Windows Tip of the week: Create a system image backup

systemImageRecoveryWindows

Create a system image backup:

The surest way to recover from a data disaster, such as a system drive failure, is to restore that drive from an image-based backup. You’ll need an external hard disk–at least as large as the amount of space in use on the system drive and ideally the same size as your system drive.

The capability to back up and restore a system image is in the Windows 7 Backup And Restore program. That same program is also in Windows 8, 8.1, and 10, although it’s somewhat hidden. (In Windows 10, you can find it by typing backup in the search box.)

To start the program, press Windows key + R to open the Run box, type sdclt, and press Enter. Click Create A System Image from the column on the left, choose your external hard disk as the location where you want to save the backup, and click Next. On the following page, all partitions on the system drive should be selected. Just click Next and then click Start Backup.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Microsoft Stream: The future of secure business video

Microsoft is previewing Stream, a new service for publishing and managing business videos. One day it will be the default video publishing system for Office 365.

MicrosoftStream

 

On July 18, 2016, Microsoft announced that a preview version of a new service called Microsoft Stream was available. Like most of you, I passed over the news with an indifferent “whatever” attitude. But later I realized that the news was actually more important than I had first thought.

Microsoft Stream fulfills a niche by providing a secure place to share videos created within, and for, businesses. By using a cloud-based service like this, businesses can reap the benefits of video communication without the threat of anonymous forum trolls trashing the brand or harassing employees.

Upload and forget it

While it is still a preview version, Microsoft Stream seems mostly ready for prime time. All you have to do is set up an account with a valid business email—One can use a personal domain email—and then log in. To test how easy Stream is to work with, you can make a 10-second video with a smartphone. Upload your video to Google Drive and then drag and drop it on the Stream portal website.

The web service processes the video while you give it a title and a brief description. Stream then asks if you are ready to publish and when you say yes, it publishes the video after a few seconds of grinding. It takes all of two minutes from start to finish and requires nothing more technical than knowing how to drag and drop a file.

Gone are the days of worrying about file format, aspect ratio, preferred playback applications, and all the other minutia we had to go through in years past to get a video published. You just take the video and then publish the video.

Video management

The key features of Microsoft Stream have to do with managing videos after they are published. Videos can be classified and placed into specific channels. Those channels can have their access restricted to certain individuals or certain groups, like a specific department, for instance. Access is controlled via the Azure Active Directory system.

According to the blog post, Microsoft plans to integrate Stream into the existing Office 365 Video system. Once the integration is complete, Microsoft Stream will be the default system for publishing video in an Office 365 environment.

There are plans in the works to add intelligent search to Stream by taking advantage of tools like audio transcription and face recognition. Developers are also working on ways to integrate Stream with other tools, like PowerApps, Microsoft Flow, and SharePoint.

Bottom line

We are aware of Microsoft Bookings and how that application attempts to cut out other third-party developers by integrating appointment scheduling for small businesses with the standard Office 365 subscription. By offering Stream, a secure video publishing and management service, Microsoft is attempting to execute the same strategy for video publishing.

Microsoft Stream gives businesses a secure system for publishing videos. Through Stream, businesses control access and manage who can see what and when they can see it. And because it is all handled internally, problems with anonymous forum trolls are likely to be reduced.

It seems that Microsoft’s grand strategy is to become the only software company a business needs—ever. The glaring application that Office 365 is missing now is a double-entry accounting system that includes payroll, accounts receivable, accounts payable, and the general ledger. Should we be looking for an announcement regarding those applications soon, Microsoft?

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

How to avoid ransomware attacks: 10 tips

As ransomware increasingly targets healthcare organizations, schools and government agencies, security experts offer advice to help IT leaders prepare and protect.

Nigerian princes are no longer the only menaces lurking in an employee’s inbox. For healthcare organizations, schools, government agencies and many businesses, ransomware attacks—an especially sinister type of malware delivered through spear phishing emails that locks up valuable data assets and demands a ransom to release them—are a rapidly-growing security threat.

“We’re currently seeing a massive explosion in innovation in the types of ransomware and the ways it’s getting into organizations,” says Rick McElroy, security strategist for cyber security company Carbon Black Enterprise Response. “It’s a big business, and the return on investment to attackers is there—it’s going to get worse.”

While ransomware has existed for years, 2015 saw a spike in activity. The FBI received 2,453 complaints, with losses of over $1.6 million, up from 1,402 complaints the year before, according to annual reports from the bureau’s Internet Crime Complaint Center. And the numbers are only growing in 2016, the FBIreports.

