Blog

October 2nd, 2014

Hardware_Sep29_AComputers and mobile devices might be high tech but they are still exposed to dust and grime and get dirty after a time. While for many a slightly unclean screen is a minor annoyance, neglecting to clean your devices could result in a decrease in longevity and possibly performance too. Once you commit to regularly cleaning your tech equipment it is important that you know how.

Cleaning desktop monitors

The monitor on your desktop is what many people spend the majority of their days in the office looking at. A clean monitor makes it easier to see your desktop more clearly. The best way to clean your monitor is to turn it off first, then take a microfiber cloth (these can be purchased at many optical stores as well as computer stores) and gently rub in a circular motion.

If there are still spots, then dip the cloth in a tiny bit of water - don't spray the water onto the screen - and try cleaning again. It is important that you don't press hard on the screen, as this could damage your monitor's pixels. Also, it is not a good idea to use paper-based products like paper towel or tissue, as they will not only leave residue, but may actually scratch the monitor slightly.

Cleaning mobile screens

Mobile and other touch screens usually will get your fingerprints all over them, making it harder to see what you are looking at. The best way to clean these screens is with a microfiber cloth. For tougher to remove spots you can dip the cloth into a small amount of water and then gently wipe the screen. Don't splash water onto it before cleaning, as water could get inside the device, which will likely void the warranty while potentially ruin internal components.

Some people suggest rubbing alcohol to remove fingerprints and disinfect the device. While this will be ok for some screens, many manufacturers recommend against it because the alcohol can eat away at the protective film on some devices.

If you notice that there is a lot of dust or gunk on the edges of your screen, or even in cracks, you may need to take the device into a mobile shop for further cleaning. Do not open the device yourself as this could void the warranty.

Cleaning your keyboard

Our fingers are touching keyboards almost all day, and after a while you will notice that your keyboard gets a bit grungy, with debris and dirt even between the keys. Before you do start cleaning, be sure to unplug the keyboard, or turn it off if it is wireless. To clean the upper parts of the keys - where your fingers strike the keys - try dipping cotton swabs into rubbing alcohol and then cleaning the keys with a gentle rub.

To clean between keys you will need compressed air which can be purchased at most office supply and computer stores. Spraying in between keys should be enough to get rid of most of the dust and grit.

Cleaning your mouse

Like the keyboard, the mouse can get quite dirty too, with grime from your fingers and dust in general. The best way to clean a mouse is to first unplug it and then use cotton swabs dipped in rubbing alcohol to gently clean it. You should not need to open your mouse and most models are designed to not be opened by users.

Cleaning your laptop's body

If your laptop's body is dirty the most effective way to clean it is to turn it off, unplug it, and clean it with cotton swabs dipped in rubbing alcohol. Some online articles recommend using a Mr Clean Magic Eraser, or similar cleaning tool. While this does work, it acts in the same way as super fine sandpaper, so you have to be careful that you do not end up actually lightly scratching the body.

Cleaning your computer tower

Some people may want to clean their desktop computer's tower. While this is doable by taking a slightly damp microfiber cloth and wiping down the front and side of your tower, we strongly recommend avoiding the back, and certain areas of the front, as there are ports and components that could be easily damaged.

As always, be sure to disconnect the power source and all wires before cleaning, as any water damage could ruin your computer.

Cleaning the inside of your computer

Dust will eventually get into the inside of your computer and could clog up cooling fans, causing them to stop working properly. This can potentially lead to other components overheating. The internal components of your computer are extremely fragile and need to be handled with great care. Do not take the case off of your computer as this usually voids your warranty.

For all of your computer needs our technicians are here to help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
October 1st, 2014

BCP_Sep29_AMany business owners and managers readily acknowledge the fact that they need to be prepared for a disaster, and most do have backup-plans in place should something actually go wrong. The thing is, it can be difficult to actually know if your plan will be enough to see your business through a disaster. What can help is knowing the common ways business continuity plans (BCP) fail.

