Blog

July 12th, 2016

But you already knew that.

You may be a private practice clinician thinking to yourself that you’ve already seen and heard numerous times that healthcare information is up to 50 times more valuable to criminals. You also probably have learned that what we used to believe about getting hacked as being a rare occurrence involving fringe elements, no longer applies. In fact, with the June 20 memo from Secretary Burwell, it’s now official: the healthcare industry has formally recognized cyber crime for what it is – a sophisticated and professionally run criminal enterprise – that is growing rapidly, with no apparent control over it. We view the memo from Secretary Burwell as timely and prudent. But frankly, it has been a good long time since “we’re too small/we’re not on anyone’s radar/nobody knows about us” justifications have sufficed. So, what are you supposed to do now?

“we’re too small/we’re not on anyone’s radar/nobody knows about us” justifications no longer suffice

Your feeling of cognitive dissonance from being aware of, but yet not taking action on this knowledge, may have already motivated you to implement information security solutions on your own – but maybe you quickly got bogged down by technical jargon and were sticker-shocked by costly solutions that seemed overly complex for your practice. That, combined with the enduring pressures of growing your business, controlling costs and keeping up with training and staffing demanding your attention – you eventually lost momentum, and went back to what you were good at – patient care and running your business. Does this sound familiar?

You are not alone.

We of course applaud the memo from Secretary Burwell, especially those of us who work side-by-side with private practice clinicians who are diligently striving to protect the confidentiality and security of their patients protected health information. If you would gladly do what was required, if you just knew what to do – you are not alone. Every day, we are inspired by clinicians who are diligently implementing cost-effective, best-of-breed solutions and best practice policies and procedures that successfully address their ransomware risks. Here is what we are seeing clinicians do that gets them results.

Work with a partner.

If you already had the operational budget to staff your own IT, you would have done it by now. And with the shortage in information security skill sets and advanced healthcare compliance experience – now would not be the best time to start. Instead, find an experienced partner to help you. Generally, the more experienced and skilled partners will engage with you in clear terms, and discuss both the business and technical aspects of your practice. Someone local who can meet with you onsite in your clinic can be a good option for you. Talk to three candidates – and if you walk away from all of those initial conversations with your head swimming in tech talk, just imagine trying to get to the bottom a thorny issue that may come up…and keep looking until you find a partner that can demonstrate clear thinking and direct, straightforward communication of how they will help you identify, prioritize and address your ransomware vulnerabilities.

Process. Then solutions.

Be open and curious as per your usual in your selection process – but do take note if early discussions tilt heavily toward solutions. But you may ask – if the prospective partner is very strong technically and is eager to cover the many details of their solutions, why should you be concerned? The reason isn’t because solutions aren’t needed – it’s because of the possibility that the prospective partner, while strong in technology, may still be on the learning curve regarding process. As you have already realized, ransomware is a well-known issue now, so beware of product and service vendors eager to sell their solutions, who may be focusing a bit more on their sales volume than on tailoring their approach based on the details that make your practice unique.

the hard earned secret to delivering enduring value is well thought-out process

Experienced professionals who have a track record of success tend to know that the hard earned secret to delivering enduring value is well thought-out process for implementation, maintenance and continuous improvement. Solutions come and go. Meanwhile, process lives on, and ushers in right-sized, prioritized solutions at the appropriate time.

Security Risk Assessment and Management Plan. Update annually.

As all clinicians know, the federal law governing covered entities (hint: it’s five capital letters, rhymes with the last name of host of ABC’s Live with Kelly), and mandates that they complete a Security Risk Assessment on a periodic basis – which experts in industry often recognize as annually. As it turns out, it’s not just a good idea for compliance – it is an excellent starting point for ransomware cyber-risk planning as well. If you have been performing your Security Risk Assessment in-house just to check-the-box, start working with a partner. In fact, you may want to ask your prospective partner for their viewpoint on the importance of and approach to the Security Risk Assessment. If given a fair chance (or maybe even more than one), but the prospective vendor partner is unable to describe the significance of the Security Risk Assessment and resulting Management Plan in terms of right-sizing and prioritizing solution options – you may want to let them know that you thank them for coming in, but you regret that you need to leave to attend to an urgent business issue (spending your time wisely, that is).

