The Office Potential: Using Microsoft Office 2013 To Its Full Power

Editor’s Note: With Windows 8 available October 26, today’s guest authors break down another major new Microsoft product scheduled to be released soon: Office 2013. It is more cloud-based than previous offerings, and their post also compares premium and free office suites. Whether you are a businessman, student, or casual computer user, you definitely need […]

Continue Reading This Post

Internet Security: Why It’s Essential That You’re Protected

Protecting your computer has been a necessity for many years now and has become increasingly important with the rise of broadband and now superfast broadband. On a personal level, inadequate protection of your machine can lead to identity theft and your bank account becoming emptied; on a national level, there’s also the threat of hacking […]

Continue Reading This Post

What to Expect from Intel’s Voice Search Feature on Ultrabooks?

This is a guest post by Sharon Thomas They were introduced as “extremely portable” devices. Ultrabooks are basically a cloned version of tablets’ dimensions but they don’t sacrifice on the performance of a PC and come with a traditional keyboard. It does seem like a ‘rebranding’ an existing computer category, doesn’t it? However, ultrabooks are […]

Continue Reading This Post

How to Stay Safe When Shopping Online

Q: I know buying online is becoming more and more commonplace, so what should I be doing to make sure I and my data stay safe and secure? Today, just about anyone can sell on the internet, and professional-looking store templates are cheap and easy to set up. As a result, you need to take […]

Continue Reading This Post

Is It Safe to Use Android’s Face Unlock Security Feature?

This is a guest post by Aubrey Samson One of the most recent innovations in cameras has come from Android: face detection security feature for mobile phones. Essentially, what it does is that instead of a PIN lock, a pattern or any password combination, the device takes a snapshot validation of your face. When it […]

Continue Reading This Post

What’s the Business Model and Outlook for Dropbox?

Note: This is an article in our Social Web Business Case Studies series, a close look at the strategies of innovative companies that are using the tools of the social web to transform their industries. With just about everyone in agreement that the future of computing is “in the cloud,” the personal cloud storage market, […]

Continue Reading This Post

How Should We Teach Information Literacy in Schools?

Q: When the majority of information moves from print to digital form, we need a new set of critical skills in order to find what we need and use if properly. Many students get to college without having learned much in the way of information literacy, although professors often expect it was already taught. How […]

Continue Reading This Post

The Past Present and Future of Cloud Computing

Note from the editor: This is an article by Jeff Fields. If you’re interested in contributing to Social Web Q and A, check out our guest post guidelines. In basic terms, cloud computing consists of using a central network of data servers and CPUs with their attendant memory and processing power as a multi-user accessible […]

Continue Reading This Post

Are Texting and Tweeting Destroying the English Language?

In his book A Better Pencil: Readers, Writers and the Digital Revolution, Dennis Baron poses the intriguing question of whether new writing technologies such as texting, email, and instant messaging are debasing the English language and doing major damage to society as a whole. He proceeds to dismiss these notions as overreactions, a point with […]

Continue Reading This Post

What Are the Current 3G and 4G Technologies? An Overview of WiMax and LTE

WiMax, which stands for Worldwide Interoperability for Microwave Access, is an IEEE standard for wide or metropolitan area networks (with the name of 802.16). As a wide area network (WAN), it provides network coverage to a very large area, offering high-speed data access. It uses point-to-multipoint architecture, which is a one-to-many connection. The main hardware […]

Continue Reading This Post