There are many ways a business continuity or backup and recovery plan may fail, but if you know about the most common reasons then you can better plan to overcome these obstacles, which in turn will give you a better chance of surviving a disaster.

1. Not customizing a plan

Some companies take a plan that was developed for another organization and copy it word-for-word. While the general plan will often follow the same structure throughout most organizations, each business is different so what may work for one, won't necessarily work for another. When a disaster happens, you could find that elements of the plan are simply not working, resulting in recovery delays or worse. Therefore, you should take steps to ensure that the plan you adopt works for your organization.

It is also essential to customize a plan to respond to different departments or roles within an organization. While an overarching business continuity plan is great, you are going to need to tailor it for each department. For example, systems recovery order may be different for marketing when compared with finance. If you keep the plan the same for all roles, you could face ineffective recovery or confusion as to what is needed, ultimately leading to a loss of business.

2. Action plans that contain too much information

One common failing of business continuity plans is that they contain too much information in key parts of the plan. This is largely because many companies make the mistake of keeping the whole plan in one long document or binder. While this makes finding the plan easier, it makes actually enacting it far more difficult. During a disaster, you don't want your staff and key members flipping through pages and pages of useless information in order to figure out what they should be doing. This could actually end up exacerbating the problem.

Instead, try keeping action plans - what needs to be done during an emergency - separate from the overall plan. This could mean keeping individual plans in a separate document in the same folder, or a separate binder that is kept beside the total plan. Doing this will speed up action time, making it far easier for people to do their jobs when they need to.

3. Failing to properly define the scope

The scope of the plan, or who it pertains to, is important to define. Does the plan you are developing cover the whole organization, or just specific departments? If you fail to properly define who the plan is for, and what it covers there could be confusion when it comes to actually enacting it.

While you or some managers may have the scope defined in your heads, there is always a chance that you may not be there when disaster strikes, and therefore applying the plan effectively will likely not happen. What you need to do is properly define the scope within the plan, and ensure that all parties are aware of it.

4. Having an unclear or unfinished plan

Continuity plans need to be clear, easy to follow, and most of all cover as much as possible. If your plan is not laid out in a logical and clear manner, or written in simple and easy to understand language, there is an increased chance that it will fail. You should therefore ensure that all those who have access to the plan can follow it after the first read through, and find the information they need quickly and easily.

Beyond this, you should also make sure that all instructions and strategies are complete. For example, if you have an evacuation plan, make sure it states who evacuates to where and what should be done once people reach those points. The goal here is to establish as strong a plan as possible, which will further enhance the chances that your business will recover successfully from a disaster.

5. Failing to test, update, and test again

Even the most comprehensive and articulate plan needs to be tested on a regular basis. Failure to do so could result in once adequate plans not offering the coverage needed today. To avoid this, you should aim to test your plan on a regular basis - at least twice a year.

From these tests you should take note of potential bottlenecks and failures and take steps in order to patch these up. Beyond this, if you implement new systems, or change existing ones, revisit your plan and update it to cover these amendments and retest the plan again.

If you are worried about your continuity planning, or would like help implementing a plan and supporting systems, contact us today.

Published with permission from TechAdvisory.org. Source.

October 1st, 2014

OSX_Sep29_AOver the past decade or so, Apple's laptops have become increasingly popular with business users. From the svelte Macbook Air to the powerful MacBook Pro, you can guarantee that at least one person in your office has a Mac laptop in the house. As with all laptops you will want to configure how the device uses power in order to conserve battery life and this can be done through the Energy Saver function.

What is Energy Saver for Mac?

Energy Saver is a feature included in all versions of OS X after version 10.6 (Snow Leopard) that allows users to configure how their computer users energy - both when running on battery and when plugged in. All Apple computers have this feature, including desktop computers, but it is most useful for those with laptops, where you can configure your laptop to extend battery life.