Plan the Work. Work the Plan.

Although at times we experience a love/hate relationship with Governance and Risk professionals because it can feel like they are always poking holes in our work – let us remember that bottom line, they are trusted, wise and have excellent insights. We recommend that you take their advice. Internal Audit, External Audit, Audit Committee, Examiners at the State and Federal Levels – they all seem to agree: As counter-intuitive as it may seem, a record of steady progress on implementing improvements from a list that is prioritized based on a combined analysis of likelihood of threats and their impact is not viewed as a commission of guilt or incompetence, but rather quite the opposite: as the hallmark of a serious organization that has developed a strong posture to address their ransomware cybersecurity risks.

Steady and sustained focus will see you through.

You may see over the coming weeks and months, numerous discussions of ransomware and all the who, what, where and whys. Read it all. As much as you can stand, anyway. Then once you have developed a base of knowledge:

  1. Start working with a partner. Take some time. Find a good one.
  2. Update your Security Risk Assessment. Update your Management plan. Discipline yourself to complete this step first. Plan the work – your future self will thank you later.
  3. Work the plan. Deliver the top prioritized item. Then go back to the plan for the next one. Resist the temptation to over-commit. Remain focused and commit to steady progress.

By getting help from a partner, combined with your steady focus – you may surprise yourself with how satisfied you feel after implementing significant improvements to your ransomware risk level at an affordable cost…not to mention the increased confidence from having your very own coherent and controlled ransomware risk program, tailored just for your practice.

Todd Takada
Cavu Networks

July 11th, 2016

2016July11_SocialMedia_AIf you’re like us, you’ve always got a finger to the wind when it comes to search engine strategy and internet presence. If you’re not like us, that’s okay too, because we’ve got a breezy little article here to bring you up to speed on 5 of the latest SEO and Social Media trends that are blowing through the ether.

Everyone knows about death and taxes, the two most famous certainties that we must endure. If there were a third, surely it would be that without robust up-to-date search engine optimization (SEO) and social media strategies, your business will fall behind.

And since there’s no time like the present, we’d like to put forth some of the things that your business should consider taking into account this year in order to increase awareness of your brand, drive more traffic to your websites, and ultimately boost conversion rates.

1. Conversational search

With the success of digital assistants like Apple’s Siri, and the relatively recent roll outs of Amazon Echo and Google Home - two virtual helpers for the home - voice recognition is becoming much more prominent. For businesses, this means adapting your site’s content so it’s detectable by spoken phrase searches in addition to simple short keyword searches.

2. Social publishing

There’s tons of content published on social media, but what’s changing is the convenience with which it can be consumed. Users are ever more at ease with the videos and full-length articles dropping into their feeds - and with not having to leave the comfort of their favorite social apps to see them. The new challenge for companies will therefore be to publish high-quality content through social channels first.

3. Real-time customer interaction

Having interesting videos on your social media channels is practically old hat. Nowadays, given our speedy and seemingly omnipresent internet connections and our on-demand expectations, the move is towards live, streaming, “in-the-moment” interplay with customers, which has been shown to capture users’ attention for longer periods of time than recorded video content.

4. Increasing emphasis on apps

Mobile users spend nearly 90% of their time in mobile apps and just 10% on mobile websites. It’s not surprising given their relative ease of use, and this disparity could become even greater as social media platforms continue favoring apps and search engines like Google continue developing a “web of apps” - something that just might mean the end of traditional websites in the mobile environment.

5. More rich answers

“Rich answers” are Google’s attempt to provide search results that are sufficient enough to eliminate the need to click through to a website for more information. Their prevalence is on the rise, which could significantly reduce the amount of visits to your site. But it does provide an opportunity to use “structured markup,” a protocol that allows search engines to display your site’s data in more creative ways.

As always, the fast-moving advance of ways to optimize your internet presence is keeping us on our toes, and these 5 trends will likely make a difference for you in 2016 and beyond.

So if you sense a need to enhance your company’s SEO and Social Media strategies - but you’re not entirely sure about what to do first or how to do it - remember what Benjamin Franklin once said: “An investment in knowledge pays the best interest.”

