iphone-7-back-2-780x521

Apple iPhone 7

Posted · Add Comment

Since its launch in September, the iPhone 7 has helped Apple maintain its spot as a dominant player in the tech market. You might think too with Christmas three weeks away that the phone is flying off the shelves and it is. Apple looks even better now to some Samsung users since the Note 7 […]

cordcut

Cutting the cord Part 1

Posted · Add Comment

Christmas is the time to load up on gadgets and tech and I am no different but this time I’m doing something I never thought I would do. I’m cutting my cable. I currently have TV and Internet with Telus coming it at 109 per month. While I don’t dislike Telus or its service I […]

pixelmain

Google’s Pixel Phone puts a new twist on the smartphone game

Posted · Add Comment

The iPhone 7 launch and the Note 7 battery issue has put the smartphone wars at an interesting point. Samsung is sure to reel from loss of the Note7 for a while and with the Pixel phone from Google just launched, Android lovers may have found themselves a great new phone to get. With its […]

Build and connect intelligent bots to interact with your users naturally wherever they are, from text/sms to Skype, Slack, Office 365 mail and other popular services.

Introduction to the Microsoft Bot Framework #cognitive #office365 #sms #sdk

Posted · Add Comment

One of the key problems in human-computer interactions is the ability of the computer to understand what a person wants, and to find the pieces of information that are relevant to their intent. For example, in a news-browsing app, you might say “Get news about virtual reality companies,” in which case there is the intention […]

Net Cease - Hardening Net Session Enumeration

Harden your #network against attackers with #Microsoft script Net Cease #security

Posted · Add Comment

Microsoft has released a PowerShell script called Net Cease that will harden machines against reconnaissance which is a key stage within the Advanced Attackers kill chain. According to details of the release on Microsoft TechNet, “once attackers have breached a single end-point, they need to discover their next targets within the victim’s corporate network, most […]

 
 
DMS