What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in hardware

IBM’s Quantum Processor and Modular Computer Are Now in Operation

The IBM Quantum System Two with IBM Quantum Heron processors is designed to push quantum-centric supercomputing forward. Image: Adobe/IBEX.Media A new quantum processor, a modular quantum computer and more were unveiled at the IBM Quantum Summit, held in New York on Dec. 4. This hardware is part of IBM’s effort . . . Read more

How to Test Your RAM With Windows Memory Diagnostic

Troubleshooting problems in any computer system can be a tedious process. The Windows Memory Diagnostic tool can help you by checking the memory installed in your system. If your Windows machine is regularly crashing, freezing or giving you the dreaded blue screen of death, it could have defective physical memory. . . . Read more

How to Select the Best External Hard Drive for macOS Time Machine Backups

Time Machine lets Mac users easily backup their computer. In this tutorial, learn how to pick a drive and perform your backups automatically. Time Machine is a tried-and-true solution for backing up macOS desktops and laptops. It was introduced in 2007 with Mac OS X 10.5 Leopard, and since then, . . . Read more

Get This Apple MacBook Air for $300 This Black Friday

Black Friday deal alert! Gear up with a major discount of $230 on a refurbished 2015 MacBook Air, available now through November 27. Image: StackCommerce In the hybrid working world, you need technology that will make it easier to do your job from anywhere. So, if you’re in the market . . . Read more

Microsoft Improves Windows Security with a Path to Move Off NTLM

NTLM is a simple and straightforward authentication method for connecting to applications on enterprise servers, but it’s also outdated and insecure. Despite that, NLTM is still widely used, partly because of inertia but also because the preferred replacement Kerberos doesn’t currently cope with some important scenarios. Now Microsoft plans to . . . Read more

This Wireless Charger is Just $35 Through 11/27

Get this high-quality Speedy Mag Wireless Charger for iPhone while it is discounted by 70% from the original price. You want the best tools for your iPhone, and with recent models, that means having the best wireless charging resources available. However, you don’t have to pay full price to get . . . Read more

Microsoft Announces New Maia 100 and Cobalt 100 Chips

The Maia and Cobalt custom chips will be available within Microsoft’s cloud infrastructure. Microsoft will make two new chips available next year, the tech giant announced at the Microsoft Ignite conference on Nov. 15. The Microsoft Azure Maia 100 is designed for AI workloads, and the Microsoft Cobalt 100 CPU . . . Read more

Intel Patches Widespread Processor Vulnerability

The strange vulnerability could have allowed for escalation of privilege, denial of service or information disclosure attacks. Intel has published a fix for a potential vulnerability that affected some Intel processors. The security flaw, named Reptar, causes “very strange behavior,” said Google’s Tavis Ormandy, who is one of the researchers . . . Read more

How to Use Hidden Browser Window Controls in ChromeOS

ChromeOS users, learn how to use these hidden browser window controls, and find out why you’ll want to use them. ChromeOS offers several ways to efficiently position windows, which means for many purposes you won’t need to manually move or resize browser windows or Android apps. The controls let you . . . Read more

Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack

Any company that is strategic could be targeted for the same kind of actions as this cyberattack. Follow these tips to mitigate your company’s risk to this cybersecurity threat. Mandiant, a cybersecurity company owned by Google, has revealed the details of a 2022 cyberattack run by Russian threat actor Sandworm. . . . Read more