enter promo code into shopping cart to see full details. Minimum purchase of $80 required. Offer expires Tuesday, May 10, 2016 at midnight (Mountain Time).

Copyright © 2016 BigBeagle.com. All rights reserved.

Exclusive offer from BigBeagle.com

Exclusive offer from: BigBeagle.com  |  24/7 Support: 8885051532
Amit Shah — Customer Number: 57156051

BigBeagle is a reseller of GoDaddy and offers GoDaddy products at a discounted price. Don’t forget to visit our coupon page at http://bigbeagle.com/coupons for the latest and greatest promotions.

Save upto 15% on new purchases and get everything you need. Hurry before the offer expires.

Coupon3-23-2016

Use promo code in your cart when you order.

*Some limitations apply. Applicable to new purchases only. Enter promo code into shopping cart to see full details. Offer expires Tuesday, April 12, 2016 at midnight (Mountain Time).

Copyright © 2016 BigBeagle.com. All rights reserved.

Beware downloading some apps or risk “being spied on”

Popular apps on your smartphone can be convenient and fun, but some also carry malicious software known as malware, which gives hackers easy access to your personal information.

A security firm found that between 75 and 80 percent of the top free apps onAndroid phones or iPhones were breached. The number jumps as high as 97 percent among the top paid apps on those devices.

Whether these apps help advertisers target you or help hackers rip you off, you’ll want to do your homework before downloading apps, reports CBS News correspondent Anna Werner.

California’s Susan Harvey said she was a victim after she used a debit card to download a slot machine game app to her cell phone through a Google Play store account.

“It was something you purchased once, for like $15,” Harvey said.

When she went to reload the game, she found hundreds of purchases had been made — by her math, more than $5,000 worth of transactions.

“My heart sank, I just sat there looking at it… I physically, I was sick, because I didn’t know what they were,” Harvey said.

That story’s no surprise to cybersecurity expert Gary Miliefsky, whose company SnoopWall tracks malware. He said certain apps are designed to steal your personal information.

“What are the consequences for me as a consumer?” Werner asked.

“You’re gonna lose your identity. You’re gonna wonder why there was a transaction. You’re gonna wonder how someone got into your bank account and paid a bill that doesn’t exist,” Miliefsky said.

Milifesky said when you download an app, you also give permission for it to access other parts of your phone, like an alarm clock app that can also track phone calls.

“You think an alarm clock needs all those permissions? Access to the Internet over wifi, your call information, calls you’ve made, call history, your device ID? This to me is not a safe alarm clock,” Miliefsky said.

And there’s the weather and flashlight apps that he says exploit legitimate banking apps to capture information, as he showed us in a demonstration of what could happen when someone takes a photo of a check to send to their bank.

“The flashlight app spies on the camera and noticed the check and grabbed a copy of it. Shipped it off to a server somewhere far away,” Miliefsky said.

Last year the group FireEye discovered 11 malware apps being used on iPhones that gathered users’ sensitive information and send it to a remote server, including text messages, Skype calls, contacts and photos Apple fought back by removing the apps and putting stricter security measures in place.

“They get at your GPS, your contacts list…to build a profile on you,” Miliefsky said.

Some apps are simply collecting information for advertising purposes. In 2014, the Federal Trade Commission settled a lawsuit with a company over its popular Brightest Flashlight app, alleging it transmitted consumers’ personal information to third parties without telling them.

But Miliefsky said he’s found another flashlight app that can do much more troubling things.

“This one turns on your microphone in the background, listens in on you, and sends an encrypted tunnel to a server we discovered in Beijing,” Miliefsky described.

“You’re saying that they’re actually listening to people’s conversations and sending that audio back to Beijing?” Werner asked.

“Yeah, we’ve tracked it. I can show you where it does it,” he said.

Miliefsky said it can be traced to a few blocks from Tiananmen Square on Information Drive in Beijing.

He gave a report on that app to the FBI.

“Because to me, it’s spyware at the nth degree,” Miliefsky said.

His recommendation?

“We really have to look at our phone and say, ‘This is really a personal computer that fits in our pocket. Let’s shut down all the apps we don’t use. Let’s delete apps that don’t make sense and reduce the risk of being spied on,'” Miliefsky said.

The creator of the Brightest Flashlight app settled with the FTC, agreeing to change its policy and delete all the information it had gathered.

Harvey sued Google over her alleged hack, but a judge recently dismissed it, saying she and her attorney filed too late. Google said fewer than one percent of Android devices got bad apps in 2014.

Have questions?

Get answers from a Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

10 of the latest security products that can help you fight the bad guys

1. IBM z13s mainframeIBM z13s mainframe

Image: IBM

Security standards are constantly changing. Here are some of the latest software and hardware products to help keep your organization secure.

