Eye on 2015

Every year holds promises for new technology. Here’s what we see coming in 2015.

For Apple fans, we expect to see the Apple Watch and the iPad Pro. With the iPad model, we’re likely to go from mini to maxi. Some details are starting to leak out, including a 12” to 13” screen, which would put it into the Microsoft Surface category. Speculation includes a new processor and four speakers in the new model with a release date in early spring.

Early spring is also a rumored release time for the Apple Watch. We’ll be watching.

On the Microsoft front, we just loaded a test version of Windows 10. We’ll see how it flows and what similarities it has to Windows 8 and the things we liked in Windows 7. Rumors abound on this product, too, but we hear rumblings of a Microsoft “event” for late January. The rumor mill also points to the operating system working across all platforms, including smartphones, tablets and Xbox One consoles.

We expect a continuing trend toward more use of Microsoft Office 365. We sell it to a lot of our clients and continue to recommend it. We helped a client with Exchange cut costs from $700 to $96.

We also look for improvements to Office 365 and Outlook for the Mac. It was released on Halloween (how’s that for “trick or treat?”), and we immediately downloaded it while traveling. It has the look and feel of Office and Outlook, and while there are some differences between Windows and Mac in the way I use it, the Mac version is 1000 times better than it was. We still don’t have One-Drive for the Mac, but we’re hopeful that will come out next year.

The other tech darling of the consumer world is 4K ultra high-def TV. Flat screen TVs with 720 and 1080 resolution have gotten dirt cheap to the point that you can save a lot of space and electricity costs by junking your “tube” TV.

But if 4K TV catches on in 2015 as we expect, it’s just a matter of time until you’ll want to have it. Priming that pump will be the growth of non-cable, non-satellite content delivery technology from Amazon, Apple TV, Roku and others.

New content delivery systems are just another reminder that technology can change on a dime. So if you’re contemplating a new purchase, be sure to talk to us – especially if you’re buying technology for your office and are looking for tax-saving opportunities. If you don’t need next year’s soon-to-be latest and greatest, you can find some good pricing on this year’s technology and be eligible for applicable tax write-offs for office systems. Call – 973-433-6676 – or email to set up an appointment.

iOS 8 Family Affair

With iOS 8, Apple made great strides in helping families manage iCloud accounts and Family Share. Now, you can have separate accounts for up to six family members with parents able to control what their children buy and download.

Sharing music, apps, photos, movies and other iTunes purchases was a pain in the neck before Apple got all of its bugs out of iOS 8. We always found the biggest problems involved tracking what individuals bought in the iTunes store and then keeping adults’ and kids’ content separate. This had little to do with what’s appropriate; it was more a matter of neither wanting the other’s content.

Now, all you need to do is get iOS 8 on all devices – iPhones, iPads – and the Yosemite operating system on Apple computers. You can go to Settings on each device and enable Family Sharing and then go to iCloud settings. The set-up can be a little complicated. One person, designated as the Family Organizer, needs to go to Settings > iCloud > Set up Family Sharing… and follow the instructions, which include entering an iTunes ID and agreeing to paying for anything downloaded by the family members.

Here’s where it can get a little tricky – and there are some things we are still testing out as a family. While I am our Family Organizer, my wife and I have Approval Rights for any purchases made by our children. However, we also have it set up so that if someone – like a doting grandparent – gives them Apple gift cards, any charges for their downloaded material is drawn from their accounts before their parents pay.

We have helped a number of clients set up Apple Family Sharing, and we can help customize your set-up for your family’s needs. Just give us a call – 973-433-6676 – or send us an email for an appointment. And remember, we are available without any holiday surcharges to help you set up any electronics during this festive time of the year.

Caution is Key to Online Safety

Take a deep breath and Look Before You Click during the holiday season. More scammers, hackers and schemes abound at this time of the year, looking for holes to breach and get critical personal data. Here’s a review of our tried-and-true safety measures.

Watch your email. It’s one of the easiest pathways into your computer and all of your valuable personal data. At this time of the year, scammers and hackers take advantage of harried shoppers, who are likely balancing work and shopping and not paying full attention to all of their email.

Here are some identities a cyber-invader may assume to get inside your computer:

  • Bank or Credit Card Company
    • Do you have an account with that bank or credit card company?
    • Is it really one of their actual email addresses or domains?
    • Does your bank or credit card company normally contact you about this?

