How To Protect Your Laptop While Traveling

There are multiple aspects to keeping a laptop safe. It does you little good to encrypt your laptop against malware if you conduct actions which leave it wide open to thieves, and vice versa. Here are a few tips to help keep your device safe and your trip relaxed.

Your laptop is probably the most expensive thing on you when you are traveling, and yet it is incredibly fragile. Few things can ruin a vacation faster than losing your laptop to theft, viruses, or other threats, especially if you are in an area on the globe where you may be unable to easily obtain a new one.

Get a New, Padded Laptop Backpack

A good laptop backpack is a major first step towards protecting your laptop from bumps, falls, water, and other damaging things. PC Magazine has a list of good backpacks, though you can check Amazon or any office or electronics store in the area.

When you are selecting a backpack, prioritize checking its padding above anything else. Also look for multiple compartments so that you can store just the laptop in a single compartment instead of squishing it alongside clothes and wires and other things. Go for functionality over style, as the only people you will end up attracting with a cool backpack are thieves. 

Note that you should try to get a backpack instead of a briefcase or messenger bag. A briefcase is a clear sign to unsavory individuals that something valuable is inside, and is easier to rip away from you than a properly secured backpack. It is also easy to carry a backpack on a long hike instead of awkwardly shifting a messenger bag from shoulder to shoulder.

Stay Alert

If you leave your laptop unattended in a public space for a minute or two to use the bathroom, you may as well kiss it goodbye. Laptops are prime candidates for thieves, whether it is for the value of the data in the laptop or for the device itself. And while you can lock your computer or even put a cable lock around it to deter thieves, your best weapon against them is constant vigilance.

 Take your laptop with you wherever you go, instead of leaving it in the hotel. But also keep it out of sight when you can. Keep it in a backpack, or cover it with a jacket. The less people know where your laptop, the less likely anything bad will happen to it.

Backup your Data

You should be regularly backing up your data already, but it is important to do a full backup right before you go on a trip. Store all of your important data on an external hard drive or in the cloud so that you do not lose any critical data on top of losing your computer. Create a log of passwords outside the computer so that anyone who gains access cannot access personal records.

Also consider backing up your data while you are on the trip itself. If you have created any documents or files on the trip, store them on a CD or USB drive in your hotel at the end of the day and put those things in a secure place.

Use a VPN instead of public Wi-Fi

Sitting in a café in some foreign land and connecting to the Internet may seem like the epitome of how globalization brings us together, but doing anything on a public Wi-Fi can be extremely dangerous. The problem is that as CSO Online describes, hackers can easily position themselves between yourself and the connection point. This gives them access to any data you send out, such as your email passwords, business data, and credit card data. Even if you are just logging into some internet forum or checking sports scores, they can use any information to deduce personal information about you. Furthermore, hackers can also send data back and infect your computer with malware.

Consequently, you should be looking to connect online as little as possible. If you are in a situation where you absolutely must connect, use a trustworthy VPN which will encrypt your data. If you are not sure what a VPN is, cooltechzone has an excellent guide on what they are and how to set one up.

Note that a VPN will not make your data completely hackproof. But the hacker will likely not want to make the effort when there are other computers sending unencrypted data. Your company should provide you with a VPN you can use when traveling abroad. Also make sure to turn wi-fi off when not using it, as the computer is still transmitting data when it is on.

Should You Leave Your Laptop at Home?

Your laptop will face numerous threats when traveling that it will never have to deal with if you leave it at home. So maybe you should not take your laptop at all.

This is especially true if you are on vacation. You are traveling to see the world and explore new sights, not stay hooked to the Internet like you are on most days. And even if you want to stay connected to some degree, Trip Savvy points out that a tablet or phone can serve just as well for someone just on vacation. The only major reason to bring a laptop along is if you may have to work when traveling.

If you really, truly, absolutely must bring a computer along, consider bringing in a cheaper laptop. Do you still have that old, slow, dying laptop lying around which you replaced with your brand new device? Take the old one instead. You may be frustrated with longer loading times, but you will not have to be looking over your shoulder all the time out of fear of losing or damaging it.

