Blog

July 31st, 2014

AndroidPhone_July28_CAndroid phones are currently the most popular devices being sold by many carriers. While these devices are popular, many come preinstalled with apps that have been developed by the carrier. This apps are often referred to as bloatware and are usually ignored by users. However, if you have ever tried to uninstall them, you know this is easier said than done. The good news is that there is a solution.

Bloatware defined

Read Android themed blogs and you will eventually come across this term. When it is used to refer to mobile phones, bloatware is software that has been installed by carriers or device manufacturers. These apps are generally useless, unwanted, or are value-added apps - meaning apps which you need to pay extra for in order to use e.g., a music service run by your carrier.

The kicker with bloatware is that you don't get a choice as to whether or not it is installed on your phone. The reason for this is because carriers and manufacturers install the apps before you purchase the phone. Many carriers have contracts with manufacturers to actually install the software before the device leaves the factory.

Is bloatware bad?

Mobile bloatware often gets a bad rap, especially because much of it is unwanted by users. That doesn't mean the apps are 'bad', or malicious. In fact, some users do actually use the software that comes installed by mobile carriers. The issue many have is that they have had no say in the matter and as a result feel forced into using certain apps, when they would rather be using something else, or would never have downloaded these apps in the first place.

In short, the vast majority of bloatware is not overly useful but it is by no means malicious. It's really more of an annoyance to many users.

Can I get rid of bloatware?

The short answer to this question is: No, you usually can't get rid of bloatware. Some of it can be uninstalled, but most of the apps installed by the carrier or manufacturer aren't able to be deleted.

That being said, there are two options you can consider:

1. Disable bloatware on your device

While you usually can't uninstall bloatware, phones running Android 4.X and newer do have the option of disabling it.
  1. Open your device's Settings panel. This is usually done by sliding down from the top of the screen and selecting the person icon with five squares followed by Settings.
  2. Tap on Apps and swiping right so All is highlighted at the top.
  3. Scroll to the app you would like to disable and tap on it.
  4. Press Disable.
  5. Tap Ok in the warning that opens.
  6. Once you do this, the app will be removed from the home screen and will no longer run in the background.

2. Purchase devices without bloatware

If you are currently looking for a new device, or are looking to upgrade your current phone, an option would be to purchase a device that doesn't have bloatware. For example, most phones you purchase separately from your carrier won't have carrier specific bloatware. Take for example Nexus devices. These phones, when bought outright, only have stock Google apps like Calendar, Gmail, Chrome, and Google Play store installed. Of course, if you buy the device from your carrier, there is a good chance it will have the apps on them. So it is best to look at the big-box stores or retailers.

If you are unsure as to whether the device you are looking at has bloatware installed, try asking the salesperson or looking at online reviews. As a general rule of thumb: If you buy the device from a carrier, or on a contract, the device will have some bloatware on it - most carriers have a stipulation on the agreement you sign giving them permission to install it, or noting that it is installed. When you sign the contract you thereby agree to have the apps on your device.

The major downside to buying devices like this for some users is that you have to pay full price for the device. For some this is worth it, while others are ok with the odd bit of bloatware if they get to pay less for their device.

Looking to learn more about Android phones? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 30th, 2014

SocialMedia_July28_CA common use of LinkedIn is the curation and sharing of content with fellow colleagues and users. The business oriented social platform has a wide variety of features that encourage users to share content, and earlier this year its own content creation platform was implemented for select users. Now, the company has rolled out the new publishing platform for all users to take advantage of.

About LinkedIn's new publishing platform

Like other social networks, LinkedIn allows users to publish posts on their profile which are then visible to other users. In the past, there was a limit as to how long the posts could be, which influenced how users shared the content they generated. Most would simply copy and paste a link to their content into a post on their LinkedIn profile.

In an effort to make sharing thoughts, ideas, expertise, etc. easier, LinkedIn has implemented the long-form post. This feature allows you to create longer content, such as blog articles and opinion pieces, and post this directly on LinkedIn. In other words, you can now use LinkedIn as a blog which is shared with your connections.

If you create long-form content, this could be a useful way to get posts out to an even wider audience than through your blog. This is because when you publish a post on LinkedIn, it becomes part of your overall profile, with the post being visible under the Posts section of your profile. New long-form posts will also be published and shared with all of your contacts automatically.

This means that you could technically increase the overall reach of your content, especially if the content you produce is useful to your LinkedIn connections.