Accessing Energy Saver preferences

There are two ways you can access the Energy Saver function on your Mac. If you are using a laptop, you should see a battery icon in the top menu bar of the screen, usually located on the right. Press this and select Open Energy Saver Preferences…

If you don't see the battery icon at the top of your screen, or are using a desktop, then press Command + Spacebar to open Spotlight. Type Energy Saver in the bar that opens at the top of the screen and click on Energy Saver from the drop-down search results.

Looking at the Energy Saver preferences

Depending on the type of Mac you are using - laptop or desktop - you should see up to three tabs - modes of power - at the top of the screen:
  • Battery
  • Power Adapter
  • UPS (Uninterruptable Power Supply)
Clicking on any of the tabs will bring up power settings related to that particular power source.

Configuring energy use while on Battery

When you click the Battery tab you should see the following options come up (on OS X Mavericks and later.)
  • Turn display off after: This is a slider bar that allows you to set how long the computer needs to be inactive (no buttons clicked, or user interaction) before the display is turned off. When you are operating off the battery, it is a good idea to set this lower so that the display - which draws power - will be turned off quicker, saving more power.
  • Put hard disks to sleep when possible: When ticked, the hard disks will be put to sleep when the system isn't being used, or they are not needed.
  • Slightly dim the display while on battery power: Will lower the brightness of the screen when the power cord is unplugged in order to save more energy.
  • Enable Power Nap while on battery power: Power Nap is a feature that allows the computer to wake up every now and then in order to check for software updates. It is a good idea to turn this function off if you are worried about saving battery life, instead checking for updates when the computer is awake.

Configuring energy use while on Power Adapter

When you click on the Power Adapter tab you should see the following options:
  • Turn display off after: This is a slider which allows you to set when the display will turn off, after there has been no activity for a set period of time.
  • Prevent computer from sleeping automatically when the display is off: By default, when the display is off on your computer, it will also go to sleep, which means all non-essential components are turned off. If you are say downloading a large file, or work with an IT team who needs access to your systems at night, then this is a good option to enable.
  • Put hard disks to sleep when possible: When there is no activity, or the hard drives are not being used, your computer will shut them down, saving power.
  • Wake for Wi-Fi network access: When you switch networks, your Wi-Fi turns on, or a program requires access to the Internet, the computer will wake up.
  • Enable Power Nap while plugged into a power adapter: As above, stopping searches for software updates in the short-term to save battery life.

Configuring energy use while on UPS

When you click on the UPS tab you should see the following options:
  • Computer sleep: Is a slider bar that allows you to set how long the computer should wait after inactivity to put itself to sleep.
  • Display sleep: Is a slider bar that allows you to set how long the computer should wait when there is no activity to shut the display off while under UPS power.
  • Put hard disks to sleep when possible: When ticked, the hard disks will be put to sleep when the system isn't being used, or they are not needed.
  • Slightly dim the display while on UPS: Will lower the brightness of the screen when the power cord is unplugged in order to save more energy.
  • Start up automatically after a power failure: The UPS is designed to kick in when the power fails, and if your computer is connected to an UPS, and the power goes out - shutting it down - it will restart automatically when the power comes back on.
  • Restart automatically if the computer freezes: If your computer freezes while connected to a UPS, it will restart automatically.
You can tick each of the options as you see fit and we recommend trying out different choices to see how your power usage fluctuates. If you have any concerns about how much power your systems are using, or their overall configuration, contact us today to learn how we can help.
Published with permission from TechAdvisory.org. Source.

Topic Apple Mac OS
September 30th, 2014

GppgleApps_Sep29_AOne truth about computing is that despite the various efforts you may make, there is always a chance that your data or account information will be leaked. It is because of this that many companies like Google have implemented stronger security controls. If you have a Google account, personal or business, there are a number of things you can do to keep your account and related information secure.

