View by category: News | How To | Security | Updates

Peter Levine, a Partner with venture capital firm Andreessen Horowitz, recently predicted, “Cloud computing will take a back seat to edge computing.” What does this really mean for IT support? Edge computing is a decentralized model where computing processing is done locally. With the proliferation of millions of IoT (Internet of things) devices, local computing is more efficient and effective. Read More
 
November is a time for giving and part of EVAN’s mission is focused on giving back. This week, EVAN has partnered with Boys and Girls Country of Houston. 100% of the proceeds from all IT sessions made from November 5-11, 2017, will benefit Boys and Girls Country. Boys and Girls Country’s mission is to change the lives of children from Read More
 
EVAN is committed to transparency, and as part of our service model, we encourage our EVAN IT Pros to use understandable language as they assist you so you can learn alongside them. Educating others about technology is important to us and we want to share some of our insights. Did you know that your local public library is an excellent Read More
 
Conflicts, incompatibility, and crashes, oh my! The release of Microsoft’s latest feature update to Windows 10, dubbed the Fall Creators Update, introduces a number of user experience and security improvements, though it might not be quite ready for everyday use. Keeping your PC software up to date is one of the better ways to avoid security and reliability issues. However, Read More
 ,
Since October 17, 2017, you may have had trouble opening documents in Office 2007 or even using it entirely. This is likely due to the combination of recent substantial updates to Windows and the “end of life” status that Office 2007 entered on October 10. Office 2011 for Mac also entered this status on the same date. “End of life” Read More
 
Early this morning, it was reported by Ars Technica that a serious flaw in the most trusted form of Wi-Fi security was revealed by researchers in Belgium. After several weeks of testing and preparation, details of the flaw in the WPA2 (Wi-Fi Protected Access) security standard were made available to the public online. Named after the method of the attack these Read More
 ,

Receive weekly EVAN blog updates!

* indicates required