We’ve got the knowledge, call us today and start collecting on those dividends right away.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
July 7th, 2016

2016July7_Web_AWho would have guessed that clouds could be so complex? Yet in a day and age of seemingly continuous technological advances, “cloud” computing has become one of the more intricate and interesting approaches to managing IT resources for businesses. Not to mention one of the most cost effective, flexible, and secure, thanks in part to something known as the “hybrid cloud.”

Hybrid clouds, as the name suggests, are a version of cloud computing that are made up of two different components. They are a combination of private clouds (where data and applications that require tighter controls are hosted either internally or privately in the cloud space); and public clouds (which are operated externally by third-party providers with the express purpose of reducing a company’s IT infrastructure).

A recent “State of the Cloud” report indicates that 71% of all cloud users are now implementing hybrid cloud solutions, mainly because the ways in which they benefit small- and medium-sized businesses are so numerous. Here we’ve highlighted what we consider to be the 4 most significant benefits of hybrid cloud solutions.

Cost efficiency

Does your industry go through seasonal workload increases? With a hybrid cloud solution, you’ll be able to easily handle spikes in demand by migrating data from maxed-out on-premise servers to scalable, pay-as-you-go “servers in the sky” whenever needed, without incurring any extra hardware and maintenance costs.

Adaptability

Having the ability to choose between on-site/privately-hosted cloud servers and ones on the public cloud gives you more than just cost flexibility. It also gives you the capacity to pair the right IT solution with the right job, like keeping smaller projects on your local or private cloud, while utilizing the more robust computing resources on offer from the public cloud for your bigger projects.

Scalability

What exactly does this common IT buzzword mean for your organization? In a nutshell, it means that the hybrid cloud allows you to “scale up” or “scale down” on an as-needed basis. So if there are last-minute demand increases that your hardware can’t support, or if you’re simply planning for future expansion, hybrid cloud solutions allow for on-demand increases or decreases in capacity.

Security

Last, but certainly not least, are the security advantages of a hybrid cloud solution. SMBs are able to host within the private cloud their more sensitive data such as an e-commerce website or HR platform, while using the public cloud space for less sensitive data where it’s more cost effective and there is less likely to be major problems should there ever be a security breach.

SMBs can set up their hybrid cloud model in a few different ways, depending on their precise needs and the types of providers available to them:

  1. By employing one specialized cloud provider who offers soup-to-nuts hybrid solutions
  2. By integrating the services of a private cloud provider with those of a public cloud provider themselves
  3. By hosting a private cloud themselves and then adopting a public cloud service which is incorporated into their infrastructure
So as more of our customers' IT infrastructure moves to the cloud, we’re adapting and developing innovative ways to maintain hybrid cloud environments. What this means for you is we’ve got the know-how to provide outright cloud solutions, or at the very least the expert consultation you need, to ensure that your day-to-day operations transition to a hybrid cloud solution without interruption and in a cost-effective manner. Contact us today to learn more about the benefits that the hybrid cloud can bring to your business.
Published with permission from TechAdvisory.org. Source.

Topic Web & Cloud
July 6th, 2016

2016July6_Google_AIt doesn’t matter if you’re a newbie or an expert in search engine optimization, the field changes so often that it can feel like trying to hold water in the palm of your hands. That can be pretty frustrating since businesses of any size and age need to get people to their sites in order to really grow in our web-driven culture. Thankfully, there are a few tried and true methods for improving your position in Google’s index and we’ve listed the best four below.

Make sure that you’re indexed by Google

This is the first, and simplest step. Go to Google.com and search ‘site:’ with your website domain listed after the colon (example: ‘site:acme.com’). If you don’t see any results from your page listed, that means Google hasn’t even added your site to its search results yet. Although some advisers recommend filling out a request form that Google offers, there is a much faster way to get recognized by the search giant.

Google is constantly scanning web pages for updates in content to include in their search results. As soon as they see a link to an external site on one of their already indexed pages, Google will add that link to the queue of new sites to be scanned and indexed. Feel free to fill out the form, but you’ll probably be waiting a long time. If you can get your domain name linked on a popular or trusted page, you’ll start seeing your page in the search results in no time.

