Blog

July 25th, 2014

VoIP_July21_BModern communication methods are quickly moving away from the traditional phone networks and favoring network based strategies that allow communication via the Internet. If you do some research into different solutions available you will generally hear about two major options: VoIP and Unified Communications.

What is VoIP?

VoIP, or Voice over Internet Protocol, is a modern communication method that enables voice communication over a business's network connection. With many VoIP solutions you are able to use the same phones you do on traditional networks. You just need a small adapter that turns your voice into a digital signature that travels on top of data on your network.

VoIP is common these days because many businesses have high bandwidth Internet connections that can support it, and many solutions offer considerable cost savings compared to traditional phone lines.

What is Unified Communications?

The other main modern communication solution many business owners come across is Unified Communications (UC). This is a group of modern real-time and non-real-time communication services that provide businesses with a consistent user-interface and experience across multiple devices and platforms.

Many UC solutions include:

  • Internet telephony (VoIP)
  • Instant messaging
  • Video conferencing
  • Screen sharing
  • Call control
  • Speech recognition
  • Email
  • Voicemail
  • SMS
These solutions are often delivered via a number of programs that can be combined to look the same and interact with other systems.

One of the best examples of UC in use is the idea of a customer calling to ask a question about one of your products. They unfortunately call after business hours and decide to leave a voicemail message. After they hang up, software that powers the phone system translates the message into digital form and emails it to your marketing team. Your marketing manager receives the message, in email form, on their mobile device and is then able to call the client back.

This scenario likely happens using three different systems - voicemail, email, and VoIP - and three different programs. The thing is, these programs are all 'unified', so they work as one unit.

What's the difference between the two?

The biggest difference between the two communication concepts is the scope. Many VoIP solutions focus just on Internet-based calling, while UC focuses on company-wide communication. More times than not, the voice part of UC is powered by a VoIP platform.

That being said, many VoIP solutions offer some form of UC features like voicemail, instant messaging, and video calls.

Which option is best for my business?

This is a question businesses often ask us, and the answer is that it really depends on your company and your current situation. If you already have a traditional phone system in place in your office, and are looking just to cut your phone bills then a VoIP solution may be the best solution.

One of the biggest downsides of a UC solution is that it can require a fairly large investment; certainly larger than VoIP. If your business is operating on narrow margins you probably won't be able to implement a full UC solution all at once, instead having to implement it in steps.

Our best recommendation is that before you consider either, give us a call to learn more our solutions and how we can help your business get the right type of communication that will work for your business and budget.

Published with permission from TechAdvisory.org. Source.

Topic VoIP General
July 24th, 2014

Productivity_July21_BEnterprise Resource Planning (ERP) is the use of software to automate business information and management. While it is largely thought to be mainly for enterprises, there are an increasing number of solutions that are bringing this powerful tool to businesses of all sizes. Despite this fact, many business owners often question whether they really should implement ERP or not.

There are several common business situations that indicate your business may be ready to implement an ERP solution. Here are 5:

1. Your business is entering the growth stage

If your business is experiencing a period of growth of profits, sales, and employees, chances are high that the number of systems and processes you use and require are also growing. If not managed properly, you could see a significant slowdown in growth due to inefficient processes.

By integrating an ERP solution, you can avoid this largely because these systems allow you to manage processes from a central location and provide you with the right resources when you need them. Essentially, they provide the platform that can support the systems and processes that enable healthy growth.

2. You have a tough time accessing business information

Companies without ERP often see employees wasting time tracking down important information. Think about the time you need to spend looking for accounting data. Is it available at the click of a button, or do you need to search for it across different locations?

If you are spending more time tracking important information than actually using it, you would do well to look into an ERP solution. It can centralize information and make it much easier to access when you need it, thereby increasing your overall productivity.

3. Finance and HR processes are becoming harder to manage

Companies with a small number of employees or customers can likely get by without specific software to help track relevant information and can use spreadsheets instead. But as soon as you see growth, you will quickly find out that spreadsheets simply won't cut it and managing Finance and HR related activities and information will become an uphill struggle.

