Tips & Tricks: Teach Siri Nicknames

Siri is pretty adept at working out who you want to text or call. But you can speed up the process by adding nicknames like “mom” or “Lizzie” to your contacts. In fact, Apple’s Contacts app has a field especially for this, and Siri can use it to identify people.

To input a nickname manually, open up any contact card, tap Edit, choose Add field, and then pick Nickname from the list. Alternatively, just tell Siri to “call mom” or “call dad” or something similar. Then the assistant will ask you which contact that nickname belongs to—remember your answer for future use.

Advertisements

Tech Terms: iPhone Mobile Security

Mobile security applications for Apple’s iOS mobile operating system help protect Apple iPhone smartphone and iPad tablet mobile devices from malware threats as well as unauthorized access following accidental loss or theft of the device.

Additional security features frequently offered by iPhone mobile security apps include scanning websites for potential phishing schemes or other fraudulent activity, storing passwords and other confidential information securely, VPN connectivity for protecting data in transit, helping users locate their device if lost or stolen, and more.

The most prominent iPhone mobile security application is one that’s integrated into the iOS mobile OS. The iOS Find My Phone built-in application will help locate a lost phone or tablet on a map and can also remotely lock the phone or erase all the data on it to keep the data from being viewed by others.

Source

Tips & Tricks: Notification via Camera Flash

Receive notifications via camera flash
Those of you who prefer a visual phone alert to an audible one will like this: You can get your iPhone’s flash to light up when a notification is displayed. This could come in handy during meetings, when many people place their phones face-down on top of a table.

To get the feature working, go into Settings and then tap General and Accessibility. Switch the LED Flash for Alerts toggle switch to On, and you’re done. If you prefer to not be disturbed at all when the phone is in silent mode, you can tell the flash not to light up then.

Tech Terms: Windows 10 Mobile

Windows 10 Mobile is Microsoft’s latest mobile operating system for powering mobile devices like smartphones and tablets. It serves as the successor to Windows Phone 8.1, with the name change reflecting the mobile OS’s evolution as well as its integration in Microsoft’s unified approach to the Windows 10 operating system.

New Features in Windows 10 Mobile
Windows 10 Mobile introduces a variety of key new features and enhancements over previous Windows Phone and Windows Mobile releases, such as Continuum support (the ability to connect to an external display with mouse and keyboard input support for a PC-like desktop interface), Office Mobile updates and integrated Edge web browser.

Additional new features include support for Universal Windows apps (apps work and automatically scale across Windows-powered devices, from smartphones to laptops to desktops), notification system enhancements (with notification syncing among Windows devices) and more.

Windows 10 Mobile 2015 Release
Consumers got their first look at Windows 10 Mobile when it entered public beta testing in February 2015, but it wasn’t until December of 2015 that phones with the official release of Windows 10 Mobile went on sale.

The Lumia 950 and Lumia 950 XL smartphones were the first to be powered by Windows 10 Mobile, and existing Windows Phone devices were set to receive Windows 10 Mobile updates starting December 14th, 2015.

Source

Tips & Tricks: Get Your List Phone Back

Even if you don’t use the Apple Health app, it is worth filling out the Medical ID section. That’s because the details you enter here, like your allergies and contact information for your next of kin, will appear on the lock screen when someone taps the dialer’s Emergency link. In other words, anyone who picks up your device can access this information. So, if your phone gets lost, a helpful bystander can tap through to find a way to return it.

Another, better-known way of locating a lost device is the Find My iPhone feature, which lets you track your phone on a map. Activate the ability in the Settings app under General, Apple ID, iCloud.

Tech Terms: Mobile Device Security

Mobile device security means the security measures designed to protect the sensitive information stored on and transmitted by smartphones, tablets, laptops and other mobile devices.

Mobile device security spans the gamut from user authentication measures and mobile security best practices for protecting against compromised data in the event of unauthorized access or accidental loss of the mobile device to combat malware, spyware and other mobile security threats that can expose a mobile device’s data to hackers.

Most mobile devices feature mobile operating systems with built-in mobile device security features, including iOS for iPhones and iPads, Google’s Android platform and Microsoft’s Windows Phone. Additionally, a variety of third-party mobile device security solutions are available for providing an additional layer of protection for mobile devices.

