Technology Articles
Technology. It makes the world go 'round. And whether you're a self-confessed techie or a total newbie, you'll find something to love among our hundreds of technology articles and books.
Articles From Technology
Filter Results
Article / Updated 05-16-2025
Templates are the unsung heroes of efficient spreadsheeting — like meal prepping, but for your data. Why start from scratch every time, when you can have a perfectly formatted, mistake-proof starting point? Plus, using templates saves you from the inevitable “Oops, I just saved over my clean master file” moment. Windows users can create custom worksheet templates that are ready to be dropped in anywhere, while both Windows and macOS users can craft custom workbook templates and even tailor Excel’s sacred default template — the very one it uses to spawn new workbooks. Carving out worksheet templates Worksheet templates let you drop in prebuilt worksheets on the fly — a huge timesaver when you frequently add the same formatted sheet. But here’s the catch: this feature only exists in Excel for Windows. Mac users, you’re out of luck with this one. Here are the steps: Create a workbook that has the worksheet(s) that you want to save as a template. Choose File→Save As→Browse. Navigate to Excel’s hidden template folder: Type %appdata% into the File Name field, then press Enter. Scroll down and double-click on Microsoft. Scroll down and double-click on Templates. Type a meaningful name for your template in the File Name field, and then click Save. Choose File→Close or press Ctrl+W or Ctrl+F4 to close the template workbook. To put your nifty template to use: Right-click any worksheet tab, and then choose Insert. The Insert dialog box opens. Select your template from the General tab, and then click OK. Bingo! A perfectly formatted worksheet appears, no copy-pasting required. Even better, this saves you from accidentally moving key worksheets from one workbook to another when you meant to copy them. Now you can insert polished, preformatted sheets into any workbook without fear of dragging your data into oblivion. Establishing workbook templates A workbook template is a preconfigured Excel file that serves as a starting point for new workbooks, preserving formatting, formulas, and structural elements while preventing accidental overwrites. Good news, macOS users — this one’s not Windows-only! You can create and use workbook templates just like Windows folks: Build out your Excel workbook with all the bells and whistles. This can include custom formatting, formulas, headers, footers, maybe even a motivational quote in cell A1. Save the workbook: Windows: Choose File → Save As, then select Excel Template as the file type. macOS: Choose File→Save as Template. Name your template, and then click Save. You now have a pristine copy of your workbook that can only be affected when you open the template workbook, which isn’t easy to do. To create a new workbook based upon your template: Choose File→New→Personal (Windows) or File→New From Template (macOS). Pick your carefully crafted template. A new workbook opens with a preassigned file name based upon your template and a numeral, such as YourTemplate1. Choose File→Save As, select Excel Workbook (.xlsx) as the file type, and give it a real name. Rest assured, even if you reflexively mash Ctrl+S (Windows) or Cmd+S (macOS), you can’t save over the original template — it’s safely tucked away in a templates folder, far from your impulsive keystrokes. Tailoring Excel's default workbook Why settle for Excel’s default when you can start every new workbook exactly the way you like it? From font choices to default sheet count, Excel gives you some basic customization options. Windows users even get to pick a default view (Normal View, Page Break Preview, or Page Layout) because, apparently, Microsoft thinks macOS users are fine with whatever they get. To tweak these basic settings: Windows: Choose File→Options→General, and then modify the When Creating New Workbooks section. macOS: Choose Excel→Preferences→General, and then set your preferences. But let’s be honest — the real magic happens when you customize the default workbook template. Want every new workbook to have your preferred formatting, column widths, headers, footers, and whatever else sparks joy? This is where you make it happen. Creating a custom default workbook for Windows Follow these exact steps to create a masterpiece that most (but not all) new workbooks will be based on: Set up a new workbook and make it your own. Anything