If your teams rely on paper or other base information to develop reports and fill orders, you could see labor costs shoot up, possibly becoming your biggest expense. By integrating an automated solution like an ERP, you can cut back on these costs and make your employees' jobs more manageable.

4. Databases contain double entries and errors

When each department uses their own software to keep information, it can become impossible to manage it all and ensure that all systems contain not only the same information but are up-to-date. When different departments have different information for the same client, person or function you are going to see inefficiencies and errors made.

These mistakes and the time spent correcting them can result in increased wages, decreased productivity, and even potential loss of sales. By implementing an ERP, you can ensure that everyone is accessing the same information which is not only correct but also up-to-date.

5. There are numerous processes carried out on different software and systems

It is common to see many businesses invest in different software and systems for different functions and departments. In many cases, this can lead to high overhead and management costs which in turn can eat away at profits.

Many ERP solutions are developed to support a variety of business processes and departments. What this equates to is one solution that covers all aspects of your business. This is almost always more affordable than multiple systems. The same can be said if you need to add new employees. With traditional systems this means investing in new software licenses. However, with ERP you can usually add a user for a low monthly cost, or even no cost at all - depending on the solution you integrate.

If you are looking to learn more about ERP and how it can be implemented in your organization, contact us today and discover what might turn out to be a successful solution for increased profits and productivity.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
July 24th, 2014

BusinessValue_July21_BTechnology is constantly evolving, and many businesses simply struggle to keep up with the changes, or even to manage their own existing solutions. While some may have come to terms with this and accept it as a challenge to running their business, there is an option available which could help many small business owners - outsourcing your IT to a Managed Service Provider (MSP).

What is an MSP?

When small to medium businesses look to outsource the management of their technology, many turn to a Managed Services Provider. These service providers function as partners in the management of a business's technology and often assume responsibility for managing, installing, and monitoring all, or at least a large part, of your tech on your behalf.

Because many of these IT partners are focused on technology services, they can often provide technology services equal to, or better than, hiring an in-house IT team. Beyond that, most IT partners offer services at a fixed monthly rate, thus allowing your business to effectively budget for IT expenditures.

5 Ways an IT partner can help

Aside from stabilizing costs and offering powerful IT solutions, there are many ways an IT partner can help your business. Here are 5:

1. Provide stability and direction

Technology is always changing, and the number of services and solutions available is simply staggering. Do you go with Windows, OS X, or Linux for your operating system? What about servers? Do you want cloud services? If so, which? Simply picking the right solution for your business requires an IT expert.

IT partners know technology and take the time to get to know your business needs and goals. From there, they can help pick and implement the best solutions that will support your current demands and provide the necessary IT platform on which you can stably expand your business.

2. Allow you to focus on your core business function

Anyone who is not an IT expert but has been thrust into the role of managing technology quickly comes to realize that technology management and implementation is a full time job. What this means in many small businesses is that someone has to give up time focusing on their main role to focus on technology. This inevitably results in a loss of overall productivity.

By outsourcing your IT, you and your employees can focus on core business functions, without having to worry about pressing technology issues and staying up-to-date with tech developments. This results in an overall increase in productivity.

3. Help you learn how to leverage technology to meet your business goals

To many, new technology like the cloud, advanced databases, and web languages like HTML and CSS are simply too confusing. They may even be downright scary! When people feel overwhelmed by technology, they will often not be able to use it in the best possible way or they will shy away from it. This can lead to decreased productivity, unused technology, and a wasted investment.

Many IT partners don't just install and manage systems, they also take the time to ensure that employees are comfortable with them and understand how to use them. This increases overall tech buy-in and can in turn reduce wasted investments, saving you money in the long run.

4. Enable you to use the latest technology

A common complaint of many who work in small to medium businesses is that the technology systems in the company are old or slow. This is largely due to the fact that many businesses operate on thin margins and simply cannot afford to update systems or integrate new ones.

IT partners offer their services to many different companies and therefore need to ensure that they are using the latest technology. Because most of these services are offered over the Web, they can pass along the features and updates to your business without you having to invest in new technology.

Beyond this, many MSPs offer full-service solutions that include picking the best technology for your business. They can install systems based on your budget and also manage them, ensuring that systems remain up-to-date and fully support your business needs.

