Blog

January 12th, 2012

Microsoft recently posted a video on its website that is the latest in a series from Microsoft offering a view into where technology is headed in the future through product development at Microsoft. The video offers a fascinating and impressive glimpse into the future of work and productivity that may occur in less than a decade.

The video from Microsoft gives us a glimpse into a day in the life of Ayla, a travelling executive, her daughter Shannon, at home with her Dad, and Qin, Ayla's colleague. The video is the latest in a series from the Microsoft Office team. You can see past videos here, or view a behind the scenes video from Kurt DelBane, Microsoft Office Business Division President, who explains the technological concepts behind the video, such as collaborative technologies, data visualization tools, mobile technologies, and cloud computing.

Interested in finding out more? Check out the actual place where this technology is developed by Microsoft demonstrating some of the video's concepts in real life.

Published with permission from TechAdvisory.org. Source.

January 10th, 2012

If you own an Android phone, you can use it as a substitute for an external drive or a USB key. You can load files into your phone simply by plugging it in to a PC with a USB cable, then tapping on “Mount” when you are prompted by the system.

This mounts the internal storage of the device as an external drive relative to the PC, and you can easily drag and drop files or create folders on the device as you see fit. Of course, it is recommended you do this on the SDCard that likely came with the device, or one that you buy for your phone.

Published with permission from TechAdvisory.org. Source.

January 9th, 2012

A hard drive shortage threatens to impact the worldwide computing industry due to the floods in Thailand. The majority of the world’s hard drive factories are located in Thailand and are struggling to recover pre-flood production levels.

In the same way the massive earthquake and tsunami damaged Japan's electronics industry, the flood crisis in Thailand is causing concern for companies that require hard drives for production.

The majority of the world's hard drives are produced in factories located in Thailand, where the flood crisis has put a damper on many industries, hard drive producers included.

According to reports, the shortage is already driving hard drive costs up and may just be the beginning of that trend. As companies like Hewlett Packard respond to the situation, the outlook remains unclear. PC sales could be affected well into 2012 and beyond. With flooding still an issue for some producers the shortage could expand.

As of now, there is still no concrete solution in sight for the problem with the supply of hard drives in the world, and while reconstruction efforts in Thailand are ongoing, getting the hard drive industry on its feet will take a while. As for the effects on the computing world as a whole, PC prices will likely rise as pre-flood inventories are sold out and replacement stock is delayed.

Published with permission from TechAdvisory.org. Source.

Topic General Tech
January 6th, 2012

Some companies have decided to tap into the phenomenon of social networking to create similar networks within their own organizations. While this can do wonders with the way every member of the business communicates with each other, it’s important to have proper and specific rules that pertain to its use.

With the waves created by social networking in how companies do business nowadays, many have also utilized the same principle to develop internal social networks to enhance their in-house communications as well. However, the use of this new medium of communication also requires that companies develop new policies to cover its use.

One concern that may leave you apprehensive about creating an internal social network might be the fear that it could be abused by employees. However, reports have shown that introducing an in-house social network has produced generally positive results.

As long as company policies regarding the use of internal social networks are developed and implemented properly, employees will view such a network as an extension of the workplace, and will try to put their best foot forward. Such policies must specifically tackle the use of the internal social network, and many experts recommend revising existing company rules that govern the use of email, IT resources, and even external social networks. To be on the safe side, it's a good idea to consult with a lawyer to avoid any legal problems with the policy in the future.

Who's going to be in charge? Your managers, of course. Since the social network will be for company use, it follows that department heads should be given administrative duties and permissions which they will use for moderating communications and discussions in and pertaining do their respective sections.

While an internal social network can do wonders for your in-house communications, good policies and rules pertaining to its use will be what keep it working like a well-oiled machine.

Published with permission from TechAdvisory.org. Source.

January 3rd, 2012

If you are in the habit of using passwords like 'password', 'qwerty' or '123456', you may be helping hackers and online thieves steal your data. Security experts have compiled a list of the 25 most common passwords – passwords that you should avoid.

If you think using 'password' as your password is no big deal, then it's time to rethink.

Security experts have recently compiled a list of the worst passwords users can choose, and 'password' is at the very top of the list. Weak passwords make your information more vulnerable simply because hackers can guess them. It may be easier to pick a password that you don't have to think about, but it's a choice that you may come to regret.