Writing long-form content on LinkedIn

If you would like to start publishing long-form content using your LinkedIn profile, you should be able to do so by:
  1. Logging into your LinkedIn profile.
  2. Pressing the pencil in the box that says Share an update…
Note: This update is still rolling out to users, so you may not be able to produce long-form content just yet. If you don't see the pencil in the Share an update… box, you will need to wait for a few weeks, or until you get an email from LinkedIn saying the feature is ready for you to use.

If you do see the pencil icon, click on it to open the long-form post screen. It looks like most other Web-based publishing and writing platforms with the usual formatting buttons and text field where you input the content.

You can write your article directly on this page, but many choose to write using a program they are comfortable with and then copy and paste into the text field. If you want to add images to your post, you can simply click where you would like the image to slot into the content and select the camera icon from the menu bar above the text field. Select the image and hit Submit. You can then resize the image by clicking and dragging on it.

Saving and editing your content

Once you have finished writing we strongly recommend you hit the Save button at the bottom of the text field. This will save the content to your profile, but will not post it. This means you can edit the content before publishing. To do this, click on Preview which will open your post in another window, allowing you to see what the post will look like on your profile.

While in Preview mode, be sure to check the spelling and grammar, along with the overall formatting. If you spot anything that needs to be changed simply switch back to the editing tab on your browser and make any amendments.

When you have finished writing, formatting, and editing you can then hit the Publish button. This will then publish the content on your profile and share it with your connections.

If you have content that you think your connections and colleagues would benefit from reading, then this new LinkedIn feature could prove to be useful and should be considered as a larger part of your overall content strategy.

Looking to learn more about LinkedIn and how you can leverage it in your business? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
July 25th, 2014

VoIP_July21_CModern business communication platforms are more often than not migrating to digital solutions that are supported by an Internet connection. When looking at different solutions, many businesses come across two major solutions: VoIP and Unified Communications. The problem is, both of these can cause some confusion, especially because the idea behind both sounds so similar.

What is VoIP?

VoIP, or Voice over Internet Protocol, is a modern communication method that enables voice communication over a business's network connection. With many VoIP solutions you are able to use the same phones you do on traditional networks. You just need a small adapter that turns your voice into a digital signature that travels on top of data on your network.

VoIP is common these days because many businesses have high bandwidth Internet connections that can support it, and many solutions offer considerable cost savings compared to traditional phone lines.

What is Unified Communications?

The other main modern communication solution many business owners come across is Unified Communications (UC). This is a group of modern real-time and non-real-time communication services that provide businesses with a consistent user-interface and experience across multiple devices and platforms.

Many UC solutions include:

  • Internet telephony (VoIP)
  • Instant messaging
  • Video conferencing
  • Screen sharing
  • Call control
  • Speech recognition
  • Email
  • Voicemail
  • SMS
These solutions are often delivered via a number of programs that can be combined to look the same and interact with other systems.

One of the best examples of UC in use is the idea of a customer calling to ask a question about one of your products. They unfortunately call after business hours and decide to leave a voicemail message. After they hang up, software that powers the phone system translates the message into digital form and emails it to your marketing team. Your marketing manager receives the message, in email form, on their mobile device and is then able to call the client back.

This scenario likely happens using three different systems - voicemail, email, and VoIP - and three different programs. The thing is, these programs are all 'unified', so they work as one unit.

What's the difference between the two?

The biggest difference between the two communication concepts is the scope. Many VoIP solutions focus just on Internet-based calling, while UC focuses on company-wide communication. More times than not, the voice part of UC is powered by a VoIP platform.

That being said, many VoIP solutions offer some form of UC features like voicemail, instant messaging, and video calls.

Which option is best for my business?

This is a question businesses often ask us, and the answer is that it really depends on your company and your current situation. If you already have a traditional phone system in place in your office, and are looking just to cut your phone bills then a VoIP solution may be the best solution.

One of the biggest downsides of a UC solution is that it can require a fairly large investment; certainly larger than VoIP. If your business is operating on narrow margins you probably won't be able to implement a full UC solution all at once, instead having to implement it in steps.

Our best recommendation is that before you consider either, give us a call to learn more our solutions and how we can help your business get the right type of communication that will work for your business and budget.

Published with permission from TechAdvisory.org. Source.

Topic VoIP General
July 16th, 2014

AndroidTablet_July14_COne of the biggest business trends is the idea of going mobile. With the heavy adoption of devices like Android tablets, business owners are able to connect with the office from nearly anywhere. This is great news and one of the mains reasons why so many businesses are thinking about adopting Android tablets at work. For those who are, here is a brief guide on some dos and don'ts for Android in the office.

