Blog

July 27th, 2015

AndroidPhone_Jul27_BAndroid phone users can expect a new OS coming soon with Google’s announcement at this year’s Google I/O, its annual software developer conference. While they did not announce which dessert it will be named after yet, the Android M as they are calling it at the moment comes with many improvements worth mentioning. To that end, let’s take a look at the new features you can expect to see in the next Android OS.

Custom Chrome Tabs

If you’re annoyed by having to switch to the Chrome browser while you’re in a particular app, you’ll be glad that those days are over. Android M delivers a better web experience with Chrome Custom Tabs that allow you to include Chrome web view within an app making it easy to multitask. The Chrome browser will run atop your app in case you click on any link within the app, and features automatic sign-in, saved passwords and autofill.

Android Pay

Android Pay is Google’s new mobile payments system designed to make the checkout process easier and faster. Set to be available at 700,000 stores across the United States, Android Pay will work at any payment terminal equipped with NFC. Using it is simple; just unlock your phone and place it in front of an NFC-compatible POS terminal.

Fingerprint Support

Google aims to standardize support for fingerprint scanners on all phones running on Android M. This new function will allow fingerprint scanners to be used to unlock phones as well as for making purchases using Android Pay.

Google Now on Tap

With Android M, Google Now will become smarter than ever before. You’ll be able to get contextual information on anything you have running on your phone’s screen. For instance, if you’re watching a video on YouTube, holding down the home button will provide you with more information about someone in that video.

Doze Mode

This feature uses your device’s motion sensors, be it your phone or tablet, to detect when a device has no activity for a period of time, and to then automatically shut down certain processes in order to help save battery life. While in the Doze state, the system can still be activated by alarms and high-priority notifications. According to Google, Doze helped increase the standby time on the Nexus 9 by almost double when compared to the Android 5.0 Lollipop.

App Permissions

Currently, you have to accept all permissions when you install an app, which could lead to a security breach. With Android M, you can decide which permissions you want to allow or revoke, based on when those particular functions are used. For example, you can give WhatsApp access to your camera but not your microphone.

App Links

With Android M, it will be easier than ever to link from one app to another without having to land on a web page in-between. How? A special verification method ensures that app-specific links go to the right place; for instance, clicking a Facebook link in an email will take you directly to the Facebook app instead of a redirected Facebook web page that you’ll likely have to sign in to.

Direct Share

This new feature lets you share content with your most frequent contacts or apps with a single click. Android M will learn which app you share content with the most and place it at the top of a list, as well as letting you also share content with the people you contact more often. Everything will be placed directly in the share sheet for your convenience.

Simplified Volume Control

This new simplified volume control will let you independently change ringtones, media or alarm volume directly from the volume rocker instead of having to go into different settings.

Auto App Backups

Accidentally deleted an app? Not to worry; auto app backups allow you to download it again and set it up like it was before. For now, Google is limiting the backup size to 25MB per app, though this space is not counted towards the free 15GB storage space offered in Google Drive.

Android M is expected to be released later this year but you can download the Developer Preview here now if you have a Nexus 5, Nexus 6, Nexus 9 or Nexus Player. Interested in learning more about how an Android Phone could benefit you? Just give us a call; we’re sure we can help.

Published with permission from TechAdvisory.org. Source.

July 24th, 2015

164_iPhone_BIt’s Friday night, and you’re getting ready to go out for the evening. You’ve got your wallet, keys, and extra cash - you’re good to go. You quickly glance at your iPhone to check the time, and that’s when you notice the problem all iOS users dread. You have 20% battery! While you do have access to the power supply in your car for the next 15 minutes or so, after that you’re on your own. So what can you do to get the most out of your charge in a limited amount of time? Here are four steps below that can help.

Put your iPhone in Airplane mode

The key ingredient to supercharging your iPhone in the shortest amount of time is to switch it to Airplane mode. By doing this, you essentially shut your phone off from the outside world so it’s unable to receive calls, texts, push notifications or other information. Additionally, your iPhone will be unable to search for a wireless network or better signal while in this mode. And because it’s not wasting power with any of these processes, that electricity is instead directed to your iPhone’s battery which in turn allows it to charge faster.

Take off your iPhone case

Funny as it may sound, your iPhone case may actually be slowing down the speed of your battery charge. Apple’s consumer website notes that their products don’t do well in the heat. And when it comes to iPhone, certain cases can create excess heat - which can have an effect on your battery capacity. What does this mean for you? If you have a case on your iPhone, take it off when you’re charging it.