Guest Posting on CompanionLink Blog

We publish paid guest posts on the CompanionLink Blog https://www.companionlink.com/blog/

CompanionLink DA 55 (Moz), Blog pages on first post are about PA 26.

We will publish up to five do-follow links per post. We also will do an Author biography and Author website do-follow link on request. The post will be in our category “Sponsored Posts” but not other wise identified.

Guest posts must follow our general topic of Phone Apps for Small Business, Small Business Productivity, or PC and Phone Security.

We charge $70 per guest post. We will send you a PayPal invoice when we post. Please be prepared to pay this within three days.

We will add a picture to each post. If you supply a picture please include a link for the picture source from Pexels, Pixabay, or Unsplash.

To publish a guest post send article to guestpost@companionlink.com.

We can generally post all articles within 24 hours. Google indexes them in a few hours so they are fully search-able within one day.

How Adware Affects Your Computer

While on your Computer or mobile device, you notice an annoying pop-up advertisement, and regardless of how often you close it, it keeps reappearing. Chances are its Adware.

Adware is short for advertisement and Software. It is an advertising-supported Software. It is the name given to programs that are designed to display advertisements on your Computer, redirect your search to advertising websites, and collect data about you. For example, it receives a history of sites the user visits, and this sends this information back to the ad company. The information collected is often used to deliver custom advertisements to you.

Adware is a financially supported Software, and most times, developers bundle them with other files that you’ve downloaded. They might be malicious in nature so you must run a scan using Adware Removal tool. Sometimes they are not harmful, but they have the potential to be, and users see them as an invasion of privacy and distraction.

How Adware is Installed

Are you in a situation where specific advertisements keep showing up on your Computer, whether in any of your browsers or sites you’ve never seen ads before? If you answer ‘yes’ to this question, your system might be affected by Adware that injects ads into websites as you browse.

Aside from getting rid of Adware; a big question you might be asking is how did it get there initially?

Adware overtime has been responsible for many successful and prevalent programs including AOL instant messenger, Endora and many more. A method in which Adware can get into your system is when you download a free program. Other times, producers of software bundler pay for ads to appear when you search for specific Software. These adverts lead you to download a software bundler instead of the free, neat Software you were hoping for, leaving you with many ad injections.

Another method which is as well insidious occurs when you’re visiting a website. It doesn’t matter if it’s a trusted site or a sketchy one. Whichever way, your device can be infected with Adware. This way takes advantage of the vulnerability of your browser. The Adware burrows in, start collecting information, redirects you to malicious sites and pop up more advertisement.

How Adware affects your Computer

Sometimes, adware fall under the category of malicious software ‘malware.’ Adware is often harmless, but are now used in bad manners to exploit your system. Below are ways Adware can affect your Computer.

Slows down your Computer

The first warning of malicious Adware is the deterioration in your Computer’s performance. Adware has a reputation of engaging resources and in turn, hurting performance and speed.  Adware runs continuously in the background without your knowledge and uses valuable resources such as memory processor speed.

Increase Bandwidth Usage

Adware does this by downloading unwanted stuff. When you authorize the download of Software, new Software is downloaded and installed simultaneously. Many adware programs enter into your Computer unknowingly. These programs invade your Computer and run in your Computer’s background, eating up bandwidth. If you notice a constant use of your internet, but you can’t find any program regularly using this bandwidth on your Computer. It is likely Adware.

Make Computing Experience Worse

Adware is an annoyance to most computer users. For the majority of people, the primary problem with Adware is its ability to display advertisements in a pop-up form whenever it wants. These adverts grab your attention, and if you click on them, they install Software on your system without your permission. These installed Software keeps displaying adverts related to whatever you have clicked before. This pop up over a user’s work can plague the user.

