508-909-5961 [email protected]

You may think that you hate slideshow-based presentations, but in reality you probably hate poorly designed content and overapplication of transition effects. The recent update to Google Slides may not have removed your most dreaded cliche, but they did add some truly innovative interactivity features. Let’s take a closer look at this great new feature. […]

2016May24_GoogleApps_BYou may think that you hate slideshow-based presentations, but in reality you probably hate poorly designed content and overapplication of transition effects. The recent update to Google Slides may not have removed your most dreaded cliche, but they did add some truly innovative interactivity features. Let’s take a closer look at this great new feature.

What is Google Slides?

Google Slides is a free web-based presentation creator. You can create, edit, store and share slideshows via Google’s Drive client that allows for live collaboration and presenting across the internet. Although Slides is most functional when using online desktops, offline and mobile functionality have made it a formidable competitor to more expensive software from Microsoft.

With the most recent update, your mouse cursor even doubles as a presentation laser pointer!

Enabling the Q&A Feature

Earlier this month, Google added an important feature that allows presenters to interact with their audience via their mobile devices. To enable it, click the arrow directly next to the Present button in the upper left corner of the slideshow editor. Next, click the drop-down item marked “Presenter View”. After that you should have two windows open, one that displays your presentation in your original web browser and a smaller “Presenter” that displays a number of options. In the bottom of the "Presenter" screen there should be a Start New button for a Q&A session. If you’re a Google for Education or Google for Business user, you’ll have the option to restrict who can ask questions via the presenter window.

Getting the audience involved

After enabling the Q&A tool, a short and easy-to-type link will be shown at the top of every displayed slide. Audience members can navigate to this page in order to submit questions.

Audience members who open the page will see a simple screen with an “Ask a question…” dialogue on their mobile device. Loading the site will consider them an anonymous user unless they log into a Google account. If they’re logged in, their picture and name will be associated with any submitted questions. However, self-conscious members have the option to abstain from signing in, or they can check the “ask anonymously” box when submitting their question.

Answering participant questions

After a question has been submitted, it will be displayed in both the presenter window you have open, and the communal window displayed on the audience’s mobile site. This gives them the option to upvote or downvote questions submitted by other viewers. When you see a question you want to address, or has too many upvotes to ignore, you can click the Present button in your presenter window and the question will be displayed alongside the author as a new slide. Clicking Hide will take you back to the last slide to continue the rest of the presentation as normal.

If you’re running a presentation with a particularly large number of participants, ask anyone submitting a question to include their email address. The Q&A history can be reviewed under the Tools menu for following up with answers afterwards.

Keeping a presentation interesting and engaging could mean the difference between acquiring a new client and converting your conference room into a place for audience naps. Efficient use of Google Drive software can reinvigorate your collaboration and presentation workflows. Contact us for advice on all things Google in your office!

Published with permission from TechAdvisory.org. Source.

Read More

Not that long ago, VoIP services were a new and revolutionary concept. Nowadays, internet-based voice communication is commonplace among SMBs, which means it’s time to turn our attention toward improving their security. Without a thorough understanding of what is needed to protect your VoIP systems, you could be vulnerable to cyberattacks. Let’s take a closer […]

2016May23_VoIP_BNot that long ago, VoIP services were a new and revolutionary concept. Nowadays, internet-based voice communication is commonplace among SMBs, which means it’s time to turn our attention toward improving their security. Without a thorough understanding of what is needed to protect your VoIP systems, you could be vulnerable to cyberattacks. Let’s take a closer look at 5 important tips for protecting your web-based communication devices and services.

Types of threats

The majority of VoIP services involve live communications, which often seem far more innocuous than stored data. Unfortunately, your business has just as much valuable information moving across VoIP networks as it does hosted on company servers. Internet-based calls are far more vulnerable to fraud compared to more traditional telephony services and face threats from identity theft, eavesdropping, intentional disruption of service and even financial loss.