Do:

  • Use separate profiles - Tablets that use newer versions of Android (4.3 and newer) have a unique feature that is incredibly useful for business users: You can set up more than one account on the device. This means you can have a personal account and a work account on the same device without the two crossing over. Each account has their own apps and layout, which makes it perfect for the BYOD crowd.
  • Pick responsibly - Android tablets come in all shapes and sizes, and with different versions of the operating system. It is therefore a good idea to do some research before you buy one for your business. Take the time to try and identify what you will be using the device for, what features you would like, and most importantly, if the device is compatible with your existing systems. We strongly recommend going with one of the big name brands like Samsung, LG or Acer, or the Nexus line.
  • Develop a usage and management plan - Before you implement the device into your office, be sure to develop a plan on how the device is to be used and managed. Will each employee be in charge of managing their own device, or will your IT partner manage them for you? Be sure to also develop a list of approved apps, including important ones like email and messaging; and that users are familiar with how to use them.
  • Look into accessories - One common factor many businesses forget to look into when implementing Android devices is the numerous accessories available for tablets. In order to extend the life of the devices it is a good idea to get protective cases and screen covers. Also, look and see if the device you have chosen has a removable battery or SD card. If it does, you may want to invest in extra batteries and cards.

Don't

  • Skimp on security - As Android tablets become more popular, the devices are seeing an increase in malicious attacks. It would therefore a good idea to implement mandatory security measures on all devices. This includes an antivirus scanner and daily check for app updates. Also be sure to educate the staff who will be using the device on common security issues, such as how to spot fake apps, use an antivirus scanner, and how to enable secure browsing on the Web.
  • Allow third party app stores - Because of the openness of Android, you can install apps from almost any location. This has resulted in many third-party app stores (stores not run by Google) popping up. Some of these stores host any kind of app, including ones that contain malware. So, it is a good idea to just outright ban these stores; only allowing apps from Google Play to be installed on devices.
  • Force the tablet on users - Some employees won't want a tablet, preferring instead to stick with their laptop or desktop. Don't force your employees to adopt the device if you know they won't use it. This will just lead to you wasting your tech budget and to unused devices.
  • Worry about fragmentation - Yes, Android is very fragmented - devices are running different versions of Android. While this may seem like a big deal, it doesn't have to be. We recommend that when selecting tablets, pick a newer version of Android and purchase tablets using the same version. Once you get used to the tablet, the issue of fragmentation will usually disappear, especially if everyone is on the same version.
If you are looking for help selecting and managing an Android device for your office, contact us today to learn about how our services can help.
Published with permission from TechAdvisory.org. Source.

July 10th, 2014

Security_July07_CA common issue many businesses face, regardless of their size, is that their computer systems and devices get progressively older and slower, unless they are constantly updated. This can frustrate some employees who may have up-to-date personal devices, so much so that they simply start to bring these devices into the office. The idea of BYOD, or Bring Your Own Device, is not all that new, but it is a growing concern and if it's not handled properly it can pose a security risk.

What should I do about BYOD?

The first reaction of many office managers and business owners, worried about security threats that could stem from BYOD, is to impose an outright ban of devices. While telling your staff they are not to use their devices for work may seem like a quick and easy solution, you can be 100% sure that there will be employees who ignore this policy and use their personal devices for work regardless.

This could put your business at a higher security risk if the rule is ignored, especially if you don't implement any security measures to protect your networks and data. In order to minimize the potential threats BYOD can expose your business to, we suggest you do the following:

1. Consider embracing BYOD

Instead of simply banning personal devices in the workplace take a step back and look to see if there are any benefits BYOD can offer. For example, if you operate on razor thin margins and have not replaced hardware in years, there is a good chance your employees will have better systems at hand. This could help you reduce your overall tech costs.

The same goes for phones for your employees. Why not offer to pay for the plan and allow employees to use their own devices? Of course, you are going to want to implement security measures and usage rules, but if this is easily achieved then it may help reduce your overall operating costs. Before you do implement a system like this however, we strongly recommend you read the rest of this article and follow the steps below.

2. Set up separate networks for employee devices

Oftentimes, the main reason employees bring their devices to the office and use them for work purposes, especially when it comes to mobile phones, is because they can happily connect to Wi-Fi for free without using their data plans throughout the day.

Chances are high that because they use the work Wi-Fi on their device for non-work tasks, they simply keep using the device when they are doing work related activities. This could pose a security risk, especially if you run business-critical operations on the same network. You could nip this potential problem in the bud and simply install another Wi-Fi network for mobile devices and non-critical business processes.