Your Best Course of Action: Close the email and go the bank’s or credit card company’s website to see if there are any alerts that match the email. If you’re still not sure it’s a fake message, get the phone number from the website and call. You can also look at a bank statement or credit card to get a customer-service phone number. Don’t click on any link in a questionable email.

  • Retailer or Shipper
    • Did you actually do business with that retailer?
    • Did you agree to use that shipper when you bought something online?
    • Are you being asked to click on a link?

Your Best Course of Action: Close the email. If you printed a hard copy of your order confirmation, you should be able to see the name of the carrier and a projected shipping date and delivery date and verify the information in the email. For protection, go to the retailer’s website and log in if you have an account. That should provide you with updated information on your order’s status. If the retailer has provided you with a shipper and a tracking number, go to the shipper’s website and enter the tracking number there. If you’re still not sure, call customer service.

  • Charitable Solicitations

Your Best Course of Action: Close the email. If it’s a charity you want to support, find its official website and give a donation there.

  • Email from a Friend in Need

Your Best Course of Action: Close the email. If you really think it’s legit, call your friend or send a new email with a different subject line. If that person is a close enough friend to send money, you should have full contact info – or know a way to get it.

When conducting business online, make sure you give your information over a secure website page. There are a couple of ways to check:

  • The website address begins with https
  • You’ll see a padlock icon in the address bar

Some other precautions to take include:

  • Buy from a large, reputable online or brick-and-mortar merchant. Generally speaking, retailers who work through Amazon or EBay have been vetted and have contact info posted online. If you’re not sure, buy from someone else.
  • Don’t send sensitive personal information by email. It’s too easy for someone to intercept it.
  • If somebody calls you about an account or purchase or charitable donation, you can ask to call that person back – and then go to a website to get a phone number you believe is trustworthy.
  • Make sure your antivirus, spyware, malware and firewall programs are up to date and running.

Above all, Look Before You Click. Make sure you understand exactly where a click will take you and what will be put on your computer. As Michael Conrad’s Sgt. Phil Esterhaus warned TV’s Hill Street Precinct police officers: “Let’s be careful out there.” And if you run into trouble, make your emergency call to us – 973-433-6676 – or send us an email.

Buy Now, Buy Smart

Now is a good time to buy a new computer. Between upcoming holiday gifts and companies making end-of-the-year purchases, there’s a lot of demand – and supply. Sellers will throw the word “bargain” around very freely and tempt you at every turn. Shop smart to get your true value.

Let’s start with the “five-year rule.” It’s nothing like the “five-second rule,” and therefore, it has nothing to do with your computer falling to the floor. (Whether your computer is still usable depends less on picking it up within five seconds than it does on how far it falls and how cushioned the floor is.)

Five years is about the length of a computer’s useful service life. After five years, your total system can be woefully out-of-date. The computer itself slows down in many cases because your hard drive has less room to write and rewrite the data in the files you use – even if you faithfully run defragging programs to manage the space. If you have an old computer, you are likely to have old software and connection ports, such as older USB, that are all too slow to support newer, faster, more robust systems. That holds true whether your computer is for business or home use.

If you have a computer approaching five years old, it really doesn’t pay to upgrade the software. Your old computer won’t have the processing power to run the software effectively, and your connection ports may not support functions such as Skype or streaming video. If you have kids who are into any of the many popular online gaming activities, such as Minecraft, they won’t be able to keep up, and they won’t be able to maximize learning experiences online.

We’re not telling you to go out and buy the fastest computer on the market. But we are telling you to consider this:

  • Figure on your computer lasting five years.
  • Give a lot of thought to how you plan to use your computer.
    • Are you just surfing the Internet and answering email?
    • Do you plan to use processing-heavy applications such as
      • Complex spreadsheets?
      • Photo editing?
      • Art and graphic design?
      • Skype or other videoconferencing?
      • Online collaboration with large files?
    • Do the applications you depend on require you to upgrade frequently?
    • Will you need speed, video and sound for streaming movies, TV and games?
    • Will you be integrating your new computer with wireless devices over a Wi-Fi network?

Once you know what you expect from your computer, you can better assess what’s on the market. You can look at whether a Windows-based or Mac system is better and whether a desktop or laptop is better. You might also want to consider one of the newer tablets that use the cloud to provide a full range of computing capabilities with the convenience of a tablet.