“The Dark Web and Bitcoin allow almost anyone to sell stolen data without identification—cyber criminals understand they can make easy cash without the risk of being jailed,” says Ilia Kolochenko, CEO of web security company High-Tech Bridge. And hackers—most of which are located in developing countries—are growing more sophisticated, even developing downloadable ransomware toolkits for less-experienced hackers to deploy, according to the 2016 Institute for Critical Infrastructure Technology Ransomware Report.

“The days of grammatically incorrect, mass spam phishing attacks are pretty much over,” says James Scott, senior fellow and co-founder of the Institute for Critical Infrastructure Technology, and co-author of the report. Hackers can now check a victim’s social media accounts, and create a fake email address pretending to be a friend or contact in order to get them to click on an infected link or attachment. “It’s much more targeted, and will exploit a particular vulnerability in a device, application, server or software,” Scott adds.

A typical ransom demand is $300, according to a report from security firm Symantec.

Health threats

The healthcare sector is highly targeted by hacker attacks, due to antiquated or misconfigured computer security systems and the amount of sensitive data they hold, says David DeSanto, director of projects and threat researcher at Spirent Communications.

The large number of employees at most hospitals also makes cyber security safety training difficult, DeSanto says. Experts commonly see attacks occur through spear phishing—targeted emails with attachments with names such as “updated patient list,” “billing codes” or other typical hospital communications that employees may click on if not warned.

In 2015, over 230 healthcare breaches impacted the records of 500-plus individuals, according to data from the U.S. Department of Health and Human Services Office for Civil Rights.

A February ransomware attack launched against Hollywood Presbyterian Medical Center in southern California locked access to certain computer systems and left staff unable to communicate electronically for 10 days. The hospital paid a $17,000 ransom in bitcoin to the cybercriminals, says CEO Alan Stefanek.

Following security best practices can help healthcare organizations protect themselves. “The best way is to make regular backups of all systems and critical data so that you can restore back to a known good state prior to the ransomware being on the system,” DeSanto says.

Without security best practices, healthcare organizations may be left with few options to retrieve information. In these cases, healthcare organizations may choose to pay the ransomware fee. Some make enough money that paying the ransom for a few infected computers is low compared to the cost of maintaining the infrastructure to protect these attacks, DeSanto adds.

Schools and businesses

Hackers are gaining traction and using new methods across other industry verticals as well. In 2014, a large European financial services company (whose name was not disclosed) discovered with the help of High-Tech Bridge that a hacker placed a back door between a web application and a data set.

For six months, the hacker encrypted all information before it was stored in a database, undetected by company staffers. Then, they removed the encryption key, crashing the application, and demanded $50,000 to restore access to the database.

However, the company did not end up paying, thanks to mistakes made by the hackers, Kolochenko says.

Other victims are not as lucky, says Engin Kirda, professor of computer science at Northeastern University. “If the ransomware hacker does the encryption well, once the data is encrypted it’s nearly impossible to decrypt,” he adds.

Such was the case for South Carolina’s Horry County School District this February, when hackers froze networks for 42,000 students and thousands of staff. District technology director Charles Hucks tried to shut down the system, but within minutes, the attackers immobilized 60 percent of Horry County’s computers. The district paid $8,500 in Bitcoin to unlock their systems.

Tips for IT leaders

To prevent a ransomware attack, experts say IT and information security leaders should do the following:

  1. Keep clear inventories of all of your digital assets and their locations, so cyber criminals do not attack a system you are unaware of.
  2. Keep all software up to date, including operating systems and applications.
  3. Back up all information every day, including information on employee devices, so you can restore encrypted data if attacked.
  4. Back up all information to a secure, offsite location.
  5. Segment your network: Don’t place all data on one file share accessed by everyone in the company.
  6. Train staff on cyber security practices, emphasizing not opening attachments or links from unknown sources.
  7. Develop a communication strategy to inform employees if a virus reaches the company network.
  8. Before an attack happens, work with your board to determine if your company will plan to pay a ransom or launch an investigation.
  9. Perform a threat analysis in communication with vendors to go over the cyber security throughout the lifecycle of a particular device or application.
  10. Instruct information security teams to perform penetration testing to find any vulnerabilities.