Use an iPad adaptor

An iPad adaptor, which is about twice the size of the small adaptor that’s included with your iPhone, reportedly charges an iPhone 40% faster than its native counterpart. Therefore, if you have an iPad charger, use it.

Turn off your display, and don’t use your iPhone

As already mentioned with Airplane mode, the more your iPhone is in use the less power it will have leftover to store in your battery. While Airplane mode prevents outside forces from sucking up power, you too can also not use your phone during this time to maximize the rate at which the battery charges. To do this, make sure you turn off your display, and then simply set your iPhone aside and leave it alone.

Want more tips to get the most out of your iPhone? Curious to learn about the latest iPhone news and updates? Get in touch now.

Published with permission from TechAdvisory.org. Source.

Topic iPhone
July 22nd, 2015

164_Sec_BSince many of us out there have been using the internet for decades, it’s likely that most of us have had our systems infected by malware at one point or another. But how many of us actually know what the differences are between malware, viruses, trojans, and other online threats? For those without a clue, here’s a description of four of the most common ones and the security measures you can take to keep your business protected.

Malware

Malware is the short version of the word malicious software. And this is a general term that encompasses many types of online threats including spyware, viruses, worms, trojans, adware, ransomware and more. Though you likely already know this, the purpose of malware is to specifically infect and harm your computer and potentially steal your information.

But how do the different types of malware differ from one another? How can you protect your business from them? Let’s take a look at four of the most common forms of malware below.

Virus - like a virus that can infect a person, a computer virus is a contagious piece of code that infects software and then spreads from file to file on a system. When infected software or files are shared between computers, the virus then spreads to the new host.

The best way to protect yourself from viruses is with a reliable antivirus program that is kept updated. Additionally, you should be wary of any executable files you receive because viruses often come packaged in this form. For example, if you’re sent a video file, be aware that if the name includes an “exe” extension like .mov.exe, you’re almost certainly dealing with a virus.

Spyware - just like a spy, a hacker uses spyware to track your internet activities and steal your information without you being aware of it. What kind of information is likely to be stolen by Spyware? Credit card numbers and passwords are two common targets.

And if stealing your information isn’t bad enough, Spyware is also known to cause PC slowdown, especially when there is more than one program running on your system - which is usually the case with a system that’s infected.

A common mistake many people make is they assume their antivirus software automatically protects them from Spyware. This is not always true as some antivirus isn’t designed to catch spyware. If you’re unsure if your antivirus prevents Spyware, get verification from your vendor. And for those that are already suffering from Spyware infestation, two programs that work wonders to clean it out are Malwarebytes and SuperAntiSpyware.

Worms - similar to viruses, worms also replicate themselves and spread when they infect a computer. The difference, however, between a worm and a virus is that a worm doesn’t require the help of a human or host program to spread. Instead, they self-replicate and spread across networks without the guidance of a hacker or a file/program to latch onto.

In addition to a reliable antivirus software, to prevent worms from infecting your system you should ensure your firewall is activated and working properly.

Trojan - like the trojan horse from ancient greek mythology, this type of malware is disguised as a safe program designed to fool users, so that they unwittingly install it on their own system, and later are sabotaged by it. Generally, the hacker uses a trojan to steal both financial and personal information. It can do this by creating a “backdoor” to your computer that allows the hacker to remotely control it.

Similar to the other malware mentioned above, antivirus software is a dependable way to protect yourself against trojans. For further safety, it’s wise to not open up suspicious attachments, and also ensure that your staff members aren't downloading any programs or applications illegally at the office - as this is a favorite place hackers like to hide trojans.

Curious to learn about other common malware that can cause trouble for business owners? Want to upgrade your existing network security system? Give us a call today, we’re sure we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 22nd, 2015

 

’Tis the season when you and your team will be taking a little time off to head to the beach or your favorite vacation spot, and while we know we should completely disconnect from work, most of us will still check e-mail and do a little work while away — and that could end up causing some issues if you’re not careful while working remote.

So before you head off to have a little fun with your laptop tucked under your arm, keep this in mind: never automatically connect to “any available network.” Not all Internet connections are secure, so if you’re going to log in to the company’s network, e-mail or other critical cloud apps that are hosting sensitive information, ONLY do so on a trusted, secured WiFi and NEVER a public one. We recommend investing in a personal MiFi device that acts as a mobile WiFi hotspot IF you’re going to be traveling a lot and accessing company info.

Second, turn off the ability to automatically connect for all of your mobile devices and laptops. You will still be able to connect manually, but it will prevent your laptop or device from connecting to a questionable network without your consent or knowledge.