Nothing beats going to a few stores to try out the computers to see what feels comfortable for you. You can also ask questions, but be prepared for the possibility that the sales person may be trying to steer you to a specific brand or model or may not know any more than you. Give yourself a budget. While you may go over it or find something less expensive than you planned, a budget will give you a guideline for evaluating the apples and oranges you’ll come across.

At the same time, don’t concentrate on just the hardware. Here are key considerations:

  • If you are going to use your existing software, make sure you have your original disks and product keys. You can generally download Internet browsers, programs such as Adobe Reader and drivers for peripherals such as printers – but you can’t do it with application software.
  • Have all of your passwords for your Wi-Fi system, email, cloud storage, etc.
  • Have all of your data files – word processing, spreadsheets, presentations, pictures, etc. – backed up on a portable hard drive, the cloud or CDs and DVDs. There are systems to transfer data files from one computer to another, but you should have it all backed up anyway.
  • Be prepared to buy new software or migrate to cloud-based subscription services. Your software may be so out of date that it won’t run on a new computer.

Finally, make us your first and last stop. We can talk about what you have now, how you’d like to use your new computer system, how long you plan to keep it and how much you’d like to spend. We can help you evaluate the most viable options, and then you can go out and see some things for yourself. Then, come back to us. We can help you choose the best package for your needs, and we may be able to get you a better price.

Call us – 973-433-6676 – or email us to set up a time to talk. We want to help you find a system you can.

Armor for Your Mobile Wallet

The battle between Apple Pay and Current C is about to intensify as more shoppers start to use the mobile wallet functions in their smartphones and devices. We believe Apple Pay has better security, giving you more armor for your iPhone’s commercial capabilities.

The heavy-duty armor, as far as we are concerned, is the two-factor authentication that’s part of the Apple Pay system. The system keeps your credit card information separate from the transaction, and you need a fingerprint to complete the transaction. So, if somebody steals your iPhone, they’ll also need to cut off the finger with the print you’ve registered as your “signature.”

The banks and financial companies who back various credit cards have bought into Apple Pay, too, and it would likely behoove many merchants to go along with the idea. Banks and credit card companies are moving to the EMV (EuroPay, MasterCard, Visa) system that replaces the magnetic stripe with a chip, and they are shedding their responsibility for covering fraudulent charges. That responsibility will shift to the merchants.

The security benefits are enhanced by Apple Pay’s ease of use with Near Field Communication (NFC). A post on Tech Radar gives you a simple explanation, but we’ll simplify it a little more for those who don’t want to click through.

It’s a short-range, low power wireless link that essentially uses radio-frequency identification (RFID) technology (think EZ Pass) to transfer small amounts of data between two devices just a few inches apart. It doesn’t need any pairing code as with Bluetooth, and it’s so low-power, it doesn’t need a battery in the device being read. Tapping your phone on a contactless payment terminal in a shop, train station or coffee shop identifies your account and takes payment through the app on your phone.

Your phone’s SIM card is a smart card that identified your phone to a network, and phones besides iPhones have NFC capability.

We have some issues with one of Apple Pay’s major competitors, Current C. I don’t think it’s as easy to use, but more important, the system collects a lot of personal information, and it has been hacked. Current C, as we understand it, is linked to a consumer’s checking account, and we don’t use debit cards because of the risk associated with debit card security issues.

We also don’t like the customer-data collection aspects of Current C. It functions like a loyalty program, and we should all have the choice of deciding if we want to be part of any merchant’s loyalty program.

Finally, Current C is more cumbersome to use. You need to log in and pull up a QR code that the store reads. With Apple Pay, you just hold your phone close enough to the reader for it to read your fingerprint.

We think the finger is just scratching the surface. Because fingerprints are unique – even with identical twins – mobile wallets using the Apple Pay principles can spread to boarding passes, door locks or anything else requiring accurate identification.

What are your thoughts? Leave a comment and start a conversation. And if you have any questions about setting up an Apple Pay account on your iPhone, we’d be happy to help. A phone call – 973-433-6676 – or an email will get it started.

 

Shedding Light on the Flashlight App

A cable-based news network reported that flashlight apps on Android-based phones can steal data. It created a stir in the general and technical news media. Yes, somebody could write an app that can track some of your activity (and sell it to marketers) or could launch a virus. But there’s a bigger-picture lesson to be learned: Use common sense.