Mitigating an attack

If your company is hacked with ransomware, you can explore the free ransomware response kit for a suite of tools that can help. Experts also recommend the following to moderate an attack:

  • Research if similar malware has been investigated by other IT teams, and if it is possible to decrypt it on your own. About 30 percent of encrypted data can be decrypted without paying a ransom, Kolochenko of High-Tech Bridge says.
  • Remove the infected machines from the network, so the ransomware does not use the machine to spread throughout your network.
  • Decide whether or not to make an official investigation, or pay the ransom and take it as a lesson learned.

“There is always going to be a new, more hyper-evolved variant of ransomware delivered along a new vector that exploits a newly-found vulnerability within a common-use application,” Scott of ICIT says. “But there are so many technologies out there that offer security—you just have to use them.”

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Windows Tip of the week: Benefits of the Shutdown command

The surprisingly useful Shutdown command:

shutdown

If you want to shut down a PC, you can always use the Power menu on Start. But the Shutdown command, which runs from a Command Prompt window, can help with a few tasks you can’t do from any menu.

To see the full syntax, open a Command Prompt window and type Shutdown /? Here are a few options you might find especially useful:

  • Shutdown /i – Show a graphical interface (note that this does not include all options available via command-line switches)
  • Shutdown /s – Full shutdown
  • Shutdown /r – Full shutdown and restart
  • Shutdown /h – Hibernate the local computer
  • For UEFI-based Windows 10 PCs, you have two extra options that can be invaluable:
  • Shutdown /s /fw – After a full shutdown, opens firmware user interface on next start
  • Shutdown /r /o – Restarts and displays the advanced boot options menu

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Ransomware 2.0 is around the corner and it’s a massive threat to the enterprise

The profits from ransomware are making it one of the fastest growing types of malware and new versions could negatively impact entire industries, according to a Cisco report.

ransomware2.0

Despite the efforts made to improve cybersecurity at many organizations, there are too many systems with aging infrastructure and vulnerabilities that leave companies at risk, with ransomware one of the most sinister threats, according to a new Cisco report.

Ransomware is a top concern because it’s become an area of intense focus for cybercriminals due to its effectiveness at generating revenue. Once a cybercriminal hacks into a company’s files and encrypts them, victims have little option but to pay the asking price for the code to decrypt their files. Ransomware is becoming more ominous as new versions are continually being developed.

“The landscape is simple. Attackers can move at will. They’re shifting their tactics all the time. Defenders have a number of processes they have to go through,” said Jason Brvenik, principal engineer with Cisco’s security business group, discussing the Cisco 2016 Midyear Cybersecurity Report.

Cisco used data from its customers to create the report, since there are more than 16 billion web requests that go through the Cisco system daily, with nearly 20 billion threats blocked daily, and with more than 1.5 million unique malware samples daily, which works out to 17 new pieces of malware every second, Brvenik said.

Brvenik has the following recommendations for companies wanting to improve security:

  • Improve network hygiene – Improve aging infrastructure to limit vulnerabilities.
  • Integrate defenses – Use machine learning techniques combined with novel data views.
  • Measure time to detection – Find out how long an attacker can live in your network before they are found.
  • Protect your users everywhere they are – Protect users whether they’re on a laptop, a smartphone, or another device. Don’t just protect networks but protect users. They are the target.

The next step in the evolution of malware will be ransomware 2.0, which Brvenik said “will start replicating on its own and demand higher ransoms. You’ll come in Monday morning and 30% of your machines and 50% of your servers will be encrypted. That’s really a nightmare scenario.”

Ransomware campaigns started out primarily through email and malicious advertising, but now some attackers are using network and server-side vulnerabilities as well. Self-propagating ransomware will be the next step to create ransomware 2.0, and companies need to take steps to prepare and protect their company’s network, Brvenik said.

New modular strains of ransomware will be able to quickly switch tactics to maximize efficiency. For example, future ransomware attacks will evade detection by being able to limit CPU usage and refrain from command-and-control actions. These new ransomware strains will spread faster and self-replicate within organizations before coordinating ransom activities, according to the report.

JexBoxx, an open source tool for testing and exploiting JBoss application services, had been used to allow the attackers to gain access to networks in the targeted companies. Once the attackers had access to the network, they encrypted multiple Windows systems using SamSam.

Overall, in all aspects of cybersecurity, there are too many companies with vulnerabilities that haven’t been addressed. Out of 103,121 Cisco devices connected to the internet that were studied for the report, each device on average was running 28 known vulnerabilities. The devices were actively running known vulnerabilities for an average of 5.64 years, and more than 9 percent had known vulnerabilities older than 10 years, according to the report.