5. Ensure compliance

Many industries like healthcare, education, finance, and real estate, require that businesses comply with strict regulations regarding technology and its use. Some governments even require that all businesses meet privacy regulations, making it difficult for businesses to know what the requirements are and if they are actually compliant.

IT partners also operate in these industries and are compliant. This means that they can often ensure that your business and systems are also meeting regulations.

If you are looking for an IT partner who can help your business get the most out of your technology, contact us today to learn more about our managed services.

Published with permission from TechAdvisory.org. Source.

July 23rd, 2014

BCP_July21_BWhile there are many different and important tasks a business needs to do, one of the most important is to back up data. Your data is important, and it really is a matter of when, not if, you will face a crisis where data will be lost. Most business owners realize this and do back up their data, but it can be a challenge to find a complete solution. In order to help, we have come up with eight data backup tips.

1. Pick the backup solution that works best for your business

When it comes to backing up the data on your company's computers and systems, most companies consider five main options:
  • Internal hard drives - You can either use another hard drive installed in your computer or partition an existing hard drive so that it functions as a separate drive on which you back your data up. This is a quick option, however should your computer or the hard drive fail - two of the most common computer failures - then you will lose this data.
  • External hard drives - These drives are essentially separate hard drives that you connect to your computer via a USB or other connection. Many of these drives allow for one touch backup and can be configured to back up data at certain times. While these can be useful, especially if you want to keep data backups easily accessible, they are prone to the same potential failure as internal drives.
  • Removable drives or media - For example, USB flash drives, DVDs, etc. These are great for backing up work you are doing at the moment or for transferring small files from one machine to another. These options are limited by smaller storage sizes however, so backing up even one computer will likely require multiple disks or drives.
  • Cloud-based backup - This is the act of backing up your files to a backup provider over the Internet. Your files are stored off-site and can be restored as long as you have an Internet connection. For many businesses, this has become the main form of backup employed, largely due to cost and convenience - files can be backed up in the background. The biggest downside of this backup option however is that you do need an Internet connection for it to work and you will see more bandwidth being used, which could result in slower overall Internet speeds when files are being backed up.
  • NAS - Network Attached Storage, is a physical device that has slots for multiple hard drives. You connect this to your network and the storage space on the hard drives is pooled together and delivered to users. This solution is like a mix of cloud-based and external backup, only the device is usually in your office. While it is a good backup solution, it can get expensive, especially if you have a large number of systems to back up.
There are a wide variety of backup solutions available, so it is a good idea to sit down and figure out which are best for your business. The vast majority of companies integrate multiple solutions in order to maximize the effectiveness of their backups and spread the risk of losing data around a bit.

2. Split your backup locations

Despite all of the backup options available, you can narrow these down to two categories, the fact that the backups are kept in two locations:
  • On-site - Data backup solutions that are kept in your office. This could include internal hard drives, or NAS, and more. The idea here is that the data backup is kept in your office. Some like USB drives may leave the office, but the main idea is that they are used primarily in the office.
  • Off-site - Data backup solutions are stored off-site, or out of the office. The best example of this is cloud-based backup where your data is stored in a data center, most likely in another city. Another example is backing up to hard drives and storing them in a secure location outside of the office.
In order to ensure that your data backups are available should you need them you could split up the locations where they are kept. Should you keep all of your backups on hard drives in the office and there is damage to the premises, you could see your data disappear. One of the most effective strategies is to have one set of backups on-site, and another off-site which will ensure that should there be a disaster in one location, the other will likely be safe and you will still be able to access your data.

3. Establish a standard naming and filing system

Have you ever seen how people organize their hard drives? Some like to use folders and subfolders that are organized neatly, while others tend to throw files into one general folder. The same can be said for they way files are named - there's just so many differences.

Because of these differences, it can be difficult to back up and recover files properly. We recommend that you pick a naming and file system that every file and folder will follow across all systems. This means backups will be quicker, you will be able to see what is new, and you will spend less time organizing files.

Beyond this, an efficient naming and organization structure goes a long way toward making it easier to find files and recover them should your systems go down.