Costs Money

Shopping is now a lot easier with the availability of online stores. The idea that one can buy anything from the comfort of their home is soothing. Right products, reasonable prices, and new offers/discounts are some of those things that make online shopping attractive. However, there are dangers associated with online shopping. Adware throws fake advertisements for an online store at a user. These ads are illegitimate, and most times, they offer a ridiculously low price of an item or a service that is hard to pass up on. Once a user clicks on it, a malicious user can steal their info (credit card info, for example).

Invades Privacy

Another negative side is an invasion of privacy. Some adware programs can download and install spyware. These programs can capture user personal information, and they send confidential information to advertisers or criminals. Additionally, they can collect browsing history and send it to ad managers.

How to Get Rid of Adware

Look out for suspicious/unknown name in installed programs and remove it.

As discussed earlier, most pop-up ads install a program on your Computer. Though not as a general rule, you’ll need to check for malicious programs to remove it.

Navigate your way to the programs screen and scroll through the list of currently installed programs. Look for recently installed unknown programs, any other unwanted or unknown program and uninstall from your Computer.

Depending on what application has installed the adware infection, the program may have a different name on your Computer. If you cannot find any unwanted or unknown programs on your Computer, then you can proceed with this next step.

Look out for suspicious/unknown name in installed browser extensions and remove it.

Adware generally bombards web browsers with ads. An important step is to look out for unknown extension and uninstall it.

Besides, you can reset Internet Explorer settings or other browsers to return them to the state they were in on the first installation on your PC. This reset feature fixes many issues while saving essential information like bookmarks, passwords, web form auto-fill information, browsing history, and open tabs.

Install MalwareFox

As easy as the above steps look like, things are not completely easy in most cases. There are situations in which these programs might be hiding deep in system setting and prove challenging to remove.

In cases like this, it is reasonable to scan the system with adware removal tool like MalwareFox. MalwareFox performs deep cleaning, detects, and cleans Adware; removing annoying ads, toolbar, and search in a click.

Additionally, MalwareFox restores performance by deleting adware infections which engages resources. With this method, there’s a gain of lost power of the computer system.

FaceTime Stuck On Connecting: What To Do To Troubleshoot Issues?

Since its first launch, FaceTime has proven to be a convenient and simple way to stay in touch with your family and friends. It is one of the top-rated tools for communication used by millions of people all over the globe.

Unfortunately, despite its popularity, sometimes the app fails. Such issues often catch users by surprise, leaving them without connection. This situation can be rather frustrating. What to do in this case? Our article will give you the answer!

How to Troubleshoot FaceTime Settings

Simple Ways To Deal With The Problem

If you have found the application not responding or stuck on connecting, chances are it is an internal failure of the app itself. Thus, your main task is to define the causes of the issues you’ve faced and find possible solutions. In the guide below, we will tell you about the main steps you could undertake to find the reason behind the problem and fix it. The solutions are offered in a special sequence from the simplest to the most complex ones, so make sure you try them in the same order!

1. Restart

Whenever you face any sort of issues, the first thing to try is to restart your computer or another device. If it’s only the application itself that is not responding, you can reboot your device the traditional way. Otherwise, you may need to use special tools for force restart.

In any case, this is the first step to take. After the reboot is complete, go back to the application to see if the issue is solved and if not, go on to the next step.

2. Make sure you haven’t missed an OS update

Since FaceTime is one of the default apps on iOS devices, it may work improperly when your OS version becomes too outdated. This means that if you find FaceTime stuck on connecting screen, you might want to upgrade to the newest OS. This will likely solve the problem. In fact, this tip can apply to all the other system or app failures.

3. Reactivate the application

Sometimes, connection failures can be resolved by reactivating the app. To do this, go to your Settings and find FaceTime tab. Open it and turn it off. Then turn it back off and wait until the activation is completed. Once you do this, go back to the home screen and try launching the app now to check if it works.