is fair game — fonts, column widths, number of worksheets. You’re in control. Choose File→Save As→Browse. The Save As dialog box opens. Select Excel Template from the Save As Type field. Navigate to another hidden folder: Type %appdata% into the File Name field, then press Enter. Scroll down and double-click on Microsoft. Scroll down and double-click on Excel. d) Double-click on XLSTART. If XLSTART doesn’t exist, create a new folder named XLSTART and then double-click it (because sometimes Excel likes to test your perseverance). Type Book in the File Name field, then click Save. If you name the file anything other than Book (like Book1, My Awesome Template, or Y’all Watch This), Excel still opens it automatically when you launch the program (assuming you saved the workbook in the XLSTART folder), but all new workbooks ignore your changes and stick with the factory settings like an overprotective parent. Choose File→Close or press Ctrl+W or Ctrl+F4 to close the template workbook. Choose File→Options→General, clear the Show the Start Screen When This Application Starts checkbox, and then click OK. Going forward, when you launch Excel, a blank workbook that has all your customizations appears automatically. Unlike macOS users, you now get to have your cake and eat it too: Creating standard workbooks: Choose File →New Blank Workbook or File →New →Blank Workbook to start with a fresh slate. Initiating customized workbooks: Press Ctrl+N to summon your custom masterpiece, no magic wand required. If you change your mind about the template, use the File Explorer to navigate to %appdata%\Microsoft\Excel\XLSTART then delete the Book.xltx workbook. Customizing the default workbook for macOS Here’s how to tailor your default workbook to your liking: Create a new workbook and tweak it to perfection. Adjust fonts, styles, margins, custom headers and footers, or even hide an Easter egg in cell Z100 — go wild. Choose File → Save As Template. The Save As dialog box opens. Erase the Save As field, then navigate through the following folder structure: Type ~ to display the Go To dialog box. Type /Lib and then press Tab to navigate to the Library folder. Type Group and then press Tab to navigate to the Group Containers folder. Type UBF and then press Tab to navigate to the UBF8T346G9 folder. Type O and then press Tab to add the .Office extension. Type /User and then press Tab to navigate to the User Content.localized folder. Type Start and then press Tab to navigate to the Startup.Localized folder (no slash this time). Type E and then press Tab to navigate to the Excel folder (no slash here either). Press Enter to return to the Save As dialog box. Give yourself a high five — you made it! Type Book in the Save As field, and then click Save. Book is the only valid name — Book1, My Template, or anything else won’t work. Choose File→Close or press Cmd+W to close the workbook. Going forward, when you launch Excel or create a new workbook using File→New or Cmd+N, your custom template becomes the new default. To go back to the original blank workbook, delete the custom template from: ~/Library/Group Containers/UBF8T346G9.Office/User Content.localized/Startup.localized /Excel.
View ArticleCheat Sheet / Updated 05-15-2025
Whether you're just starting out with Excel or looking to sharpen your spreadsheet skills, this cheat sheet brings together some of the most practical tips you need for everyday use. It covers everything from quickly closing all your workbooks, to working smarter with templates, doing instant calculations, and even using advanced search with regular expressions. This guide is designed to help you save time, avoid common pitfalls, and discover handy Excel features you might not know exist. Let's make your Excel experience smoother and more enjoyable!
View Cheat SheetCheat Sheet / Updated 05-12-2025
A geographic information system (GIS) is a software for making maps, analyzing data, and more. This cheat sheet tells you about what you can do with GIS, provides a handy guide to raster-based functions, gives you some key ideas to keep in mind about maps (relating to scales, projections, and datums), and the X, Y, and Z of GIS.
View Cheat SheetCheat Sheet / Updated 05-12-2025
Word is one of the most used computer programs on the planet. Helping you to compose text is one of the things that computers do well, but that doesn't make the text-writing chore easier or imply that using Word is simple enough that professionals like you don't need help every now and then. So, enjoy this Cheat Sheet.