Let’s start with a few of “givens.”

First, there’s always someone out there trying to get your data and resell it – whether it’s your sensitive personal information or just some data to help a marketer target you. Ultimately, you have the responsibility to protect your data – though we can help you put systems in place.

Second, you have control over what gets installed on your device. You need to take time and care when you download and install apps to make sure they are safe and secure.

Third, if you have an iPhone or an iPad with a camera, you have no reason to download a third-party app for your flashlight. It’s been there since the release of iOS 7.

With that being said, what’s going on with the flashlight apps? You can dig into some of this yourself, starting with a report from Fast Company about the app Brightest Flash sharing location and device ID information. (Please note, most of you allow this information to be used with many other apps, such as those that provide directions while you drive somewhere.) The app’s developer was automatically sharing location and device information with advertisers and other third parties–even when users opted out. In fact, before they could accept or refuse the app’s terms, it was already collecting and sending information.

That got scaled up in a special report on a cable news channel, in which viewers were told this could be bigger than Ebola. What further rankles me is that the report on the How-To Geek website made specific references to the iPhone flashlight app, which is built into your device. It made a mountain out of a molehill.

However, the report noted: “The fact is that Android app permissions are a mess and you have very little control over what apps can do once you’ve agreed to install the application other than just trusting Google. Your best bet is to avoid installing apps that have permissions that look suspect, or only install apps from really reputable companies.”

All of this brings us back to why I like the iPhone and Apple apps. Apple may come across as control freaks, but the company vets all of its apps and app developers to give you better protection. Some device users find that restrictive; I find it comforting.

To be sure, hackers and virus writers are looking to invade Apple computers and devices, and it’s only a matter of time until they succeed often enough to create problems. For now, our advice is – as always – to look before you click and decline if you’re not sure. Also, as always, never hesitate to call us – 973-433-6676 – or email us if you have any questions about any apps you’d like to download.

Windows of Opportunity Opening for Microsoft?

Microsoft has announced Windows 10, and it can’t be coming to a computer near you soon enough if you have Windows 8. We believe Microsoft is finally on the right track with a new operating system that creates a cohesive environment across all platforms. Here’s what you can expect.

For home users, you’ll get a lot of the look and feel of Windows XP back – along with the ability to use the tiles of Windows 8 and 8.1. You will be able to upgrade to Windows 10.

Except for one business client, who had no option but to go to Windows 8 because of poor service from a previous support provider, all of our business clients are on Windows 7 – or are surviving with XP. If XP is making your business life intolerable – or difficult – you can upgrade to Windows 7 Professional, which is the version we provide.

We don’t know at this time what upgrades Microsoft will make available for Windows 7 users. We’re hoping they’ll be liberal in their policies because we believe they damaged their reputation and because we believe there are still a lot of Microsoft users out there.

Despite all you hear and read about Apple and the Mac, Windows is still the dominant operating system, but it is a fast-changing world. A lot of what you’ll see in Windows 10 is a refined version of the attempt Microsoft made with Windows 8 to better integrate with the iPhone and iPad worlds. The touchscreen capability was a big part of that strategy, and you can expect to see that continue in Windows-based tablets and phones. We believe many laptop users will migrate toward lighter-weight tablets as they make more use of the cloud and as habits change over time.

Accounting for the timing of habit changes is one reason for Microsoft to upgrade its OS so quickly. A vast majority of business users – as well as many home users – could not easily adapt to the tiles and the lack of the “start” button in the lower left corner of the screen. Windows 10 will restore the “start” button and other familiar navigation cues, and it will help Microsoft integrate with the “swipe” capabilities of device touchscreens. A lot of PC users have iPhones and iPads, but businesses have been reluctant to change complete office systems, and home users have been cost-sensitive. The argument that Macs are virus-free has lost steam as their infection rate has increased.

However, we caution you not to expect to be up and running immediately. Microsoft still needs to work out the bugs that plague any new system. As it stabilizes, we’ll start testing it and begin to formulate our recommendations.

In the meantime, we believe the new OS will be part of other upgrades from Microsoft. These could include a new version of Office – especially Office 365, which we continue to recommend – to remain up to date with software changes and changes in the way the world does business.