4. Check your settings

Sometimes, you may be unable to make or receive calls when you are using FaceTime not with Wi-Fi, but with a cellular connection. Why does this happen? Most often, the reason for such failure is just the wrong settings. To check if it is the case, go to your device’s settings and find the section that manages Cellular connection settings. Then, find a tab called Use Cellular Data For and make sure that you allow the app to work when you are not connected to Wi-Fi.

5. Reset settings

One more effective method requires you to resetting all network settings. This action will not remove your files from the device, so you shouldn’t be worried about that. It will only delete all the previous network settings including VPN, Bluetooth, and Wi-Fi.

To try this method, go to your phone’s settings and navigate to the General tab. Next, find the Reset section and pick an option that resets only network settings. Wait for the process to be completed, connect to Wi-Fi again and see if FaceTime works now.

6. The Last Option

What if any of these steps help you? In this case, it might be a problem with the device itself. Your last option would be to take your device for a repair.

7 Best Android Learning Apps

As your child grows, they’ll need your help in school less. Part of this is from independence and learning more. The other part is knowing where to find high school and college homework help. One useful tool for students is learning apps, which focus on teaching them how to do problems instead of just providing answers. Here are seven of the best apps for Android users. These are perfect for students, as well as adult learners who want to refresh on something or learn something new.

1. Khan’s Academy

Khan’s Academy has versions for children and adults. It has over 10,000 lessons and is completely free to use. Many of its subjects are more common, which is great for struggling students or adults who want to brush up on lessons. Some of the areas it covers include math, science, physics, English, economics, and others.

2. DuoLingo

DuoLingo is perfect for anyone trying to learn a second (or third) language. The app is full of fun games that make learning vocabulary easy and enjoyable. According to the designers, spending 34 hours on this app teaches as much as a semester in school. Currently, there are over a dozen languages offered.

3. Amazon Kindle

Amazon Kindle is not just for entertainment reading. It is also full of reference guides and books on any topic students can think of. This can be useful if they are researching a topic or need extra information on a subject. As an added benefit, students can buy textbooks. This means they do not have to lug their book home every night.

4. Coursera

Coursera is its own online school. It is best for older students who need extra help or adult learners. There are more than 1,000 different courses available, each of them with video content, access to reading material, and lectures. At the end of each course, a certificate of completion is given to students.

5.  PhotoMath

PhotoMath works with your phone’s camera. It is useful for students or parents. Simply take a picture of the problem and wait for the explanation and answer. The major benefit comes from the explanation since it walks students through the steps toward a solution.

6. Wolfram Alpha

This is a more advanced app that might benefit high school or college students. It can be used for all types of information and works as a calculator. Some subjects covered include data analysis, physics, mathematics, engineering, geography, weather, astronomy, and more.

7. LinkedIn Learning

While this will not help the average student, this is a great app for adult professional learning. It is free to use and covers job skills. This could even benefit students considering their first job. Some topics covered include office skills and creative skills.

Parents and tutors are not students’ only options for assignment help. Learning apps for Android users are a great alternative for help. The best apps will guide students in finding the answer rather than doing the work for them. This ensures they are prepared come test time while providing the extra help they need to succeed.

10 Ways to Secure Your Information Across Your Devices Online

The digital revolution has brought great advances in public access to information. Before the internet, you needed a set of encyclopedias or a visit to the library to find things out. Now, almost any information you desire is at your fingertips, on the computer. But the same technology that permits information access online makes us vulnerable to invasion by others seeking valuable information or resources from us. So it is vital in this digital age to take strong steps to protect yourself and devices.

Here are 10 ways to secure your information across your devices online:

  1. Pick Strong Passwords

This is the obvious one, but you’d be amazed how many people choose simple passwords that are easy for sophisticated hackers to hack. Algorithms can go through millions of simple possibilities in seconds. A good password should contain/include alphabetical, symbolic, and numeric characters. It should be of sufficient length, 10-12 characters, and not contain obvious names or words. Acronyms make good passwords because they are easy to remember, yet do not present discernible patterns for hackers. Also, obviously your passwords across different apps should be different, not the same.

