Unit 2, Eliburn Office Park, Livingston, EH54 6GR
+441506668613

Blog

Mear Technology help many business resolve their IT issues and focus on their business not their IT

WhatsApp Rolls-Out Emojis and Sharing Of Files Over 2GB

WhatsApp Rolls-Out Emojis and Sharing Of Files Over 2GB

Following last month’s announcement, Meta’s WhatsApp is rolling-out emojis and the ability to share files within WhatsApp up to 2GB in size.  Communities  The new features are being added as part of WhatsApp’s “vision for Communities” where the idea is to “help people have the next best thing to an in-person conversation when they want to talk to…
Read more

Apple, Google and Microsoft In Password Collaboration

Apple, Google and Microsoft In Password Collaboration

Apple, Google and Microsoft have announced that they are joining forces to support a common passwordless sign-in standard that will allow websites and apps to offer consistent, secure and easy sign-ins across devices and platforms.   The Problem With Password-Only   Relying on password-only authentication is known to present many risks and challenges such as managing multiple…
Read more

More Control To Remove Personal Data From Google Searches

More Control To Remove Personal Data From Google Searches

Google has announced that it is changing its policies to allow more types of personally identifiable information removal requests.  Personal Information Showing Up In Google Search  Google acknowledges that personally identifiable information of some users can and does show up in Google search queries. This can make users concerned, e.g. about how it could be…
Read more

What Are 'Toxic' Backlinks?

What Are ‘Toxic’ Backlinks?

In this tech insight, we look at what ‘toxic’ backlinks are, how to identify them, and how to remove them.  Backlinks Backlinks (incoming links) are believed to be one of Google’s top three ranking factors. Trustworthy backlinks from websites with a high authority score are a factor which contribute to higher search engine rankings. However,…
Read more

Tech Insight : What is Web 3.0?

Tech Insight : What is Web 3.0?

In this tech-insight, we look at what Web 3.0 is, together with its main benefits plus some concerns about it.  What Is Web 3.0?  Web3 / web3 / Web 3.0 (a term coined in 2014 by Ethereum co-founder Gavin Wood) is the next phase in the evolution of the Web. It is based on blockchain…
Read more

Microsoft's Self-Updating Emails

Microsoft’s Self-Updating Emails

As part of its roll-out of the collaborative working ‘Loop’ app, Microsoft has announced that as part of its ‘365 Roadmap’, self-updating Loop elements can now be included in Outlook emails. What Is Loop? In November 2021, Microsoft unveiled its ‘Loop’ collaborative app which it described as “a flexible canvas with portable components” designed for assisting with…
Read more

Allow pop-ups and redirects for a specific site in chrome

How to Allow Pop-Ups From a Specific Site in Chrome When Chrome blocks a pop-up from a website, it displays an icon with a red X in the corner of the Omnibox. If you suspect this is an error and want to see pop-ups from this website, click on the icon to see site-specific options, select…
Read more

How To Stop Your Smart Devices From Being Used To Spy On You

How To Stop Your Smart Devices From Being Used To Spy On You

With so many smart devices now all around us in homes and offices, we look here at ways to minimise the risk of having your privacy invaded.    The Internet of Things (IoT)    IoT devices are those devices that are now present in most offices and homes that have a connection to the Internet and are,…
Read more

Mobile Malware Surges By 500%

Tech News : Mobile Malware Surges By 500%

Proofpoint researchers have reported that, starting in early February, there has been a 500 per cent jump in mobile malware delivery attempts in Europe.  Trend  According to the researchers, this rise is in keeping with a trend that has been evident in the last few years where attackers have been increasing their attempts at smishing…
Read more

Protect a document with a password

This document shows how you can password protect a word document. If you are using this to send to a to a 3rd party we would always suggest you send the Password via a different method. For Example if you email the encrypted password to a client/customer then proved the unlock password over a phone…
Read more