4. Determine which files need to be preserved

While it may be tempting to back every file and folder up, in an effort to maximize efficiency of your solution, it is better to not back everything up. We aren't saying don't back anything up, but you should take time to identify what files and folders are to be backed up. For example, screenshots that have been uploaded to the Web may not need to be kept.

The same can be said for non-work related files. While these may be important to your personal life, they likely aren't to the business so should not be backed up onto your business backups.

Look at each file and folder and see if it has something to do with business decisions, or is in anyway tied to your business. If it is then it is probably a good idea to keep it.

Stay tuned for the next four tips coming soon. If you would like to learn more about data backups in the mean time however, please contact us today.

Published with permission from TechAdvisory.org. Source.

July 23rd, 2014

iPhone_July21_BWhile it is easy to simply type a message and send it, iPhone's messaging app - Messages - is capable of doing much more than that. And since businesses today rely on effective communication processes to help with workflow and productivity, it’s worth taking a look at some iPhone messaging tips which could help make your communication experience faster and easier.

1. Create Shortcuts

Have you ever typed phrases that you often use on the iPhone messaging app only to correct the typos that often come from typing on the touchscreen? To do away with this annoyance, you can create shortcuts for phrases by going to Settings>General>Keyboard>Shortcut and clicking on Add new shortcut. Now, whenever you type in a particular word that matches the shortcut you’ve entered, you won’t have to type out that entire phrase again.

2. Voice Messages

While voice messages have been ignored by many people, they’re actually a fast and effective way to communicate in the iOS messaging app. Simply record any message through the Voice Memo that is available in the Utility folder and tap on the arrow symbol in your recording page to share them on your messaging app. Now you won’t have to worry about typing your message or there being any sort of miscommunication again.

3. Share Contacts

Sharing contacts is handy for business operators. And while you’d usually go into your contact page and type in a contact’s phone number, there is a quicker way to get the job done. Simply tap into contact information and then scroll down and hit the Share Contact option. Not only will you eliminate having to type that contact’s phone number, but other information from that contact such as their email or work address will also be shared without you having to copy and paste it.

4. Share Messages

Sharing of information is a basic task in any business, and if you want to share a message but don’t want to type it out or even copy and paste it, the iPhone messaging app features another alternative. All you have to do is tap and hold down the message, tap on More and then on the blue arrow on the bottom right corner of the prompt command. By doing this, your message will be placed in a new message screen and you can simply choose your recipient.

5. Hide Message

We all need some privacy, especially where work is concerned, and the messaging app on the iPhone allows you to keep your messages to yourself by stopping the message preview from showing in the Notification Center. Go to Settings>Notification Center >Messages, then tap Show Preview to turn the message preview off. Now, when you receive a message, your iPhone will only display who sent that message without compromising its content.

Familiarizing yourself with iPhone’s messaging capabilities will save you time and frustration - and in chaotic business environments that can be a huge advantage. Looking to learn more about iPhone and its capabilities? Contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic iPhone
July 22nd, 2014

Facebook_July21_BFacebook is the largest social media network out there and has so much clout that many different apps now connect with the platform. Most of these apps or sites even allow you to use your Facebook account and password to access them. While this is convenient, some users do have an issue over this, especially when an app requests private information. To help increase the overall privacy of your Facebook account, the company has recently introduced two new app login features.

Anonymous login

What is interesting about apps on Facebook is the way people use them. For the most part, they add an app because their friends are talking about it and they want to check it out too. Most of the time however, we don't really stick with apps and instead quickly move onto another app. The problem with this is that all of these apps are asking for access to at least some information on your profile.

Most people who want to try an app usually would rather not have to share their profile information for privacy reasons. In an effort to increase account privacy, Facebook has announced the anonymous login feature. This will let you log into different apps using your Facebook username and password without sharing your personal information.

For example, if you want to use your Facebook account to access Flipboard you can login anonymously and link your account to Flipboard, but your personal information like name, email address, contact number, etc. will not be shared. This feature will also make it so the app cannot post on your News Feed. In other words, say goodbye to those annoying game invites!

