Blog

July 10th, 2014

Security_July07_BAs technology continues to expand and improve, many people have come to prefer to use their own systems over their office's tech offerings. This is largely because many of us have newer personal devices that allow us to do so much more than the computers we use at our office. As a result, the issue of BYOD (Bring Your Own Device) has become far more important, especially due to the fact that if left unchecked, BYOD could pose a security risk to your organization.

What should I do about BYOD?

The first reaction of many office managers and business owners, worried about security threats that could stem from BYOD, is to impose an outright ban of devices. While telling your staff they are not to use their devices for work may seem like a quick and easy solution, you can be 100% sure that there will be employees who ignore this policy and use their personal devices for work regardless.

This could put your business at a higher security risk if the rule is ignored, especially if you don't implement any security measures to protect your networks and data. In order to minimize the potential threats BYOD can expose your business to, we suggest you do the following:

1. Consider embracing BYOD

Instead of simply banning personal devices in the workplace take a step back and look to see if there are any benefits BYOD can offer. For example, if you operate on razor thin margins and have not replaced hardware in years, there is a good chance your employees will have better systems at hand. This could help you reduce your overall tech costs.

The same goes for phones for your employees. Why not offer to pay for the plan and allow employees to use their own devices? Of course, you are going to want to implement security measures and usage rules, but if this is easily achieved then it may help reduce your overall operating costs. Before you do implement a system like this however, we strongly recommend you read the rest of this article and follow the steps below.

2. Set up separate networks for employee devices

Oftentimes, the main reason employees bring their devices to the office and use them for work purposes, especially when it comes to mobile phones, is because they can happily connect to Wi-Fi for free without using their data plans throughout the day.

Chances are high that because they use the work Wi-Fi on their device for non-work tasks, they simply keep using the device when they are doing work related activities. This could pose a security risk, especially if you run business-critical operations on the same network. You could nip this potential problem in the bud and simply install another Wi-Fi network for mobile devices and non-critical business processes.

It is usually quite affordable to simply purchase another line and the networking equipment to support this, not to mention the fact that it will keep business-critical processes secure from errant malware. As an added bonus, you will likely see increased productivity because the bandwidth demand will be limited, so important data will move quicker.

3. Educate your staff about security

In our experience, the vast majority of BYOD related security risks are exposed by mistake. An employee may have a virus on a personal phone and be unaware of it. When they connect to the network it can then be unintentionally spread to other computers resulting in a potentially massive security breach.

One of the simplest ways to prevent this is to educate your employees about proper mobile safety. This includes how to spot apps that could contain malware, sharing security threat updates, and teaching your employees how to secure their devices. You really need to stress just how important security is to them.

On top of this, contact an IT expert like us for a recommended anti-virus and spyware scanner for mobile devices that users can easily install. Encourage employees to not just install this but to keep it up to date too. Many of these mobile specific scanners are free and just as powerful as desktop versions.

4. Work with an IT partner to establish a solution that works for you

Beyond education and simple network establishment, it is a great idea to work with an IT partner like us. As experts, we keep tabs on the trends and solutions related to BYOD and will work with you to establish a program that works for your company.

It may be that you don't actually need to integrate BYOD but to update hardware or software to newer versions instead. It could be that there is a simple solution to employees feeling frustrated with slow performance of existing systems at work.

If you do implement BYOD, we can help establish security measures and policies that will ensure your networks and employee devices are secure. The best advice we can give however, is to do this before you start allowing BYOD, as it can be far more challenging to implement and enforce changes when employees are already using their devices at work.

Looking to learn more? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
July 10th, 2014

BI_July07_BAs businesses continue to become increasingly networked, there is an exponentially increasing amount of data being made available to them. While this data can be really useful, a lot of it can also be less so, or even useless. However, you are going to continue to collect data, and in order not to be overwhelmed with the sheer volume you should have a well defined data collection system in place.

What is well defined data collection?

Everyone collects data, even people who don't use computers. The key to being able to successfully leverage the data you have available to your business lies in a strong foundation - in this case, how you collect your data. With an appropriate system in pace you will know what data to collect and measure, and just how important it is. From here, you can more effectively analyze and interpret it, allowing you to make more informed decisions.

If you are looking to implement a new data collection system, or improve on how you currently collect it, here are six tips that can help:

1. Think about what customer interactions are important

Often the most important data you need is in relation to your customers. Your first step should be to define important customer interactions. For example, if you own an online store, you will likely want to know where your customers come from, the items they click on, items they add to their cart, and items they ultimately buy.

By first identifying important interactions to track, you can then look for metrics and data collection methods related to these interactions. This makes it easier for you to track the most important data.

2. Think about what behavior-related data is important

Don't just focus on those customers who have completed a purchase or followed through the whole business chain. Think about what behavior could produce data that is important to your organization.

To continue the online store example from above, this information could include how far down the page people scroll, how many pages deep they go when looking at product categories, how long they spend on a site, and where those who don't convert leave from.

Collecting and analyzing data like this can be a great determinant of what is working well and what needs to be improved upon.

3. Look at important metrics you use

Sometimes the way you collect your data will depend on how you plan to measure it. This includes the different metrics you use to define the success or failure of marketing plans, sales initiatives, and even how you track visitors.

Be sure to identify which ones your business currently uses, as these will often point you towards the relevant data you will need to collect.

