Blog

March 2nd, 2015

Trouble aheadBusinesses are exposed to disasters all the time, including IT system failures, power outages, or even natural disasters. These causes will cripple your business unless you have a business continuity plan (BCP) ready. A good BCP allows your business to continue on running everyday operations seamlessly. It makes sure that you can service your customers in a satisfactory manner, even when you’re facing technical issues. Therefore it’s very important to come up with a continuity plan, if you don’t already have one.

Relevant factors such as your business’s resources, location, suppliers, customers, and employees must be carefully analyzed before a business continuity plan can be formed. It is also necessary to test the plan and check whether it’s working or not. Here are some proven methods to test your continuity plan’s efficiency.

Review the BCP

You have a business continuity plan ready with all the necessary information, contingency locations, personnel, contacts and service companies. The question is can you really pull it off? Have the plan reviewed regularly, or at least quarterly. Gather a team of individuals, heads of departments and managers to discuss the plan. Focus on the business continuity plan’s feasibility and pinpoint any areas where it might be strengthened.

Determine time and duration to test the plan

You should decide how often you test your business continuity plan, and for how long. Even if you have a solid plan in place, it’s still wise to review it again after a few months. Come up with a schedule for testing the plan and share it with employees. Testing time may take anywhere from one day to two weeks. However it can also take as little as three hours to determine the effectiveness of the plan by monitoring employees’ responses and decision-making abilities, based on the guidelines of the business continuity plan.

Outline objectives to employees

Most business continuity plans fail because they have never been properly relayed to employees. Emphasizing the plan’s importance to your business and demonstrating it to employees is crucial. You need to outline objectives for the business continuity test to your employees, informing them how you plan to measure its success and failure, so that they get a general idea of their roles and your expectations.

Create a scenario

Create a fake scenario that affects your business - whether it’s setting off fire alarms or announcing another disaster. Employees should act as though the scenario is genuine, and refer to their duties in the business continuity plan, going through it step by step. Monitor the time it takes to get everything under control, from contacting customers to checking business resources and temporary meeting locations.

Evaluation

After the business continuity plan is put to test, gather your employees to discuss the plan’s overall performance. Identify where it needs improvement and encourage the parts that worked best. Make changes to key persons and actions where necessary, to ensure that the continuity plan is working at its best.

Having a business continuity plan is good, but testing it regularly is equally important. Contact us today and see how we can help you cope with unexpected disasters.

Published with permission from TechAdvisory.org. Source.

February 27th, 2015

Happy  Mature Man Using CellphoneWindows Phones may not have the biggest market share in the smartphone industry, but they have a number of useful features for business people. Whether you're seeking the ability to do business presentations, increase productivity or manage devices remotely, Windows Phones have the capability for this and more. So if you’re using a Windows Phone, you can improve business performance by taking advantage of these features.

Data Sense

Nowadays, telecommunication service providers restrict your Internet usage to a few gigabytes of data on a monthly basis. When you’ve exceeded this data limit, your Internet speed goes down drastically, and you might even have to pay extra to maintain speed. Data Sense allows business users to stay productive while on the go by monitoring their data usage. You can set a monthly data limit and Data Sense will help you control background applications and save certain downloads for when you’re connected to a Wi-Fi network. This way, you can save your precious connection speed for when you need it most.

‘Running late’ notification

At important business meetings, you don’t want to be the one seen as unprofessional for turning up late, especially if you haven’t been able to let people know what's happening. But even if you strive to be on time for every appointment, sometimes things are beyond your control. The ‘running late’ notification in the Windows Phone calendar app lets you send a quick message to your colleagues, to alert them to the fact that you’ll be late for a meeting. Simply do this by setting a default message, then choose a meeting in your calendar. The notification feature will pull contact information from your address book and send an email to attendees of your choice. Just make sure you have a good excuse when you do turn up!

Office Remote

This powerful application turns your Windows Phone device into a remote control for Microsoft Word, PowerPoint, and Excel documents. Business presentations are easier with Office Remote, which you can use to jump between PowerPoint slides and control a laser pointer to draw your audience’s attention. You can also use it to store your speech notes, and you can glance down to monitor your presentation time on the screen. Office Remote is simple to implement, requiring only Bluetooth and a small piece of add-in software that allows you to connect your Windows Phone and PC.