This feature has been released on Facebook's side, but the company is still working with app developers to get the feature integrated into their apps. Over the next year or so we should see more and more apps integrate this great privacy feature.

Line by line control for Facebook login

An increasing number of apps are allowing users to log in using their Facebook account and password. Think of any app or even some sites you have recently used, or visited, and chances are you've seen the 'Log in with Facebook' button. Pressing this will link your Facebook account to the app, and then bring up a window asking you to allow the app to access certain information on your Facebook profile.

This information can include your username, email, friend list, birthday, Likes, etc. It also often includes another option to allow the app to post to Facebook on your behalf. While app developers certainly have the right to ask for this information, some users feel that apps often ask for too much private information. So, in an effort to tighten up privacy, the company has updated their Facebook app login. Now, when you go to log into an app using your Facebook account you can select what information is shared.

Click Log in with Facebook on many apps and you should see the usual permission window open, only now you should see a link that says 'Edit the info you provide'. Clicking this will bring up a list of permissions the app is requesting.

You will see check marks beside each line of permission. Many of these are actually optional, and you can now uncheck them to prevent that specific information from being shared. Also, by default, apps will no longer be able to post to Facebook on your behalf. You will need to approve this when you first connect to the app.

These two features are a great boost to account privacy. If you are looking to learn more about using them effectively contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 18th, 2014

Virtualization_July14_BVirtualization is the act of moving a physical component or bit of software from a physical environment to a digital one that is normally delivered over a network. This concept has become one of the most sought after tech improvements of the past decade, especially among small to medium businesses. The only problem is, virtualization is complex and carries with it some confusing terminology. To make things easier, we have created a glossary of ten common virtualization terms.

1. Virtual Machine (VM)

You will often hear virtualization experts bandy about the term VM. What they are talking about when they say this is the Virtual Machine. The VM is essentially a virtual representation of the computer on your desk. It can do everything a physical machine does, only everything is virtual and usually delivered over a network connection.

Because VMs are software based, you can often run more than one VM on the same physical machine. This could equate to having say two separate versions of Windows running at the same time, or even running a different operating system, say Windows on your MacBook.

2. Virtual server

A specific type of VM, in this case a server, that is running in a virtual environment. A common setup many offices employ is to have one physical server on premise. This server then hosts separate virtual servers that in turn host different services like email, networking, storage, etc.

Other businesses choose to rely completely on virtual servers. This is where another company hosts the servers which are delivered to you over the Internet. To the computers and users it appears the servers are there on your network, and can be interacted with normally when in truth, the servers are actually virtual.

3. Virtual desktop

Much like the virtual server, the virtual desktop is a specific type of VM. In this case, it is a virtually delivered version of an operating system like Windows, Linux or even OS X.

Since the advent of virtual desktops, the idea that companies have to stick with one type of operating system has started to become irrelevant. For example, if you own a Mac and need to access a Windows only program, one solution is to use a virtual version of Windows. If you have access to one, you will be able to run Windows from your Mac without having to physically install it on your computer.

4. Hypervisor

The hypervisor is essentially a small operating system that enables virtualization. Its job is to take physical hardware resources and combine them into a platform that is then delivered virtually to one, or many different users.

5. Host system

The host system, also referred to as the parent, is where the physical hardware and software is installed. These physical components are then copied by the hypervisor and delivered in a virtual state to the user. If you are creating a virtual desktop environment, then the host system will have the desktop's OS installed on it, along with the necessary software.

6. Guest system

The guest system, also referred to as the child, is where the VM is accessed. To carry the example on from above, the OS that is installed on the host machine is replicated by the hypervisor and the copy is then delivered to the user.

The user can interact with the OS just as they would with the physical host machine, because the guest system is an exact copy of the host. The only difference is, the guest machine is virtual instead of physical.

7. Virtual Infrastructure

When you combine a bunch of different types of VMs together into one solution, including hardware, storage, desktops, and servers you create a virtual infrastructure.

This can then be deployed to businesses who are looking for a completely virtualized solution. The easiest way to think of this is that your whole IT infrastructure is combined into one solution and virtualized. Many companies look for a solution like this because it reduces the need for on-premise hardware, while making it easier for an IT partner to manage.