It is usually quite affordable to simply purchase another line and the networking equipment to support this, not to mention the fact that it will keep business-critical processes secure from errant malware. As an added bonus, you will likely see increased productivity because the bandwidth demand will be limited, so important data will move quicker.

3. Educate your staff about security

In our experience, the vast majority of BYOD related security risks are exposed by mistake. An employee may have a virus on a personal phone and be unaware of it. When they connect to the network it can then be unintentionally spread to other computers resulting in a potentially massive security breach.

One of the simplest ways to prevent this is to educate your employees about proper mobile safety. This includes how to spot apps that could contain malware, sharing security threat updates, and teaching your employees how to secure their devices. You really need to stress just how important security is to them.

On top of this, contact an IT expert like us for a recommended anti-virus and spyware scanner for mobile devices that users can easily install. Encourage employees to not just install this but to keep it up to date too. Many of these mobile specific scanners are free and just as powerful as desktop versions.

4. Work with an IT partner to establish a solution that works for you

Beyond education and simple network establishment, it is a great idea to work with an IT partner like us. As experts, we keep tabs on the trends and solutions related to BYOD and will work with you to establish a program that works for your company.

It may be that you don't actually need to integrate BYOD but to update hardware or software to newer versions instead. It could be that there is a simple solution to employees feeling frustrated with slow performance of existing systems at work.

If you do implement BYOD, we can help establish security measures and policies that will ensure your networks and employee devices are secure. The best advice we can give however, is to do this before you start allowing BYOD, as it can be far more challenging to implement and enforce changes when employees are already using their devices at work.

Looking to learn more? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 3rd, 2014

AndroidTablet_June30_CAndroid, Google's mobile operating system, is one of the most popular mobile systems out there. Each year, at Google's annual I/O conference, it is expected that the company introduces the next version of Android, and at this year's conference held on June 25 and 26, the company didn't disappoint, announcing a new version of Android that will bring about some big changes.

Coming soon: A new version of Android

It's true that you can pretty much guarantee a new version of Android to be announced at I/O. This year, Google was true to form and spent the better part of the whole keynote speech talking about the upcoming changes expected with the next version of Android - Android L. Why Android L? Well, the latest version of Android to date is 4.4, codenamed: KitKat. It makes sense that the next big release of Android will start with the letter L. At this time however, it has not been assigned a dessert related name like the other versions of Android because it is still in development.

Names aside, there were a number of interesting changes talked about by the Google staff. Here are five that business users of Android devices will be interested to know about.

1. Material design - A drastic change to the UI

Practically one of the first things talked about, regarding Android L at least, was a newly designed UI or User Interface. In fact, when released, this will be the biggest change to the look of Android since the Ice Cream Sandwich update in 2011. Powering this change will be a new look Google calls material design.

Material design creates a drastically different look from existing versions of Android. This will bring a flatter design with lots of rounded elements and softer edges that will extend to all versions of Android - tablets, phones, Chromebooks, and even Google's apps themselves. From this, it appears that Google wants to extend Android to other devices and it will do so by implementing a card-based design. These cards will play a front-and-center role with Android L, and according to Google they will be able to scale to meet screen size and dimensions. This means that one app will be able to work on different devices, without the need for a specific tablet, or phone version.

From the demo of material design that Google played, the new UI looks great. It looks clean, modern, and more colorful than ever before. If you are wondering what this design will look like when it comes to apps, take a look at the latest version of the Google+ app for Android, it has already been switched over to reflect the upcoming new style from Google. Or, check out this YouTube video from Google that highlights what the material design UI will look like.

The company also showcased a number of new changes to the UI that will make Android even easier to use. One of the biggest was how the apps interacted. Using the new version, the presenter searched for a restaurant and one of the search results was to an app installed on the phone. Tapping on it opened the app, without you having to close the results, to be able to then search for the restaurant. Overall, this will be a big change in the way Android looks and interacts with other apps.

2. Improved notifications

While a drastic change to the UI is pretty big news, Google wasn't content to just redesign the look of Android. They also showcased an improved notifications function. In current versions of Android, you need to unlock your device and swipe down from the top of the screen to view your notifications which are displayed in chronological order.

In Android L, your notifications will be viewable, and actionable from your locked screen. For example, if you get a new SMS, you can read it directly from your phone's screen, without having to unlock the device and open the relevant app or notifications center.