Finally, disable all printer and file-sharing options on your mobile devices. This is another way hackers can gain access to your network. In an ideal world, you and your employees would take a true break from work, but if they aren’t able to completely detach themselves, then at least require them to stay safe using the above tips.

July 21st, 2015

BusinessIntelligence_Jul21_BData visualizations, when done properly, are the best and easiest way for us to understand a vast amount of information. Businesses are able to utilize data visualizations to great advantage, from summarizing annual sales report to visualizing marketing strategies in an easy-to-understand format, and much more. A poorly presented visualization, however, can not only show misleading information, but it might also confuse business users into making wrong decisions. Make sure you don’t fall victim to these common data visualization mistakes.

Inconsistent visualizations

It’s important to be consistent when presenting your data, otherwise users will have to stop and figure out how to read each new picture before they can comprehend what it says, wasting time and defeating the purpose of data visualization. Luckily, there are some best practices you can follow. For instance, try choosing colors that go well together. Use only 2-3 colors at most throughout your visualization - any more and you’ll find that your pictures might be hard to read. Also, use the same iconography and typography in each picture so your audience can quickly understand the information.

Displaying too much data

Overly complicated data visualizations are sure to turn off most audiences because they can’t figure out where and what to focus on. Your customers, colleagues, and employers want specific, relevant answers. The quicker you can deliver those answers, the better. Irrelevant data gives your presentation a cluttered look, making finding relevant information more difficult for readers. The solution? Find a compromise between showing too much data and not showing enough overall. Use good judgement.

Oversimplifying data

The purpose of data visualization is to present data in a way that’s easy to understand. While it’s all too easy to simplify data, if you go too far and leave out crucial parts, your audiences won’t be able to see or grasp the main point of the presentation. Instead of trying to oversimplify data, it’s better to include all important criteria and organize them into a structure so audiences can easily understand what’s being presented to them.

Choosing the wrong visualization

This is one of the most common mistakes made in data visualization. There are many different types of data out there, and each of those types require different analytics and tools to use. For example, if you want to present a sales growth comparison in the last 5 years, it’s better to use bar charts that can clearly show the difference at a glance. If you want to show a relationship between two metrics, on the other hand, you should use a scatter chart to show results.

The best way to avoid all these errors is to focus on your goals first. It’s likely that you’ll have to make changes along the way, which is actually a good thing, because it will make your presentation more accurate and effective.

Want to learn more about other business intelligence tools to implement in your company? Give us a call today.

Published with permission from TechAdvisory.org. Source.

July 17th, 2015

iPad_Jul17_BApple holds their Worldwide Developers Conference (WWDC) each year to introduce their new products and platforms. This year, the tech giant has announced the arrival of the latest iOS version, which contains several application additions and revamps, as well as changes to design and interface. The new iOS 9 is coming soon to all Apple mobile devices, and iPad users seem to benefit most from this release - here’s what you need to know.

Design changes

There’s a minor change in the typography, where Apple has replaced the ‘Helvetica Neue’ system font with a font called ‘San Francisco’. Apple also deploys its typography in a clearer way, with more space around the lettering. Although these are subtle changes, the new font should be easier to read as well as remaining easy on the eye.

Interface changes

Following complaints from users, Apple has made a small modification to its ambiguous Shift key system. The former version is hard to use, since only a change in the Shift key’s color indicated the letter’s case change - when it’s on, it looks off and when it’s off, it looks on. When you press the new Shift key, however, all the letters on the screen will change to uppercase. This will put an end to the frustration at having to delete letters because you mistakenly type an uppercase letter instead of a lowercase one, and vice versa.

The new features

Apple has revealed a number of new features in the WWDC, and has released a public beta of iOS 9 for developers to test drive its capabilities. Here are some of the new features that Apple users can benefit from.
  • Split View - This long-awaited feature is exclusively available on iPads. iOS 9 finally allows two applications to coexist on one display, making multitasking possible. You can activate Split View simply by swiping inwards from the right hand side, and you’ll be offered a range of apps that can run in the activated sidebar. You can have your email stay on the side while you browse for information in Safari, or catch up on the latest news. The possibilities are endless!
  • Picture in Picture - While using a live video chat or watching a video, you can press the Home button to activate this feature and scale down your video screen to a corner of your display. You can now chat with your friends or watch your favorite shows while you reply to emails. What’s more, you can move the video screen to wherever you prefer with a swipe, adjust the size by pinching, and close the screen by tapping the close button.
  • On-screen Trackpad - The default keyboard that pops up when you type on-screen is now equipped with an extra function. Now you can hold two fingers down on the keyboard to turn it into a trackpad, which allows you to easily navigate through the text without having to tap the exact spot on the screen. This makes document navigation much faster, especially when writing or replying to emails.
  • News app - This fresh addition will draw news stories from various sources that you can choose, from Daily Mail to Bloomberg Business, CNN, The New York Times, and more. The News app is intelligent; it is able to learn about your interests based on what you are reading, and will show you articles from sources you didn’t select if they match your interests. So basically, the more you read, the more personalized your news becomes.

