Our Blog

February 12th, 2015

Browsers_Feb03_CInternet browsing is a piece of cake, thanks to the many browsers available for every level of user. Basic users generally surf the Internet to chat with friends or to look up information for personal reasons. Advanced users, on the other hand, might prefer a technical tool to make browsing even more convenient. The ex-CEO of Opera has launched Vivaldi, a new web browser designed for computer experts and engineers. Below are details about Vivaldi, which may well grab the attention of power users.

What is Vivaldi?

Back in 1994, Jon Von Tetzchner and his team developed the Opera browser, aiming to serve each user’s individual requirements. However, when the company diverted from its initial purpose, Von Tetzchner left Opera and decided the time was ripe to design another browser, Vivaldi.

Packed with various features, Vivaldi focuses on the needs of power users and on those who want to gain more from their browsing experience. Vivaldi is a Chromium-based application and has similar features to its predecessor, Opera. This is a clear attempt by Von Tetzchner and his team to continue remaking what they believe Opera should have been.

As well as the usual components that other browsers possess, Vivaldi packs in a number of functions that could be very useful for the kind of user who works with a lot of content, keeps a lot of tabs open and spends a lot of time on the Internet.

The Features

Here are some neat functions Vivaldi offers to its users. If you make the most out of these tools they might just work wonders.

  • Speed Dial – Vivaldi adopts the speed dial function from Opera. If you’re a fan you’ll realize it makes website navigation so simple. Speed dial allows you to organize websites based on your interests all on one page; e.g. News, Sports, Health, Tech.
  • Tab Stack – opening too many websites at once? Couldn’t find what you wanted under all those excessive tabs? Tab stack lets you arrange those messy tabs by adding multiple tabs on a single one. Simply drag and drop the tabs to your desired spot.
  • Quick Command – another powerful feature for power users. Quick command is an option for keyboard and shortcut users. You can customize and execute various settings such as opening tabs, bookmarks and other features with the keyboard.
  • Notes – taking notes from your favorite website has never been easier. With this function you can easily jot down what’s on your mind while browsing. Notes automatically remember which site you were browsing and allow you to add tags for future reference.

Despite being in its early stages of development, Vivaldi has many advantages and boasts impressive features for high-level users. Its efficiency in the long run remains to be seen. However, with the current functionality Vivaldi provides, it is a browser that all tech savvy users should consider.

Do you want to learn more about the best Internet browsers for your business? Contact us at 623-444-2395.

Published with permission from TechAdvisory.org. Source.
Topic browsers
February 11th, 2015

Security_Jan28_CHow to protect yourself against Poweliks

Think your security is taken care of with a frequent anti-virus scan? Think again. While we’ve all become used to the idea that viruses, worms and other malware – however much disruption and damage they cause to our systems – can be detected and removed thanks to the tracks they leave as they create havoc, that’s no longer something to count on. Proving the point is Poweliks, an invisible trojan horse that evades being picked up by anti-virus software. Read on to find out all you need to know about Poweliks and how to fight it.

What is Poweliks?

Security firm Symantec describes Poweliks as a trojan horse that performs malicious activities on the compromised computer. But it’s no ordinary trojan – unlike the majority, which infect your computer with malicious files, Poweliks is a silent and invisible threat that hides away in the memory registry of your system. It’s not entirely new for a virus to seek to cover its tracks by making itself “file-less” but, in contrast with Poweliks, most are wiped when you restart your computer and its memory is cleared. Worse still, Poweliks hijacks the legitimate processes and applications running on your network, inserting its code into them where it can largely evade detection.

First discovered back in August 2014, Poweliks has therefore created something of a headache for firms behind conventional security solutions like anti-virus software. Symantec and others have admittedly managed a number of updates to their protection in response to the threat posed by Poweliks. But although very minor records of the presence of the trojan are left behind by way, for instance, of registry logs, the signs of its destructive presence are much lower key than the computer world is used to, meaning Poweliks is unlikely to show up on most system scans.

Poweliks has links to Kazakhstan, the home of two servers the malware connects to once it is up and running from within your computer. The servers in Kazakhstan then send commands to the bug to tell it what to do next. In theory, this then makes way for the tool to be used to download other undesirable programs that could infect your system without your knowledge. It could equally be used to steal and disseminate data from your network.