  1. Protect Your Passwords

They are the keys to your digital kingdom! Do not give your passwords to others. Password manager apps are one great answer for those who have many passwords. If you do use a password manager app, make sure their reputation is excellent and security strong. After all, someone who gains access to that information will pretty much gain access to all that you own, in one form or another. Change your passwords when notified of any security breach.

  1. Maintain Separate User and Admin Accounts

Maintaining separate user and admin accounts is a common, almost universal, practice in business settings these days. It is a good idea for your home devices as well. Protect your admin account with a password. Use this account only for admin purposes. If your computer is hacked, the hacker will not automatically have access to make administrative changes. It also makes sense to protect your user account with a password. If your computer is stolen, the thief will need to know the password to immediately access any information you keep on file.

  1. Keep Software Current

This is done automatically, in large part, these days on many computers. If you don’t have your computer set up to automatically update at specified times, do so. Many updates are security fixes to combat vulnerabilities in programs. There is a continuous race between developers and hackers who wish to exploit these vulnerabilities. If you are not updating, hackers can easily win this race! Back up your files. It is also a good idea to back up all vital information on two flash drives. Store one and keep the other with you when you go places. In the unlikely event of some kind of disaster (fire, hurricane, theft, etc.) you will maintain your vital information.

  1. Connect With Care

Connect only to secure sites. Do not use public Wi-Fi to conduct personal or business affairs. If you must connect to sites where security is questionable, use a strong Virtual Private Network (VPN) like Surfshark. Try it here.

  1. Practice Multi-Factor Authentication

Two-factor, or multi-factor, authentication is the use of more than one form of identity verification to gain site access. Passwords are one method. Security questions are another often-used form of authentication. But many times the information commonly used is easily available to identity thieves as well. So, if you are going to use a security question, make sure the information is personal and truly private. Biometrics is another method growing in sophistication and popularity. Facial recognition or iris identification should someday be the norm in all computers. Fingerprints or voice identification are other good examples. Biometrics authentication is the future state of the art, although all methods still face challenges. Some devices have biometric capability now. Passwords will become a thing of the past, although they’re still vital currently! Setting alerts on your online accounts is another good practice.

  1. Use Caution with Emails

One of the most common security breaches comes from replying to or opening links in fraudulent emails. This is commonly known as phishing. Never open a link in an email unless you are absolutely certain it is from a trusted source. Don’t even open it then. A common hacker practice is to gain entrance to one account and use that account to send phony messages to all contacts, with requests for money or information. Phishing emails have led to many notorious security breaches. Think of the 2016 elections, when a phishing email led to the massive DNC security breach.

  1. Use a Good Security App

This is just good common sense. In this day and age, a good security app is a must. Many decent apps are free, but this is one area where it likely pays to pay. Consumer advocate sites rate the top security apps each year. If you don’t have one, hurry to check these ratings out, then purchase a good app. Visit at least 2 or 3 sites to get a consensus. Then check customer reviews as well.

  1. Minimize Physical Access Possibilities

Physical access to any of your devices may be the easiest way for someone to gain vital personal information. Don’t leave your computer up and running in public. Do not leave important applications open anywhere while you are absent. Protect access with a strong password. Although best practice with passwords is to not keep physical copies, in the real world, where you might have 50 passwords, this is often not practical. Keep password information in a secure spot.

  1. Utilize a Virtual Private Network (VPN)

The VPN has become vital to maintain strong internet security. VPNs encrypt information and route your connection through a remote server. Your actual identity and location are masked by that server. VPNs also permit connection to sites that are geographically restricted or forbidden. They protect information when using public Wi-Fi. VPNs can be used to stream video such as Hulu or Netflix. VPNs permit download access without a digital footprint. Business users can log on to their business networks while traveling. One of the highest rated VPNs is Surfshark. Surfshark has more than 500 servers in all parts of the globe to facilitate strength and speed of connection. They were recently named a top VPN newcomer. Surfshark now offers annual plans with decreased cost and 24/7 support. Presently, a no risk trial is available. This is an excellent opportunity to secure a strong VPN network at an unusually low price.