TeamViewer

What happens when you’re out of the office, and a client calls to request information stored on your computer? Well, the good news is you don’t need to rush to your desk. With TeamViewer, you can access your PC’s desktop right from your Windows Pphone device, as long as the computer is turned on and running the TeamViewer program. This can save you a lot of time when you’re outside and need to check a file or run a program on the go.

Mobile device management

If your business deals with confidential client information, then deploying Windows Phones to your employees can be risky. Microsoft has come up with Windows Intune, an application to centrally manage and secure your employee’s Windows Phone devices. Windows Intune allows the administrator to manage updates, control which applications can be installed, and protect the devices from viruses and malware.

If you want to integrate Windows Phones into your business, contact us today to get started.

Published with permission from TechAdvisory.org. Source.

February 26th, 2015

Hardware_Feb26_AWearable technology is here to stay - there’s no denying that. Whether it’s Google Glass, watches that monitor heart rate, or jewelry that alerts you to incoming calls and text messages, there is a growing trend for high-tech clothing and accessories, and it represents a growing market. These are the sort of gadgets that can bring innovative technology to your very person, and therefore boost day-to-day productivity in life and business like never before. But since the apparent flop of Google Glass, it seems increasingly likely that Apple’s move to bring its Watch product to market will take time to catch on. Here’s why you might want to hold off jumping on the Apple Watch bandwagon just yet.

The battery dwindles all too quickly

Much like your smartphone - perhaps even more so, in fact - if you buy yourself an Apple Watch then it’s likely you will want it to travel with you everywhere. That means it’s going to be on your wrist, in use and burning through its battery charge, for a good portion of the day. It might not be running at full capacity the whole time, but it’s unlikely to be on complete standby either. You might use it to check the time, the weather, your e-mails. It might sound an alarm when you need to leave the office for a client meeting, display your fitness regime progress at a glance, or help you find directions to the convention you’re attending tomorrow morning.

And while Apple claims its Watch will hold out on you for between three and four days when in one of two standby modes, in truth there’s no way those modes are going to get much use when you’re playing with your brand new toy. In fact, experts believe that with moderate to heavy use you could expect it to begin powering down after just two and a half hours. That’s not much help if you are hoping to use it as a more convenient replacement for your smartphone. Though Apple is rumored to be mulling over a more powerful battery, that will likely be released at some point in the future - in the meantime, less than perfect battery life will be off-putting to potential Watch users.

It’s late to the party

Okay, so Apple has demonstrated before that it can show up after everyone else and still do a great job of ruffling feathers - it certainly wasn’t the first smartphone around, and yet it has managed to do an impressive job of market domination. But Apple’s rivals have been in the smartwatch arena for some time and that means companies like LG, using the Android Wear platform to develop their devices, have the benefit of almost a year of customer feedback behind them. Put simply, they already have more of an idea than Apple as to what consumers are looking for in terms of both design and features. With Apple likely to be playing catch-up for some time, it seems probable that it will be a while before the Apple Watch will become a must-have gadget.

It’s just too Apple - and yet not

Apple has carved a reputation out of devices that sell themselves thanks to killer apps that make them essential purchases. When the idea of the Apple Watch was first touted, it was meant to do the same - a comprehensive fitness regime tracking app that revolutionized your exercise routine would have put it well and truly on the map. Yet technological capability and regulatory compliance appear to have got in the way, and what has made it to market seems to be a watered down version of the dream. Without this, the device looks to be scheduled for release with little to really wow its audience aside from incorporation of the Apple Pay service.

And yet Apple Watch appears to have burned itself on two fronts because, while its apps have failed to impress critics, the distinctive Apple design goes against the grain of industry efforts to make wearable tech look less tech-y. With watches especially, the aim has been to produce devices that look like their traditional, analog cousins, in order to make it feel more socially acceptable to wear them. Nonetheless, having the latest iPhone release has undoubtedly become a status symbol, and Apple’s refusal to rein in its branding could prove to be a worthwhile gamble and make the Apple Watch even more attractive to consumers.