How can I best protect myself?

As well as the anti-virus updates that have gradually been released – but which are still likely to have only a limited impact on threats of this type compared with those of the past – a number of Poweliks removal guides are now available online. Nevertheless, prevention as ever, remains better than cure. One method reported to have been employed in the distribution of the Poweliks infection is embedding it in a Microsoft Word document, which is then sent as an attachment to spam emails, and which the attackers hope your curiosity will lead you to open. Among the senders that these spam messages have masqueraded as being from are the United States Postal Service and Canada Post. Of course the best advice remains to be suspicious of any and every email attachment you open, particularly if you weren’t expecting mail or it’s from someone you don’t know.

Should I be concerned?

In fact, revisiting your everyday security precautions is probably pretty good advice all round, since experts predict that this type of threat is likely to become ever more common as attackers seek to exploit the techniques of Poweliks in order for their infiltration to remain unnoticed for as long as possible. Sure enough, a number of copycat threats have already been detected by security specialists as of the start of 2015.

General awareness around web sites you choose to visit is also recommendable in particular, since others have also reported the bug making its way onto their systems thanks to so-called ‘drive-by download attacks’ – whereby simply visiting a malicious web site is enough to trigger the infection, and actively downloading a file isn’t even necessary. As a result, organizations may wish to consider more comprehensive filtering of internet access, or at the very least reactive blocking of known malicious sites, in order to prevent employees from inadvertently infecting a company network.

To find out more about IT security solutions and protecting your technology from attack, contact us at 623-444-2395.

Published with permission from TechAdvisory.org. Source.
Topic Security
February 10th, 2015

Productivity_Jan29_CDoes it seem like everyday another PC breaks down or your IT contractor interrupts you with questions about your software budget? In today’s world, technology shouldn’t be slowing down your business, it should be speeding it up. If it’s not helping you, it’s time to admit you have a problem before your employees organize an intervention. Here are four ideas on how technology can blast your business into the future.

Work together from anywhere

With the onset of Cloud technology, it’s now possible for your employees to work easily from anywhere – be it Bangkok, Belize or Boston. With Cloud-based suite products, employees can log on from remote locations and access company files. All they need is a web-enabled device.

Cloud-based technology also makes it easier than ever for your staff to collaborate. While one employee is in a coffee shop in Vancouver and another is at a desktop in your office, they can both be editing the same document at the same time. This makes it easy for your staff to remain on the same page, both literally and metaphorically, which in turn boosts both productivity and profits.

While many SMBs use public Cloud applications like Google Drive, Dropbox and Evernote, private pro-level options are available, which come with more security and more features.

Keep all your data in the Cloud

The fact is that searching through spreadsheets for information stored in bloated data sets can be a huge waste of time. By having all your data in the Cloud, all your information will be in one place. So when you’re looking for that critical client receipt for your taxes, you’ll know where it is immediately.

Thanks to its remote access and collaboration possibilities, the Cloud also gives you and your staff easy access to all of your data wherever in the world you are.

Identify bottlenecks and upgrade your technology

Facing the facts about your current technology is key to increasing productivity. Yes we know you love your tablet from way back in 2008. You even named her Susie, after your niece, because they’re both so darn creative. But let’s face it, Susie is old now and is slowing down your business. She’s served you well, but it’s time to upgrade.

And desktops aren’t the only technology that can slow you down. There are also unreliable internet connections, obsolete software and outdated email providers. The list goes on…

The solution is to take a careful inventory of your current IT technology and see what’s keeping your business from reaching its true productivity potential. After you have your list, update your technology accordingly. Then create a plan to regularly upgrade your IT resources, so your employees are never being slowed down.

Outsource your IT

As the old saying goes, ‘out of sight, out of mind’. Whether you have a part-time contractor or a fully-staffed IT department, the mere presence of tech staff onsite in your workplace can be a distraction. When you’re focusing on sales or setting up meetings with potential clients, a knock at your door from your IT colleague – because he or she has just discovered a glitch in your system – can take you out of the flow of the task at hand.

On the other hand, outsourced IT departments are proactive in preventing technical issues from popping up in the first place. They’ll fix problems without you even knowing they existed, and without distracting you from your core work. All of which means a great boost to your day-to-day productivity – and therefore profitability.