Now go out and get more links

Alright, so your site is showing up in Google’s search results -- on the third or fourth page. Pretty much the only people making it that far into search results are students writing papers at 4 a.m., desperately looking for barely-related citations to pad out a bibliography. In this particular situation, we’re lucky enough that the solution is more of the same from step 1. The more links to your site from external pages, the higher you climb in the search results.

Other than getting affiliate businesses to link you on their pages, consider managing a blog or RSS feed. Content generation not only promotes interest and traffic in your site, it also opens up the opportunity for you to submit yourself to blog directories like Technorati and Alltop that compile source material and get you those external links.

Fine tune your content

After you’ve spent some time generating traffic to your site from links on external sites, it’s time to put a magnifying glass over your own site and start perfecting the little things. For starters, make sure Google has your .xml sitemap on file. It’ll help any content updates on your site get pushed to the indexes a little bit faster and improve your ranking. Head over to Google’s Webmaster Tools to submit your sitemap.

Once your site has been indexed, be very careful not to change any of your core ‘permalinks’. If users have links that direct them to pages that can’t be found, it could knock you pretty far down the ladder. Keep your pages live, and keep them named efficiently. Some website platforms, like WordPress, use default link structures that create complicated, number-based links that can be off-putting to users and confusing to administrators and search engine indexers. If possible, make sure your links use category and page title references for more appealing links and organizational structure.

Measure and track your ranking

All the points listed in this article are ongoing projects. Just because you believe your site has achieved a desirable ranking on Google doesn’t mean it will stay there. Keep an eye on where it stands and never let yourself get lazy with your content production, site management and SEO monitoring -- it could mean the difference between moving up the search page, and disappearing from it altogether. Online tools like Cyfe and give you a more in-depth look at your site traffic and external links so you’re always ahead of the competition.

Optimizing your Google page indexing is a little like visiting an auction house where everyone has a megaphone and a bigger budget than you. Some designers spend countless hours becoming experts on this specific topic and market their services to a wider audience. Sure, a truly great and well-reviewed business is going to generate a lot of organic traffic, but why not call one of those experts to give you the boost you need? We’ve got the skills and the time to sit down with you and get your site moving up the ladder.

Published with permission from TechAdvisory.org. Source.

Topic google
July 5th, 2016

programming concept: text wordpress with gears over businessman handWordPress is one of the most popular and reliable content management systems on the market, and for this reason it is also one of the most frequently targeted platform for hackers. Websites that are running older versions of WordPress are often vulnerable to security breaches and data leaks. Seeking to correct a number of bugs, WordPress recently updated to version 4.5.3, a release that doesn’t provide much additional functionality but is highly recommended by the WordPress security team. Here’s what you need to know about their latest security update.

What’s new in WordPress 4.5.3?

The latest WordPress version includes fixes for more than two dozen critical vulnerabilities, including:
  • Redirect bypass in the WordPress customizer API
  • Two separate cross-scripting problems via attachment names
  • Information disclosure bug in revision history
  • Denial-of-service vulnerability in the oEmbed protocol
  • Unauthorized category removal from a post
  • Password change by stolen cookies
  • Some less secure sanitize_file_name edge cases
All vulnerabilities were found by members of the WordPress community. In addition to the security issues listed above, WordPress 4.5.3 fixes 17 maintenance issues from its predecessors 4.5, 4.5.1 and 4.5.2 (See full list).

WordPress update process

Many sites have an automatic background update, meaning that website admins will receive an email, confirming the update. If your website doesn’t support this feature, you can trigger manual updates by logging in to your WordPress dashboard and click on the ‘Please update now’ link, which is clearly visible on the top of the page.

Before you perform the update, however, we highly advise you to make a backup of your website. This is so that you can quickly restore your site in the event that something goes wrong. Once you have your backup ready, you can go ahead and update your site with the push of a button. Alternatively you can download WordPress 4.5.3 here and install it via File Transfer Protocol (FTP).