To help you avoid common password choice mistakes that users make, management application provider SplashData has compiled a list of the 25 worst passwords to use:

  1. password
  2. 123456
  3. 12345678
  4. qwerty
  5. abc123
  6. monkey
  7. 1234567
  8. letmein
  9. trustno1
  10. dragon
  11. baseball
  12. 111111
  13. iloveyou
  14. master
  15. sunshine
  16. ashley
  17. bailey
  18. passw0rd
  19. shadow
  20. 123123
  21. 654321
  22. superman
  23. qazwsx
  24. michael
  25. football
Make a smart password choice Experts advise using a combination of letters and numbers when creating your passwords, and to avoid things that anyone might be able to guess, such as birthdays and anniversary dates. Passwords with eight characters or more are safer and it's best to use different passwords for different accounts and websites. Use a password manager to help you keep track of all of your passwords if you're finding it difficult to remember them all..

No matter how sophisticated your security system is, a weak password gives hackers and online thieves an advantage. Helping all the users in your organization understand the importance of password strength will help you secure the IT systems in your organization.

If you're interested in learning more, please contact us so we can develop a comprehensive and custom security blueprint that meets your specific needs.

Reference: Worst Internet Passwords

Published with permission from TechAdvisory.org. Source.

January 2nd, 2012

Did you know that there are many free tools available on the web that can increase your productivity? Especially beneficial to small companies who can always use the savings, these free applications and software, if used correctly, can both increase productivity and help maximize the resources they have at hand.

It is a constant challenge for small businesses to meet ever-changing and ever-evolving IT requirements while balancing a budget and keeping costs reasonable. And with software applications being one of the major factors that contribute to IT maintenance costs, it is always welcome news to come across free tools that work well and efficiently despite the lack of a price tag.

ThinkFree Online Office One of these applications is ThinkFree Online Office, which is a cloud application that enables you to create and edit documents in common formats. It also comes with free 1GB of storage and allows you to work from anywhere, since the documents are stored online. And with its own app for Android users, ThinkFree is particularly advantageous to people who need to work on the go.

ReqMan Another free cloud-based application that can prove useful is ReqMan, an online project management tool. You can use this to manage and track your different projects using various templates the service provides. And since it's in the cloud, mobile personnel and staff who are given access to your ReqMan account can work even when they're out of the office.

Gliffy Gliffy is a free tool that you can use to create all sorts of technical illustrations – diagrams, floor plans, flowcharts, and more. The basic plan is free, but you also have the option to subscribe to their more fully featured plans for a minimal fee.

ScheduleOnce For managing schedules, calendars, and the like, ScheduleOnce allows you to keep better track of all your appointments, meetings, and deadlines through a single tool. It integrates with your calendar on Google, and then allows other people to see your open times when they can schedule a meeting with you. Think of it as a one-stop-shop for your scheduling needs.

If you want to know more about these tools and how you can best utilize them, please feel free to contact us. We’ll be happy to guide you and help you make the most out of these types of applications to improve your efficiency and bottom line.

Published with permission from TechAdvisory.org. Source.

Topic Tech Tips
December 29th, 2011

A joint operation between the United States Federal Bureau of Investigation (FBI), authorities in Estonia, and IT security firm Trend Micro recently put down a massive bot network that victimized an estimated 4-5 million users around the globe.

Four million is a big number which makes four million bots, in security terms, a staggering and frightening number as well.

It is a good thing, then, that four million is also the number of bots taken down in a recent bust by the United States Federal Bureau of Investigation, the Estonian Police, and security firm Trend Micro. Data centers in New York City, Chicago, and Estonia were raided by authorities, shutting down hundreds of servers used to create a network of bots that spanned some 100 countries.

The said bust, dubbed “Operation Ghost Click”, is one of – if not THE – largest cybercriminal bust in history, putting to sleep a sophisticated scamming operation that victimized 4 to 5 million users and was said to have generated at least $14 million in illegal revenue.

The scam mainly involved hijacking Domain Name Server (DNS) settings in infected computers, which can be used not only to introduce more malware into an IT system, but also to hijack search results and replace advertisements loaded on websites visited through an infected computer.

While this bust does bode well for all IT users everywhere in the world, it also illustrates the scope of influence and level of organization behind security threats. Since this is probably not the only scam / fraud / botnet operation in the world, it is always best to have a comprehensive security policy for your IT infrastructure to minimize the risk of compromising your company’s data and information.

For more details on the bust, check out Trend Micro’s blog post here.