Want to know more ways IT can enhance your company’s productivity? Contact us today at 623-444-2395 to learn how.

Published with permission from TechAdvisory.org. Source.
Topic Productivity
February 5th, 2015

Microsoft’s Security Essentials Fails Latest Antivirus Test

Keeping up its poor showing in AV-Test’s assessments, the free offering from Microsoft scored a zero when it came to protection.

Once again, Microsoft’s Security Essentials has finished at the bottom of the list during AV-Test’s latest evaluation of antivirus products. The German-based testing firm pitted 28 antivirus programs (a mix of free and paid offerings) against 153 pieces of zero-day malware and 12,327 pieces of known malware on Windows 7 machines in a three-part test that scores on protection, performance and usability.

The tests, which were conducted in December, not only had Microsoft’s free antivirus tool (version 4.6) coming in dead last among 28 competitors, but it scored 0 out of 6 points in the category of malware protection. It fared a little better when it came to performance (4 out of 6) and scored a perfect 6 points when it came to usability. However, if your antivirus is not successful in blocking threats, ease of use will never make up for that glaring weakness.

Microsoft in the past has spoken out against AV-Test’s findings in the past, saying that while the testing firm rates the products based off of missed malware detections, Microsoft prioritizes protection based off of real-world malware use and potential risk to end users.

In a blog from 2013, Microsoft’s Joe Blackbird said that the majority of malware tested against its products would rarely be encountered in the wild. “Our review showed that 0.0033 percent of our Microsoft Security Essentials and Microsoft Forefront Endpoint Protection customers were impacted by malware samples not detected during the test,” wrote Blackbird. “In addition, 94 percent of the malware samples not detected during the test didn’t impact our customers.”

According to the latest batch of testing, when it comes to antivirus protection, you get what you pay for. That’s why it’s no surprise that the three products that claimed perfect scores in the category of protection are all paid products.

While there is no magic bullet, we believe a defense-in-depth strategy works best for our clients to keep out that nasty stuff. We recommend an business-class security router called a UTM. This is not that $50 to $150 router you purchased from Best Buy or Staples. These internet protection devices start at about $450 and offer boat loads more protection and reporting than those cheap home-routers. We always use enterprise-grade antivirus and also add another layer of anti-spyware/malware.  With the UTM, and the multi-layered protection on each computer serious infections can usually be avoided.

 

Topic Security
February 1st, 2015

iPad_Jan12_CWorking with two computer screens can prove to be quite useful in speeding up work processes and boosting efficiency and productivity. And while many people might not want to incur the expense of a large external monitor, or might lack the space for the addition, you no longer have to do so if you have an iPad.

Duet Display, developed by a former Apple engineer, Rahul Dewan, will turn your iPad into an external screen for your Mac, and does so using a cable that you already use to charge and sync your iPad. To be precise, it’s actually two apps — one for your iOS device and a companion app for your Mac that lets it recognize an iPad or iPhone as a second screen.

How does Duet Display work?

  1. Download Duet Display from the Apple Store for $14.99
  2. Install Duet Display for OS X
  3. Duet Display will add a little settings icon to the right side of your menu bar and requires a password when you’re installing it on your Mac. This is because the app needs to install display drivers.
  4. Open the Duet Display app on your iPad and plug it into your Mac with a lightning cable (or a 30-pin cable if you’ve got an older iPad that’s still supported).
  5. Now you can enjoy working with two screens!

Because your iPad is plugged in, you won’t have to worry about your iPad’s battery. And while you’re using Duet Display on the iPad, you’ll still get your regular iOS notifications. You can also set your computer to use all the pixels on your iPad’s Retina display (2,048×1,536 pixel resolution), or you can set your iPad to regular resolution too. Duet Display works with all Macs running on OS X Yosemite and any iPads or iPhones running iOS 5.1.1 or above, meaning it will work with your old iPad. The only downside is you can only connect a single iOS device for now.

The growing number of applications in the App Store means there are often new ways to make use of your iPad being introduced. Looking to learn more about the iPad and its capabilities? Contact us and see how we can help.

Published with permission from TechAdvisory.org. Source.
Topic iPad
January 30th, 2015

web_Dec26_CIt is really important for a business to have a presence online these days. The first step to take to achieve this is to create a website. When businesses set out to develop and set up a new website, one of the most important aspects they need to decide upon is a Web host. Here is an overview of what exactly a Web host is and the two most common types of hosting.