Of course, Apple will count on its legions of fans to make the Watch a success in spite of whatever shortcomings it might have. Wearable technology is certainly here to stay, and the Apple Watch release is a development for both consumers and businesses to keep a close eye on. Though you might want to hold back on the Apple Watch being the productivity boosting device your company has been longing for, it could yet win its way into our technological hearts - you’ll have to watch this space (excuse the pun).

To learn more about the benefits to your business of wearable technology and other hardware solutions, give us a call today.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
February 23rd, 2015

SocialMedia_Feb23_AHave you heard that social media can be used to skyrocket your business to unprecedented heights of success? You probably have; people like to talk. But unfortunately, not a lot of this talk is backed up with practical tips on how to go about it. So if you’re tired of waffling in the social media stratosphere, read on for some smart, focused advice that will breathe new life into your social media efforts.

Undoubtedly, the most important strategy to use in your social media plan is...to have a strategy to begin with. Know how much time you can dedicate to social media, block out the hours to focus on it and don’t waste that time checking out friends’ vacation photos or celebrity twitter feeds.

If you don’t have a strategy, you’re going to waste time posting irrelevant updates that won’t engage with your audience. To help you plan an effective social media strategy, here are three crucial tips to get you off on the right foot.

Initially focus on the big three

Most social media experts agree that the three platforms that generate the most business leads, engagement and brand exposure are Linkedin, Facebook and Twitter. When you’re getting started, your efforts should be primarily focused on these three. After you’ve gained followings here, then you can start forging paths into YouTube, Instagram, and Pinterest amongst others.

Post at prime exposure times

Studies have shown that around lunch and dinner time are ideal posting times (since everyone is uploading photos of their meals). As for which days, many marketers agree your posts are most likely to get noticed on Tuesdays and Thursdays. So these are the times to deliver those high-impact messages you’ve been randomly shooting out.

Find the value in your post

On social media, you should always be focused on selling your services, right? Wrong. Only 15% of your posts should concern news about your business and its products. The other 85% should focus on providing fun, valuable and timely content.

When you create a new post, you should ask yourself what’s in it for the customer. What do they get from reading it? Seriously, why is someone going to share your post or talk about your business unless it adds value to their life? Think about the posts you share personally. Do they provide value to your friends and family? We’re guessing the answer is yes.

For more tips on how social media can create buzz for your business, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
February 20th, 2015

VMware_Feb20_AVirtualization has taken a firm hold over most businesses, since companies can reduce their costs and improve IT efficiency by virtualizing data. And when it comes to virtualization, VMware is an industry-leading virtualization company that allows businesses to store their assets in an economical way. Recently VMware has launched vSphere 6, the latest version of its vSphere flagship product. Here’s what you need to know about vSphere 6 and its capabilities that may benefit your business.

What is vSphere 6?

After three years of development, VMware has finally released vSphere 6, the latest version of its virtualization platform. vSphere 6 is a cloud system that turns physical resources into virtual ones. It also allows users to run multiple operating systems and applications on a single computer. The new vSphere 6 is equipped with new capabilities to suit the needs of business users.

What are its new features?

vSphere was recently updated to version 6 and, along with the update, a number of new features were added that could prove useful for businesses.
  • Content Library - This new function enables users to store virtual machine templates, applications, ISO images and script into a centralized management tool of vSphere, the vCenter. It is very useful when you need to install files or maintain your infrastructure. With Content Library, you can keep everything in one place, allowing easy access when needed.
  • vMotion - Migrating data can be one of the most daunting tasks for administrators. With vMotion, you can move an active virtual server from one physical server to another without downtime. vMotion will retain the network’s connections and perform non-disruptive live migration with a high speed network connection. The whole process takes merely seconds to execute, so users won’t even notice that the server has been moved!
  • Fault Tolerance - On those rare occasions when your company is facing power outage, the damage can be severe. vSphere 6’s Fault Tolerance protects up to 4 virtual CPUs and allows your applications to keep running in the event of server failures. This feature ensures zero downtime and prevents data loss. Fault Tolerance is needed for applications that require continuous protection.
  • NVIDIA GRID vGPU - VMware partners with NVIDIA to bring high-quality graphics to their virtual machines. GRID vGPU provides exceptional graphics when sharing desktops and applications on a virtual server. In the past some applications were impractical to use on a virtual server, due to their need for high-quality graphics cards. But GRID vGPU can bring those applications to life on a virtual platform without the need to install a high-end graphics card.
The new vSphere 6 packs in a whole load of new features and innovations that will bolster many enterprises’ virtual performance. If you’re interested in integrating VMware into your business, contact us today to find out how.
Published with permission from TechAdvisory.org. Source.