In February 2016, IBM announced the IBM z13s, a mainframe with cryptographic features built directly into the hardware. According to IBM it can decrypt at twice the speed of the generations before it.

2. Cisco Firepower NGFW

Cisco Firepower NGFW

Image: Cisco

Cisco recently announced its Firepower series appliances with its next-generation firewall (NGFW) technology. There are 16 models in the series that include integrated NGIPS and advanced malware protection.

3. Illumio

Illumio

Image: Illumio

Illumio is a startup that provides adaptive security for the data center and cloud environments. The company recently achieved unicorn status as its value topped $1 billion, and it is consistently named a top enterprise security provider.

4. GOTPass

GOTPass

Image: University of Plymouth, H. Alsaiari, M. Papadaki, P. Dowland, and S. Furnell

GOTPass is a graphical authentication system developed by researchers at the University of Plymouth. It uses images to authenticate instead of traditional passwords.

5. Skyport Systems SkySecure

Skyport Systems SkySecure

Image: Skyport Systems

SkySecure is an out-of-the-box enterprise security solution to protect application workloads. The systems includes hardware, software, and management tools.

6. Spikes Security Isla

Spikes Security Isla

Image: Spikes Security

The Isla is an enterprise appliance that “isolates and eliminates all browser-borne malware.” It was launched in mid-2015, but it was independently certified as invulnerable to web malware exploits in early 2016.

7. Blackphone 2

Blackphone 2

Image: Zack Whittaker/CNET

The Blackphone by Silent Circle is an Android-powered smartphone with a built-in security center to lock down your data. The most recent iteration, the Blackphone 2, released late last year.

8. Imation IronKey Enterprise H350

Imation IronKey Enterprise H350

Image: Imation

The IronKey Enterprise H350 is a rugged, military-grade encrypted hard drive. It is available in multiple capacities and is FIPS 140-2 Level 3 certified.

9. Bitdefender Total Security 2016

Bitdefender Total Security 2016

Image: Bitdefender

For home users and small businesses, the Total Security 2016 by Bitdefender is a great option. It stacks up well against key competitors and includes device anti-theft features.

10. Qubes OS 3.1 rc2

Qubes OS 3.1 rc2

Image: Qubes

Qubes OS is a Linux-based, security-oriented OS that is focused on compartmentalization using VMs. It’s been around for a few years, but the latest version released in January 2016.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows tip of the week: How to customize the Send To menu

Customize the Send To menu:

The Send To menu is a particularly useful feature in File Explorer. You can right-click any file or folder, choose Send To, and copy or move those objects to a folder of your choosing. You can also open compatible files by sending them to an application shortcut.

Unfortunately, the default list of Send To destinations is sketchy to say the least. But if you create a shortcut, you can customize that list to your heart’s content. The secret is to open the Run box (Windows key + R), type the command shell:sendto, and then press Enter.

The folder with all the items you see on the Send To list will pop up. To delete an item, just right click it and select delete. To add destinations, like the Videos or Music folders, by dragging them from the menu on the left.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Yammer is on the way to Office 365: Are you ready?

Microsoft is activating Yammer for every Office 365 subscription. But is this one collaboration tool too many?

On February 2, 2016, Kirk Koenigsbauer announced in the official Microsoft Office 365 blog that Yammer is now being activated for every eligible Office 365 subscription. In a nutshell, that means Yammer is going to be another app on the Office 365 app list unless an admin specifically turns off access. Your enterprise should plan accordingly.

Yammer

For those of you unfamiliar with the product, Yammer bills itself as an enterprise internal social network. It mixes the typical chat messenger application with collaboration tools available in Office 365.

Similar to the Delve tool we looked at last week, Yammer can serve as the central hub for team collaboration. From within a Yammer discussion, teams can set up meeting appointments using Outlook, switch to a full-fledged Skype for Business video meeting, and access OneDrive for Business to create collaborative documents.

The initial rollout of Yammer took place on February 2, 2016; the rest of the rollout will take place in stages. The next release is March 1, 2016, and the last is April 1, 2016. According to the blog post, the first wave is for “Office 365 customers with a business subscription who purchased fewer than 150 licenses that includes Yammer and who have zero or one custom domains for Yammer.”

The second wave is for “Office 365 customers with a business subscription who purchased fewer than 5,000 licenses that includes Yammer.” Customers with an education subscription are not included.

The final wave is for “remaining customers with a business subscription and all customers with an education subscription.” For subscribers who have never had a Yammer account, the rollout will take place last, in April. Alas, that is the wave I’ll have to wait for.