12 Awesome Resources For Developers On App Marketing

Developers often dislike marketers. The reasons for that are often quite simple – they had a bad previous experience where the marketer didn’t understand their product enough and oversold it. This only brings poor results and no one is happy.

However, this also comes from the fact that app developers don’t really understand marketing well enough. It has a different approach to the app – marketers are focused on users and what would work for them even though they might not always understand what it takes to make it happen.

This means that app developers, aware of what they can do, should try to learn the basics of marketing in order to market the app themselves or have a better relationship with their marketer. Here are some useful resources to begin with:

Gamasutra

This resource covers game development and the business of making and marketing games in general. In various sections you can find many useful tips on app development, marketing and crowdfunding.

They have a lot of posts and the community posts often as well. Some of the most quality posts come from established game developers but there are also a lot of useful tips from amateurs that can help you with all elements of app development”, – says a content marketer at UK Writings and State of Writing, Sarah Gilles.

Relate – The Digital Mag For Marketers

This app used to be called Appboy but they rebranded and published a great resource for people looking for marketing tips on various elements like deep linking, retention and much more.

People with experience share posts here and they share their personal tips an stories which is great.

Apptweak Blog

This blog is set on publishing fun, thorough and entertaining content on marketing and promotion. Here, you can learn everything you need to know about ASO, beta testing and much more.

Mobile Marketer Blog

This is always a great read because they often do case studies and conduct various research experiments to bring you the best conclusions and information they can. They serve a large market of big companies but also small businesses just starting out as well.

You’ll be able to find a lot of great data here.

The App Guy Podcast

This is a fun podcast which offers a lot of useful information on all aspects of app marketing. There are a lot of episodes and you can hear from app entrepreneurs, startup founders and so on. People really love it and have found it useful in the past”, – says Tina Gruber, an app marketer from Simple Grad and Academized.

App Savvy – Ken Yarmosh

App Savvy is an amazing book dedicated to all app marketers out there. Ken really dedicates his time to elaborate the subject and bring it closer to the reader. This book may be a bit old but its still timeless.

Touch Arcade

This is a forum dedicated to game developers and helping them solve their issues. Here, a lot of experienced people and amateurs alike post their tips and advice in order to help others create a better marketing campaign for their apps.

Tune Blog

This blog is publishing great content from industry experts on several areas, making it one of the most helpful blogs out there for app developers.

Appentive Blog

Appentive makes a point out of creating valuable pieces for their readers. “They cover a wide range of topics but you will most likely be able to find anything you need on this blog” comments April Cordero, a tech writer at Let’s go and learn and Student Writing Services.

Fiksu Webinars

These webinars can help you learn amazing things about app marketing and it’s especially good because you can ask questions at the end of the webinar and get all of that extra information that you need.

iPhoneDevSDK

This is an amazing blog and a great place to exchange some information and tips between independent developers. There are interesting debates and insights from time to time.

Arkenea

This is a mobile app development company that offers a blog on app development and design, app marketing and so on. There are also interviews with successful people from the app and startup industries.

Find The Best Way To Market Your App

Marketing can be difficult and seem terrifying but it becomes much easier once you learn how to do it properly. Who better to market your app than yourself? You know what you can do and what is possible, so learn the basics and dive a bit deeper into the specifics. Hopefully, these resources can help.

How to sync Samsung Galaxy Note 5 and Galaxy S6 Edge+ to Outlook

Galaxy Note 5 and Galaxy S6 Edge+ are the newest additions to the Wide World of Phablets. The Edge+ is the first Phablet phone to feature the curved edges which can show information while the phone is turned.

