Technology is Awesome

Archive for Technology – Page 2

Technology is Awesome

When it comes to keeping up with the latest technology, many become overwhelmed. Most people are too busy to spend the time to evaluate new applications and software. The biggest tip to learn new technology is to take baby steps. Some evaluate new technology every six months, others more frequently. They want to know what’s out there that can make their lives better, more efficient, educational or just fun.

Learn New Technology, Because Technology is Awesome!

The perception of technology can vary with different generations but most agree it makes our lives better. To that end, I suggest focusing on what technology will most impact your life in a positive way. For some it maybe business-related such as contact relationship management (CRM) applications that promote shared calendaring, tracking of emails and documents as well as the basic contact information tracking.

For others, technology may be more pragmatic such as the huge surge of downloads during Hurricane Irma of Zello Walkie-Talkie, a two-way radio phone communication. This would allow critical communication between family members and friends if the cell towers went down but Internet connectivity was still available.

Entertainment is a big draw for technology. For example, Spotify allows fairly unlimited music listening entertainment for about $9.00 per month. Moreover, this app allows excellent organization and sharing of your music lists, particularly fun if your friends enjoy music as well. Ever get stuck in traffic? Sure, that’s 100 percent affirmative for anyone living on the planet. Then you might download Waze to give you a heads up on exactly when the traffic clears, if there’s any road hazards, accidents, police with radar guns, you know very helpful information.

If you’re on the brainier side of things, you may like Pocket, previously known as Read It Later, an application and service for managing a reading list of articles from the Internet. If you are a creative type, you may like Snapseed, a photo editing application that enables users to enhance photos and apply digital filters. Type A people may love Wunderlist, a cloud-based task management application allowing users to manage their stuff from any device including their smartwatch. This app might be used in conjunction with Evernote, an app designed for notetaking, organization and archiving which can be used personally or as an office intranet.

In the end, you can choose to embrace technology or ignore it. You’re in charge of your electronic world, so pick and choose what works best for you. You might be surprised how technology, when used on your terms, can positively impact your life. Stay curious!


Best New Tech Releases of 2017 (So Far)

Since we are at the age where most innovations are related to our smartphones, there is a significant decrease of head turning hardware that people can really relate to. Now, iteration is a lot easier than innovation. However, just because there are few, it doesn’t mean that they are not interesting and helpful for the people who use them.

Best New Technology Releases in 2017

This year, a lot of standalone gadgets have either quirky uses, like the Snapchat glasses, or a very niche purpose, such a compact sous vide machine. Here are some of the most groundbreaking, useful and innovative new technology releases this year.

  • Here One

Whether it’s on the subway, on your way to work, or aboard a plane with an economy class seat, you must admit the noise can be irritating. Everyone wants to avoid the seat right next to a wailing baby or someone talking too loudly. Here One allows you to turn down anyone or anything’s volume. That way, you’re saving your ear from the constant wailing, while keeping yourself alert in case someone calls your name or tries to talk to you.

Unlike the usual ear bud, this doesn’t just cancel out the noise. It allows you to control what you can hear and how much of it you can hear, giving you more control. Here One is able to do this thanks to the microphones and sound processors installed into it.

  • Superpedestrian Copenhagen Wheel

For those who think that bicycles are too slow, this is an upgrade you should try. The Copenhagen Wheel increases a bikers speed by about 20 miles per hour for 30 miles. It looks no different than a typical bike wheel, but it contains an amazing technology inside.

It comes with an internal motor powered by a battery, a wireless sensor that hinders thieves from stealing your bike (and the wheel) and increases the efficiency of your brakes. If you’re hardcore cyclists who enjoy the power of your legs, then this might not be for you. However, if you’re a regular commuter looking for a faster and easier way to travel on your bike, this is an amazing addition.

  • Space X Falcon

Who isn’t a fan of space and space exploration? There is so much out there people are yet to discover, so it’s not surprising that country’s continue to invest in building rockets no matter how expensive they get. The issue is rockets are made to be used once, making it a far more expensive endeavor. The SpaceX is hoping to change that by designing the Falcon 9 to land back on Earth upright, preserving its shape.


The New Surface Pro: 5th Generation

Microsoft’s Surface Pro has been a hit since its first release. You will find that, like the generations prior this release, this new launch will have the same core concept and functions as its predecessors. Why mess with a good thing, right?

