(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Intel’s Confusing Name Change Shows Why Researching Products is Important

Intel’s Confusing Name Change Shows Why Researching Products is Important

Renowned tech company Intel has announced their next line of laptop processors, but an unfortunate aside caused significant frustration amongst the IT market. Intel has broken from the tradition of releasing new processors each September which will be improved upon later. Instead, Intel has jumped the gun and released a new processor, rather than improve their Skylake processor from the previous year.


The processor has been named Kaby Lake, which is optimized for 4K video handling and editing and can improve battery life. However, it’s not these changes that have resulted in confusion; rather, it’s something as simple as a name change that has IT professionals up in arms. Prior to Intel’s most recent release, there were two lines of processors which were given the titles of Core i and Core M. The 'i' line of processors is the stronger of the two, while the M processors were reserved almost exclusively for tablets. The confusion came when the Core M processors were renamed to represent the 'i' series.

Keep in mind that there has been no change in the capabilities of the processors. The change is in name only. The difference can only be seen in the product numbers. What this means is that when someone is researching components for a workstation, they may accidentally purchase the wrong i7 processor (a significantly less powerful one). The only way they can really determine the change is by digging into the product’s specifications--which, if you’re not technically inclined, won’t mean anything.

This leads to our next point; while the average consumer may not notice a difference in performance, business owners want technology that meets the specific needs of their organization. Granted, this is assuming that a business owner has the time and resources available to research the available solutions. The problem here is that the average business owner probably doesn’t have this time available to them, and it takes much more than identifying the proper product number to make educated decisions about your IT infrastructure.

If your business doesn’t want to waste time sifting through product numbers and specifications, Carceron is happy to help. Our skilled technicians can help your organization procure only the best technical assets that are designed to meet your business’s specifications. To learn more, reach out to us at (770) 424-3393.

Continue reading
0 Comments

Use Your Smartphone Incorrectly and Risk Going Temporarily Blind

Use Your Smartphone Incorrectly and Risk Going Temporarily Blind

It’s no secret that the screens of devices like smartphones, laptops, desktop monitors, and tablets, can contribute to eye pain and what’s called “digital eye strain.” In fact, in some extraordinary cases of prolonged screen use, smartphone use has even led to temporary blindness.

Continue reading
0 Comments

Tip of the Week: How to Download All of Your Media From Google Photos

Tip of the Week: How to Download All of Your Media From Google Photos

If you use Google Photos to store your videos and photos, chances are that you’ve accumulated plenty of media that you’d be devastated to lose. For this week’s tip, we’ll discuss how you can download all of the media you’ve accumulated for your Google account and store it on a local device.

Continue reading
0 Comments

Galaxy Note 7: Now With Exploding Batteries!

Galaxy Note 7: Now With Exploding Batteries!

Samsung has put out a global recall on their Galaxy Note 7 devices and a moratorium on any being sold after reports of exploding batteries came in. This recall--which is being considered the highest-profile recall in the history of consumer technology--comes at one of the worst possible times for the company, as they had just managed to gain some momentum after a run of mediocre mobile growth.

Continue reading
0 Comments

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

There are countless threats out there that can mean danger for your business, but one of the most innovative to date utilizes a malicious Twitter account to administer commands to a botnet made up of infected Android devices. In fact, this is widely considered the first threat to actively use a social network in this manner, making it a wake-up call for security professionals and social media users alike.

Continue reading
0 Comments

Tag Cloud

Security Technology Best Practices Privacy Internet Microsoft Tip of the Week Business Management Managed Service Provider Software Cloud Workplace Tips Backup Saving Money Small Business Hardware Data Productivity Gadgets Hackers Business Computing Mobile Office Business Email Hosted Solutions Malware Google IT Services Quick Tips Social Media IT Support Virtualization Mobile Devices Upgrade Business Continuity Users Passwords Smartphones Microsoft Office Network Windows Disaster Recovery WiFi Server Miscellaneous Innovation VoIP User Tips Computer Mobile Computing Mobile Device Management Vendor Management Windows 10 Communication Efficiency Operating System Unified Threat Management Smartphone Marketing BYOD Apps The Internet of Things Holiday Remote Computing History IT Consultant Facebook Android Analytics Health Wireless Technology Ransomware Apple Alert Going Green Windows 8 Bring Your Own Device Hard Drives Lithium-ion Battery Big data Printer Office Network Security Tech Support Content Filtering Information Technology Saving Time Outlook Firewall Data Management Collaboration Save Money Phishing Employer-Employee Relationship Gmail Remote Monitoring Spam Search Best Practice Automation Computers Humor Smart Phones Antivirus Browser Maintenance Tutorials Bandwidth Computer Repair Save Time Proactive IT Hiring/Firing Running Cable User Error Fax Server Avoiding Downtime Hacking Router PowerPoint User Managed IT services Help Desk Sports Administration Intranet Business Intelligence Excel Education App Internet of Things Current Events iPhone Budget Document Management Mobile Device Money Phone System Two-factor Authentication Wireless Networking Website Net Neutrality Virtual Desktop End of Support Inbound Marketing Network Congestion Artificial Intelligence Experience Heating/Cooling Legal Digital Payment Customer Relationship Management Social Networking Bluetooth Data storage Comanaged IT Laptop Computer Accessories Comparison Augmented Reality Flexibility Pain Points Company Culture Printer Server Safety Social Cost Management Office Tips Text Messaging VPN Computing Gaming Console Customer Service Downtime Government USB Virus Recovery Password Programming Hosted Solution Cybercrime SaaS Chrome Cortana Risk Management Presentation Black Market IBM Processors communications Compliance Documents Business Growth Encryption Thin Client Statistics Retail Streaming Media Adminstration Shortcut Adroid Displays Harddrive Lifestyle Managed IT Advertising Leadership Troubleshooting Chromebook Drones YouTube Work/Life Balance Domains BDR Business Owner eWaste Twitter File Sharing Law Enforcement Outsourced IT Touchscreen Co-Managed IT Writing Unified Communications Specifications Environment Download Staffing switches Competition Paperless Office Analytic Permissions Office 365 LinkedIn Entertainment Microchip Wearable Technology Riske Management Google Docs External Harddrive Disaster Application Digital Signature Regulations Mouse Identity Theft Operating Systerm Solid State Drive Securty organize IT consulting Virtual Reality Society Webinar DDoS Display Micrsooft Ebay Tablet Windows XP IT service Computing Infrastructure Efeciency Word Content Management Robot Pirating Information CIO GPS Recycling Skype Public Speaking HIPAA Memory Electronic Payment Wi-Fi Music Microserver Entrepreneur Archive Teamwork Upgrades 3D Hacker Update Flash Telephone Systems Turn Key Best Available Deep Learning Video Surveillance Settings Trending LiFi IP Address Online currency Storage Banking Point of Sale Read Human Resources Keyboard Value Monitors Debate Language Visible Light Communication PDF Business Metrics Google Wallet

Mobile? Grab this Article!

QR-Code

Recent Comments

No comments yet.

Blog Archive