Topic VMWare
February 18th, 2015

Security_Feb18_AWhether we use them for business or pleasure, we all want the confidence that the online services we use to store files, post life updates or check our email are given adequate security protection to safeguard our information. But since high-profile breaches such as the celebrity photo leaks of 2014, the security of Apple platforms has been in the limelight. So it is a welcome move that Apple has extended its two-step authentication feature to the popular FaceTime and iMessage applications.

After the fall-out from the celebrity photo leaks, Apple extended the two-step authentication process (also known as two-step verification) to iCloud, the online storage platform at the center of the scandal. The feature was initially introduced only to the user IDs for access to Apple accounts; the motivation for the launch of that extra security measure was the hacking of a journalist’s data back in 2013. But what is two-step authentication and how does it work to protect your data?

The premise behind two-step authentication, which experts recommend all businesses implement as part of their security strategy, is actually pretty simple. Usernames and passwords are all too easily stolen by malicious parties, whether by phishing emails or a more sophisticated hacking attack. So, rather than typing just your username and password to access your account, the password is teamed up with a four-digit verification code which is newly and uniquely generated each time you attempt to access your account.

The verification code is delivered by text message (meaning that to use the two-step verification feature, you’ll need to have a cellphone to receive the SMS on). As a result, even if a hacker manages to get hold of your password, unless they also have your phone by their side then they won’t be getting into your account. This authentication method is already used by organizations around the world including banks, mobile service providers and other companies who recognize the added layer of security that it brings. And now you can give yourself the same level of protection to ensure that only you can FaceTime your family and send iMessages to your friends.

Fear not, there’s a backup plan to ensure that you can still access your accounts if you happen to forget your password or if something happens to your phone so you can longer receive authentication codes. Apple also provides you with a 14-character recovery key that will get you back in if all else fails. To enable two-step authentication for your FaceTime and iMessage applications, login to your Apple ID account, select Password and Security and then click Get Started under Two-Step Verification.

To find out more about using two-step verification and other security measures to protect your business, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
February 13th, 2015

BC_164_AIt’s Monday morning, you’re the first one into the office as usual. You take your keys out and unlock the door only to find your office in complete disarray. Documents are thrown everywhere, chairs are knocked over and the worst part - all of your computers are gone. To your right, you notice a smashed window and a trail of keyboards and cables. Then it hits you. You’ve been robbed. Situations like this can happen to businesses of all sizes. The question is, are you prepared? Here’s how you can create a business continuity plan that keeps you open and making profits when the unexpected strikes.

The difference between disaster recovery and business continuity

While it’s easy to overlook the differences between a disaster recovery and business continuity plan, there are actually some key variations you should be aware of.

Disaster recovery is the restoration of business operations and IT infrastructure after a disaster has already occurred. Business continuity, on the other hand, is focused on maintaining business operations and profits throughout a disaster. While disaster recovery is mainly focused on the slice of time immediately following a disaster (how you replace your equipment and restore IT infrastructure asap), business continuity looks at the bigger picture - the continuity of the company as a whole. It ensures you can run your business and maintain profits during the process of recovering from a catastrophe. It generally includes a disaster recovery plan as part of it.

Creating your business continuity plan

The first step in creating your plan is to identify which of your IT assets are vulnerable to disaster. To do this, you need to ask yourself some important questions, starting with what might happen if you were to lose the functionality of a specific asset for a day, a week or even longer. Answering this question will help you identify your most critical IT assets; the ones that are integral to your business operations.