View Cheat SheetArticle / Updated 04-28-2025
Today, applications can run anywhere — on-premises or in the cloud — and users can access them from anywhere, on virtually any device. Modern business trends including remote and hybrid work, distributed and extended workforces (such as contractors, partners, vendors, and other third parties), and the proliferation of cloud-hosted applications have led to the emergence of a new security perimeter: identity. An identity includes attributes such as user (or account) name, password (or passphrase or secret key), roles, access privileges, and historical context. This information identifies an individual or entity (such as a service, device, or application) in an organization’s systems and networks. As attackers increasingly target identities, organizations must stay ahead by implementing a comprehensive identity security program. In this article, we explain how the right approach to identity security can enhance your organization’s security posture, improve the employee experience, and deliver significant business benefits. Rather than developing exploits for system or application vulnerabilities, attackers can simply log in with stolen credentials. According to the 2024 Verizon Business Data Breach Investigations Report (DBIR), 68 percent of breaches are the result of credential theft (that is, the “human element”) from vectors including social engineering techniques (such as phishing, smishing, business email compromise, and pretexting) and brute-force dictionary attacks. A strong security posture is good for business When an organization falls victim to a ransomware attack or a data breach, normal business operations grind to a halt. It’s never “business as usual” when your employees, partners, and customers can’t access your critical applications and data because of a cyberattack. By improving network security and account hygiene, an identity security program can help organizations prevent breaches before they occur and respond quickly when compromised accounts are discovered, thus reducing the impact of any potential breaches. Don’t be the weak link in your supply chain security posture In our modern interconnected world, no business is an island, and the weakest link in your security posture may be one of your supply chain partners. According to research from BlueVoyant, more than four-fifths of organizations (81 percent) were impacted by supply chain attacks in 2024. Of course, supply chain attacks aren’t new — the 2013 Target data breach was the result of a compromised account belonging to a third-party maintenance vendor — but they have become more prevalent. More recently, the Change Healthcare (a subsidiary of UnitedHealth Group) attack in February 2024 cost nearly $9 billion in response efforts and assistance to affected healthcare providers. Every business has a supply chain and is a part of the supply chain itself — whether as an upstream supplier, downstream customer, or both. Third-party risk management has taken on renewed importance and can be a competitive differentiator when selecting new partnerships or renewing existing relationships. Yet many organizations struggle to manage third-party access to their systems and data. A strong identity security program can help an organization better manage guest accounts and monitor third-party activities, reducing the risk of data breaches caused by third-party access. Security is only strong if it is adopted While the login experience isn’t likely to top your employees’ list of factors impacting job satisfaction, it is a routine part of their daily work lives, and a poor experience can quickly cause user frustration. Struggling to remember different passwords, answering numerous multi-factor authentication (MFA) prompts, or calling the help desk to unlock their account — all before they’ve had their first cup of coffee — isn’t a great way to start the workday. Employees can benefit from an identity security program that provides quick and seamless access to their applications and devices, increasing productivity and reducing user frustration. A well-designed identity security program can also increase operational efficiency and decrease resource strain on IT and help desk teams by streamlining identity and access management (IAM) workflows such as account provisioning, permissions management, MFA enrollment, password resets, and reporting. It’s a win-win for everyone. By defining clear objectives and tying them to known business drivers and risks, organizations can ensure a strong identity security program that delivers measurable business value. To learn more about identity security and its business benefits, visit https://duo.com/ and download a free copy of Identity Security For Dummies.
View ArticleArticle / Updated 04-28-2025
For enterprises whose growth depends on the innovation of their developers and data scientists, success moves at the speed of their development environments. Efficiency, effectiveness, and the ability to build without friction — that’s what sets the pace. The question is simple enough: Do your developers and data scientists work their magic in cloud development environments (CDEs), or is their work bogged down by a legacy development environment? Read on to find out why local development environments and other traditional solutions may be holding back your developers, and how cloud development environments can set them free. How traditional development environments are lacking What are some of the ways the wrong development environment may be making your company’s progress sluggish? Local development environments: This was yesterday’s standard, with all developers managing their own environments on their own machines. All that local control gets in the way of getting ahead. It’s complicated and time-consuming to configure tools and dependencies on each individual environment. You wind up with inconsistencies that slow things down. And don’t even think about scaling this approach. Virtual desktop infrastructures (VDIs): VDIs help to centralize environments, but they’re often not really workable for development. They’re expensive and complicated to maintain. They also tend to suffer from sluggish performance, and that’s no way to keep developers happy. Shadow virtual machines (VMs): Developers may get around these issues with ad hoc VMs, but they end up creating different problems. “Shadow” solutions may be lacking in governance and are often overprovisioned. That makes them potential security risks, not to mention wasteful of