Microsoft Surface Pro 5th Generation Has A Lot Going on Beneath the Surface

Despite those similarities, Microsoft claims that there have been a lot of internal improvements made to the Microsoft SurfacePro 5th Generation, which has made it technology news all over the nation. A total of 800 new custom parts we introduced to this mode.  This was according to the Microsoft Surface Chief, Panos Panay.

Apart from the unexpected change in components, Microsoft also dropped the numbering scheme that their products have now become known for. Now, they’re simply calling it the move, however, Microsoft chose to drop the numbering scheme in favor of calling it simply the “new Surface Pro”. This product releases in 26 different countries, from the US and UK to India and Taiwan, on June 15. You can still pre-order them now.

The most basic version of the Surface Pro you can pre-order comes with an Intel Core m3, but you can choose between 2  Intel Core i7 or 3 Intel Core i5 options too. These processors are all 7th generation Intel Kaby Lake units, and the GPU can be easily upgraded to Intel HD 620 or 640 from Intel HD Graphics 515 and 520. They’ve even added an LTE option, which can support both and eSIM micro SIM. This feature comes with an additional price though. With all these options and new features, it’s up to your to pick which on suits your needs and budget the best.

What remains the same are the memory options, which still ranges from 4GB to 16GB, while the storage 128GB to 1TB. This model has a 13-hour and half worth of battery life and comes with hinges that you can move deeper. It can even lay nearly flat on a table. The Surface Pro is light and easy to carry around, weighing about 784 grams. That’s good news for most professionals who loved the sleekness and compactness of the previous models.

All these features will cost you anywhere from $799 to $2,699. At $799, you will be getting the 128GB base model. It has an Intel Core m3. That latter price will get you all the add on features mentioned above – the biggest storage, the best processor and the best memory. You can also add Type Cover keyboards, which costs around $129 to $159. In comparison, its most recent predecessor has just been discounted to $699 at the Microsoft store.



Explore the TechSherpas Store

At TechSherpas , we provide essential training for those in the tech industry.  Our valuable training can bring you to the next level in your career! IT training in Atlanta isn’t always enough, however. In order to advance in your career, you need the right training and the right tools to make it happen. That’s why we also provide valuable products in our online store to help you get to the top. Here are just some of the available and valuable items that we offer.

TechSherpas Offers Even More Than IT Training in Atlanta

Computer Systems and Displays

Of course, we offer a wide variety of computer systems.  From barebone notebooks and systems to Blade servers to desktop computers, we are a one stop resource for all types of computer systems.  If you’re looking for notebooks, tablets, or workstations, you can find these in our store.  Whether you are building, repairing, or looking for a full system, TechSherpas is the place to find what you need.  

We also have computer displays, from monitors to electronic writing boards.


Our online store carries a variety of elements for your AIDC/POS systems.  We have barcode readers and verifiers, POS kiosks, check readers, keyboards, cash registers and pole displays, among other items.  We even have bundles and solutions to get you started.

Network & Communications

In our industry, it’s important to be connected.  We have a number of network and communications elements and devices.  

Consumer Electronics

We’re not all about tech professionals!  We have a large inventory of consumer electronics.  Whether you’re looking for a clock radio or a complete gaming system, we have you covered.

Multimedia Devices

Looking for graphic or sound cards?  Video modules?  Yup, it’s in our store!

Everything Else

This is only a small sampling of what we have on hand.  Basically, our goal is to have you covered for all of your technological needs.  We have such a wide variety of accessories, for computer systems, home theaters, gaming systems, and repairs.  We even have a large inventory of office supplies, so that the budding entrepreneur or massively successful businessperson can make one convenient stop to the TechSherpas store to get their needs, from wastebaskets to full computer systems.
Being a company that offers IT training in Altanta, we wouldn’t leave you without the latest in software.  Explore our software packages at the TechSherpas online store.


digital trends

Learn all at once or five minutes at a time, anywhere, anytime with New MOC On-Demand

Now you can build Microsoft technical expertise while balancing the demands of your schedule. TechSherpas , your Microsoft Gold Learning Partner, is now offering Microsoft Official Courses On-Demand (MOC On-Demand).

What is MOC-On-Demand
MOC On-Demand combines high-quality video, reading, live hands-on labs and knowledge checks in a self-paced format to help you build skills on Microsoft technologies as your schedule allows—all at once or five minutes at a time. Once purchased, students will have 24/7 access to the course and labs for 90-days. The students will have access to the digital courseware indefinitely.

High-quality content, direct from the source. MOC On-Demand is brought to you by the people who write the software. The content is based on the same official courseware we use in our instructor-led training, and videos feature engaging experts hand-selected by Microsoft. It’s quality content!