Source

Tips & Tricks: iPhone Bed Time

In addition to letting you set alarms so you will wake up on time, the latest version of iOS helps you keep to a given bedtime. Open up the Clock app on your iPhone and then tap on the Bedtime link at the bottom to get started.

First, your phone will ask you what time you want to wake up in the morning. When that’s set, you can decide which days of the week you want the alarm to go off, and then how many hours of sleep you want each night. Your iPhone will then ping you when it’s time to hit the hay, and track how well you’re doing at reaching your sleep targets.

Tech Terms: Tiered Storage

Tiered storage is an underlying principle of ILM (information lifecycle management). It is a storage networking method where data is stored on various types of media based on performance, availability and recovery requirements. For example, data intended for restoration in the event of data loss or corruption could be stored locally — for fast recovery — while data for regulatory purposes could be archived to lower cost disks.

Today’s tiered storage infrastructures range from simple two-tier architecture consisting of SCSI or fibre channel attached disk and tape to more complex infrastructures, which in some cases are comprised of five-to-six tiers. Regardless of the number of tiers, organizations are looking to tiered storage and ILM to lower cost and improve operational efficiency.

Implementing tiered storage infrastructures can dramatically decrease the cost associated with achieving an RPO and RTO of zero. Classification of data can provide different RPOs and RTOs based on application and business requirements.  Policy-based data migration ensures that the right data is in the right place at the right time.

Source

Tips & Tricks: Hide Photos

We all hand our phones over to friends when we want to share photos or videos. But what if your collection includes sensitive images you would rather not show anyone else? Luckily, the iPhone makes it easy to hide your most personal pictures from view.

Inside Photos, select one or more images, then tap the Share button and choose Hide. As the confirmation message says, your chosen pictures will become invisible via the Moments, Collections, and Years views, but can still be accessed through the Albums screen.

Tech Terms: RAM

RAM (pronounced ramm) is an acronym for random access memory, a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes. RAM is found in servers, PCs, tablets, smartphones and other devices, such as printers.

Main Types of RAM
There are two main types of RAM:
DRAM (Dynamic Random Access Memory)
SRAM (Static Random Access Memory)
DRAM (Dynamic Random Access Memory) – The term dynamic indicates that the memory must be constantly refreshed or it will lose its contents. DRAM is typically used for the main memory in computing devices. If a PC or smartphone is advertised as having 4-GB RAM or 16-GB RAM, those numbers refer to the DRAM, or main memory, in the device.

More specifically, most of the DRAM used in modern systems is synchronous DRAM, or SDRAM. Manufacturers also sometimes use the acronym DDR (or DDR2, DDR3, DDR4, etc.) to describe the type of SDRAM used by a PC or server. DDR stands for double data rate, and it refers to how much data the memory can transfer in one clock cycle.

In general, the more RAM a device has, the faster it will perform.

RAM Memory
SRAM (Static Random Access Memory) – While DRAM is typically used for main memory, today SRAM is more often used for system cache. SRAM is said to be static because it doesn’t need to be refreshed, unlike dynamic RAM, which needs to be refreshed thousands of times per second. As a result, SRAM is faster than DRAM. However, both types of RAM are volatile, meaning that they lose their contents when the power is turned off.

The Difference Between Memory, RAM and Storage
Sometimes, people get confused about the difference between memory and storage, in part because both can be measured in megabytes (MB), gigabytes (GB) and terabytes (TB).

In common usage, the term RAM is synonymous with main memory. This is where a computing system stores data that it is actively using. Storage systems, such as hard drives, network storage devices or cloud storage, are where a system saves data that it will need to access later.

Computing systems can retrieve data from RAM very quickly, but when a device powers down, all the data that was in memory goes away. Many people have had the experience of losing a document they were working on after an unexpected power outage or system crash. In these cases, the data was lost because it was stored in system memory, which is volatile.
By contrast, storage is slower, but it can retain data when the device is powered down. So, for example, if a document has been saved to a hard drive prior to a power outage or system crash, the user will still be able to retrieve it when the system is back up and running.

Storage is usually less expensive than RAM on a per-gigabyte basis. As a result, most PCs and smartphones have many times more gigabytes of storage than gigabytes of RAM.

Source