Don't use your main account to sign up/as a login for other sites and accounts

When we hear of account breaches or instances where Google account information has been leaked, many people will turn and blame Google, thinking that it was Google's systems that were breached. While this is a possibility, more often than not the breach occurred with another system where a Google account was used to either sign up, or as the main username.

When hackers get hold of this information they can then use it to launch subsequent malware or phishing attacks against the main Google account, in hopes of actually gaining access to it. Therefore, to prevent this from happening, you should be sure to limit what you use your main Google account to sign up for. Most websites requiring you to sign up for an account ask for an email address, so it is best to create a second dummy account that is only used for this purpose.

If you are asked to set the username as an email address, use this dummy email address and be sure to keep this account separate from your main account.

Don't use your Google password for other sites

Alongside account information breaches, password breaches on other sites are also commonplace. If you have used the same password for a site that you use to access your Google account that is akin to giving hackers direct access to these accounts.

Use a unique password for every site you sign up for, but at the very least make sure your password for your Google account is unique from any other accounts.

Use 2-step verification

Most major websites offer enhanced login security these days, Google included. When enabled, you will need to enter a second code - usually sent to your mobile or generated by a PIN generator - in order to access your account.

The major benefit here is that anyone who tries to access your account will need to enter this PIN, and because the majority of hackers won't have access to your mobile device, your account will be more secure.

You can enable 2-step verification by:

  1. Logging into your Google account.
  2. Going to the 2-step verficiation website (http://www.google.com/landing/2step/).
  3. Pressing Get Started at the bottom of the page.
  4. Selecting Start Setup on the next page.
  5. Logging into your account again.
  6. Following the instructions on the following pages.
In order for this to work, you will need a mobile device. You can either enter a phone number or choose to download the Google Authenticator app onto your mobile device. Regardless of which method you use, you will need to enter a cell number during the setup.

Audit your account security settings

If you are unsure as to how secure your account is, or the security options you have available, one of the first stops you make should be to Google's account checkup page (http://g.co/accountcheckup). Here you will see a number of security options that are available to you which you can enact or modify.

Finally, take a look at your account login locations on a regular basis. This information can be found here: https://security.google.com/settings/security/activity and shows you where recent logins were made, what systems were used, and even the IP address. Should you see some irregular activity, or strange looking login locations, then it is advisable to change your password immediately.

If you are looking to learn more about the security of your accounts, and what you can do to ensure that hackers can't gain access, contact us today.

Published with permission from TechAdvisory.org. Source.

September 25th, 2014

WindowsPhone_Sep25_AThe app is arguably the most integral part of any smartphone operating system. It is apps that give our devices the functionality we all want, and the number of apps available is constantly growing. Because of the increase, we are also seeing a rise in malicious software that makes its way onto app stores like the Windows Phone Store. These can pose a security risk, but the question is, how you can spot malicious apps and report them.

To begin with, we should make clear that app store hosts like Microsoft do have strict security measures in place that strive to keep malicious software off of stores and therefore users' devices. That being said, there is always a chance that an industrious hacker can subvert these security controls and get their app onto the online stores. To counter this, here's four tips on how you can spot fake or malicious apps.