“In April, Cisco estimated that 10% of all JBoss servers worldwide were compromised. And they were compromised using readily available tools and old vulnerabilities. Adobe Flash is still a favorite. It gives a viable attack surface for them. And we see Microsoft Silverlight vulnerabilities. This means to us that people are opportunizing those that work for them,” Brvenik said.

Brevik noted that the nature of the attack is also likely to change, focusing on service-oriented technologies and systems, with teams ready to attack and try to compromise systems. Advertising is a viable model for attack.

“We saw a 300% increase in the use of HTTPS with malware over the past four months. Ad injection is the biggest contributor. Adversaries are using HTTPS traffic to expand time to operate. That’s the attacker opportunity as it exists today,” he said.

It’s no longer reasonable to expect to block 100% of threats, but being able to detect the threat fast, and limit the time the attacker is in your system is key to minimizing the damage. In December 2014, the median time before an attack was detected was 50 hours. In April 2016, it dipped to a median of 13 hours for the previous six months, Brvenik said.

“It is a living number as defenses improve and attackers change. This is good. It says that for the customers that have these systems, when they are compromised, they’re now down to 13 hours as a median time to detect it. I wouldn’t leave the door to my house open for 13 hours; and that’s what you’re doing when you leave your door open to attackers for 13 hours.”

Industries that previously thought they were immune because their business was of little interest to attackers are wrong.

“No industry is safe,” Brvenik said. “Assuming that what you do is of no interest to attackers is not a good way to think of it.”

Three takeaways for the readers

  1. Of more than 100,000 Cisco connected devices studied for the report, an average of 28 vulnerabilities were running on each one.
  2. Self-propagating ransomware is around the corner and companies need to protect themselves from the threat.
  3. Ransomware is giving massive profits to attackers, encouraging them to create even more sinister ways to attack. The average time of attack lasts 13 hours, down from 50 hours in 2014.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Mozilla Joins Google and Facebook in Phasing Out Adobe Flash

Web browsers don’t like the security and stability problems that come with Flash.

Another popular web browser has had it with Adobe Flash.

Mozilla said this week that it plans to gradually wean its Firefox web browser from Adobe’s ADBE -1.07% multimedia player. In August, Firefox will no longer support “certain Flash content” that it deems “not essential to the user experience,” although Mozilla did not specify what type of Flash content it was referring to.

Mozilla will still support “legacy Flash content” for an unspecified time, but the company urged websites that use Flash or Microsoft MSFT -0.25% Silverlight, another multimedia web player similar to Flash, for their videos or online games to adopt newer “HTML technologies as soon as possible.”

In May, Google GOOG -0.59% detailed its plans to end support of Flash for its Chrome web browser, and it hopes to completely rid itself of Flash advertisements by the beginning of 2017.

Google, like Adobe, is urging website operators to switch to the HTML5 coding language to display multimedia like video on their sites.

Flash is notoriously buggy and prone to many security vulnerabilities. Firefox believes that by ending support for Flash, its users will see “enhanced security, improved battery life, faster page load, and better browser responsiveness.”

Still, Mozilla is not totally cutting ties with Adobe. Mozilla said it would “continue to work closely with Adobe to deliver the best possible Flash experience for our users” as it phases the multimedia player out, and said that an engineering partnership between the two companies has improved some performance and stability in Firefox when it displays Flash content.

Last summer, Facebook’s FB -0.27% chief security officer Alex Stamos urged Adobe via Twitter to disable Flash because of its security vulnerabilities.

In April, Adobe issued an emergency update to Flash after security researchers found a flaw that allowed hackers to distribute so-called ransomware to owners of Microsoft Windows personal computers. Ransomware is basically a form of malware that lets hackers block people from accessing their computer or related computer networks so that a hacker can demand payment in return for access.

In 2010, legendary Apple AAPL -1.32% CEO Steve Jobs wrote a 1,700 word essay on Flash and why Apple’s problems with the multimedia player, which he claimed hurt the “reliability and security of our iPhones, iPods and iPads.”

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows Tip of the week: Reduce clutter with a mouse gesture

Shake the clutter away:

Windows-Macbook

On a modern Windows PC with gobs of memory, it’s easy to have dozens of windows open at one time. But all that multitasking can create a distracting mess of overlapping panes that makes it difficult to concentrate on the task at hand.

The solution is a little gesture that debuted in Windows 7. Bring the app you want to focus on to the foreground, point to its title bar, hold down the left mouse button, and make a gentle left-right-left shaking gesture. It doesn’t need to be violent; just make sure you move the window an inch or so in each direction. Do it right, and every other open window is minimized to the taskbar. Shake again to restore all windows to their previous position.