The other big change will be to how your notifications are displayed. Google is going to take a different approach to this and instead of showing these chronologically, it will display notifications sorted by relevance and importance.

Finally, Google will fix one of the biggest annoyances with Android - if you are working in an app, say giving a presentation, and you receive a call your device will no longer close the presentation and open the phone dialer. Instead, it will show what Google calls a 'Heads Up Notification'. This is a small notice displayed on top of the app that you currently have opened. In the example shown, a game was being played when someone called. Instead of the game closing, you saw the call info hover on top of the app. You could answer, hang up or even send a quick auto-reply SMS (e.g., I am busy, will call you back later) without the current app being closed.

3. Trusted environments

Having a screen lock on your device, such as a pattern or number lock, is essential for all users. This is one of the best ways to ensure that others can't physically access your device and the data within. While screen locks are a security must, there are times when they are more of an inconvenience than anything.

Take for example during a presentation. If you are using your Android device to show a slideshow, and pause for a time on one slide, long enough for your phone's screen to switch off, it is a hassle to unlock the screen and reopen the app.

Google's fix for this is a feature which establishes a trusted environment or device e.g., an Android smartwatch or your Office Wi-Fi. When you are in range of the watch, or the Wi-Fi connection, your device will automatically be unlocked and accessible without having to enter your PIN or code.

Move out of range however, and your device will lock, requiring the PIN or swipe code to unlock. This could be a useful feature for many businesses, especially those who use Android devices on a regular basis.

4. Deeper ties with Chrome and the Web

Many Android users utilize the recent app button on a regular basis. With one tap of the button, usually located on the bottom right of your device, or by pressing the home button, you can open previous apps. With the introduction of Android L, this will also show tabs that you have open in Chrome. This could be useful, especially if you use Chrome on your desktop and want to quickly access the same page on your device.

5. Business oriented APIs

The API, or application programming interface, is an essential part of the mobile device. It is the API that specifies how different apps should work together. With Android L, Google will include some business oriented APIs, with the most important being a set that allows both personal and business data to exist on the same device, without being mixed. In other words, you will be able to use a personal device for work, likely without mixing accounts, something which the BYOD crowd should find incredibly useful.

When can we expect Android L to arrive?

As of the writing of this article, there is no set release date for Android L. During the keynote numerous mentions were made of it being released sometime in the fall. Bear in mind that this is for Nexus, Google Play, and likely new devices released just after Android L. When, or if, it will be made available for other users is unknown, but likely won't be until early next year.

In the meantime, keep reading our blog for updates. And, if you have any questions regarding Android in your business please give us a shout today.

Published with permission from TechAdvisory.org. Source.

July 3rd, 2014

AndroidPhone_June30_CAndroid devices are one of the most popular business tools, largely because of the increasing number of business oriented apps being released. Earlier this year, Google released standalone versions of their office productivity apps, but one - Slides - was missing. Google said they would release it at a later date, and this June they did exactly that.

What exactly is the Google Slides app? I thought it was part of Google Drive...

As many who use Google Apps know, productivity apps like Slides, Docs, and Sheets are part of Google's cloud storage app - Drive. If you have used the Drive app on your phone or tablet, you likely also know that you can create, edit, and share documents via this app.

This development is an effort to extend the capabilities of Drive, while simultaneously making it easier for users to access their individual files. For example, if you are a heavy user of Slides it can be a little annoying and time consuming to open the Drive app, search for the file you want, open it, and start editing. Now, if you have the app installed you can open it for immediate access to your related files, in this case Slides.

The key here is to think of the Slides app as a branch of the Google Drive App, as all of your files are still linked to Drive. Create a presentation using the Slides app and it will show up automatically on Google Drive as well as in the app. This app has all the same features as the Drive version, it is just that the app has been specifically written for mobile devices and designed for ease of use.

What can I do with this app?

As we stated above, the main focus of the Slides app is to allow you to create and edit presentations from your Android device. As such, there are a number of useful features:
  • The ability to create and edit presentations offline. As long as you have accessed a Slides presentation while online, it will be made available for you to open and edit offline as well. You can also save individual presentations to your device's hard drive and have the file updated when the presentation is.
  • Advanced sharing features. You are able to share your presentation from a mobile device and have users on their devices or computers collaborate on the same file.
  • Automatic saving of presentations created and edited on the Web. As long as you have an Internet connection, changes made to files via the app will be synced with Google Drive and reflect on all versions of the presentation. If you are offline, the changes will sync when you are next online.
  • The ability to open, edit, and save Microsoft PowerPoint presentations directly from the app. This is a big feature, largely due to the fact that many businesses use PowerPoint instead of Slides. What this means for you is that you can view these files without PowerPoint installed on your device.
  • Full editing capabilities. You are able to create slides, add text, edit slide order and the overall format of your text and slides.
  • Present directly from your device. You can run presentations on your device or connect to a projector using adapters that can usually be purchased for your device.