Published with permission from TechAdvisory.org. Source.

December 23rd, 2011

Have you ever sent an email and then immediately regretted sending it? If you are using Gmail as your mail client, you can do just that with an interesting but buried option in Gmail settings.

To enable this feature, go to Mail Settings in Gmail (upper right corner, under the gear icon). Navigate to the "Labs" tab. In the labs search box, look for "Undo Send" and choose Enable, then save. Now in Mail Settings you will see an option to "Undo Send: Send cancellation period: __ seconds." Enter the number of seconds that Gmail will allow you to change your mind in the future (try 10 seconds).

With this enabled, the next time you send an email, you’ll be able to “Cancel” it from being sent out, as long as it is within the time frame you specified.

Published with permission from TechAdvisory.org. Source.

Topic Tech Tips
December 19th, 2011

With mobile devices becoming more accessible, many are finding it more comfortable and more productive to use these devices not only for personal purposes, but also for work. This may seem to be a good thing initially, but it also means that you have less control over the way these devices access your IT system. The best thing to do is to have a good IT security policy in place to make sure that important company data is not compromised.

As technology continues to become more affordable and accessible to consumers, it's an inevitable fact that employers will see more and more of their employees using their own personal devices such as laptops and mobile phones to access the company's IT system.

This can be a dangerous thing. Since these devices aren't company owned and regulated, you have limited access and control over how they are used. Employees could download all sorts of malware and viruses on their devices and pass the infection along to your IT system when they access it.

The solution: a comprehensive IT security policy. It's important that you find a compromise between the freedom of the employee to use the device as desired and your need to keep your IT system safe from viruses and other threats to your data's security. Steps such as having employees run mobile device management (MDM) software on their devices is one of many actions you can take to lessen the risk of security breaches. You may also want to implement applications and software that check and screen for malware, both for laptops and mobile devices. And don't forget that while Android seems to have a bigger problem with malicious software, Apple isn't exactly virus-free, either.

Employees have a right to use their personal devices as they see fit, but not at the expense of important company information stored in your IT system. Running a tight ship in terms of security is an effective way to protect your business interests and your sensitive company data. If you are interested in knowing more about developing a concrete and effective IT security policy for personal device use as well as general system access, please don't hesitate to give us a call so we can sit down with you and discuss a custom security blueprint that's just right for you.

Published with permission from TechAdvisory.org. Source.

December 15th, 2011

Just when you think things have peaked – in this case the social media boom – somebody comes up and thinks of a way to make things more interesting. Case in point: Pinterest. While it can hardly stand shoulder to shoulder with giants like Facebook or Twitter, it certainly brings something new to the fold that could prove useful to businesses.

What is Pinterest? In a nutshell, it's something like a social media scrapbook, album, and bulletin board combined. Each interest / theme has its own 'Pinboard' where you put photos, videos, or other media that interest you.

What makes Pinterest unique is its concept, which has been consistently growing in popularity, especially with female audiences. And while Facebook and Twitter are more open to overt advertising, Pinterest takes a more conservative stance. While advertising isn't exactly prohibited, the marketing should definitely be more subtle and more consistent with a personal Pinterest profile. Here are some basic tips that will help you utilize Pinterest to your advantage.

1. Understand your market. The first question you should ask yourself is if Pinterest is something worth your time investment. Since the majority of Pinterest users are female, ask yourself if your products and services appeal to them directly.

2. Invest time. As in many other social networking sites, you need to put a personal and human touch to your Pinterest profile and in the way you interact with your audience. Log in often, update regularly, and respond quickly to any kind of feedback. Let your audience know that you're there.

3. Use other social media to augment Pinterest. Since Pinterest is less known, use your other social media accounts to point people your way in Pinterest, such as Tweeting or updating your Facebook status with your most recent Pinterest profile update.

4. Talk about what you represent. As mentioned earlier, since Pinterest isn't big on overt advertising, you need to market yourself in a different way. Talk about what your brand is all about. What do you represent? What content can you provide that would inspire your audience to share on their own Pinboards? If you're a furniture company, for example, you can try giving some tips on basic interior design and picking the right furniture pieces for spaces, with pictures or videos. What's good about Pinterest is that it challenges you to be more creative, and thus, more appealing to potential clients.

If Pinterest interests you, give us a call so we can discuss how you can maximize this new social media platform for your business.

Published with permission from TechAdvisory.org. Source.

Topic Tech Tips