What exactly is a Web host?

When creating a website, you are going to need to find a way to get the files and pages that make up your site online and available for all Internet users to see. In order to do this, you are going to need to work with a Web host who provides space on a server for you to host your website files (what the user sees when they visit your site).

A good way to think of a Web host is as being similar to a company that businesses rent premises from. You pay the company to rent space to host your Website so that you can run your business. Many Web hosts also offer a service called domain hosting, which allows you to create a Web address so users can access your website e.g., google.com, inc.com, etc. Combine these two services together and you have the main foundations for your website.

Beyond simply hosting your website, Web hosts often host domain-based email addresses, website databases, videos, etc. Essentially, whatever needs to go on your website will need to be stored with your Web host.

When you sign up with a Web host you will usually pay a monthly fee, which the company uses to maintain and invest in new servers for hosting, decreased access speeds, and better services.

What are the two most common types of Web hosting?

There are hundreds, if not thousands of Web hosts around the world, but you can fit almost all of them in one of two categories:

  1. Shared hosting - Hosting where multiple, different websites are stored on one physical hosting server. Sites avet their own partition (section of storage) that is kept separate from other sites on the same server.
  2. Dedicated hosting - Hosting where one website is hosted per server. This means you have all of the server’s capacity to yourself. No other websites beyond yours and the other sites you run are hosted.

Which one is best for my business website?

The vast majority of websites on the Internet are hosted via shared hosting services. This is because this way is more affordable, while still offering generally stable access and access speeds. For almost all small to medium businesses who want fairly simple websites, or sites with minimal features, a shared host is ideal.

If your website is going to be large, e.g., thousands of pages, and you are going to need to host complex features like advanced ecommerce, streaming, etc., then it would be best to opt for a dedicated hosting service.

As a general rule of thumb, for most business needs a shared hosting service is sufficient. Dedicated hosting is more suitable for large sites like Google, Amazon, government sites, etc. Our site at www.aztechworks.com is in a shared hosting environment and suits us very well.

There are a wide-variety of Web hosts out there and it can be a challenge to select one that works well for your business. What we recommend is contacting us. With our expertise and solutions, we can help find a Web host that will work best for your website and business needs. Contact us today at 623-444-2395 or ask@aztechworks.com to shine the spotlight on your online presence.

Published with permission from TechAdvisory.org. Source.
Topic Web
January 29th, 2015

socialmedia_Jan20_CRegardless of the industry in which you operate, it’s undeniable that social media has become an essential platform for many businesses of all sizes to easily engage and interact with customers and potential customers, as well as boost visibility. But there’s more to social media than market reach and penetration and it can prove to be a powerful tool for driving dynamic business development too.

In most cases, a business development manager already has an idea of the kind of company with which to partner. Their next step is to contact that company via a phone call or email. However, this can be an unreliable way to reach out, especially when your potential partner has never heard of you. Social media speeds up this process by identifying the best person to contact, as well as determining if you have any mutual connections.

Simply put, social media lets you understand the background of different companies and gives you an idea of the different players involved, before you even engage in a dialogue. With this in mind, let’s take a look at four ways you can utilize information available on social media to enhance your business development success.

  1. Social media is an extra pair of eyes
    Social media allows you to see first-hand what potential partners, competitors, and customers are doing, which is a major asset when it comes to your business development and performance. This can also reveal business-relationship possibilities or even warn where it is best to stay away. It’s crucial to position yourself and your company as industry experts by sharing mind-blowing content as well as highlighting recent successes.
  2. There’s no universal message in social media
    The way people behave and connect across different social media platforms varies, therefore it is important to adjust accordingly. For instance, you might use Twitter to promote ongoing marketing campaigns, share content, and direct customer service requests. You may use Facebook for larger marketing initiatives, such as showcasing a company’s culture and resources. It’s important to remember that there’s no universal rule to utilizing social media and that it is beneficial to be flexible. Think about what your individual goals are and work out which social media platform is the best avenue to explore. Test and measure and then test and measure again to get a finer point on your posts and direction to get maximum results.
  3. Leverage employee relationships
    If you’re looking to connect with an individual in a specific company, make it a habit to check and see if anyone in your company has a pre-existing relationship with that person. Social media channels like Facebook and LinkedIn make it fairly easy to spot mutual connections, so it is a good idea to get into the habit of checking. Whether you ask your colleague to help make an introduction or to arrange a meeting, a mutual connection gives you the competitive edge in effective business development.
  4. Use social media as a touchpoint
    Social media is not only essential to business development, but also complements other more traditional practices, such as when you’ve sent an email or voicemail to a business prospect that has gone unanswered. It’s understandable that people get so busy they can delay, forget or pass over an inquiry, but instead of passively waiting for a reply, why not make it standard practice to follow up separately via LinkedIn or other social media platforms? This way you can build additional opportunities with potential partners, increase the likelihood of a response, and even forge a future business relationship.