24/7 monitoring

A recent study by Nettitude reported that 88 percent of VoIP security breaches take place outside of normal operating hours. This could be attackers trying to make phone calls using your account or gain access to call records that contain confidential information. This can be avoided by contracting outsourced IT vendors to monitor network traffic for any abnormalities or spikes in suspicious activity.

VoIP firewalls

Every VoIP vendor should provide a firewall specially designed for IP-based telephony. These protocols will curb the types of traffic that are allowed, ensure the connection is properly terminated at the end of a session and identify suspicious calling patterns. Consult with your VoIP or IT services provider about which of these features are available and currently in use at your organization.

Encryption tools

One of the reasons that eavesdropping is so common is because a lack of encryption. Inexperienced attackers can easily download and deploy tools to intercept and listen to your calls. Although some services claim built-in encryption, be sure to investigate how effective they really are. Many of these protocols require the same VoIP client on the receiving end of the call -- something that’s much harder to control. Encryption should be compatible with as many other software clients as possible to effectively prevent anyone from undermining the privacy of your calls.

Virtual private network

Virtual private networks (VPNs) create a secure connection between two points as if they were both occupying the same, closed network. It’s like building a tunnel between you and the call receiver. In addition to adding another layer of encryption, establishing a VPN can also overcome complications involving Session Initiation Protocol trunking, a recommended VoIP feature.

Password protection

Usually password protection refers to requiring password authentication to access sensitive information. However, in this case it actually means protecting the passwords themselves. Eavesdropping is one of the easiest, and most common, cyber attacks against VoIP networks and even with all of the protocols above, employees should be instructed to never give out any compromising information during a VoIP call.

VoIP is as important as any of your other network security considerations. It requires a unique combination of protection measures, and we’d love to give you advice on implementing any of these protections or managing your VoIP services. Give us a call today to get started.

Published with permission from TechAdvisory.org. Source.

Read More

Like all things man-made and otherwise, business continuity plans are not perfect. They too have pitfalls that can result in your business's failure if not accounted for immediately. Don’t blame it all on the IT guy, as often times the way a system is designed can also have loopholes. Here are a few of the […]

2016May20_BusinessContinuity_BLike all things man-made and otherwise, business continuity plans are not perfect. They too have pitfalls that can result in your business's failure if not accounted for immediately. Don’t blame it all on the IT guy, as often times the way a system is designed can also have loopholes. Here are a few of the reasons why business continuity plans fail.

Over-optimistic testing

The initial testing attempt is usually the most important as it’s when IT service providers can pinpoint possible weak points in the recovery plan. However, what usually happens is a full transfer of system and accompanying operations to the backup site. This makes it difficult to look at specific points of backup with too many factors flowing in all at the same time.

Insufficient remote user licenses

A remote user license is given by service providers to businesses so that when a disaster strikes, employees can log in to a remote desktop software. However, the number of licenses a provider has may be limited. In some cases, more employees will need to have access to the remote desktop software than a provider’s license can allow.

Lost digital IDs

When a disaster strikes, employees will usually need their digital IDs so they can log in to the provider’s remote system while their own system at the office is being restored. However, digital IDs are tied to an employee’s desktop and when a desktop is being backed up, they are not automatically saved. So when an employee goes back to using their ‘ready and restored’ desktop, they are unable to access the system with their previous digital ID.

Absence of communications strategy

IT service providers will use email to notify and communicate with business owners and their employees when a disaster happens. However, this form of communication may not always be reliable in certain cases such as the Internet being cut off or with spam intrusions. There are third-party notification systems available, but they are quite expensive and some providers sell them as a pricey add-on service.

Backups that require labored validation

After a system has been restored, IT technicians and business owners need to check whether the restoration is thorough and complete. This validation becomes a waste of time and effort when the log reports come in a manner that is not easy to compare. This usually happens when IT service providers utilize backup applications that do not come with their own log modules, and have to be acquired separately.