Where can I find the Slides app?

This app is available now on Google Play. To install it you can:
  1. Open the Google Play app on your device.
  2. Press the magnifying glass and type in Google Slides.
  3. Tap on the app and select Install.
  4. Open the app when it has been installed.
When you open the app, you should see all of your slides related to your Google account pop up in the app.

If you are looking to learn more about Google's apps on your Android device contact us today to see how we can help ensure that you get the apps your business needs most.

Published with permission from TechAdvisory.org. Source.

July 2nd, 2014

SocialMedia_June30_CFor many businesses, social media is becoming not only relevant but an important element of overall operations. For business owners, managers, and employees one of the most valuable networks is the business oriented LinkedIn. This network encourages business friendly activities like networking and idea sharing, and is seeing ongoing growth as more business owners and managers continue to join. Like all networks, your profile is key to your success and the question then is how to go about creating a great profile.

In this article we will go over eight important steps you need to take in order to build the perfect LinkedIn profile. In fact, we came across a great infographic on Link Humans that could be a big help when following these steps. We strongly suggest you take a look at this when building your profile.

Step 1: Establish your profile

While you don't have to join LinkedIn, it is a good idea if you are looking to connect with other business owners and colleagues through a more professional, business style networking oriented social network. If you do want to connect at this level, the absolute first thing you need to do is to create a profile. This can be done by:
  1. Going to LinkedIn's website (linkedin.com).
  2. Clicking on Join Today.
  3. Entering the relevant information on the following page. We recommend using the name the majority of your customers and clients know you by and your work email address. Personal email addresses are fine if you don't want to fully represent your company.
  4. Selecting Join LinkedIn.
If you use your Facebook account for business, you can also sign up using your Facebook account. Just follow steps 1. and 2. above and click Sign Up with Facebook. You will be asked to log into your account (if don't already have Facebook open in another tab on your browser) then approve the account access rights. Once you've done this you should see your basic profile pop up.

Step 2: Select an appropriate picture

LinkedIn is a work-related network, and to that end you will need to present the right corporate image; this means uploading a professional profile photo. This image should clearly show your face and be cropped to show mainly your head and upper body. The background should be clear or unobtrusive, allowing you to be the main focus.

If you don't have any professional head shots, it might be a good idea to get some taken. Most photographers can snap a few for you, and will be able to provide you with information about how to pose and dress for the shots.

You can add an image to your profile by:

  1. Logging into your profile.
  2. Hovering over Profile which is located in the menu bar at the top of the screen.
  3. Clicking on Edit Profile followed by the camera icon at the top of your profile.
  4. Pressing Change photo and then selecting the image you would like to use as your profile picture from a file on your hard drive.
  5. Ticking Save to set your picture.
The reason a good picture is more important than on other networks is because it has been proven that profiles with professional looking pictures are easier to find and also enhance the potential that other members will want to connect or even recognize you.

Step 3: Fill in your basic information

Once you have a great picture set on your profile go back to the editing screen and add your basic information. This includes your name, role, location, and company. Also, click on the Edit Contact Info tab to the right-hand side of your basic information section. Add as much contact info as you feel comfortable with; we recommend your email address and company website at the very least.

Step 4: Determine who your main audience will be

Before you begin to fill in your profile, you should take time to determine what the purpose of this profile will be. Will it be used to find new colleagues? Or will it be used to connect and communicate with your colleagues? Or, will it used to find prospective clients? Each reason will determine what information you should include in your profile along with the relevant keywords.

For example, if you would like to find new employees you can tailor your profile to show what you do in your job and what makes it so great. You can then also come up with more relevant keywords to use in your content. For example, using the words 'career' and 'job' and including in your summary information about who you are looking for will definitely attract prospective hires. However, this profile likely won't attract colleagues or clients.

Don't feel that you have to limit yourself to one set function however. For example, there are many crossover terms that both clients and prospective employees will search for. So, if you want to use your LinkedIn profile for more than one reason, take some extra time and try to figure out which keywords and ideas you think will work well. The great thing about LinkedIn is that you can always edit everything at any time. So, if you want to switch your audience, you can easily do so by simply editing parts of your profile and changing keywords.