Want to minimize every window, including the current one? Aim for a narrow strip at the end of the taskbar, just to the right of the system clock, and click once. Click again to restore all windows.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Simple steps to stay on top of your mobile data usage

Apps not required

Businessman in suit, jacket,shirt, tie, using his smart phone

Who said you needed to install something to control your mobile data use? Your iOS and Android devices come with all the tools you need to stay below your data cap. It takes a few taps to turn them on and configure them, which is exactly what we’re going to help you with.

Easy in Android

MobileDataUsage2

Tracking and limiting your data usage is easy on an Android device. There are a number of options available to stop yourself from going over the data limit.

The simplest solution is to activate two options under the Data Usage menu in your phone’s Settings app: Limit Mobile Data Usage and Alert Me About Data Usage. Toggle these two switches to on and your phone will turn off cell data once you reach a certain point, as well as warn you when you start getting close. Adjusting those thresholds is as simple as dragging a little line up or down.

Control data use per app

MobileDataUsage3

Scroll a bit further down in the Data Usage menu and you’ll find a list of apps sorted by how much mobile data they use. Click on one of those apps and you’ll see a few more options. Toggling Restrict Background Data on will stop the app from doing anything in the background, unless you’re connected to Wi-Fi.

App-specific options

MobileDataUsage4

Turning the Background Data Restriction on brings you face to face with a popup warning you that doing so might mess with the app’s performance. It also directs you to the View App Settings button, where you can change the settings right in the app.

In my experience going into the app hasn’t been necessary—just toggle the data restriction option on, but know that your weather, email, Twitter feed, and other apps that require a constant connection might not update without your telling them to (provided you’re not on Wi-Fi).

Other Android tips

MobileDataUsage-5

There are two other nifty things you can do on Android to save data: use the Chrome Data Saver and store frequently used Google Maps locations offline.

Chrome Data Saver is turned on by opening Settings in Chrome. Swipe down to the bottom of the menu and you’ll see Data Saver. Open that menu and turn it on—that’s it! Data Saver compresses incoming web traffic to save space, and it really doesn’t have that much effect on your experience.

Google Maps offline

MobileDataUsage6

Storing map data offline is a good idea whether you want to save data or not. It makes your commute smoother, and longer trips will never leave you without a map in unfamiliar territory. It’s easy to do, too.

Open the menu in Google Maps. You’ll see Offline Areas right in the first few options—that’s what you want to select. From there click the plus sign and you’ll see a map highlighted with a blue circle. Pinch to zoom in or out, tap download, and it will download anything inside the square.

Managing data on an iPhone

MobileDataUsage-7

iOS users aren’t nearly as fortunate as Android users when it comes to built-in data capping options. There are still a few ways to track and limit your data use, but if you’re hoping for an Android-like option that terminates data once you near your cap you’re out of luck.

Controlling background data

MobileDataUsage8

It’s simple to disable background app data in iOS. Open up the Settings app, and tap Cellular. Once you’re there, scroll down a bit and you’ll see a list of every single app you have installed. Tap to turn off the ones you want to stop from using cell data—that’s it!

App-specific options

MobileDataUsage-9

Disabling background use is one thing, but you can save even more data by tweaking options specifically to different apps. In the Settings app, scroll down a bit to see a list of all the apps you have installed. Tap one and you’ll see a list of app-specific options.

You can turn off cellular data for an app, background refresh, and location services, all which will eat up your data bit by bit.

Disable Wi-Fi Assist
MobileDataUsage-10

iOS devices have the option to hop to their cell networks when Wi-Fi signal is weak. Disabling this can save you a bit of data, but it’s all dependent on how often you have to deal with weak Wi-Fi.

You’ll find the toggle for Wi-Fi Assist at the bottom of the Cellular page.

Good luck saving that data

Mobile payment

Seven or eight gigs might seem like a lot, but constant travel, mobile gaming, and video streaming can eat that up before you know it. Hopefully some of these options will help save you megs and bucks!

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

6 things you need to know about 802.11ac Wave 2

A new Wi-Fi standard known as 802.11ac Wave 2 was recently certified by the Wi-Fi Alliance. Here are the six details you need to know.

wave 2

The Wi-Fi Alliance, a global nonprofit association of companies that determine the interoperability of Wi-Fi technology, recently certified the 802.11ac Wave 2 standard. The new standard brings a host of updates that could eventually affect the daily connectivity of consumers and businesses alike

Here are six performance changes that we will see with 802.11ac Wave 2.

