Great New Browser, Big Expectations. Be BRAVE & Get BRAVE

“We have a mission to save the web by increasing browsing speed and safety for users, while growing ad revenue share for content creators.”

Everyone is taking notice to a new browser, and for good reason.  The CEO of BRAVE Browser from Brave Software is Brendan Eich.  If you do not know who Brendan Eich is  – Don’t admit to it LOL.  He is an American technologist and creator of the JavaScript programming language. He co-founded the Mozilla project, the Mozilla Foundation and the Mozilla Corporation, and served as the Mozilla Corporation’s chief technical officer and briefly its chief executive officer  (Credit Wikipedia).

I have been using it for a few weeks and am ready to replace everything else for my personal use.  I recommend you try it.

FULLY RUGGED – GETAC V110

THE BEST CONVERTIBLE GETAC® HAS EVER MADE!

The Getac V110 fully rugged convertible notebook is Faster,
More Secure, Thinner and As Versetile As Ever.  It features :

 

Getac V110

6th Gen Intel® Core i7  +  Intel HD Graphics 520

A large 11.6” widescreen display and a design that is as                                               thin and light as ever – at 4.36 lbs. light and 1.26” thin.

Absolute DDS.

This optional protective measure disables your V110 if it detects an unauthorized or compromised entry.

Trusted Platform Module 2.0

The V110 features TPM 2.0 – a powerful anti-tampering device that checks for any signs of intrusion during system boot-up.

NFC/RFID Reader.

Authenticate your credentials via Near Field or  Radio Frequency transmission.

Smart Card Reader.

The V110 supports Smart Cards for secure identity verification.

Fingerprint Scanner

Verify your ID with ease and accuracy by simply swiping your finger.

Windows 10 Multi-Factor Authentication.

The V110’s hardware fully supports Microsoft’s latest authentication tools, including Windows Hello, Microsoft Passport and Credential Guard.

 

V110 Brochure

GET A QUOTE (312) 262-3930 or SALES@classcomputing.com

CLASS APPROVED – GETAC S410

Setting the Standard in Semi-Rugged Computing

Raising the bar on the semi-rugged notebook class, the new S410 is
more rugged, slimmer and lighter than ever before. The all-new S410
boasts the latest computing innovations, including a significant CPU
performance boost, enhanced graphics , and multiple options for
greater flexibility. The S410 puts greater power and adaptability into
the hands of mobile professionals across a range of industries.

Less Downtime When It’s Crunch Time.

It doesn’t happen often, but if a S410 ever needs to be serviced, Getac offers unmatched coverage that will ensure you get your computer fixed and back on the job fast.

Industry’s Best 3-Year Warranty.

Nothing says quality like a manufacturer standing behind their product. We’ve designed the S410 semi-rugged notebook from the inside out to survive drops, shocks, spills, vibration and more. We’re confident in our quality and that’s why the rugged S410 comes standard with the industry’s best 3 years Pack & Collect warranty. It’s the peace-of-mind protection of knowing you’re covered1.

Standard.
3 years Pack & Collect.

S410 Brochure

GET A QUOTE (312) 262-3930 or SALES@classcomputing.com

CARVIR™ CYBER SECURITY NOW AVAILABLE THRU CLASS COMPUTING

Originally from https://www.neverpaytheransom.com/ ©2017CARVIR INFOSEC®

CLASS COMPUTING (www.classcomputing.com) is thrilled to be able to offer this elite Security Service for your companies IT Infrastructure.

The CARVIR™ security team provides the first line of defense – without the noise of managing threat intelligence, research, analysis and false positives. CARVIR will:

  • Kill malicious processes
  • Quarantine malware and infected files
  • Disconnect infected endpoints from the network to prevent lateral spread
  • Alert IT Security personnel via email and SMS
  • Immunize all other protected endpoints on the network against new, never-before-seen threats
  • Report and escalate

Heaps of deep forensic data are transformed into an intuitive visualization in real time. The attack storyline depicts the threat execution flow in high resolution, from inception. Our team can view a specific process on the attack story line and drill down into the individual network, file, process, or data actions that occurred. This information allows our team to take decisive action towards securing your network.

If escalation is needed, we will provide an outline of the attack details. This will often include attack statistics, file information, path, machine name, IP, domain, along with information about where else on the network the attack has been seen, what we’ve done to isolate or eliminate the threat and what your team’s next step should be, if any.

In addition, we can provide cloud reputation, certificate information (if the file is signed or not), and advanced attack details (such as a list of known packers that may have been used). And lastly, we will provide a .csv or .json file of the attack providing forensic level reporting on the threat for your incident response team reporting – especially helpful in compliance driven environments.

Detection

Leverage powerful, behavior-based threat detection to protect data from the types of advanced malware, exploits, drive-bys and script-based attacks that evade outdated, signature based anti-virus technology and sandboxing solutions in Windows, Apple and Linux environments.