It’s important to update to the newest versions of WordPress to ensure that you have access to all of its functionalities and to keep your data and website visitors safe from potential security threats. Google will also demote websites that are running old versions of WordPress in its search results pages - all the more reason why you should regularly check for WordPress updates. If you have any questions about WordPress security, feel free to get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 4th, 2016

Security_Aug31_CThe Internet is a powerful platform that brings people together on a global level while giving them access to a wealth of information anytime they please. With the good, comes the bad - some utilize their skills in committing cyber crimes from the comfort of their own homes. Case in point, the recent Cerber ransomware attacked that ravaged millions of Microsoft Office 365 users worldwide. Here’s what a security expert and Microsoft had to say about the matter:

Steven Toole, a researcher for the cloud-security firm Avanan, detailed that his company experienced the first attack at 6:44 a.m. on June 22nd. Another interesting fact is that at least 57 percent of all Microsoft Office 365 customers on Avanan’s platform received at least one phishing attempt that contained the infected attachment. While Avanan did extrapolate the number of Office 365 users involved, the exact number has yet to be revealed.

This is particularly interesting since according to Microsoft’s first quarter reports in 2016, there are over 18.2 million Office 365 subscribers worldwide. On top of the global scale in which the attacks took place, it took Microsoft over 24 hours for the attack to be detected and for any attempts to block the attachment to be made.

Microsoft’s side of the story shares many similarities with slight differences on the detection and actions made about the ransomware attack. In an email to SCMagazine.com, the spokesperson wrote:

"Office 365 malware protection identified the attack and was updated to block it within hours of its origination on June 22. Our investigations have found that this attack is not specific to Office 365 and only a small percentage of Office 365 customers were targeted, all of which have been protected."

The point is Office 365 was compromised, regardless of how quickly it was detected - many people were asked for a ransom and were told that their files have already been encrypted. Still wanting to come across as polite, the ransom came with an audio recording that detailed what the attack was and what measures must be taken in order to regain access to the files. The unknown attacker asked for a ransom of 1.4 bitcoins or an equivalent of $500 in exchange for the decryption key.

Toole noted that “This attack seems to be a variation of a virus originally detected on network mail servers back in early March of this year," He also added that "As it respawned into a second life, this time Cerber was widely distributed after its originator was apparently able to easily confirm that the virus was able to bypass the Office 365 built-in security tools through a private Office 365 mail account.”

This proves that cyber criminals go to great lengths to not only use their tools but to improve on them and eliminate flaws. So no matter how many firewalls, passwords or fire-breathing dragons you have to guard your servers and networks, without the right network security measures in place, chances are they’ll manage to find a way to overcome the hurdles and wreak whatever havoc they can.

Network security isn’t something to be taken lightly, if you are unsure about how safe or how capable your systems are in fending off cyber threats - get in touch with us. Our experienced and friendly staff will help you with any ransomware or security-related issue you have.

Published with permission from TechAdvisory.org. Source.

Topic Office
July 1st, 2016

2016July1_Windows_AEven an IT novice can recognize the scourge of ‘bloatware’ on new hardware. It doesn’t matter what type of new gadget you’ve purchased, it’s bound to come loaded with unnecessary apps and software that the manufacturer believes will drive you to purchase more of their products. And while they aren’t impossible to remove, those pesky programs can take a lot of time to get rid of. With Microsoft’s new ‘Refresh Windows’ tool you can send all of them back from whence they came in just two easy steps.

If this software isn’t trying to drive you back to the manufacturer's sales stream, it’s paid a hefty chunk of change to be included on off-the-shelf hardware. Regardless of which it is, it’s not there to help you -- it’s there solely to increase the manufacturer’s bottom line. So if you think bloatware just isn’t enough of a concern to waste time refreshing your Windows install, consider that PCs without it start up 104% faster, shutdown 35% faster and have approximately 30 more minutes of battery life.

Because this isn’t a new problem, we’ve seen similar removal tools in the past, but they didn’t offer the same level of usability. When using Windows 8’s ‘Refresh and Rest’ the bloatware either wasn’t removed, or if it was, Windows required the reentry of a license key and a lengthy install completely from scratch. ‘Refresh’ Windows swiftly replaces everything on your hard drive with a fresh version of the OS as if it came straight from Microsoft.