  • Look at the name - If you are looking at an app on the Windows Phone Store, always look at the name of the app. Some malicious software that has made its way onto the Store has had a spelling mistake in the name. If in doubt, do a quick search on the Internet for the app and the correct spelling. Should nothing turn up, it may be a good idea to avoid it.
  • Look at the publisher information - All apps for Windows Phones require that the developer/publisher includes information about the app and themselves. If you are looking to download what seems like a popular app, take a look at the listed producer or developer, and then search on the Internet for their site. If the developer of the app appears to be different, or there are differences in the spelling, it is best to avoid installing it.
  • Look at social media stats - On the Windows Phone Store, below the install information, are counters for social media likes and shares. If the app information states it is a popular app and yet there are no social shares, then this may indicate it is actually fake. You should therefore err on the side of caution.
  • Look at comments - Lastly, look at the comments/reviews of the app. The Windows Phone Store uses stars to provide a quick overview of how much people like each app, but if you read comments you can quickly get an idea of exactly what people say about specific apps. If you see words like Fake, Doesn't work, etc. then it is a good idea to skip installing it.
While it can help to be able to identify apps, you should also know how to report apps that you believe are malicious or fake. You can do so by:
  1. Opening the app's page on the Windows Phone Store.
  2. Scrolling down and clicking on Report concern to Microsoft.
  3. Selecting from a list of complaints. Note: Pick the one that is most appropriate to the issue, for example if it is a fake app then select Misleading app.
  4. Pressing Submit.
The plus side of the Windows Store is that Microsoft does usually act quickly to remove identified apps, so the actual chances of you downloading one are fairly low. But, it is always better to be safe than sorry. If you are looking to learn more about Windows Phones and how they can fit into your organization, contact us today.
Published with permission from TechAdvisory.org. Source.

September 25th, 2014

AndroidPhone_Sep22_AMobile operating systems incorporate a huge number of similarities when compared to desktop systems, with one of the most useful being the ability to create folders. On Android devices, folders are used to group similar types of apps together, thereby reducing the space taken up by icons. If you have an Android device, do you know how to manage your folders?

Creating folders

On most devices, when you install a new app the icon will be automatically added to your home screen, or onto a screen where there is space. While this is useful, many of us have a large number of apps installed, and it can be a bit of a chore actually finding the icon you are looking for.

The easiest solution is to group icons together into a folder. This can be done by:

  1. Pressing and holding on an app on your device's home screen.
  2. Dragging it over another app and letting go.
You should see both of the icons moved into a circle and kind of hovering over each other. This indicates they are now in a folder. It is important to note that these folders only appear on your home screen. If you combine say Facebook, Twitter, and LinkedIn apps into a folder on your home screen, they will not be put into a folder in your app drawer.

Naming folders

When you create new folders, you will notice that there is no text below the icon as there is with other icons. This is because you need to name the folder, which can be done by:
  1. Tapping on the newly created folder.
  2. Tapping on Unnamed Folder in the pop-up window.
  3. Naming the folder.
  4. Pressing Done at the bottom of the keyboard.
The name you assign to the folder will show up under each icon on your home screen. If you are going to use different folders, it is a good idea to pick names related to the apps they contain. For example, if you put all of your email apps in one folder, call the folder 'Email'. This will make your apps easier to find.

Adding/removing apps from folders

You can easily add apps to folders by either dragging them from the home screen over to the folder and letting go, or:
  1. Opening your device's app drawer (usually indicated by a number of squares).
  2. Finding the app you would like to put into a folder.
  3. Pressing on it, and holding your finger down until the home screen pops up.
  4. Dragging it over the folder you would like it to be placed in.
  5. Letting go.
If done right, the app's icon should be automatically dropped into the folder. You can also remove apps from folders by tapping on the folder where the app is, pressing on the app, then dragging it up to Remove, which should appear at the top of the screen. This will remove it from the home screen, but will not uninstall the app. You can also tap on the app and move it out of the folder to an empty place on the home screen.

Moving folders

You can move a folder's location the same way you do so with an app: Tap and hold on the folder until the screen changes slightly and drag it to where you would like it to be. On newer versions of Android, the apps should all move to make room for the folder.

Deleting folders

Finally, you can delete a folder by either dragging all of the apps out of the folder, or pressing and holding on the folder until the screen changes and dragging it up to Remove. This will remove the folder and all the stored app icons, but it won't delete the apps.

If you have any questions about using an Android device, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

September 24th, 2014

Windows_Sep22_AMany business users who have upgraded their systems to Windows 8, or 8.1, are quick to forsake the tile-based launch screen for the more familiar desktop mode. One of the reasons for this is because of the taskbar which is at the bottom of almost every version of Windows. This bar holds open and popular programs, allowing users to quickly access different programs. However, did you know that you can modify the properties related to the taskbar, in order to make it even more useful?