These are just some of the many reasons why business continuity plans fail. It is important for business owners to be involved with any process that pertains to their IT infrastructure. Just because you believe something works doesn’t necessarily mean that it works correctly or effectively. If you have questions regarding your business continuity plan, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

Read More

Sorry M&M fans, but the codename Android M doesn’t stand for your favorite chocolate after all. Android 6.0, or Android Marshmallow, as it’s officially called, was more than just enhancing user experience with Android Lollipop. Although it looks a bit similar to Lollipop by retaining the Material design theme, the new features that come with […]

2016May19_AndroidTablet_BSorry M&M fans, but the codename Android M doesn’t stand for your favorite chocolate after all. Android 6.0, or Android Marshmallow, as it’s officially called, was more than just enhancing user experience with Android Lollipop. Although it looks a bit similar to Lollipop by retaining the Material design theme, the new features that come with it are apparently smarter and well, sweeter. We have rounded up a list of new features that you can expect when your tablet finally updates to Android 6.0.

Now on Tap

Google’s digital personal assistant is being made more efficient in giving you quick answers and in figuring out what you may want to do next. Now On Tap can be activated by pressing on your tab’s home button, which works for both onscreen and the physical button. A short animation or a card will appear that will give you quick information based on the context of what is currently on your screen. For example, you are chatting with a client regarding a new restaurant, Now on Tap can give you directions to the restaurant, its contact information or Yelp review. This deep-linking technology also includes shortcuts to apps on your tablet and is also applicable to voice searches. It’s designed in a way that it appears when you need it and disappears so you can resume what you were previously doing.

Android Pay

With the increasing popularity of mobile payment, Google is trying again after the dismal performance of the Google Wallet. The latter is being changed for peer-to-peer payments only, while Google Pay allows you to pay for both in-store and in-app purchases. Google’s newest mobile payment system lets you purchase goods from 700,000 participating stores by using your tab’s NFC technology. Also, checking out in mobile shopping apps is a walk in the park using Android Pay.

Doze

Don’t you just hate it when after a few hours of taking the tablet off the charger, you’re left with just 2% battery life? With the Doze mode in Android 6.0, it promises to make your tablet last even longer. This new power-saving feature even uses a lot less power than the current Standby mode. In Doze mode, your tablet hibernates when you put it down for a lengthy period. That means your tab will not be disturbed by power hogging apps, but will still be receiving incoming messages, phone calls and important alarms.

Redesigned App Drawer

Marshmallow comes with a new design for the app drawer - that part in your tablet where all your installed apps are located. A search bar at the top makes it even easier to find an app. Google also remembers your app-opening frequency or periods and can make suggestions on what apps you might want to use. Instead of scrolling left and right, the app drawer now scrolls up or down which is reminiscent of older Android versions.

Android for Work

This may not be a very appealing addition to many but for those who bring their tablet as a BYOD (Bring Your Own Device) device at work, this is definitely sexy. Android Marshmallow improves the way it handles security, notifications, VPNs, access and storage. So much so that one device can be used for both home and work purposes.

Fingerprint API

This update may not be all that apparent, but now your Android tab comes with support for a fingerprint reader. This allows you to unlock your tab and its apps, and also to easily verify payments.

App Permissions

Now you can have greater control over the security and privacy of your tablet by approving permission requests on a need-to-use basis. Previously, these apps required carte blanche permission to look at parts of your tablet you actually didn’t want them to. With Android Marshmallow, WhatsApp may not ask for permission to access your photos until you try to take and send one.

However, keep in mind that some apps may not function optimally if you restrict it to resources that it actually needs. Not sure how to proceed when it comes to app permissions? Having problems in updating your tablet’s software? Or are you finding it difficult to integrate your BYOD device with technology at work? Get in touch with one of our experts to assist with any of your technology issues.

Published with permission from TechAdvisory.org. Source.

Read More