Our team actively detects and prevents attacks, even those using memory, PowerShell scripts, insider attacks and browser based drive-by exploits. Once detected, we automatically shut down the attack on the infected machine and prevent lateral movement across the network.

Prevention

Prevention starts with silent monitoring of all user- and kernel-space activity on the endpoint. Our security agent rapidly builds a complete context of normal system activity, which serves as the backdrop for the industry’s most advanced behavior-based threat detection.

With full visibility into the endpoint, the engine pinpoints malicious activity—even by the most sophisticated, stealthy attacks.

We secure Windows, OS X, and Linux endpoint devices (servers, workstations and laptops) for full endpoint protection.

Rollback Ransomware

Eliminate threats the instant they are detected with fully integrated response capabilities. If something slips through, we can reverse any attack-driven file damage and restore* files back to their previous trusted states with the click of a button.

Well, technically our team says it’s two clicks. But who’s counting?

And it’s not just ransomware. We protect data from the types of advanced malware, exploits, drive-bys and script-based attacks that evade outdated, signature based anti-virus technology and sandboxing solutions.

* Requires use of Windows Shadow Copy

Contact CLASS COMPUTING for a QUOTE today!

sales@classcomputing.com

(312) 262-3930

VERIZON TOUTS LTE ADVANCED ROLLOUT WITH 50% FASTER PEAK SPEEDS IN OVER 450 CITIES

Chicago & Suburbs are included in the LTE ADVANCED roll-out.

LTE Advanced is not a new technology, with Verizon and other carriers working over the past couple of years to gradually roll it out through “carrier aggregation” upgrades that allow multiple bandwidth channels to be combined for faster speeds.

The LTE Advanced upgrades come to Verizon’s customers at no additional cost.  Verizon LTE Advanced will work on one of 39+ devices found at this URL: https://www.verizonwireless.com/devices/lte-advanced/  already on the carrier’s network, including the iPhone, Moto Droid, and Galaxy S6 and S7.

“Verizon LTE Advanced means your data session moves more quickly over the best network,” said Nicki Palmer, Verizon’s chief wireless network engineer. “Imagine a road with multiple lanes in which, once you pick a lane, that’s the lane you drive in. That describes our award-winning 4G LTE network.

Continuing the metaphor, Verizon LTE Advanced allows cars to change lanes efficiently and flawlessly, balancing the flow of traffic and getting drivers to their destinations more efficiently. That means blindingly fast data transmissions when you need it most.”

Verizon’s LTE Advanced deployment currently uses a combination of two- and three-carrier aggregation, with two-channel carrier aggregation resulting in download speeds of up to 225 Mbps under ideal conditions, compared to “typical” speeds of 5-12 Mbps.

CLASS COMPUTING is very passionate about Hardware and Gadgets!  This includes Cellular Products and Remote Computing.  Remember, Hardware is part of the Network…we manage your entire companies IT, so shouldn’t we consult you on the hardware too?

CALL US AT (312) 262-3930.

 NOTE:

  • Mbps = megabits per second.
  • 1 byte = 8 bits, which is 1 character (i.e. A).
  • 1 Kilobyte (KB) = 1024 bytes = 210  bytes
  • 1 Megabyte (MB) = 1,048,576 bytes = 1024 Kilobytes = 220
  • 1 Gigabyte (GB) = 1,073,741,824  bytes = 1024 MB = 1,048,576 KB = 230  bytes
  • 1 Terabyte (TB) = 1024 GB = 1,048,576 MB = 240 bytes
  • 12 Mbps divided by 8 bits per byte is ~ 1.5MB per second or 90 MB per minute download. In the real world, this means a movie downloaded in about 15.92 minutes.
  • (1.4 GB)(1024 MB/GB)/ (90 MB/min).  With this new Roll-out, under ideal conditions, you might download at speeds of (225 Mbps / (8 bits/byte)) =                     28 MB / Second or 1.64 GB per minute.  About 1 non-HD movie per minute!

Is Office Mobile a good buy?

Excited that Microsoft has finally developed a mobile version of its Office suite of products for the iPhone? Temper your enthusiasm. As Jill Duffy, a tech reviewer for PCMag.com writes, Microsoft’s Office Mobile is probably not worth the money.

Not free

Duffy writes that Office Mobile is an elegant piece of software, one that’s simple to use and understand. The issue, though, is that accessing the program makes it necessary that you get a subscription to Office 365. That will run you a minimum of $99 a year. And that price is way too high, Duffy writes.

Subscription

As Duffy writes, most smartphone users can make use of a collection of free options to handle everything from word-processing to spreadsheets. So why, then, should a consumer invest nearly $100 yearly for Office Mobile?