1. Add or remove programs from your taskbar

By default, there are usually two icons on your taskbar: Internet Explorer and File Explorer. When you open a program, the icon will pop up to the right of these icons and will remain there as long as the program is open. Close it however, and the icon will usually disappear.

If you use certain programs a lot, you can 'pin' the icon to your taskbar, making it easier to launch in the future. This can be done by first opening the program, then right-clicking on the icon and selecting Pin to Taskbar. You can unpin unused programs by right-clicking on the icon and selecting Unpin from Taskbar.

Alternatively, you can drag a program's icon onto the taskbar to add it. Just drag it from the folder or your desktop to where you would like it to be on the taskbar, and it should be added.

2. Locking the taskbar

If you have added the programs you use most, and would like to ensure that they stay on the taskbar, you can lock the bar to ensure that nothing can be added or deleted without first unlocking it. Locking will also ensure that the taskbar can't be accidentally moved.

Locking the taskbar is done by:

  1. Right-clicking on the taskbar.
  2. Selecting Lock the taskbar from the pop-up menu.
Note: When you install a new program, or would like to add/modify those on the taskbar you will need to unlock it first, which can be done by right-clicking on the taskbar and clicking Unlock Taskbar.

3. Hiding the taskbar

While the taskbar is useful, some users prefer that it isn't always showing at the bottom of the screen. You can actually enable hiding of the taskbar, so it will only show it when you hover your mouse over where it should be.

This can be done by:

  1. Right-clicking on an empty space on the taskbar.
  2. Selecting Properties. Note: Don't right-click on an app's icon, as it will open the properties related to the app, not the taskbar.
  3. Tick Auto-hide taskbar.
  4. Click Ok.

4. Move the location of the taskbar

If you have a large number of apps pinned to the taskbar, or don't like it's location at the bottom of the screen you can easily move it by either:
  1. Left-clicking on an empty area of the taskbar.
  2. Holding the mouse button down and moving the cursor to the side of the screen where you would like to move the bar to.
Or:
  1. Right-clicking on an empty area of the taskbar.
  2. Selecting Properties.
  3. Clicking on the drop-down box beside Taskbar location on screen:.
  4. Selecting the location.
If the bar does not move, be sure that it is not locked.

5. Preview open apps

One interesting feature of the taskbar is that it can offer a preview of your desktop from the tile-based screen. You can enable it by:
  1. Right-clicking on an empty area of the taskbar.
  2. Selecting Properties.
  3. Ticking Use Peek to preview the desktop when you move your mouse to the Show Desktop button at the end of the taskbar.

6. Pin apps to the taskbar from the metro (tile) screen

While the tile-based Start screen isn't the most popular with business users, it can be a good way to easily add programs to your taskbar. You can do so by:
  1. Scrolling through your tiles until you find the app you want to pin to the taskbar.
  2. Right-clicking on the app.
  3. Selecting Pin to taskbar from the menu bar that opens at the bottom of the screen.
If you are looking to learn more about using Windows in your office, contact us today to see how we can help.
Published with permission from TechAdvisory.org. Source.

Topic Windows
September 24th, 2014

SocialMedia_Sep22_AFor many small to medium businesses, social media has become an integral part of their overall business strategy. Most businesses have a presence on at least one platform, but one issue many business owners and managers struggle with is how they should be using social media effectively. To help, here is an overview of the three most common ways small to medium businesses use social media.

1. To be a resource for existing and potential clients

This approach is by far the most popular used by businesses of all sizes. The main idea here is that social media is used as essentially a two-way street where you can pass information about the company, products, and industry to your followers. In turn, they interact with the content and eventually start to turn to your profile and page when they are looking for information.