resources. How cloud development environments can help A fully managed environment is the answer to the challenges of these more disjointed solutions from yesteryear. The CDE may be hosted in the cloud or via on-premises infrastructure, and it brings together all the necessary tools, libraries, and infrastructure needed for efficient development. It’s a development workspace that can be accessed from anywhere, not tied to a specific location or machine. It’s great for remote work, and because of its centralized infrastructure, it’s a lot more secure than storing code and data on developers’ laptops. Developers and data scientists can easily tap into it for coding applications and training machine learning (ML) models, getting up and running in minutes. Provisioning is automatic, so everything developers need is right there and ready to go. It can all be controlled from a centralized interface by authorized team members, ensuring only the right people can access code and data. And the compute and storage resources are easily scalable. How CDEs make developers more productive Traditional local development environments tend to be frustratingly slow when it comes to onboarding new developers or moving developers to new projects (and developers tend to take on new projects multiple times a year, of course). Provisioning environments can take days or even weeks, thanks to all the complexities of dependencies and the need for approvals. Meanwhile, if developers are off working in their own local environments, that also leads to problems requiring time-consuming troubleshooting. Mismatched environments are the enemy of success. What’s more, resource constraints can be a hangup in local development environments. CDEs, on the other hand, can be preconfigured, so developers just log in and get to work. Platform engineers can make global updates and ensure consistencies across the CDE. Configuration drift is no longer a problem. As for resource constraints, the cloud can fix that with high-performance resources that scale as needed. Developers can set up resource-intensive tasks such as ML model training in the cloud, and use their local laptops to get other work done in the meantime. Why cloud development environments provide better security Local development environments and various noncentralized alternatives can pose security threats, due to a lack of adequate governance and a hard-to-manage attack surface. Working with intellectual property and other sensitive data on developer laptops or unapproved VMs is risky. If developers need to pull sensitive data to their laptops for such things as ML model training, you’re tempting fate, because security problems don’t just hold developers back — they can set back the entire organization. CDEs, on the other hand, can live in a cloud environment or be centralized in on-premises infrastructure. They can be air-gapped if need be. Source code and data can stay in secure cloud or on-premise locations, along with any compute resources needed for dealing with them, so sensitive data never needs to leave the safety of home. Compliance teams aren’t fond of local environments because they’re tricky to monitor. CDEs, on the other hand, offer better monitoring and auditing capabilities, without getting in the way of the developers’ work. How CDEs save both money and time Face it — local development environments can be costly. Local hardware isn’t cheap, especially the high-end hardware needed for resource-intensive processes. But if your enterprise tries to trim those costs, developers are likely to be displeased. The reality is, CDEs not only provide a better developer experience and greater security, they also save money and time. Developers can use most cost-effective machines that are less powerful and longer-lasting, because the heavy lifting is happening in the CDE, not on the local machine. What’s more, CDEs can tap into automation to optimize resource utilization. Auto-start and auto-stop features mean unused environments aren’t sitting there wasting money. Bin-packing multiple developer workspaces onto a single VM can reduce infrastructure costs, too. And once again, helping developers be more efficient — by easing onboarding and transitioning, while banishing sluggish equipment — saves money, too. Time is, after all, money. If you can save hours and days and weeks of wasted developer time, you’ll get a whole lot more out of the money you’re paying them. To learn more about the benefits of CDEs, download your free Cloud Development Environments For Dummies, CoderTechnologies, Inc. Special Edition e-book.
View ArticleCheat Sheet / Updated 04-11-2025
The Microsoft Power Platform is a suite of applications that offers low-code and no-code development tools organizations can use to streamline and automate business processes. Collectively (and when integrated properly), the Power Platform suite of applications works together to support business transformation. Following is a description of the applications contained in the Power Platform, and some details about how each application functions as part of the suite: Dataverse: Starting your journey with each of the Power Platform applications requires one essential element: data. At the heart of the Power Platform is Dataverse, the common data service for storing and structuring relational data. Dataverse serves as the backbone for capturing and retaining user inputs across the platform's apps. Power Apps: The first step in the low-code/no-code journey to business automation is to create a mechanism for data entry. You can begin, for example, by using Power Apps to build an application that collects and manages data. Power Apps is often the primary tool businesses use to design custom applications that are tailored to their needs. Power Pages: Sometimes, you want the data entered with your Power Apps applications to be available for everyone to see, not just a few users. This is when you use Power Pages to design secure, data-driven external websites. The sites you create with Power Pages can display and collect information directly from Dataverse. Power Pages presents this data in a tabular format or as embedded reports and other media objects. Power BI: For data analysis, you use Power BI to transform data collected through custom apps created with Power Apps into interactive reports and insightful dashboards. Power Automate: You can use Power Automate to automate tasks and processes based on the data in Dataverse, which enhances productivity and efficiency across your organization.