The fundamentals of business development are strong relationships with a partner or companies with a good reputation, who will have a positive impact on your business, such as marketing an initiative collaboratively. Social media can get this whole process started, so the next time you’re looking to contact a business prospect or potential partner, start by visiting their social media channels to get the heads up to help you in your quest.

Looking to learn more about the benefits of social media in business? Contact us today at 623-444-2395 or ask@aztechworks.com.

Published with permission from TechAdvisory.org. Source.
Topic Social Media
January 28th, 2015

AppleMacOS_Jan16_CDespite Macs being full of shortcuts and tricks and tools to speed up your work processes, we all know how easy it is to fall out of the habit of using them and instead to go back to our old habits. Yet with the New Year comes the perfect opportunity to get back on top of your game and put all those shortcuts to good use in using your Mac to ease work pressures. Speed up, wise up and clean up with these productivity-boosting Mac hacks.

Make searching easier

Need to hunt down a file? You can make the process easier by not searching for just one word, or even a series of words in sequence, but by instead searching for a logical combination of terms as a Boolean expression. Boolean expressions combine search terms with conditions like ‘and’, ‘or’ and ‘not’ to specify whether you want results that contain all, or only some, of your search terms. These expressions are supported by native Mac apps including Spotlight, Mail and Calendar, and by plenty of third-party apps too.

For instance, if you wanted to track down client invoices that have not yet been marked as paid, you might begin by searching for files containing the word ‘invoice’. This term alone would bring up plenty of results you had no interest in, but by using a Boolean expression which takes the terms ‘and’, ‘or’ and ‘not’ to create a logical statement, you could run a search for ‘invoice NOT paid’.

Protect your passwords

We’ve all heard the recommendation that our passwords should be long, difficult to guess and full of unnatural-feeling characters like mixed-case letters, numbers and punctuation – easier said than put into practice. Add to that the fact that, if we want to be truly secure, we shouldn’t use the same password for more than one account, and suddenly creating hack-roof passwords becomes a real challenge. Even once you’ve invented them, how on earth are you supposed to remember all of these different passwords?

Well, there’s an app for that. Or several, to be precise – the Apple-specific iCloud Keychain syncs your passwords across your devices and then fills them in when necessary, remembering what you can’t. Or as an alternative and for cross-platform compatibility, programs like RoboForm, 1Password and LastPass are good alternatives. We make extensive use of RoboForm so we have secured access to  account passwords on our Macs, Windows Machines, iPhones, and Android devices.

Simplify your coding

Does your day-to-day work involve writing of some kind? You can make your job simpler by forgetting often difficult to read HTML code in favor of much friendlier, more attractive and easier to work with Markdown code. Based on plain text, Markdown is compatible with almost all word processors, meaning you don’t need to worry about using a specific text editor for fear of risking the corruption of your code. Simplified codes, such as Marketing to create a hyperlink, are transformed into formatted documents by a converter that takes the effort out of writing.

Numerous versions of Markdown have expanded upon the original idea to add additional features and bring further design richness to your finished document, but all of them offer the basics you’ll need to produce in your writing. Examples of apps that act as dedicated Markdown editors are Marked 2, iA Writer and Editorial.

If you’re looking to learn more about productivity tips or other Mac features, get in touch with us today at 623-444-2395 or ask@aztechworks.com and see what we can do to help.

Published with permission from TechAdvisory.org. Source.
Topic Apple Mac OS
January 27th, 2015

Security_Jan12_CThe scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to us small business owners as they are to multimillion dollar corporations. These three tips will take you back to security basics and help avert your own big-screen drama.