8. P2V

P2V, or Physical to Virtual, is a term used by IT experts to refer to the act of migrating a physical system to a virtual one. The most common example of P2V is the merging of physical servers into a virtual environment that is hosted on one server.

9. Snapshot

A snapshot is an image of the state of the virtual machine at a specific point of time. This includes all of the data, configurations, and even windows or programs open at that time. Snapshots are used kind of like the Save button on video games - it saves your progress. When you next load up the VM, you will get all of your data, programs, and configurations back.

Snapshots are also kept in case something goes wrong with the VM. You can easily revert back to an older snapshot, one that was taken before the problem.

10. Clone

The action of taking one VM and creating an exact copy that can then be used by another computer or user.

If you are looking to learn more about virtualization, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 17th, 2014

BCP_July14_BThere is a good chance that you would like to see your business survive any future disaster, and any problems that follow as well. While it is nearly impossible to predict what the next disaster will be, it's easy to prepare for, especially if you have an effective business continuity plan. When it comes to these plans, there are many key metrics you need to be aware of and the most important two are RTO and RPO.

While both RTO and RPO are important elements of continuity plans, and they both sound fairly similar, they are actually quite different. In this article we define RTO and RPO and take a look at what the difference is between the two concepts.

RTO defined

RTO, or Recovery Time Objective, is the target time you set for the recovery of your IT and business activities after a disaster has struck. The goal here is to calculate how quickly you need to recover, which can then dictate the type or preparations you need to implement and the overall budget you should assign to business continuity.

If, for example, you find that your RTO is five hours, meaning your business can survive with systems down for this amount of time, then you will need to ensure a high level of preparation and a higher budget to ensure that systems can be recovered quickly. On the other hand, if the RTO is two weeks, then you can probably budget less and invest in less advanced solutions.

RPO defined

RPO, or Recovery Point Objective, is focused on data and your company's loss tolerance in relation to your data. RPO is determined by looking at the time between data backups and the amount of data that could be lost in between backups.

As part of business continuity planning, you need to figure out how long you can afford to operate without that data before the business suffers. A good example of setting an RPO is to imaging that you are writing an important, yet lengthy, report. Think to yourself that eventually your computer will crash and the content written after your last save will be lost. How much time can you tolerate having to try to recover, or rewrite that missing content?

That time becomes your RPO, and should become the indicator of how often you back your data up, or in this case save your work. If you find that your business can survive three to four days in between backups, then the RPO would be three days (the shortest time between backups).

What's the main difference between RTO and RPO?

The major difference between these two metrics is their purpose. The RTO is usually large scale, and looks at your whole business and systems involved. RPO focuses just on data and your company's overall resilience to the loss of it.

While they may be different, you should consider both metrics when looking to develop an effective BCP. If you are looking to improve or even set your RTO and RPO, contact us today to see how our business continuity systems and solutions can help.

Published with permission from TechAdvisory.org. Source.

July 17th, 2014

iPad_July14_BMobile devices and the apps we use on them have drastically changed the way we communicate. With platforms like Facebook, many people are simply not calling each other anymore, instead relying on Facebook's messaging feature. In an effort to make this easier to use on mobile devices, especially the iPad, the app has recently been updated.

Facebook Messenger on the iPad

Over the past few months, Facebook has been set on separating the two main functions of their platform - at least for mobile users. What this had led to is two separate Facebook apps, with the main Facebook app being just for social media functions, and a stand-alone app for its popular messenger service.

Up until now, there has been one version of the Facebook Messenger app for iOS, and it was optimized to smaller iPhone screens, meaning if you used it on iPad, it looked a little weird. In early July 2014, Facebook set about fixing this by releasing a new update to the app, which brought full support for the iPad's bigger screen.

When you download this app onto your iPad, you will have the same functionality as the other versions, including the ability to call people, send group chats, share photos, and best of all message people.

Where to get the app

It may seem a bit odd to have a separate app just for messaging on Facebook, but it can be useful for businesses who use this form of communication. Essentially, the app makes it easier to use just the messaging features without having to deal with the full social media aspect of the platform.