When will it be available?

For Apple fans, and especially iPad users, the new features alone in iOS 9 are worth waiting for. The first public beta testing version of iOS 9 is available now, and Apple will most likely release the final version of the software in September 2015.

With the new iOS 9 release, iPad business users can be more productive than ever. Want to learn how to best implement the iPad in your business? Get in touch today.

Published with permission from TechAdvisory.org. Source.

Topic iPad
July 15th, 2015

164_Prod_BPeople like to speculate about what the most disruptive productivity killers are in offices around the country, but do they really have a clue? It’s easy to point fingers at email, social media, or lack of discipline as sources of common distractions, but what are the real issues? In a survey of 2,175 hiring and human resource managers released by CareerBuilder last month, the true sources of lost productivity on the job are revealed.

Here are the top 10 productivity busters according to CareerBuilder’s June 2015 survey.

  1. 52% - Cellphones & texting
  2. 44% - Internet
  3. 37% - Gossip
  4. 36% - Social media
  5. 31% - Email
  6. 27% - Coworkers chatting
  7. 26% - Meetings
  8. 27% - Snack and/or smoke breaks
  9. 17% - Loud coworkers
  10. 10% - Sitting in a cubicle

Why are these findings a big deal?

According to the managers who took the survey, the consequences of these distractions can be pretty severe. A few examples they gave were lower quality of work, dissatisfied employees who have to pick up the slack of lower performers, missed deadlines, and even loss of revenue.

So how do you prevent these productivity killers from disrupting your business?

The chief human resources officer at CareerBuilder mentioned that one of the most effective ways to increase productivity is to simply take a break, which may come as quite a surprise since “Snack and/or smoke breaks” is listed as number 8 for productivity killers.

However, it should be noted that not all breaks are created equal. Listening to loud music or getting caught up in gossip on social media may not actually give employees the sense of rejuvenation they need when they return to work. They key is for staff members to take a break that will re-energize and give them a fresh focus. Some suggestions are to simply take a walk or perform some form of light exercise or stretching.

On a more humorous note, the survey also revealed some of the more unusual non-work activities employees partook in while on the clock. Employers reportedly found their staff doing everything from taking a nap on the CEO’s couch, searching for a mail order bride, and even taking a sponge bath in the restroom sink.

Want more tips on how to boost employee productivity. Curious to see how technology can help? Send us a message today.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
July 12th, 2015

 

We often hear that said. But is it true? Recently someone asked me for a favor. The request came in an impersonal form e-mail. I had some business dealings with this person many years ago. Since then, I had heard from them only once when they asked another favor.

I was being asked to promote something on my social media network. The request did not offer an excerpt, a preview, a sample or any compelling reason why I should offer my assistance and ping the people on my e-mail list.

I thought, “Why should I help?” The implied assumption that I owed this individual something, or that I should help for no reason other than that they asked, seemed a bit off-putting. Have I helped an unfamiliar person before? Yes, there have been circumstances where I was glad to do so. But “Do this for me because our paths crossed” is not a good reason. Sometimes it does hurt to ask. Sometimes it comes across as inappropriate or entitled. Asking someone for a favor when you have no relationship with them is a bad idea. Naturally, most people like to help — but very few people like to waste their time or energy. And nobody likes to feel someone has taken advantage of them.

There’s nothing wrong with asking for a favor or assistance. Just make sure you ask the right person for the right reason in the right way. Otherwise, you might damage your reputation and your relationships.

 

Mark Sanborn, CSP, CPAE, is president of Sanborn & Associates, Inc., an idea studio dedicated to developing leaders in business and in life. Mark is an international best-selling author and noted authority on leadership, team-building, customer service and change. Mark is the author of 8 books, including the best seller The Fred Factor: How Passion in Your Work and Life Can Turn the Ordinary into the Extraordinary, which has sold more than 1.6 million copies internationally. Learn more about Mark at www.marksanborn.com

July 10th, 2015

Facebook_Jul10_BFacebook has grown rapidly in the past decade, and now boasts over one billion monthly active users. These users are constantly liking, sharing, commenting, and posting on the platform. Many businesses see this as an opportunity to grow their customer base, and so implemented Facebook advertising into their marketing strategies. While Facebook marketing is on the rise among businesses, there are a few things you need to watch out for. Here’s a list of the most common Facebook marketing mistakes you should avoid.