1) Don’t let basic security habits slip

Our modern-day instinct tells us that the answer to potential security breaches is to install new layers of antivirus software, firewalls and further encryption systems. While these are all worthy additions to your company’s armor of security shields, they will do little to help if good old-fashioned good, protective habits are allowed to slide.

Create a disciplined, from the top down, security-conscious culture in your organization, and keep the message simple so that staff remember and follow them. Focus on regularly changing passwords and keeping them complex (10 or more characters with capitals, numbers, and symbols), being vigilant about avoiding unexpected links in email messages, and limiting network access for the likes of external contractors to that which is absolutely necessary.

One of the ways hackers made their way into the Sony network was by tricking administrators into thinking they had a legitimate need for access: teach your staff to be careful, and praise cautiousness even if it turns out access is warranted. Encourage staff to flag up potential security lapses, and make sure they know that reports will be followed up and loopholes closed.

2) Take a flexible and agile approach to IT

IT changes, and so do the ways best suited to keeping it safe. This means it is vitally important to keep your IT systems up to date, and where necessary to do away with outdated practices that could leave your business technology exposed. This involves more than just ensuring that your network is running updated antivirus software to catch the latest bugs and worms – it means staying abreast of emerging methods to mitigate potential threats from hackers worldwide.

All of this uses staff and resources that your small business might not have – which is where outsourced managed services come in. Using a managed service provider as an add-on to your own IT team can give you extra flexibility and the ability to keep abreast of industry security developments, even when you lack the time to do so yourself.

Equally, know when it is time to ditch data – think of emerging social networks like Snapchat, which set messages to self-destruct after a set time, as your cue to make your data retention policy less permanent, particularly in relation to email. If you no longer have a business need or a regulatory requirement to retain information, then delete it – in the process you can limit the possible damage even if the worst should occur and you fall victim to an external attack.

3) Backup, backup, backup!

The last thing you want in the event of a security breach is for it to hit your day-to-day operations – the potential damage caused by the hack itself is likely to give you enough to worry about. But that is exactly the situation Sony found itself in after its latest hack, with its email system down and staff forced to return to the days of pen, paper and even the fax machine.

As well as ensuring alternative means of communication remain open to your business in the aftermath of a possible attack, it is also vital to make sure that you retain access to the information most critical to your work. Regular, secured backups help ensure that, whatever happens, the show is able to go on and your firm’s productivity and revenue are not unduly hit. Engaging professionals to undertake your backups on a managed service basis also means this can happen routinely and without fail, while you stay focused on running your business.

Want to learn more about how to reduce your IT network’s vulnerability to attack? Call us at 623-444-2395 or ask@aztechworks.com.

Published with permission from TechAdvisory.org. Source.
Topic Security
January 15th, 2015

Microsoft will no longer offer mainstream support for Windows 7 after January 13th. The end of mainstream support means the operating system will no longer receive new features. The company will continue to offer security updates and hotfix support.

Starting Thursday January 13  Microsoft ends mainstream support of the 5 year old operating system. From then on the company will only offer extended support on Windows 7. The extended support stage ends at January 14th 2020 after which Microsoft will no longer offer updates and security patches. SO no need to panic yet.

Although Windows 7 is half way its lifecycle, the operating system is used by more than 50% of all internet users, according to research companies StatCounter and Net Applications. According to Net Applications the market share of Windows 7 increased last year, due in part of Microsoft no longer supporting Windows XP.

The end of Window XP supported resulted in more companies and consumers switching to a newer Windows version. Many companies decided to ignore Windows 8 and move to Windows 7. Despite the migration of XP users, StatCounter reported a decrease in Windows 7 users, mainly in benefit of Windows 8.1

Market researcher Gartner warned companies in August last year to prepare for the end of support of Windows 7.  “The end of Windows 7 support seems far away, but the time between when the next version of Windows 10 may ship, and support for Windows 7 will end, is about the same timeframe as from when Windows XP support ended”, said Stephen Kleynhans from Gartner.

Microsoft will also no longer offer support on other products starting tomorrow. Besides the end of mainstream support for Windows 7 the company also ends support for Virtual Server 2005, Systems Management Server 2003, Host Integration Server 2004, Visual FoxPro 9.0 and Windows CE 5.0.