Live hands-on labs. Unlike other on-demand offerings that offer simulated labs, MOC On-Demand gives you a live, real-time environment for hands-on training. In fact, it’s the same Microsoft hands-on Labs environment used in the classroom. The best way to learn is by doing, right?

Immediate feedback on mastery. MOC On-Demand’s modular course structure lets you control what order you follow while you learn at your own pace. You can concentrate on what you don’t know, or focus on what you need to know right now. Knowledge checks tell you whether you’ve mastered the content and are ready to move on, or you need to review the information further.

To get additional details and read the FAQ, click here

 MOC On-Demand Purchase Options

 As we launch this new product, we are offering two options at which you can purchase:

1)      Reduced price when bundled with our live instructor-led course

2)      Purchase MOC On-Demand course as a standalone product (digital courseware is included)

When purchased with the live class, it serves as a great supplement to the live instructor-led training. You still have the advantages of being in a live class with instructors who can answer questions and also assist with labs, but you now have the opportunity to go back and listen to an instructor anytime you need, over the next 90 days.

How to MOC On-Demand

Using MOC On-Demand is simple, and can be done anywhere there is an internet connection. You can view the training from any device, but labs will need to be completed on a desktop or laptop, not one of your handheld devices. Training begins in three simple steps:

1) Purchase Course – Purchase your course with TechSherpas

2) Redeem the code provided to you by TechSherpas – Within 24 hours of purchase, you will receive a Code, and link with instructions on how to redeem

3) Start learning On-Demand

MOC On-Demand Courses

There are currently four Microsoft On-Demand courses available for purchase:

  • 10747 – Administering System Center 2012 Configuration Manager
  • 10961 – Automating Administration with Windows PowerShell
  • 20483 – Programming in C#
  • 20341B: Core Solutions of Microsoft® Exchange Server 2013

Additional courses will be released in the coming months.

Coming February 11th:

  • 20331 – Core Solutions of Microsoft SharePoint Server 2013
  • 20410 – Installing and Configuring Windows Server
  • 20412 – Configuring Advanced Windows Server 2012 Services

Coming February 25th:

  • 20411 – Administering Windows Server 2012
  • 20413 – Designing and Implementing a Server Infrastructure
  • 10267 – Introduction to Web Development with Microsoft Visual Studio 2010

Coming March 3rd:

  • 20417 – Upgrading Your Skills to MCSA Windows Server 2012
  • 20697-1B: Installing & Configuring Windows 10
  • 20480 B – Programming in HTML5 with JavaScript and CSS3

MOC On-Demand puts you in control of your learning experience, and it’s only available through certified Microsoft Learning Partners, such as TechSherpas 365 . Click here to get started.

Support for Windows Server 2003 ends July 2015 – Make Migration a Priority

Microsoft recently released a report on the risks that enterprises will face by not migrating to a new operating system. Migrating over to the new system should be a priority among all organizations still utilizing the legacy Windows Server 2003, as users will no longer have support. Learn the risks and recommendations on how to get migration to Windows Server 2012 & Azure going within your organization.

Risks & Recommendations
Some of the problems and risks that IT Departments will realize are:

Compromised business applications that open the door for theft and other security concerns
Applications that don’t operate properly and display error messages constantly because the old system is just not compatible with the other systems and errors with the old system cannot be corrected
Regulatory & Compliance requirements
Leaders of these Organizations who are unaware of the risks, will still be liable for issues that will arise.
The recommendations include:

The IT department should create a report that outlines all the risks and downfalls that staying on Windows Server 2003 will mean to your company.
This report needs to be provided to the team leaders so that they can understand the risks, ask questions, and be prepared to talk to the decision makers for support of the migration to get funding.
Do these as soon as possible so that migration is completed before July of 2015. Problems that arise with Windows Server 2003 will not be supported, causing more issues with the organization’s business processes.
You don’t have to go through a Windows Server migration alone
Migration does not have to be a scary feat. Get educated on the risks and the migration process. Get a game plan together. There is support for you. In addition, there are in-depth Microsoft Server training courses available for your IT professionals and staff. The training courses listed below are interactive and hands- on, so students not only learn about Windows Server, but actually work within the Windows Server environment. Get the training while migration is on-going so once implemented your staff is up to date with the new technology.