Collaboration

Yammer is the latest, and perhaps the last, major teamwork collaboration app to be added to Office 365. In Microsoft’s vision of a mobile-first, cloud-first enterprise, teams collaborate across distances using shared documents, video conferencing, and applications that tie it all together in one virtual location.

YammerForOffice365

With the addition of Yammer, Microsoft is offering several tools teams can use to manage and organize their collaboration activities. Teams can use Yammer, Delve, Groups, Sites, SharePoint, and OneNote to manage their shared conversations and documents across the enterprise. One of those tools should be able to satisfy even the most persnickety of teams.

Bottom line

But then again, that may be where we run into problems. One could argue that there are too many collaboration tools available in Microsoft Office 365. While all these wonderful choices may seem good at first glance, it is possible that subscribers may become overwhelmed.

Microsoft’s idea that teams can choose the best tool for them or for the project they are working on sounds all well and good, but it does still require someone to make an important initial decision. For some people, making a decision that will affect a project from start to finish can be a daunting task.

In the long run, it may be beneficial for organizations to establish guidelines for when each of the collaboration tools works best. They may even decide to block some of the tools from use altogether in favor of a recommended best practice.

Having myriad collaboration tools is generally a good thing, but it might help move things along if the enterprise establishes some well thought out guidelines.

Have questions?

Get answers from Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

Apple CEO Tim Cook: FBI asked us to build a back door into iOS

The most important Tech Case in a Decade

Customer Letter – Apple

February 16, 2016

A Message to Our Customers

The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.

This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.

Answers to your questions about privacy and security

The Need for Encryption

Smartphones, led by iPhone, have become an essential part of our lives. People use them to store an incredible amount of personal information, from our private conversations to our photos, our music, our notes, our calendars and contacts, our financial information and health data, even where we have been and where we are going.

All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission. Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data.

Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us.

For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.

The San Bernardino Case

We were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following the attack, and we have worked hard to support the government’s efforts to solve this horrible crime. We have no sympathy for terrorists.

When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.

We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The Threat to Data Security

Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.

A Dangerous Precedent

Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.

The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by “brute force,” trying thousands or millions of combinations with the speed of a modern computer.

The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.

Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.

We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.

While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

Exclusive offer from BigBeagle.com

Exclusive offer from: BigBeagle.com  |  24/7 Support: 8885051532
Amit Shah — Customer Number: 57156051

BigBeagle is a reseller of GoDaddy and offers GoDaddy products at a discounted price. Don’t forget to visit our coupon page at http://bigbeagle.com/coupons for the latest and greatest promotions.

Save upto 10% on the purchases of $40 or more and grow your web presence. Hurry before the offer expires.

Coupon

Use promo code rs6216a in your cart when you order.

*Some limitations apply. Applicable to new purchases only. Enter promo code into shopping cart to see full details. Minimum purchase of $40 required. Offer expires Thursday, March 17, 2016 at midnight (Mountain Time).

Copyright © 2016 BigBeagle.com. All rights reserved.

Windows 10: Ten big things to watch for in 2016

Next year will mark the first full year of release for Microsoft’s new OS. A look at what’s in store for Windows 10 next year.

Windows10

 

Windows 10 was described as the “last version of Windows” – an OS that would evolve over time rather than be superceded.

In the few months since Windows 10’s launch Microsoft says it has been installed on more than 110 million devices. But just what lies in store for the OS in 2016, how will it get better and what new devices will it find its way onto?

1. Windows 10 will begin automatically installing on your old machine

Windows 10 is available as a free upgrade to Windows 7 and 8.1 users and Microsoft is getting increasingly aggressive about moving these users to the new OS.

From next year Windows 10 will automatically begin installing on most Windows 7 and 8.1 machines.

Users will still need to confirm the installation manually for it to continue. However, if they choose not to proceed it’s unclear if they can cancel it altogether, with Jeremy Korst, general manager of the Windows and Devices team at Microsoft, saying only that “the customer will have the ability to delay it for some period”.

If users do upgrade but don’t like Windows 10 they will have 31 days to roll back to their previous OS.

The automatic installation, the result of Microsoft changing the status of the Windows 10 upgrade to a Recommended update, will be preceded by increasingly insistent nag messages to upgrade. These notices are already being shown to some Windows users and have been criticised for not offering an easy opt-out.

2. Microsoft Edge will get extensions

Windows 10 launched with Microsoft Edge, a new browser that cast off a lot of the legacy code holding Internet Explorer back.

However, while speedy and capable on paper, the browser suffers from its share of bugs and is missing support for extensions, a key feature found in competitors such as Chrome and Firefox.

Microsoft will rectify this omission “early next year” when Korst said it will add extensions to Edge in test builds of Windows 10, ahead of being made generally available.