We hope Microsoft will push out a new Office for the Mac world, especially with the coming of Yosemite, Apple’s new OS for the Mac. Otherwise, Mac users could migrate to Pages, Keynote and Numbers, the Mac’s version of Word, PowerPoint and Excel. We usually see leaked images of changes such as this, and the rumor mill is churning. In addition to Yosemite, we expect to see a new iPad and the official rollout of Apple Pay.

With so many changes coming and so many possibilities, it’s critical to make sure you plan your technology acquisitions with great care. We can help you plan and budget for your business and home needs and help you phase in and integrate the systems you need to make business and home life efficient. Call us at 973-433-6676 or email us for answers to your questions or to set up an appointment to discuss your needs.

 

New iPhone Worth the All-Nighter

As you know, we waited on line all night at our local UPS depot to claim our new iPhone 6+ at 7:30 in the morning. Now that we’ve had the chance to use our new phone, we’re happy to say it was worth the effort to get it as soon as humanly possible. Here’s our report.

We like the new phone and the new iOS 8 features, especially the My Health app. We believe it can be a life saver. When you set up the data, it asks for your date of birth, blood type and other information about your medical condition as well as people to call in the case of an emergency. Anyone can use your phone without unlocking the screen to make an emergency call on your behalf, and whoever receives the call will have all of that vital information. You’ll also have your information handy whenever you visit a healthcare provider.

We also like the iPhone 6’s capability that allows you to add widgets to your home screen, and we’re anticipating Apple Pay’s rollout.

While many people will claim that Android phones have had these new iPhone capabilities, iPhone remains the dominant device in the cellular world. Most people who traded iPhones for Android phones did so because of the screen size. Apple addressed that marketplace demand, and the company sold 10 million phones in one weekend – and that’s without the Chinese market. The new phones will be released there Oct. 17, and two million reservations were made in the first hour they were made available.

The major bug we found right away was synching the Bluetooth capability with our car. The system dropped a lot of calls, and that is a pain. We’re confident Apple will fix this problem and the others that are sure to pop up as more new iPhones are in the field.

And now for a word of caution: As we continue to make more use of smartphones and devices, we’re loading more and more sensitive information on them. It’s more important than ever to protect that data because device hacking is on the rise. Just as with your computer, if you start to see a lot of new error messages or pop-ups, it could be a sign that something is happening.

Here are some safeguards you can take for all devices and computers:

  • Be very, very careful on public Wi-Fi networks. Don’t do any online banking, for example, or any other activities that involve sensitive information with passwords.
  • Make sure firewalls are in place.
  • Download and install reputable anti-virus, malware and spyware software
  • If you have a computer on a Wi-Fi network, disconnect it from the network when you’re not using it

While we are getting into our new iPhones and all of our new connectivity possibilities, we’re still keeping any eye on the horizon for new phones from Samsung and the major Android-powered devices. And, we’re also starting to think – just a little bit – about an iPhone 7. If there’s one thing we’ve all learned about technology, it gets better and – in terms of performance for the money you spend – cheaper.

We can help you decide on your next device purchase and help you get it set up and integrated with your existing technology. We’re a phone call away at 973-433-6676, and you can email us to set up a time to talk.

 

Diversify Your Data Backup

Two new clients came to us after experiencing data backup failures. While no single backup solution is guaranteed to work all the time, the odds are highly against every backup system failing at the same time. The best solution, in a word, is “diversification.” If you choose carefully, you can get the right backup systems for what you need to store and save yourself some money, too.

You have many options to backup and restore pictures, videos and other types of data files, but let’s look at three broad categories: the cloud, external drives and media such as DVDs and thumb drives. If you are highly concerned about the safety and recovery of your data, you can pick a system in each category and feel confident you can always get your data. If all systems fail, chances are your data will be a minor worry.

The cloud, otherwise known as a system of large, remote and redundant servers and storage facilities, is the foundation of most data backup and recovery systems. We now work with multiple cloud-based storage and recovery providers, giving you the ability to implement a system that meets your volume, data-sensitivity and pricing parameters. Despite the iCloud invasions, cloud-based systems remain safe places for your data, and for a relatively low cost, you can rest assured you can protect your data and get files whenever and wherever you need them.

External hard drives come in a variety of sizes and speeds. Home and SOHO users can buy them in sizes from 500 GB to 3 TB and connect them through USB 2.0 and 3.0 ports for up to a few hundred dollars. You can cross the $1,000 mark and get 12-to-20 TB units, but for most of you, that’s probably overkill. If you really want to protect your data, you should consider having multiple external hard drives to cover a unit failure, and you could keep external drives at another location and swap them on a regular basis. It all depends on what’s right for you.