DejaOffice for Outlook App is made for these large screen phones, giving a maximum of functionality.  Only DejaOffice offers:

* Contacts, Calendar, Tasks and Notes in one app, and you can link them together
* Category colors, use the same categories across all conduits.
* USB, Wi-FI and Cloud synchronization options
* Private records, view them only when you enter a pass code
* Onboard encryption.  Even if your phone is lost, your data is safe

Setup Guide for Samsung Galaxy Outlook sync

  1. Install CompanionLink on your PC. Click here to download it.
  2. On your Galaxy Phone, launch the Google Play Store. Search for DejaOffice and install it.
  3. Configure CompanionLink. Your configuration steps will depend on the sync option listed above that you choose.
    1. Setup guide: Galaxy S6 to Outlook USB sync
    2. Setup guide: Galaxy S6 to Outlook WiFi sync
    3. Recommended: Galaxy S6 to Outlook DejaCloud sync (automatic)
    4. Setup guide: Galaxy S6 to Outlook using a Google account
    5. With DejaCloud sync, the synchronization will begin automatically within a few minutes. If you selected USB, WiFi, or sync to Google, you need to click on the Sync button in CompanionLink on your PC to start the first sync.

Further help for Samsung Galaxy to Outlook sync

Call us at 503-243-3400 if you need further help. Support is free to everyone with a Galaxy S6 phone, regardless of whether you do or do not own a license to CompanionLink . You can also access our setup guides online. If you want an advanced configuration help, we offer a $49 RunStart package where our experts will log in to your PC and Galaxy S6 to configure the sync for you. This gives you the peace of mind that your Galaxy S6 to PC sync is fine-tuned to match your needs.

 

How to sync Outlook Color Categories to iPhone 6

Current iPhone Outlook sync options simply don’t work for business professionals using a PC. Apple ships iTunes and iCloud as two ways to sync Microsoft Outlook with iPhone and iPad. The problem is neither product supports sync of Outlook Categories.

Why are categories important on phones?

Business users who have hundreds of contact records, notes, and appointment details need a way to organize info for quick lookup. Organization is inherent in their PC Outlook database courtesy of the Color Categories feature. Each category has a name and color in Outlook. This offers quick sort and view options on the PC.

But what about the iPhone and iPad?

CompanionLink solves this problem by mapping Outlook Color Categories to iOS devices. This means business users can rely on color recognition to view data on their iPhone or iPad. They can sort and view the device’s contact list the same way they did on the PC. They can assign categories as they create new Notes or Tasks on the device. These new items will sync back to the correct Outlook Category on their PC.

CompanionLink supports Outlook Categories for Contacts, Calendar, Tasks, Notes, and Journal. Outlook calendar alarms, task alerts, and contact photos also sync to iPhone and iPad. Basically, you get everything iTunes and iCloud offers with support for additional Outlook data like Categories and Alarms. This is a perfect paid utility for business users who need to organize hundreds of Outlook records on their phone.

How Outlook categories on iPhone look

How Outlook Categories look on iPhone

You have two options to view Outlook categories on your iPhone: use our DejaOffice mobile app or use the phone’s Contacts app. There are pros/cons to each approach.

CompanionLink relies on our DejaOffice iPhone app to store Outlook data on the device. Our app is designed for a one-to-one map with Outlook fields, which is why we can handle more Outlook data than iPhone’s Contacts app.

If, however, you prefer to use iPhone’s Contact app, you have that option. Go to Settings > Sync > Sync to native iPhone Contacts. This will create and transfer DejaOffice Outlook Categories to the iPhone’s Contacts app as Groups. You can then use the Contacts app to view your rolodex by Group (which is Apple’s name for Category).

Click here for more information about Outlook iPhone sync.

Carrier policies for unlocking devices

Many people will be selling their current Android or iPhone device to make room (and cash) for the new iPhone 6 and iPhone 6 Plus. An unlocked unit will earn more money on sites like Gazelle that pay cash for your old phone or in the private market.

Here are links to the Device Unlock Policy for each major US carrier.

AT&T: click here.
T-Mobile: click here.
Sprint: click here.
Verizon: click here.
O2 (UK Carrier): click here.
Virgin Mobile (USA): click here.