If this sounds like a useful app, you can download it from the iTunes Store for free.

Using the app

If you have not used the app before, it may take a bit of time to get used to it and to set it up. When you first download and open the app you should be asked to log in using your Facebook account. You should then see your contacts pop up with recent messages at the top.

Tapping on a chat will open the window with your message history and standard messaging abilities. You can scroll through your different chats on the left and view these by tapping on them.

At the bottom of the main chat history window you should see a number of buttons:

  • Recent - The default view, showing recent chats or messages in chronological order with the newest being at the top.
  • Group - Shows only your Group chats, again with the most recent messages at the top.
  • People - Brings up your contacts so you can start new messages. Simply search for a contact and tap on their name to start chatting.
  • Settings - Opens the Settings panel, allowing you to change various features including the alerts that are shown when you have a new message.
One potentially useful feature the app offers is the ability to call people directly from the chat window. If you open a chat, you should see a phone icon at the top-right of the screen. Tapping this will allow you to call the person you are chatting with, and if they also have the Messenger app installed, the call will be free. If the other person doesn't have the app installed then you will get a message saying that carrier rates may apply.

Looking to learn more about using Facebook on the iPad? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic iPad
July 16th, 2014

AndroidTablet_July14_BThe tablet is easily one of the most indispensable devices for many business managers and owners. These highly mobile devices allow you to stay in touch with the office and also work without having to lug around a heavy or bulky laptop. Because of this, many businesses are looking to integrate tablets, especially Android tablets. In order to help make things easier, here are some dos and don'ts when using Android in the office.

Do:

  • Use separate profiles - Tablets that use newer versions of Android (4.3 and newer) have a unique feature that is incredibly useful for business users: You can set up more than one account on the device. This means you can have a personal account and a work account on the same device without the two crossing over. Each account has their own apps and layout, which makes it perfect for the BYOD crowd.
  • Pick responsibly - Android tablets come in all shapes and sizes, and with different versions of the operating system. It is therefore a good idea to do some research before you buy one for your business. Take the time to try and identify what you will be using the device for, what features you would like, and most importantly, if the device is compatible with your existing systems. We strongly recommend going with one of the big name brands like Samsung, LG or Acer, or the Nexus line.
  • Develop a usage and management plan - Before you implement the device into your office, be sure to develop a plan on how the device is to be used and managed. Will each employee be in charge of managing their own device, or will your IT partner manage them for you? Be sure to also develop a list of approved apps, including important ones like email and messaging; and that users are familiar with how to use them.
  • Look into accessories - One common factor many businesses forget to look into when implementing Android devices is the numerous accessories available for tablets. In order to extend the life of the devices it is a good idea to get protective cases and screen covers. Also, look and see if the device you have chosen has a removable battery or SD card. If it does, you may want to invest in extra batteries and cards.

Don't

  • Skimp on security - As Android tablets become more popular, the devices are seeing an increase in malicious attacks. It would therefore a good idea to implement mandatory security measures on all devices. This includes an antivirus scanner and daily check for app updates. Also be sure to educate the staff who will be using the device on common security issues, such as how to spot fake apps, use an antivirus scanner, and how to enable secure browsing on the Web.
  • Allow third party app stores - Because of the openness of Android, you can install apps from almost any location. This has resulted in many third-party app stores (stores not run by Google) popping up. Some of these stores host any kind of app, including ones that contain malware. So, it is a good idea to just outright ban these stores; only allowing apps from Google Play to be installed on devices.
  • Force the tablet on users - Some employees won't want a tablet, preferring instead to stick with their laptop or desktop. Don't force your employees to adopt the device if you know they won't use it. This will just lead to you wasting your tech budget and to unused devices.
  • Worry about fragmentation - Yes, Android is very fragmented - devices are running different versions of Android. While this may seem like a big deal, it doesn't have to be. We recommend that when selecting tablets, pick a newer version of Android and purchase tablets using the same version. Once you get used to the tablet, the issue of fragmentation will usually disappear, especially if everyone is on the same version.
If you are looking for help selecting and managing an Android device for your office, contact us today to learn about how our services can help.
Published with permission from TechAdvisory.org. Source.