Here are some other important questions to ask when drafting your business continuity plan:

  • What is the purpose of my business continuity plan?
  • What disasters can affect my IT infrastructure?
  •  What are my key business areas?
  • Which different business areas, assets and departments depend on each other?
  • What is the longest amount of time I can go without functionality of IT assets?
Once you can answer these, it’s time to start planning. Write down your thoughts, and then contact an IT provider like us for assistance. We’ve helped countless businesses just like yours prepare themselves in order to remain operational throughout catastrophes. We can also help you identify potential problems that you may not have thought of.

Need help creating your business continuity plan? Contact us today to see how we can help you stay running and turning profits when disaster hits.

Published with permission from TechAdvisory.org. Source.

February 12th, 2015

SocialMedia_Feb12_AWhen it comes to social media, most of us have privacy concerns at the forefront of our minds. Who can see what we post? Who owns the photos we upload? It even comes down to wondering what happens to our social media identities when we die. It is part of the reason for the emergence and subsequent popularity of apps like Snapchat, which allow you to send a photo to a friend and at the same time specify when it will self-destruct. Now, a new entrant to the app marketplace is taking things a step further - it wants to protect your privacy by filling Facebook with pictures of cats.

But there is more to it than that: the team behind social messaging app Wickr aren’t looking to post images of our furry friends just for the fun of it. In fact, the feline factor is just one feature of the app, known as the Wickr Timed Feed. Wickr actually promises to offer greater security and privacy controls than similar apps like Snapchat - but whereas Snapchat simply lets you set your images to self-destruct once they have been seen by the recipient, Wickr takes an alternative approach.

As well as allowing only pre-approved friends to see your photos within your Wickr feed, the app lets you share each photo through Facebook and control which of your friends can see it. So where do the cats come in? Well, when you first share to Facebook, no-one will see your photo - instead, they’ll see a decoy image of a funky-looking cat. However, Facebook users then have the option to click through to Wickr and, if they are one of up to 151 people you have pre-approved to have access to your real photo, it will be unlocked and the cat will disappear - at least, until the photo automatically self-destructs 24 hours later, as do images on your feed in the Wickr app itself.

If it all sounds a bit like security overkill, then that’s probably because it is. Sharing Wickr photos to Facebook also sounds a little cumbersome, and even more so the process for unlocking a cat-guarded photo, and this could have an adverse effect on widespread take-up of the feature. But it does address genuine concerns surrounding the far and often uncontrollable reach of images and information we post online. What’s more, it appears to be a way to prevent Facebook from claiming ownership of the photos we upload - as much a concern for professional photographers and companies using Facebook for marketing purposes, as for individuals using the platform to keep in touch with friends. Wickr claims that, because the cat photo is all that will be publicly visible unless the bona fide picture is unlocked, that will be the only thing to which the social network could claim to have ownership or reproduction rights.

Whether it catches on or not, the emergence of apps like Wickr is telling of the growing pressure for the usability of social media networks to be balanced with protection for their users’ privacy. It acts as a reminder to businesses to be aware both of potential issues with usage rights for corporate images shared online, and of the need to keep consumer concerns about data misuse in mind when designing social media marketing strategies.

To learn more about how to effectively put social media to work for your business, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
February 11th, 2015

Androidphone_Feb11_A2015 may have only just begun, but some of the big names in the mobile industry are already preparing to launch brand new Android smartphones to kick-start the year. Some of these models are upgraded versions of an existing device, with better features and more functionality. So before you rush into buying an Android phone, you might want to check out these latest devices scheduled to debut in 2015.

Samsung Galaxy S6

If you’re a Samsung Galaxy S5 fan, the new Galaxy S6 will be just what you’re looking for. Samsung plans to change the overall design of this model following criticism of Galaxy S5’s conservative style. There are rumors about its quad-HD screen with 2560x1440 resolution, metal unibody, a 64-bit Snapdragon 810 processor with 3GB of RAM, and better camera and battery performance. As usual, the S6 will be available in three storage options: 32GB, 64GB, and 128GB.

Galaxy S6 is expected to debut at the Samsung Unpacked event, scheduled for March 1st in Barcelona. The release date should be around a month after the official announcement. It’s unlikely that Samsung will be making the Galaxy S6 any cheaper than the current Galaxy S5. So far, the estimated price for the 32GB model is around $650, the 64GB model around $800, and the 128GB version could cost an extra $100 more.