Step 5: Write a solid summary

The summary of your LinkedIn profile is a place where you highlight who you are. Take time to craft this so that you can showcase what you do and your main strengths. Be sure to use relevant industry and position specific keywords and terminology that you believe your audience will be searching for, as this language will make your profile easier to find in searches.

The key here is to write a summary that not only explains what you do and your experience, but showcases who you are. Use active language like 'I', 'my', and 'me', and be sure to include a way for people who don't have a LinkedIn profile to contact you - usually an email, link to your website or a phone number.

Step 6: Add your past and present positions

Once your summary is finished, you should move onto your current and past positions. This section should reflect your resume and highlight the experience you are talking about in your summary. It would be helpful to try and work in some of the keywords you used in the summary or identified earlier in order to really make your experience really stand out.

Chances are you aren't looking for work, so you can deviate a little from your resume here, and highlight what you do best, or how you can help your audience best. Feel free to leave out points that may not be 100% relevant or interesting e.g., how many people you manage, sales goals, etc.

Step 7: Start connecting

Once your profile is mostly complete with experience and a summary, you can start looking for people to connect with. Start by searching for people that you know or work with on a regular basis and inviting them to connect.

Next, join a few groups that are related to your position and industry. These can be found by hovering your mouse over Interests which is located in the menu bar near the top of the window. Select Groups from the menu that drops down and then select Find a group from the right-hand side of the page that opens. Some groups are private and will require you to ask to join them, but don't be afraid of sending in your request.

Once you have joined some groups and started to make connections be sure to be active on the network. It will help to join in on conversations held in your groups and post content on a regular basis. And, if you meet new clients or people don't be afraid of looking them up on LinkedIn and asking to connect with them!

Step 8: Work on your awards and recommendations

Finally, start recommending people that you know. You can do this by going to a colleague's profile and scrolling down to their Skills and Endorsements section. Find skills that you know they possess and press the + Endorse button beside the skill. Most people will also do this for you as well.

If you have won awards in the past, be sure to include these as well, especially if they are relevant to your intended audience. Just be sure to pick the awards that really highlight your skills, as an Employee of the Month award may not be the most relevant.

From here it's really just a matter of tinkering with your profile on a regular basis. Be sure to be active and ensure that your profile really reflects who you are. Doing this will create a stand-up profile you can be proud of.

Looking to learn more about LinkedIn and how to use it for your business? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
June 26th, 2014

VoIP_June23_CIt’s safe to say that businesses today are concerned with efficiency and performance, as well as making and saving money. To that end, Voice-over-Internet Protocol (VoIP) is clearly and rapidly becoming one of the most popular go-to solutions. This system moves phone communications onto your network connection to help increase productivity and minimize communication costs. Still, some business owners are skeptical about whether or not to opt in for VoIP. If you are one of them then you need a comprehensive view of the functions of VoIP system to see if it fits your company’s needs.

Quality improvement

Since its inception, the quality of VoIP service has come a long way. Today’s VoIP services allow you to make and receive calls using standard phones. Sound quality has improved tremendously, to the point where many businesses have abandoned traditional phone systems in favor of VoIP.

Reduction of telecommunications costs

Operating costs for the majority of VoIP service providers are significantly lower than traditional phone companies. This allows VoIP providers to charge customers - you - much less than their competitors, both in calling rates and monthly fees. With VoIP, businesses no longer have to maintain separate networks for phones and data which also helps save money.

And while some businesses do pay their current phone company extra for features like call holding, call display, and call forwarding, most VoIP providers include these features in their product, meaning you don’t have to pay extra for the features you need.

Easy to set up

With most VoIP connections, there’s no need to install switching boards or phone connections. Some systems can be installed easily by downloading an app to your computer, while others might require that you install an adaptor that converts voice signals into digital signals using your existing phones. These adaptors are small and in most cases all you have to do is plug the phone’s cable in before plugging the adaptor into an Internet connection socket.

More than just voice calls

Many VoIP programs also allow for chat capabilities, video calls, video conferencing, and even screen sharing. Not only that, but you’ll be able to see if your employees are available through presence technology, as well as giving them more ways to stay connected.