External hard drives are essential add-ons for data-intensive applications. A client with a video editing business found this out soon after buying a new computer and running out of space shortly thereafter. In this case, the external drive provides easily accessible storage for files of work in progress, and it gives the computer’s hard drive room to do all the manipulation required for video editng.

Mac users have access to Time Machine, the built-in backup feature of OS X that works with your Mac and an external drive (sold separately) or AirPort Time Capsule. Time Machine automatically backs up your entire Mac and remembers how your system looked on any given day. It keeps hourly backups for the past 24 hours, daily backups for the past month, and weekly backups until your backup drive is full.

Saving files to DVDs and thumb drives is inexpensive and relatively quick and easy to do. You can easily make multiple copies, and you can easily store them in multiple locations. We generally advise relying on them as a supplemental backup for important files.

Selecting your backup system or combination of systems is like buying insurance. The more you value your data, the more you’ll want to increase and diversify your backup capacity. And just as there is an insurance program that meets your economics and tolerance for risk, there’s a backup system that will work for you. Talk to us about your needs, and we’ll find the solution that best matches them. Call – 973-433-6676 – or email to start the process.

Security and Convenience

Major retailers have been vulnerable to security breaches because we want convenience. New credit card systems that rely on chips instead of magnetic strips will help solve the security issue and so will Apple’s new ApplePay, which uses NFC (Near Field Communications) technology.

There won’t be any need to open an app or even wake your display because of the combination of NFC and the antenna in iPhone 6. To pay, just hold your iPhone near the contactless reader with your finger on Touch ID. You don’t even have to look at the screen to know your payment information was successfully sent. A subtle vibration and beep lets you know.

Instead of using your actual credit and debit card numbers the system assigns a unique Device Account Number that is encrypted and securely stored in the Secure Element, a dedicated chip in iPhone. These numbers are never stored on Apple servers. When you make a purchase, the Device Account Number, along with a transaction-specific dynamic security code, is used to process your payment. So your actual credit or debit card numbers are never shared by Apple with merchants or transmitted with payment.

If your iPhone is ever lost or stolen, you can use Find My iPhone to quickly put your device in Lost Mode so nothing is accessible, or you can wipe your iPhone clean completely.

This is a major step toward convenience and security. Another step will be the replacement of that magnetic strip on your credit with chip technology already in use in most of the world. Again, it will separate your credit and debit card info from the info stored by retailers.

Retailers’ storage of your transactions and credit and debit card info has given you the convenience of being able to return merchandise without a receipt. It also presented a plump, juicy target for hackers. Banks, which bear the liability of covering the cost of fraud, are behind efforts to speed up the conversion to this new technology. Their goal, of course, is to minimize their risk, and they’ll minimize ours, too.

New credit and debit cards will be better for those of us who still carry them around in our wallets. Apple Pay and evolving technologies will help us get rid of our wallets all together – and probably our keys, too.

Millennials are driving device technology. They don’t like to bother with carrying wallets and keys and anything else they deem bulky. The changes are likely to trickle down to the rest of us, especially as we find them to be secure and convenient.

While the new technology looks great, there are other steps you can take now to protect your data. We’ve discussed these measures before:

  • Strengthen your password. The greater the combination you can use of upper and lower case letters, numbers and special characters, the longer it will take for hackers to crack your password.
  • Use two-factor authentication for Internet access to your data. It’s a second password, a reference to a graphic symbol or an answer to a question. Dropbox now offers it, and you can click here to learn more.
  • Look before you click. Use common sense when clicking on websites or opening attachments to email. If something doesn’t look right or feel right, leave it alone.
  • Make sure your protection is up to date and running. Anti-virus programs, malware programs and firewalls for home and office systems can prevent unwanted problems and intrusions. Make sure you have all systems up to date and turned on.

Now you can buy your new iPhone 6 or 6+ and enjoy the benefits of Apple Pay and NFC – whenever the technology is activated, most likely in October.

What your thoughts on this? How willing are you to embrace this new technology? Share your thoughts with us. And if you have any questions about buying an iPhone 6 or 6+ or any other phone, tablet or computer and getting them all to work together, drop us an email or give us a call at 973-433-6676.