1. It opens up gigabit Wi-Fi possibilities

With all the hype around products like Google Fiber, AT&T GigaPower, and Verizon Fios, it’s safe to say that gigabit internet is hot right now. However, it’s mostly constrained to a hardline connection. Using the Wave 1 standard, gigabit speeds have been achieved in lab settings, but not commonly in the real world.

The Wave 2 standard could open the door for gigabit Wi-Fi, though. The PHY (physical) rate, which in turn affects the throughput rate of data transfer, is much higher in Wave 2. Wave 1 PHY rate maxes out at 1.3 Gbps, while Wave 2 can be 2.34 Gbps. Even if the throughput was 50% lower than the theoretical PHY rate for Wave 2, in theory it would still be above 1 Gbps.

2. It supports more connected devices

Wave 2 offers offers greater density than Wave 1in that it supports multiuser multiple input, multiple output (MU-MIMO). This means that the spectrum is used more efficiently for multiple connected devices, and devices can more easily get on and off of the network.

Gartner research vice president Tim Zimmerman said it is: “The ability for the access point to communicate simultaneously with multiple mobile devices in a single coverage area.” The access point will be able to talk to up to four, single stream devices at one time going downstream.

The support of MU-MIMO is important for consumer users, as most people tend to have multiple connected devices in their home or on their person, but it’s also good new for businesses. The growing number of mobile devices and IoT-connected devices have created some frustrations for network admins, and the addition of MU-MIMO support could help alleviate some of those headaches.

3. It offers stronger performance

In addition to the stronger PHY rate, it also adds the option for 160 MHz channel width. Previously, in Wave 1, the only options were 20, 40, and 80 MHz. In theory this will make it easier to access and transfer large files.

The Wave 2 standard also adds a fourth spatial stream, up from the three streams offered in Wave 1. According to the Wi-Fi Alliance, “Device speeds are proportional to the number of spatial streams.” So, more streams should mean better overall performance.

4. It brings more bandwidth and flexibility

One of the biggest updates that comes with 802.11ac Wave 2 is that it supports additional 5 GHz channels. If these channels are designated for Wi-Fi use, it could help support more users and devices overall. Most devices (65% according to the Wi-Fi Alliance) now are dual-band, meaning they can operate in both the 2.4 and 5 GHz frequencies.

5. It is certified for interoperability with five devices

With the certification of 802.11ac Wave 2, the Wi-Fi Alliance listed five products that it has certified for interoperability:

  1. Broadcom BCM94709R4366AC
  2. Marvell Avastar 88W8964
  3. MediaTek MT7615 AP Reference Design and MT6632 STA Reference Design
  4. Qualcomm IPQ8065 802.11ac 4-stream Dual-band, Dual-concurrent Router
  5. Quantenna QSR1000 4×4 802.11ac Wave 2 Chipset Family

6. It won’t be widely available immediately

Wi-Fi.org lists 24 products that have compatibility with 802.11ac Wave 2 features. However, not many of them are hardware-related. As with most new technologies, it will take some time for adoption to ramp up and for supporting products to be released. We will likely see more Wave 2-enabled hardware hit the market by the end of the year.

“You’ll see them in the devices in a near time frame, but the roll into the end-user, whether it be in the consumer or whether it be in the enterprise, it’s going to be a little bit slower,” Zimmerman said.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows Tip of the week: Keyboard tricks for switching between programs

Keyboard tricks for switching between programs:

windows-switch

Do you know all the program switching techniques for Windows? The more programs you have open, the more you can benefit from these keyboard shortcuts.

Here are three worth memorizing:

  • Alt+Tab: This is the classic shortcut, the one most Windows users are likely to know. Hold down the Alt key and tap Tab to see a list of running programs as thumbnails. If you continue holding down Alt and keep tapping Tab, you’ll cycle through all of them.
  • Alt+Esc: Use this shortcut if you want skip the thumbnails and just cycle through the actual programs. Keep holding down Alt and tapping Esc until you reach the window you want.
  • Ctrl+Alt+Tab: Most people don’t know this one. Press this combination and you get the same thumbnails as with Alt+Tab, with one crucial difference: When you take your hands off the keyboard the thumbnails remain visible. Use the left and right arrow keys to move through thumbnails. To choose one, tap the spacebar or press Enter.

And one last secret: Add Shift to any of these shortcuts to move in reverse.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.