Samsung Galaxy Note 5

The Note series from Samsung has always managed to impress Android users. This means Samsung has to come up with something special to stand out further. Word has it that the Note 5 will employ an Ultra HD, 4K display and a camera with up to 50 megapixels. You can also expect wireless charging and a two-day battery life.

The release date for Note 5 is still yet to be confirmed, but Samsung tradition suggests the launch will be somewhere during September and October. As for the starting price, Samsung’s Note series has always been costly, and Note 5’s additional features could further increase the price up to around $750.

Sony Xperia Z4

After Xperia Z3’s debut in September 2014, Sony has been working around the clock to strengthen its Z-series products. The Xperia Z4 is expected to have a 5.5-inch quad-HD screen with a Snapdragon 810 processor. Sony’s smartphones are well-known for their camera quality, and the Xperia Z4 may pack in an even more impressive camera and image sensor. The new sensor will be able to record videos much faster and smoother than the previous Xperia Z3.

Sony has announced that it will not be presenting Xperia Z4 at the world’s largest mobile trade show this March, so we can assume that it will be released at a later stage in 2015. The price is rumored to be around $600-$650.

LG G4

The one thing LG prides itself on is its innovation, and the new LG G4 is sure to house some extra features. There’s a possibility that the G4 will have an eye scanner to gain secure access to the phone, but a fingerprint scanner would be more likely. LG’s smartphones are already on top when it comes to screen resolution, so G4’s display will probably be ahead of its competitors. Furthermore, a new stylus known as the G Pen will replace the poorly received LG G3 stylus.

Since the G3 is available for $600, we can assume G4 to cost the same or more at its launch. Its release is expected to come in May 2015.

Want to find out how Android phones can fit into your workplace? Get in touch with us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

February 10th, 2015

Virtualization_A_164You’ve likely heard of virtualization. It’s the ability to move both hardware and software out of your office to a vendor offsite - therefore freeing up office space and cutting costs. This likely sounds like a dream come true for small businesses, whose overheads need to be kept to a minimum. But with the ability to virtualize almost everything from networks to server hardware and operating systems, you may feel overwhelmed and have no idea where to start. With that in mind, let’s take a look at some tips that’ll take you by the hand into the world of virtualization.

The key to successful virtualization is to not virtualize too much too quickly. Choose one or two items you’d like to test out, and then give it a go. By only focusing on virtualizing a few assets, you’ll be able to accurately measure how much your business is benefiting from virtualization.

Once you’ve decided to make the jump into virtualization, here are a few tips to keep in mind.

Don’t virtualize for the sake of virtualizing

If you have 20 PCs running on an older operating system, but they are still producing results you’re happy with, it may be best to save your money and hold off on virtualization until you really have a need for it.

On the other hand, if you’ve been thinking about buying a new server, it may be smarter to consider getting a virtual server instead since the need is already there.

Understand the risks and challenges of virtualizing individual assets

Server, desktop and application vendors have unique and evolving licensing rules concerning virtualization. With vendor licensing audits becoming more and more frequent, you may be in for a major financial penalty if you’re not following the rules.

It’s been reported that one company saved $4 million in hardware expenses through virtualization. However, they lost $52 million for not remaining in compliance with the software licenses.

Try virtualizing more than one asset

If you start out only virtualizing your server and it doesn’t show immediate benefits, that doesn’t mean you should just give up on virtualization completely. The fact of the matter is that virtualization does save businesses millions of dollars every year in IT expenses, giving them a productivity boost in the process.

You can virtualize many physical assets of your business besides servers. This includes applications, laptop hardware, operating systems and more. All the virtualization process does is deliver these assets to you via the internet instead of having the physical product in your office. So if the server virtualization doesn’t work for you, maybe virtualizing another asset will.

Or it could simply be that your IT service provider is the real problem. Maybe you haven’t found the right virtualization vendor that works best for your business. The only way you’ll ever find out is if you don’t give up the first time you encounter a failure.

For more information about virtualization and how to effectively integrate it into your business, contact us today.

Published with permission from TechAdvisory.org. Source.