Mistake #1: Treating Facebook like a one-way communication tool

The content you post on Facebook should encourage followers to express their thoughts. Think of it this way - Facebook is a social media network, which means that people use it to connect with friends and communicate with family members. They don’t want to be showered with advertising messages! Instead of speaking at customers, create dialogues that promote engagement and feedback. Try asking probing questions, sharing fun quizzes, or posting images and videos that get your followers talking. Remember that engaging content has a better chance of going viral and attracting more followers to your profile.

Mistake #2: Ignoring follower metrics

There’s no telling whether your content is going to appeal to your followers or not. All audiences are different, and the only way to find out what’s going to work for them is to head over to Facebook Insights in your admin panel. Take a look at the metrics there to determine if your posts are resonating with your readers. Some of the best insights include your top posts, where you can find the types of posts that rank high on the list (they can either be text, links, images, or videos). You can analyze the statistics and pick up things from there.

Mistake #3: Targeting ads poorly

It is true that Facebook has more than one billion active users. But guess what? Most of these people don’t want to see your ads! So don’t waste time and money to show them ads when you can use Facebook’s powerful set of audience targeting tools. Facebook allows you to choose potential ad viewers based on their location, age, education, interest, and more. You can easily weed out people who are unlikely to click on your ads. You can create multiple ad groups to be displayed at different times to various audience groups. This is a method to test and see which ones work best.

Mistake #4: Abandoning your audience

This is probably one of the worst things you can do. When it comes to Facebook marketing, consistency matters. People won’t be very impressed if they visit your page and see that your last post was a few months ago. When you post at regular times, on the other hand, your followers will get into the habit of expecting posts from you - they’ll even look forward to them if the content is really good! If you find it hard to stick to a schedule, try using tools that can automate your posting for you like Hootsuite.

If you’re not using Facebook to expand your online business presence, you’re missing out on one of the most powerful marketing tools out there. Want more tips on how to expand your business through Facebook? Get in touch today and our experts will be happy to help.

Published with permission from TechAdvisory.org. Source.

July 8th, 2015

164_Sec_BA picture is worth a thousand words - and now a selfie may even be worth more. Later this year, MasterCard plans to jump into the facial recognition-based trend of online security with an app that allows users to verify online purchases with a selfie. But is this technology secure? Will it replace traditional passwords for good? Here’s what you need to know.

At the beginning of this autumn, MasterCard will acquire the help of 500 customers to test out a new application that enables people to verify their identity and authenticate online transactions with a facial scan. What does this mean? Instead of using a traditional password at the online checkout, MasterCard wants to give you the option to snap a selfie instead. According to the credit card giant, they’ve partnered with every smartphone company in the business to make this mode of identity verification possible.

Why is this happening?

A quote from Ajay Bhalla, security expert at MasterCard, suggests this is an attempt by the credit card giant to appeal to a younger crowd of digital natives. "The new generation, which is into selfies...I think they'll find it cool. They'll embrace it," Bhalla recently said.

That said, the “cool” appeal to youth is likely not the only reason for this change. The firm is likely attempting to make online purchases both more secure and more convenient.

How it works

To use this technology, users will have to download a dedicated app, which they can then use to take a photo of themselves at checkout. But how does MasterCard prevent a thief from using a photo of you to fake your verification? Simple - the app requires you to blink to prove that you’re a living, breathing human being.

However, it’s been noted by critics that, in today’s technological world, even a blink can be animated on a static photo. This leaves those of us with security concerns wondering whether MasterCard will make this app more secure before it’s released.

Note as well, though, that MasterCard is not getting rid of traditional passwords completely. Users will still have the option of the more conventional method of verification, as well as the choice of fingerprint scanning to check your identity.

Is this where the future of online security is headed?

With the release due later this year of a similar Windows 10 security application to identify users using biometrics, it appears that this is where the future of online security is headed. And with ever more applications and online services requiring a password, it is becoming increasingly difficult for the average web user to create one that is both unique and secure for each individual service. So whether it’s facial recognition, a fingerprint scan or some other technology that’s yet to be perfected, it seems as though some sort of more advanced security solution is inevitable.

Want more of the latest security news? Looking to implement new security to protect your IT infrastructure from cyber threats? Get in touch today.

Published with permission from TechAdvisory.org. Source.

Topic Security