View Cheat SheetCheat Sheet / Updated 04-10-2025
Access makes managing data easy, enabling you to set up a database quickly, enter records into that database, and then use the data however you like. With Access, you can organize data into tables, design forms for editing and reports for presenting, and create queries for finding information!
View Cheat SheetCheat Sheet / Updated 04-08-2025
Some readers like to thumb through a book and flag pages that they think are important. If that’s not you, we have you covered with this handy-dandy cheat sheet! This sheet contains all the important stuff you need to know about posting on Bluesky: rules for posting text, images, and videos and Bluesky’s community guidelines so your posts contribute to a healthy community.
View Cheat SheetArticle / Updated 03-03-2025
In this article you will learn: The necessity of discovering and classifying all sensitive data Challenges of modern DSPM tools Solutions that DSPM tools provide Data is often shared and copied across multiple locations, making your most valuable business asset a security nightmare. It’s in your organization’s best interests to keep data as secure as possible, away from prying eyes, no matter where it resides. Doing so requires a structured and strong data security program backed by a powerful data security posture management (DSPM) solution. Modern DSPM is the next generation of data security technology, designed for the complexities of the hybrid cloud environments by tapping into the power of artificial intelligence (AI) and machine learning (ML) to continuously discover data and automate classification of sensitive information across known and unknown environments. The necessity of discovering and classifying all sensitive data Your sensitive data can’t be fully secure unless you’re able to effectively discover and classify every bit and byte of it, quickly and continually, and at scale, across your entire data footprint. That’s what modern DSPM excels at. Essential visibility — what data your enterprise has, how sensitive it is, and where it resides — is the key to security. Gaps in that visibility will stand in the way of a strong security posture. As data is discovered, modern DSPM classifies it automatically and precisely using AI and ML with advanced large language models. Modern DSPM solutions can discover and classify data types that are specific to your organization without any custom tuning. With data discovered and classified, you can then apply the appropriate security controls for keeping that data secure and keeping your organization in compliance with data protection regulations. Modern DSPM excels in both discovery and classification, which is why it’s critical for your data security program’s success. Challenges of modern DSPM tools Today’s data volumes and advanced technologies makes protecting your data a challenge, meaning legacy tools can’t keep up. You’ll find these problems when using a tool that’s not optimized for these challenges: Partially classified data: Legacy tools are designed with out-of-the-box classifiers, set up to only find what it’s looking for. Modern DSPM solutions find what you might not even know you should be looking for, such as unstructured sensitive documents specific to your organization. Discovery is slow: Data security requires rapid information, but legacy tools can’t keep up the pace. Scanning can take a long time because legacy tools don’t benefit from the AI and ML scanning techniques that a modern DSPM tool provides. Inaccurate classifications: Outdated tools tend to rely mainly on regular expressions and other older techniques to classify data. As a result, you need dedicated resources to manually write rules, tune the tools, and make sure classifications are accurate. Difficult to manage: With legacy tools, lots of agents and dedicated resources are needed to connect to datastores. That requires tons of work, and it is a monumental task to maintain. Solutions that DSPM tools provide DSPM, on the other hand, is made for modern data security challenges: Precision in classification and context: A modern DSPM solution applies AI and ML not only to detect common patterns, such as personal identifiers and financial data, but also to recognize proprietary, unstructured, or business-specific data with high precision. Scale and speed for today’s data environments: Precision alone isn’t enough for data that’s fast-moving and dispersed across SaaS, IaaS, and on-prem systems. Speed and scalability are essential. Modern DSPM tools operate agentlessly, scanning datastores quickly without disrupting business operations, providing rapid results, even across vast ecosystems. Actionable insights for remediation: Detecting risks is only the beginning. A powerful DSPM solution goes beyond visibility, offering actionable insights to address identified risks. Modern DSPM is the core that ties everything together and helps ensure the confidentiality, integrity, and availability of your data. You really can’t run a modern data security program without it. To learn more about modern DSPM solutions that support your business needs, download Modern DSPM For Dummies, Cyera Special Edition.
View Article