Although this tool is best suited for clearing unwanted programs off of your machine right after you’ve purchased it, there’s no reason that you can’t use it further down the road. You might be thinking, “No way, I’ve got way too much important information to sacrifice it all just for a clean install.” Well depending on the extent of your data, that isn’t a problem.

When you open the ‘Refresh Windows’ client there’s only one option you need to select before moving forward, ‘Keep personal files only’ or ‘(Keep) Nothing’. Selecting the former will keep everything stored in your ‘Music’, ‘Pictures’, ‘Videos’ and ‘Documents’ folders. Remember that documents (in these folders) created or edited using Microsoft Office will be kept but the Office suite itself will be removed. Make sure you still have the licenses and installation disks for every piece of software you plan to use after the refresh.

This new feature will accompany next month’s Windows update, but users who just can’t wait to squash annoying ‘crapware’ can find the tool here. Simply download, open, and choose if you want to keep any personal files -- one, two, done.

You may be able to adequately navigate your way around a Windows machine, but there are often shortcuts that insiders use to speed up otherwise mundane management tasks. For any Windows projects or problems you have, drop us a line, we’ll have them fixed faster than you can uninstall that CD-burner utility that you never asked for.

Published with permission from TechAdvisory.org. Source.

Topic Windows
June 30th, 2016

2016June30_BusinessIntelligence_AOut of all the numerous social media platforms, Instagram is playing in the big leagues with over 400 million active users. But since most companies are acquainted with Facebook and Twitter, Instagram has essentially been overlooked as a marketing tool. The challenge isn’t posting a picture, but attempting to drive traffic back to your company’s website. Establish a solid corporate presence with the latest tools announced by Instagram:

Business profile pages

Previously, it was hard for Instagram users to distinguish an account belonging to a business from one that is dedicated to cats, but with the Business Profile feature, that’s a problem of the past. By taking advantage of this, you are giving customers directions to your business with just one tap - and on top of that, you can also establish a contact call to action with choices that include: text message, phone call or email.

The posts themselves are identical to those from other accounts, but as previously mentioned, the major difference is the account’s profile page itself. Especially when customers are given directions and various channels for communication with just a single tap. This fills in the void many business owners experience: converting the interest sparked on Instagram and converting it into action.

For example, if you stumble upon something you like on the page of a clothing boutique, you’ll be able to initiate contact with a single tap to inquire or to make a purchase.

Insights

Inspired by Twitter and Facebook, Instagram will now offer analytical data that tracks how the content is performing. Business owners will get to see reach and impressions data along with demographics (ex. On location and age) for each post.

This data won’t be available on Instagram itself, to access it you’ll need a business Facebook page that is linked to the Instagram account. By analyzing user demographics and behavioral data, you’ll be able to create Instagram content geared towards users that are more likely to engage with it.

Promote, promote, promote

Both the Business Profile and Insight features are free, but companies with a generous advertising budget can utilize the Promote feature to enhance top-performing posts through paid advertisements. Instagram will also suggest which posts should be promoted, and you can use the data gathered from Insights to designate top-performing posts based on your target audience.

Plus with customizable targeting options, you are in control of how little or how much you want your content promoted. Promoted content also comes with a call-to-action embedded in the post, for example: triggering a phone call or redirecting traffic to your website.

Both Instagram and Snapchat are emerging as the most popular social media platforms to date, and before these features are released later this year, you should consider establishing an Instagram presence for your business as soon as possible. For any further questions, feel free to contact us. #wereheretohelp

Published with permission from TechAdvisory.org. Source.

Topic business
June 29th, 2016

2016June29_Virtualization_AJust understanding what office virtualization is can be difficult enough; picking from the long list of software providers that help you achieve it can feel impossible. Since virtualization is a relatively new practice for small and medium-sized businesses, there isn’t even a standardized way to go about virtualizing your company. So why not start with this simple list of the 5 most popular virtualization options and what their strengths are.

VMware

Any conversation about virtualization for small and medium-sized businesses usually starts around VMware. Although it wasn’t necessarily the first, VMware was the company that really put office virtualization on everyone’s action item list. The company offers a number of different solutions for different sized businesses with a wide variety of needs. Its ease of use and robust security features have secured its reputation as one of the best options for virtualization at SMBs.

