(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Intel’s Confusing Name Change Shows Why Researching Products is Important

Intel’s Confusing Name Change Shows Why Researching Products is Important

Renowned tech company Intel has announced their next line of laptop processors, but an unfortunate aside caused significant frustration amongst the IT market. Intel has broken from the tradition of releasing new processors each September which will be improved upon later. Instead, Intel has jumped the gun and released a new processor, rather than improve their Skylake processor from the previous year.


The processor has been named Kaby Lake, which is optimized for 4K video handling and editing and can improve battery life. However, it’s not these changes that have resulted in confusion; rather, it’s something as simple as a name change that has IT professionals up in arms. Prior to Intel’s most recent release, there were two lines of processors which were given the titles of Core i and Core M. The 'i' line of processors is the stronger of the two, while the M processors were reserved almost exclusively for tablets. The confusion came when the Core M processors were renamed to represent the 'i' series.

Keep in mind that there has been no change in the capabilities of the processors. The change is in name only. The difference can only be seen in the product numbers. What this means is that when someone is researching components for a workstation, they may accidentally purchase the wrong i7 processor (a significantly less powerful one). The only way they can really determine the change is by digging into the product’s specifications--which, if you’re not technically inclined, won’t mean anything.

This leads to our next point; while the average consumer may not notice a difference in performance, business owners want technology that meets the specific needs of their organization. Granted, this is assuming that a business owner has the time and resources available to research the available solutions. The problem here is that the average business owner probably doesn’t have this time available to them, and it takes much more than identifying the proper product number to make educated decisions about your IT infrastructure.

If your business doesn’t want to waste time sifting through product numbers and specifications, Carceron is happy to help. Our skilled technicians can help your organization procure only the best technical assets that are designed to meet your business’s specifications. To learn more, reach out to us at (770) 424-3393.

Continue reading
0 Comments

Use Your Smartphone Incorrectly and Risk Going Temporarily Blind

Use Your Smartphone Incorrectly and Risk Going Temporarily Blind

It’s no secret that the screens of devices like smartphones, laptops, desktop monitors, and tablets, can contribute to eye pain and what’s called “digital eye strain.” In fact, in some extraordinary cases of prolonged screen use, smartphone use has even led to temporary blindness.

Continue reading
0 Comments

Tip of the Week: How to Download All of Your Media From Google Photos

Tip of the Week: How to Download All of Your Media From Google Photos

If you use Google Photos to store your videos and photos, chances are that you’ve accumulated plenty of media that you’d be devastated to lose. For this week’s tip, we’ll discuss how you can download all of the media you’ve accumulated for your Google account and store it on a local device.

Continue reading
0 Comments

Galaxy Note 7: Now With Exploding Batteries!

Galaxy Note 7: Now With Exploding Batteries!

Samsung has put out a global recall on their Galaxy Note 7 devices and a moratorium on any being sold after reports of exploding batteries came in. This recall--which is being considered the highest-profile recall in the history of consumer technology--comes at one of the worst possible times for the company, as they had just managed to gain some momentum after a run of mediocre mobile growth.

Continue reading
0 Comments

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

There are countless threats out there that can mean danger for your business, but one of the most innovative to date utilizes a malicious Twitter account to administer commands to a botnet made up of infected Android devices. In fact, this is widely considered the first threat to actively use a social network in this manner, making it a wake-up call for security professionals and social media users alike.

Continue reading
0 Comments

Tag Cloud

Security Technology Best Practices Privacy Internet Microsoft Tip of the Week Business Management Managed Service Provider Software Workplace Tips Cloud Backup Saving Money Hardware Data Small Business Productivity Gadgets Hackers Business Computing Mobile Office Business Email Hosted Solutions Malware Google IT Services Quick Tips Social Media IT Support Virtualization Upgrade Mobile Devices Business Continuity Users Passwords Smartphones Network Windows Microsoft Office WiFi Server Disaster Recovery Miscellaneous Innovation VoIP Computer User Tips Vendor Management Windows 10 Communication Efficiency Mobile Computing Mobile Device Management Unified Threat Management Smartphone Operating System BYOD Apps The Internet of Things Marketing Holiday Remote Computing Facebook Android Analytics Health History IT Consultant Alert Going Green Windows 8 Bring Your Own Device Wireless Technology Ransomware Apple Big data Office Printer Tech Support Content Filtering Information Technology Saving Time Hard Drives Outlook Lithium-ion Battery Network Security Collaboration Save Money Phishing Employer-Employee Relationship Gmail Remote Monitoring Spam Firewall Data Management Humor Bandwidth Antivirus Smart Phones Browser Maintenance Tutorials Computer Repair Save Time Proactive IT Hiring/Firing Search Computers Automation Best Practice Avoiding Downtime PowerPoint Hacking Help Desk User Router Internet of Things Sports Administration Intranet Business Intelligence Excel Education iPhone App Document Management Current Events Budget Mobile Device Managed IT services Phone System Two-factor Authentication Money Wireless User Error Running Cable Fax Server Heating/Cooling Bluetooth SaaS Laptop Computer Accessories Comparison Comanaged IT Augmented Reality Black Market Pain Points Text Messaging Compliance Safety Printer Server VPN Company Culture Cost Management Business Growth Social Gaming Console Encryption Virus Customer Service Downtime USB Government Recovery Networking Cybercrime Chrome Password Programming End of Support Artificial Intelligence Cortana IBM Presentation Risk Management Processors Legal communications Data storage Thin Client Documents Statistics Streaming Media Retail Flexibility Net Neutrality Office Tips Website Computing Virtual Desktop Inbound Marketing Network Congestion Digital Payment Customer Relationship Management Hosted Solution Experience Social Networking Co-Managed IT Robot CIO Specifications Memory Wi-Fi Music LinkedIn Environment Competition Wearable Technology Upgrades Office 365 Entertainment Mouse Flash Analytic External Harddrive Operating Systerm Telephone Systems Riske Management Application Digital Signature Deep Learning LiFi Settings Banking organize Display Ebay Monitors Visible Light Communication DDoS Webinar Language Business Metrics Efeciency Google Wallet Content Management Pirating Information Displays Tablet Advertising Recycling Managed IT Word Chromebook Drones Public Speaking GPS Archive HIPAA Skype YouTube Update Electronic Payment Work/Life Balance Entrepreneur Twitter Teamwork Microserver Law Enforcement Hacker 3D Video Surveillance Writing Outsourced IT Unified Communications Online currency Trending Point of Sale Download Best Available Turn Key Staffing IP Address Storage Debate switches Read Permissions Human Resources Paperless Office Keyboard Microchip Value Google Docs Disaster Lifestyle Regulations Identity Theft Leadership Solid State Drive PDF Shortcut Harddrive Adroid Adminstration Securty IT consulting Troubleshooting Virtual Reality Society BDR File Sharing Micrsooft Windows XP Domains Touchscreen Business Owner IT service Computing Infrastructure eWaste

Mobile? Grab this Article!

QR-Code

Recent Comments

No comments yet.

Blog Archive