  • 20410: Installing and Configuring Windows Server 2012
  • 20411: Administering Windows Server 2012
  • 20412: Configuring Advanced Windows Server 2012 Services
  • 20694: Virtualizing Enterprise Desktops and Apps
  • 20346: Managing Office 365 Identities and Services
  • 10968: Designing for Office 365 Infrastructure
  • 20532: Developing Microsoft Azure Solutions
  • 20533: Implementing Microsoft Azure Infrastructure Solutions
  • 10979: Microsoft Azure Fundamentals
  • 20487: Developing Windows Azure and Web Services
  • 20695: Deploying Windows Devices and Enterprise Apps
  • 20696: Managing Enterprise Devices and Apps using System Center Configuration Manager

Windows Server migration needs to be at the top of the “To-Do” list if you‘re still on Windows Server 2003. To learn more about migration visit Microsoft.

To download the complete report, click here.

Hackers make History and Hollywood

“Uh-uh. You didn’t say the magic word!” The skill of hacking has definitely made a place for itself in Hollywood. You may recall Lex’s hacking skills got Jurassic Park back on track after dinosaurs wreaked havoc on a secluded island. Then there was Stanley Jobson (Hugh Jackman) who stole $9.5 billion from a secret government slush fund, codenamed Swordfish, for a high tech robber villain. And you can’t talk about hacking and not mention the Matrix trilogy (1999), Tron (1982), or The Girl with the Dragon Tattoo (2009).  Even President Obama made a recent comment that the manhunt for 29 year old hacker, Edward Snowden will make for a good movie someday. The Best Hacking movies, are exciting, and although they can seem like a bit of a stretch from reality, there is some truth behind these plots.Code 2600 is a documentary film worth watching because it is both accurate and entertaining, and will open your eyes to the truth about hacking.


The terms hacker and hacking typically carry a negative connotation and as they are commonly associated with the skill of unlawfully breaking into computer systems. But not all hackers are bad. In fact, hackers have the ability to diagnose security flaws. Crackers, on the other hand, use their hacking skills for malicious gain, stealing private information and sometimes large amounts of money. Crackers are hackers who have gone to the dark side. The White Hat versus the Black Hat….the good versus the evil.

The Infamous Crackers aka the Black Hat Bad Guys

Since the development of computer technology there have been a number of notorious hackers that have created real-life dramas, off the big screen, and no doubt have provided inspiration for big Hollywood directors. Here is a list of the some of the most infamous real life black haters that give hackers a bad rep. Some of them are now respectable White Hat hackers!

  • Kevin Mitnick – Kevin Mitnick started out just wanting a free ride on the bus, starting his hacking career at the age of 12. Mitnick went on to become the most wanted computer hackers in the country, known primarily for his hack into Digital Equipment Corporation’s network to steal their software. It may have been his first notable break-in, but Mitnick went on to other big targets, including cell phone giants Nokia and Motorola. After hacking into fellow hacker Tsutomu Shimomura’s computer, Mitnick was tracked down by Shimomura and the FBI in 1995.Today, Mitnick has served a five-year sentence and come clean, but he continues to profit off his former title, authoring books and working as a security consultant. The movie Takedown (2000) is based on Kevin’s capture.
  • Kevin Poulsen (aka Dark Dante) – Today, Kevin Poulsen is an editor at tech-savvy Wired magazine, but back in the 1980s, he phone-phreaking hack. Poulsen rigged s Los Angeles radio station phone line to allow only him to get through and win a trip to Hawaii and a Porsche. Dark Dante’s more serious targets included his break-in to the FBI’s database which led to his 1991 arrest and five years prison time. Since then, he’s gone respectable using his power for good by racking sex offenders on MySpace.
  • Gary McKinnon – Conspiracy-theorist McKinnon broke into computers at the U.S. Department of Defense, Army, Navy, Air Force and NASA sometime in 2001 and 2002. McKinnon believed the U.S. government was hiding alien technology that could solve the global energy crisis. The U.S. government claims McKinnon’s hack job cost them significant amounts of money to fix.
  • Robert Tappan Morris – Back in 1988, while a graduate student at Cornell University, Morris created the first worm and released it on the Internet. He claimed it was all an experiment gone awry, a test to see how big the then-new Internet was. The worm turned out to be more than a test: it replicated quickly, slowing computers to the point of non-functionality and virtually crippling the Internet. He was eventually fined and sentenced to three years probation. Since then, he’s earned his Ph.D. from Harvard and made millions designing software. Today, he’s a computer science professor at MIT.
  • Jonathan James – Infamous by the age of 16, this kid was charged for hacking into NASA and the Department of Defense computer systems, stealing information and causing serious downtime while the security breaches has to be addressed. This would cost tens of thousands of dollars. He basically informed NASA and DOD that their systems had weaknesses, which was the defense his father was using. The judge didn’t buy it, and he was sentenced as a juvenile, and received 6 months in juvenile institution. Trouble seemed to follow him, as he was later associated with the TJX scandal (listed below). He committed suicide after his suspected involvement in this case.
  • Albert “segvec” Gonzalez – This is the guy that was responsible for the TJX hacking scandal of 2009, in which a group of hackers stole 36 million credit card numbers.  He was an informant to the secret service providing information on other credit cards thieves! TJX spent over $170 million responding to the attack, and Albert was sentenced to 20 years in prison, which is the longest sentence handed down to a convicted hacker in the US.
  • 23 (1998) – The movie’s plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson’s “Illuminatus”, but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl’s rather criminal acquaintances senses that there is money in computer cracking.