One of the best ways to be successful with this approach is to provide your followers with information about the company, facts, tips about your products and industry, and links to other relevant content.

By sharing content, users will generally interact with it more and begin to see your company as a reliable source of information. This often translates into enhanced brand awareness and potentially sales.

The downside with this approach however, is that it can be time consuming to constantly develop new content. Most companies eventually reach a point where what they produce and share is pretty much the same, and overall payoffs begin to decrease. One way around this is to work with professionals to come up with dynamic and different content.

2. To provide customer service/support

These days, when someone has a problem with a company's services or products, the first port of call for complaints is often social media, largely because it's the most convenient place to vent where you can get instant reactions.

It therefore makes sense to create support or customer service presence on these channels. Some companies have even taken to launching support-centric profiles, where customers can contact them about anything, from complaints to questions, and receive a personal answer. For many companies this is ideal because it eliminates the hassle of customers having to call a support line and dealing with automated machines.

This approach can prove useful for businesses because it often makes it easier to reach out to disgruntled customers and track overall brand satisfaction. The downside is that you will need someone monitoring services 24/7, and to respond in a timely manner which may be tough to do for many smaller businesses.

3. To sell something

There are an increasing number of businesses who have launched social media profiles with the intent of selling a product or service. The actual sales may not take place through social media but the information on these profiles and platforms channels potential customers to an online store or to contact a company directly. Social media's instantaneous nature makes for a tempting platform, especially when you tie in different advertising features and include content like coupons, and discounts.

While this hard sales line can be appealing to businesses, many users are seemingly put off of companies with profiles that only focus on selling via their platforms. The whole idea of social networking is that it is 'social'; this means real interactions with real people. Profiles dedicated only to trying to sell something will, more often than not, simply be ignored.

What's the ideal use?

One of the best approaches for small to medium businesses is to actually use a combined approach. Most people know that ultimately, businesses with a presence on social media are marketing something, but focusing solely on this could turn customers off.

A successful split that many experts have touted is the 70-20-10 rule. This rule states that you should make 70% of your content and profile focused on relevant information to your audience. 20% of content should be content from other people and 10% of content should be related to selling your products or services e.g., promotional.

If you want to use social media for support as well, it is a good idea to create a separate profile dedicated just to this end. If complaints are lodged or noticed using your main account, direct them towards the support account.

As always, if you are looking for help with your social media strategy, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
September 23rd, 2014

Office365_Sep22_AMicrosoft's Office 365 is one of the fastest growing productivity software suites, especially when it comes to small and medium business users. When launched a couple of years ago, the company commented that they see Office 365 as one of the best ways to help colleagues get their work done, collaborate, and connect with one another. In an effort to bring this all together, Microsoft has announced a new feature for Office 365 called Office Delve.

What is Office Delve?

The idea behind Office Delve is that it's a tool that helps business users get the most out of their data and information related to Office 365. According to Microsoft, Delve will allow you to:
  • Discover new information - Delve has been designed to show you information from different sources in Office 365 that you may find useful for what you are currently working on.
  • Discover what you need - Documents you have seen before, or have recently worked on, are highlighted and made easier for you to find, regardless of where they are stored. This makes it less taxing to find work you have been doing in the past, and continue from where you left off.
  • Discover new connections - Typing a name in Office 365 will allow you to see what a user is working on, their connections, and even connect with them to build relationships and share information.

How does it work?

In order to provide the information and data that users will likely find useful, Delve is powered by a tool Microsoft calls Office Graph. Graph maps the relationships between the various Office 365 users in your company, and the content/information related to them.

This 'map' is then used by Delve to provide users with what they need, when they need it. Content and information is displayed on a card-based screen, which can be found under the Delve tab in the main Office 365 launch screen.

Aside from content such as profile information, links to documents, or information, users can also see: Likes, views, comments, and tags, which brings a deeper social integration into Office 365.