Extensions are small software programs, typically written using HTML, CSS and JavaScript, that augment the functionality of a browser.

Earlier this month, Microsoft accidentally published a website announcing the introduction of extensions to test builds of Windows 10. The site, which was taken down, referenced extensions for Pinterest and Reddit.

Microsoft originally planned to add support for extensions to Edge this year.

3. Windows 10 will blur the virtual and real world

Microsoft’s Windows 10-powered augmented reality headset HoloLens will ship to developers in the first quarter of 2016.

The augmented reality headset places 3D virtual images in the wearer’s vision so that they appear part of the real world – for instance, a Minecraft landscape sits on a coffee table or a Skype video sits on the wall.

After trying a demo of the headset this week, TechRepublic senior writer Dan Patterson said that though the headset had a limited “field of vision”, “the 3D animations are smooth, easy to interactive with, and result in only marginal eyestrain”.

The HoloLens doesn’t come cheap, with the developer kit priced at $3,000 – although Microsoft says this early release is meant for developers and commercial customers.

Although HoloLens has obvious consumer and gaming uses, Microsoft is stressing its use for business and is working with NASA, AutoDesk, Volvo, Dassault Aviation, Case Western Reserve University, and other large organisations to develop applications for it.

4. More security for enterprise

The coming year will also see some notable new features added to the enterprise version of Windows 10.

Key among these additions is Enterprise Data Protection, which will allow companies to separate work and personal data on devices using containerisation file techniques. It will also encrypt data as it moves around the organisation – helping to ensure that information isn’t accessed by the wrong people.

The feature will be rolled out to people testing Windows under the Insider Program “early next year”.

5. Testers will get a peek at even earlier builds

Those testing early releases of Windows 10 under the Windows Insider Program will be able to get earlier access to new features from January next year.

Those who choose to be in the “fast” ring of the Insider Program will receive builds of Windows 10 more frequently in 2016, according to Microsoft VP Gabe Aul.

The price of testers getting their hands on early builds more regularly will be that this software will likely include more bugs, he said. Those testers who prefer stability to early access should opt for the “slow” ring, he said.

6. Cortana will be everywhere

Microsoft is planning a major upgrade to Windows 10, codenamed Redstone, next year – with reports the upgrade will put Microsoft’s virtual assistant Cortana at the core of the OS.

An unnamed source told The Verge the new Cortana will help users with a much wider range of tasks inside Windows 10, appearing contextually in documents to provide “information and assistance” and giving Cortana control over a wider range of notifications.

The other major upgrade to Cortana will reportedly be an ability to start a task on one device and pick it up on another, for instance if you get a missed call on an Android phone running the Cortana app you could reply from your Windows 10 PC via text.

7. Microsoft doubles down on Windows 10 phones as desktops

A much touted feature of Windows 10 is its ability to run a desktop OS from a phone.

Microsoft’s new Lumia 950 and 950XL handsets can – wirelessly or via a dock – be hooked up to a monitor, mouse and keyboard and used to run a Windows desktop.

The Windows 10 OS can change the look and feel of certain apps, as well as its own appearance, to suit the phone or the desktop, as well as coping with everyday desktop tasks, such as multitasking and copying files from a USB stick.

The expectation is that Microsoft will further commit to this idea of using your phone as a desktop in 2016, with rumours that Panos Panay and the team behind the high-end Surface Book laptop are working on a Surface Phone that will release next year.

8. No more free upgrade

Windows 10 is available as a free upgrade to everyone running Windows 7 or 8.1 but only for a limited time.

The offer of a free upgrade will expire on 29 July 2016 – after which point it seems that users will have to buy a Windows 10 licence.

However, due to the in-your-face tactics that Microsoft is adopting to persuade people to upgrade, it seems unlikely that Windows 7 and 8.1 users will inadvertently miss out on the offer.

9. Windows 10 replaces its predecessors on new PCs

If you’re not a fan of Windows 10 then you should buy a new PC before October.

From the end of October 2016, PC makers will have to sell new machines with Windows 10, rather than Windows 7 or 8.1.

After that point businesses that want to run older Windows versions on new machines will have to rely on downgrade rights or software assurance rights under volume license agreements.

10. Windows 10 Surface Hub arrives

From January 2016 Windows 10 will power another new piece of hardware,Microsoft’s touchscreen computer the Surface Hub.

The successor to its large-screen Perceptive Pixel displays, the Surface Hub will run a custom version of Windows 10 and various apps needed for workplace communication and collaboration, including OneNote, Skype for Business and Office.

The 55-inch, Intel Core i5-based Surface Hub model will sell for $6,999 (estimated retail price), and the Intel Core i7-based 84-inch version for $19,999 ERP.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.