The Famous Hackers aka the White Hat Good Guys

When you take a look at the computer technology and hacker movies, you will notice that the majority of hackers are in fact, good guys. These are the guys that give hackers a good name. Although they may have gotten into a little trouble here and there, by forgetting about the ethics of hacking, White Hat hackers have really contributed to improvements in technology security.  Hackers, can build a career around their skill and become IT Security Professionals through certification. These IT security gurus are important members of successful organizations, and are in high demand these days as security crime and threat is on the rise. Here are a few White Hat hackers whose discoveries changed the world of technology as we know it.

  • Bill Gates – At 14 years old, he dialed into a nationwide computer network, uploaded a virus he had created causing the entire network to crash. That boy was Bill Gates, founder of Microsoft.
  • Steve Wozniak – He and Steve Jobs got their start building blue boxes, a device that could bypass traditional telephone switch mechanisms in order to make free long-distance calls. Wozniak and Jobs built these boxes together and ended up selling them to their college classmates. From there, they progressed to bigger and better ideas so users could make free long distance calls. The money helped start up Apple computers and now, we have iPhones as a result. The movie, Pirates of Silicon Valley (1999), is based on the young founders of Apple. Also Stan Jobson (Hugh Jackman’s character in Swordfish) is named after Steve Jobs. He’s modeled after the cool computer geniuses of William Gibson’s cyberpunk novels.
  • Joanna Rutkowska – This Polish researcher has made it an obsession to figure out how stealth malware, such as rootkits, can be so well hidden in software and hardware that few are ever likely to find it. Her “Blue Pill” attack against Microsoft’s Vista kernel protection mechanism, which brought a crowded room of security geeks at Black Hat to a standing ovation in 2006, was just her first revelation publicly to show how easy it is for dangerous code to hide in plain sight.
  • Mark Maiffret – Once the bad boy ‘Chameleon’ in hacking group “‘Rhino9,” Maiffret luckily realized his hacking skills could be put to use in protecting Windows-based computers when, at age 17, he turned over a new leaf to co-found eEye Digital Security in 1997. Maiffret also played a role in zeroing in on the infamous “Code Red” worm in 2001, which exploded across the Internet ravaging Microsoft-based computers.
  • Zane Lackey – This co-author of “Hacking Exposed: Web 2.0″ and contributing editor to “Hacking VoIP” and “Mobile Application Security” digs into flaws in mobile and VoIP systems. In the past, some of his public talks and demos about compromising VoIP systems have been so detailed that chief information security officers at major corporations said they couldn’t advocate investing in VoIP until the issues raised were addressed by vendors.
  • Tim Berners-Lee – Tim is credited as the brilliant mind behind the creation of the World Wide Web–not to be confused as the creator of the Internet, which he isn’t. He is the creator of the actual system that we all use to navigate the Internet in order to access particular files, folders, and websites. He got his start with electronics at a relatively young age. When he was a student at Oxford University, Berners-Lee managed to build a computer from scratch using a soldering iron, TTL gates, an M6800 processor, and parts from an old television.

Hacking –  Career vs. Jail Time


Hacking not only makes exciting crime dramas, but can also earn someone a good honest living, or it can earn someone some jail time, depending on the route taken. White hacking can help prevent the black hacking so hacking is an important topic to understand, learn, and get certified, if you want to pursue a career in hacking or IT security. To learn more about how to become a White Hat hacker, visit our IT Security Certification & Course pages for classes near you. Who knows…maybe your skills will go down in history and make the big screen one day!

Which one of these people/stories would make the best Hollywood film? Do you think Edward Snowden will make it to the big screen? What is your favorite hacker movie?