Shopping

Duffy recommends that users search the Internet for free apps that handle such tasks as word-processing and spreadsheets. Users will probably discover something interesting: The free apps are often just as effective as Office Mobile. And, needless to say, they come at the low, low price of nothing.

Do you think Microsoft is going backward with its new logos?

People say that everyone is a critic. You can see this firsthand at the Quora knowledge-sharing Web site. A short time ago, a Quora user took Microsoft to task. This user wasn’t annoyed that Windows 8 was clunky and counter-intuitive. The user wasn’t mad, either, that Internet Explorer didn’t return the best search results. No, this user took Microsoft to task for its lack of artistic ambition. Yes, that’s right.

A Quora Critic

This user believes that Microsoft isn’t putting sufficient time into designing artistic, aesthetically pleasing logos. Instead, the user writes, Microsoft is dashing off simplistic, minimalist logos. These logos, the assertion goes, look like graphics pros dashed them off in five minutes. The user adds that Microsoft is dumbing down their logos since introducing Windows 8 and Office 2013.

The argument

To no one’s surprise – at least to anyone who’s ever used Quora – the user’s argument immediately stirred up debate. A lot of fellow site users stood up for Microsoft, declaring that the logos are actually rather striking in their minimalism. And, indeed, when you look at the logos lined up side by side, the effect is a bit striking. Microsoft’s new, simpler icons, instantly tell you what program you can open by touching them.

A Growing Trend?

The fans of Microsoft’s new logos might be right. The purpose of the icons is to let users know what program will pop up after they click on the icon. And the logos convey this information well. You immediately can recognize which icon will open Microsoft Publisher and which will open Microsoft’s new cloud services. And if a logo does that? Then who cares if it’s simple?

These apps make sharing your screen on a tablet a breeze

This has become a tablet world. And why not? Consumers are able to use these nifty and highly portable devices to watch movies, surf the Web, listen to online radio and send and receive e-mail messages while on the go. It’s no wonder that tablet sales have eclipsed the sales numbers of traditional laptop computers. But that doesn’t mean that tablets are perfect. Many users have complained that these particular devices falter when it comes to sharing screens with other people. However this, too, is changing, thanks to several high-end screen-sharing apps for iOS now on the market. Miguel Leiva-Gomez, a writer with the smallbiz technology Website, took a look at three of the best. Start using these apps and you’ll soon be sharing screens easily, even on a tablet.

Join.me

Leiva-Gomez starts his review with join.me for a good reason. To put it simply, it’s one of the better screen-sharing apps for iOS currently out there. You will, though, need to pay for the program’s “pro” version to use it. After you pay out the monthly fee of just under $20, though, you’ll be able to share your screen with co-workers and friends with ease. The program also comes with such goodies as Internet calling, instant chat and file sharing.

Air Sketch

Leiva-Gomez says that this app will turn your tablet into a whiteboard with such features as multiple pages. End users are able to use images from their own libraries as the background of their whiteboard and they can rely on one of five different drawing tools. Users can also use Air Sketch to open PDFs. The application displays everything in real time, creating an environment well suited to collaboration.

Conference Pad

Conference Pad is a simple but effective screen-sharing program, one that Leiva-Gomez gives high marks. Users can open and present PDFs and documents with simply a few taps. The application also provides some impressive zooming features, allowing users to zoom without having to sacrifice any image quality.

Simple steps to protect your privacy

Smartphones, tablets and laptops are wonderful tools: They allow us to search the Internet, answer e-mail messages and watch video whether we’re on the train or waiting for our flight at the airport. But these devices can be dangerous, too. If they fall into the wrong hands, your private information, from your online banks accounts to your e-mail messages to your Facebook pages, can fall prey to cyber thieves. And there’s little limit to the problems they can create. Luckily for us, there are steps that you can use to protect your privacy even in today’s age of mobile computing, and as Forbes says, these steps are very easy.

Password Protect

Forbes recommends you always password-protect your mobile devices. This way, if you lose your tablet or someone steals your smartphone, the thief won’t be able to effortlessly access your device and the private data stored on it. Forbes compares password-protecting your devices to locking your home’s front door; it’s just common sense.

Online Google Alerts

Do you know what people are saying about you online? You might like to. You don’t want any of your secrets sailing around the Internet. Forbes recommends that you create a Google Alert on your name. That way, each time anyone types it online, you’ll receive a message alerting you. Then you’re able to take a look at what’s being said about you. Consider this to be a very easy way to track your online presence.

Signing Out

You just completed changing your Facebook page. You’ve just transferred money electronically to your PayPal account. What do you do now? Make sure, before leaving the site, that you simply sign out. This is especially important if you’re using a computer at a library or any other public space. You don’t want the next user to see your accounts and gain instant access because you’re still signed in. We’re all busy. However you are not too busy to remember to sign out.