Citrix

An average user may not recognize the company name, but has a good shot at previous knowledge of their popular remote access tools, GoToMyPC and GoToMeeting. Citrix has specifically geared their virtualization software, XenApp, XenDesktop, and VDI-in-a-box toward SMBs and even claims that non-IT staff can easily manage and administer the services. They even provide a free trial to prove it.

Microsoft

Although it may be a little more difficult to manage without an in-house or outsourced IT staff, Microsoft’s Hyper-V option is hard to ignore considering its integration with the popular cloud platform Azure. Whether you’re a Microsoft loyalist or you just want to minimize the number of vendors in your network, Hyper-V offers everything you need from a virtualization service.

Oracle

This company just keeps getting bigger and bigger. Specializing in marketing software, they also offer database management, cloud storage and customer relationship management software. If you’re using any of their services already, there could be benefits to enlisting their virtualization services as well. Oracle does everything, server, desktop and app virtualization, and they believe that consolidation of all of these into one solution is what sets them apart.

Amazon

And since we’re on the topic of household names, let’s talk about Amazon’s EC2 platform, which hosts scalable virtual private servers. The ability to scale and configure capacity is definitely EC2’s biggest draw for SMBs, who are preparing for the possibility of rapid growth. Although almost any virtualization service is rooted in scalability, Amazon is leading the pack in how quickly and finely you can adjust your solution to your individual needs.

Virtualization is a really hard topic for most SMBs to tackle. This list only covers the most popular vendors, and there are plenty more out there. Choosing one based on its application possibilities and management requirements is not a subject for the lighthearted. Get in touch with us today so we can break down all of the technobabble into easy-to-understand advice and expertise.

Published with permission from TechAdvisory.org. Source.

June 28th, 2016

2016June28_AndroidTablet_ANot only is the efficiency of a Mac/iPhone combo well-known but it’s also quite hard to beat. That being said, it doesn’t mean that there aren’t other dynamic duos that can give them a run for their money. Enter Android phones and Google Chrome, the technological team with some pretty decent tricks up their sleeves. Here are five useful things you can do on your computer with the Android phone and Google combination:

Before getting started, you must make sure that Google Now is activated on your Android phone and the same account must be logged in for both the phone and for Chrome.

Send directions from Google Maps to your Android phone

You’re taking your time looking up directions for a restaurant on Google Maps, but your friends called to tell you everyone’s already there; fear not. You can send the location details directly to your phone. Start by typing in the destination on Google Maps and look for the Send to your phone option in the center left, click on that and click on your phone’s name. Et Voila! Co-ordinates should appear in your phone’s notifications.

Sync your computer’s Chrome tabs to your phone

This is especially useful when you are working on or researching something on your computer and need to continue on your phone after work or when heading outside. Tap on the Settings icon (3 vertically aligned dots) on the top of right of the Chrome App in your Android phone, go to Recent tabs, and you’ll see all the devices when you’re logged into Chrome.

Finding your phone

Simply typing “find my phone” in the Google search bar prompts Google to look for the last known location of your phone. On top of that, you can also ring your device in the hopes that someone will pick it up and tell you where you can come pick it up.

Use your phone to control your computer

Start off by installing the Chrome Remote Desktop app from the Google Play Store on your Android phone and the Chrome Remote Desktop app for Chrome on your computer. With this you can see and work on your Mac via Android phones as if you were sitting right in front of your desktop. This also works for Windows computers as well!

Set reminders for yourself with Google Search

If calendar entries aren’t doing the trick, this alternative is perfect for you. After activating Google Now, type in “remind me X to Y” in the Google search bar then click the blue “Remind on Google Now” nestled at the bottom of the reminders box. Google Now will then remind you of whatever you need reminding at that time - you can also set reminders to alert when you reach a certain location as well.

Now that you know that Android has more than just cute names for operating system updates, you should look into investing on a new device for yourself. Especially when there are so many things it’s capable of doing when paired with Google Chrome, expand your tech horizon and make the most of both Apple and Android. For any questions regarding the Android/Chrome combo, feel free to give us a call anytime!

Published with permission from TechAdvisory.org. Source.

Topic android