Delve also orders content a number of different ways, including:

  • What you've recently worked on - Shows you content in card-form that you have recently opened or worked on.
  • Content that has been shared with you - Shows the content your colleagues have shared with you.
  • Content that has been presented to you - Shows content that colleagues have presented recently, or content that has been sent to you.
While this idea works great on the desktop, many Office 365 users access their systems from their mobile devices. Delve will also be available to mobile users. On your device you can browse the cards with files, swipe left or right on each card to view files, and even search for colleagues and view files they have shared with you and their recent activity.

When is Delve available?

Microsoft has noted that Delve is currently rolling out for businesses who have subscribed to the Office 365 Enterprise level plans (E1-E4) and have joined the first release program. Over the following months, it will roll out to all E1-E4 customers. In 2015, Microsoft has noted that they will introduce Delve to Business Essentials, Business Premium, Small Business, Small Business Premium and Mid Sized Business customers.

If you are looking to learn more about Delve, contact us today.

Published with permission from TechAdvisory.org. Source.

September 23rd, 2014

Google_Sep22_AWhen you want to find the answer to something what do you do? You more than likely 'Google it'. You simply go online and search for it using Google's popular Search. While we can usually find what we are looking for, it can still take some time. Luckily, there are some great tips you can employ to help find what you are looking for faster. Here are seven:

Search inside one site only

Oftentimes, we are looking for an article, words, page, or even image from one site. If you simply search for it on Google, you may find the site right away, but you will also see results from other sites. To narrow down the results a little, try using the search operator site:.

When using site: followed by a web address in the search bar (without a space), Google shows results for that site at the top of the results list. So, if you are looking for an article that has the keywords: 'cloud technology' on CNN, you can enter: site:cnn.com cloud technology.

Search for results based on a page's title

If you are looking for a specific webpage, but don't know the site it is on, you can use the operator: intitle: followed by keywords. This tells Search to look for webpages that contain the keywords in the title.

For example, if you are looking for a webpage that has the title: five cloud tips, you can search for it by entering: intitle: five cloud tips. Note, be sure to add a space between the operator and the keywords/titles.

Do two searches at once

Using an OR operator between two keywords tells Search to show results for both of the keywords at the same time. This can be useful for when you are looking to quickly compare two different ideas or topics.

The key to making this operator work is to make sure that OR (in capital letters) is between the two terms you are looking for, and separated by a space on both sides.

Exclude certain results or keywords

With many Google searches you will often see results for local businesses with a presence on Google first, or results related to your local area. While these can be useful, when you are looking for non-local results, it can take time to sort through these findings.

If you see that there are a number of results with keywords or terms that you are not interested in, then put a - (minus) in front of the term (without a space) e.g., -term, and Search will not show results containing that word.

Quickly find sites that link to yours (or another)

One of the key components of successful SEO (Search Engine Optimization) is link building - the concept of increasing links to and from your site. With Search's various updates, Google is constantly changing the way sites are ranked and displayed in results. Businesses with websites need to ensure that the links they are using to direct to other content, or to bring people into their site are legitimate.

One quick way to see who links to your site is to use the Search operator: link:site.com. Simply enter link:yoursite.com, and Google will display results for all other sites and content that contain links to your site.

Fill in the blank searches

Looking for something where you know the first and last part of say the name, title, sentence, etc? You can use the Search operator * to help. The * (asterix) functions as what is called a wildcard, or unknown, operator. When used, it tells Search that you don't know the words that are missing, and that you want Search to try and fill in the results.

Use quotes to search for exact terms

The way Search works is that when a set of keywords are entered with spaces, Search will return results that contain the words either separately or together in any order. If you know exactly what you are looking for, you can add double quotes (") around the terms.

By using double quotes, Google will show results that only contain those exact words, in that order. While this is useful, longer sentences in quotes will return fewer results, so if you aren't finding what you are looking for, try reducing the number of words inside the quotes.

If you are looking to learn more about Google Search, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.