Highly flexible phone systems

VoIP systems allow you to do far more than is possible with traditional phone technology. You can:
  • Take your phone system with you: As long as you have access to a broadband connection you can use your VoIP system anywhere.
  • Talk on your laptop: Many VoIP systems include telephone software that enables you to send and receive calls using a headphone unit connected to your computer. This helps eliminate the risk of you missing an urgent call when you’re on your laptop.
  • Receive voicemail and faxes via email: Many VoIP services allow you to have voicemail and faxes forwarded to your email inbox. You then receive all your messages in one place, and your voicemail and faxes can be easily archived or forwarded.
  • Have virtual phone numbers: Your phone number can have any available area code, meaning you can have a business based in one place but can have a phone number with a different area code; advantageous if your business has, or wants, customers in specific areas.
  • Increase productivity: Many VoIP phone numbers can be configured to simultaneously ring on multiple devices, such as your cell and landline phones. This eliminates time-consuming phone tag. According to a recent survey conducted by Sage Research, the increased productivity enabled by Internet telephony added up to 3.9 hours per week, per employee.
No matter what industry you operate in, VoIP is a surprisingly flexible, affordable, and continuously evolving technology. Interested in implementing a VoIP system into your company? Contact us today to see what we have to offer and how we can help.
Published with permission from TechAdvisory.org. Source.

Topic VoIP General
June 26th, 2014

Security_June23_CThe increasing number of businesses turning to a virtual environment is parallel with cyber criminals looking to breach that security. While many businesses think their virtual servers are safe and secure, some are unaware of major security myths that can leave your business vulnerable to attack. With that in mind, isn’t it time you familiarized yourself with five common virtualization security misconceptions to keep your virtual environment secure?

Myth No.1: Existing endpoint security will protect our virtual environment

Most traditional endpoint security solutions are virtual-aware and provide low levels of protection. This simply isn’t enough. Depending on the virtualization platform used (VMware, Microsoft, etc.), your traditional endpoint security suite can probably recognize virtual endpoints. However, this physical software often can’t bring its full tool set of anti-malware to the virtual world, meaning it can only perform basic tasks such as on-access scanning.

Therefore what you need is a solution that has been designed to keep both virtual and physical computing environments secure. There are a wide-number of solutions out there, and the best one for your business will depend largely on the virtual environments you employ. We strongly recommend talking to IT experts like us, as we can help determine, or even offer, the strongest security based.

Myth No.2: My existing anti-malware doesn’t interfere with my virtual operations

Performance issues can create security gaps that don't exist in your physical environment. Traditional endpoint security uses an agent-based model where each physical and virtual machine has a copy of the security program’s agent on it. This agent communicates with the server while performing security tasks. This is fine for physical machines, but if you have 100 virtual machines running off of one main environment that has been infected with malware, you’ll also have 100 instances of malware running on the machines.

This high level of duplication can cause massive performance degradation and waste tons of storage capacity. Therefore, you should make an effort to ensure that all of your systems including the main ones are without malware. This not only makes every system secure, but can also speed up overall operations.

Myth No.3: Virtual environments are inherently more secure than physical environments

Sadly, this just isn’t always true. Virtualization is designed to allow software, including malware, to behave as it normally would, and malware writers will target any and all weak points in a business’s network to accomplish their goals. An attacker who compromises one virtual machine and finds a way to jump to the hypervisor - the system that enables the virtualization - then has access to every virtual machine on that host.

Therefore, malware scanners on both the user and main systems would be a good idea. If it does happen to get on a system, the chances of it spreading are drastically reduced.

Myth No.4: Using non-persistent virtual machines effectively secures a network

In theory, any machine that encounters malware is wiped away and recreated cleanly. However, we are now seeing malware that is designed to survive teardown of individual machines by spreading across the virtual network. This allows it to return when new virtual machines are created.

Additionally, being too eager to create new machines on demand can result in virtual machine sprawl, which happens when virtual machines are created but then forgotten. This leads to an unmaintained virtual endpoint operating without your knowledge. Even if the rest of your virtual machines are secure, it’s possible for one machine to eavesdrop on the traffic of another virtual machine, leading to privacy and security risks.

The best solution to this is to employ an IT manager who can track and maintain systems. Many IT partners offer a solution like this, so experts like us may be able to help ensure your systems are secure.

Myth No.5: Specialized virtual security programs are more or less the same

There are various approaches to virtualization security and your network will probably need a blend of available options. This all depends on what you’re trying to protect.

A non-Web-connected server is going to have entirely different security needs than a virtual desktop of a server that manages customer information. Implementing one without the other simply just won’t do in today’s world, where attackers are set on getting their hands on your data.

Proper security is vital in making virtualization a critical component of your business IT infrastructure. Looking to learn more about virtualization and its components? Contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security