4. Identify the data sources you are going to use

In many businesses there are redundancies with data collected. For example, a CMS (content management system) will often have some of the same data points as Web analytics, or a POS (Point of Sale) will have some of the same data points as an inventory system. Due to this, you are going to have to identify what systems will provide what data.

On the other hand, many businesses use data from multiple systems for one key metric. In order to ensure that you are collecting the right data, you will need to identify these sources and ensure that they are compatible with your data collecting system. If they aren't, you could face potential problems and even make wrong decisions based off of incomplete data, which could cost your business.

5. Keep in mind who will be viewing the reports

When implementing data collection systems and subsequent data analysis systems, you will likely start generating reports related to this data. It is therefore a good idea to identify who will be reading these reports and what the most important information they will need is.

This information will be different for each audience, so be sure to identify what data they judge to be important. For optimal results, you should think about who will be reading the data reports and what relevant data needs to be collected in order to generate them.

6. Set a reasonable frequency for collection and analysis

This can be a tough one to get right, especially if you work in an industry with high fluctuation or your business is in a constant state of change. Your best bet is to look at when you think you will be needing data. For example, if you are responsible to submit a monthly sales report it might be a good idea to collect data on at least a bi-weekly basis in order to have enough to develop a report at the end of the month.

You should also look at who will be getting the reports and how long different campaigns or business deals will be in place. The frequency will vary for each business, so pick one that works best for your systems and business.

If you are looking to implement a data collection system, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 9th, 2014

Web_July07_BFiles and folders on any device are among the most essential parts of the overall operating system. Many business owners and managers go to great lengths to keep these organized and easy to find. This is easy to do on desktop and laptop computers, but on mobile devices, such as the Windows Phone, it's somewhat more challenging. In an effort to make this easier, Microsoft has recently released a new app for Windows Phone users.

About the Files app for Windows Phone 8.1

In late May, Microsoft posted an article on their Windows Mobile blog announcing that the Files app had been launched. The idea behind this app is that it allows easier viewing and managing of files and folders on your Windows Phone.

With this app you can:

  • Browse for installed files
  • Arrange files into folders
  • Move files or folders from one location to another
  • Open or search for files
  • Change the name of existing files
  • Share individual or multiple files with other users
While this app is a welcome development, there is one feature that makes it great: It allows you to also access and manage files on your device's SD card - if it has one. This means you no longer have to connect your Windows Phone to your computer in order to manage your files. You can do so directly from your phone.

Where can I get the app?

If you use your device for work we strongly recommend that you install this app, especially if you store files on your device. Find the app on the Windows Phone Store for free. Simply click the Install button in the left-hand ribbon of the page and select your device. You need to be signed into the Microsoft account you use on your phone. You can verify this by looking at the top-right of the page and hovering your mouse over Explore. If you are not signed in hover over Explore and click Sign-in. Enter the username and password of the Microsoft account you use on your phone and you should be able to install the app directly from your browser.

Alternatively, you can install the app directly to your device by:

  1. Going to the Windows Phone Store app on your device.
  2. Searching for Files.
  3. Tapping on the Files app icon (blue square with a white document icon).
  4. Pressing Install.
The app should start to download automatically and install a new tile on your home screen.

Using the Files app

To manage or view the files and folders on your device, simply open the app. You should see a screen open with the option to either look at the files on your Phone or SD card - if your device has an SD card installed.

When you tap on either Phone or SD card, you should see the file structure pop up. Scrolling up or down and tapping on files or folders will open them. If you tap on the square box beside each file you will see a number of options pop up at the bottom of the screen. Pressing the related icon will allow you to interact with that file. For example, if you select a file and press the Trash Can icon, the file will be deleted. You can select multiple files at the same time by simply tapping on the white boxes before hitting any of the action buttons.

If you are looking for a specific file, make sure you don't have any files or folders selected and press the magnifying glass icon at the bottom of the screen. Enter the name of the file or folder you would like to find and it should pop up below the search bar.

Looking to learn more about using Windows Phone in the office? Contact us today to see how our services can help.

Published with permission from TechAdvisory.org. Source.

July 8th, 2014

BusinessValue_June30_BIt’s no secret we are all targets of opportunity. In 2013 Internet Crimes IC3.gov reported receiving over 262,813 complaints. The IC3 adjusted dollar loss of complaints was $782.1 million for 2013. We all accept a bit of risk and routinely change our habits and actions around what we know of crime and its victims. Common sense and crime statics dictate to us that the risk of becoming a victim changes with simple things such as time of day, our level of awareness and how prepared we are. Though by no fault of our own hundreds of thousands of Americans fall prey to a new kind of criminal activity. Identify theft, the act of assuming a person’s identify for the purpose of transacting with financial institutions is rapidly becoming a common tool used by online thieves to transaction millions of dollars from unsuspecting victims. We see this type of behavior daily as we review logs and alerts on our clients network firewalls that block and log the source of the traffic. If the solution were that simple the thieves would find another path however Social Media Engineering continues to be the number one method of stealing someone’s identify. Often users will use the same password for all of their email and website accounts. Stealing someone’s identity is often as simple as guessing or hacking their email address. The criminal then begins to read old emails, sent items and rebuild your life through your communications, learning where you bank, who you do business with, and then they begin to assume the role of being you, often emailing or even calling by phone to make certain requests in order to get the info they are looking for. Business owners are often big targets as criminals know they are busy, typically have more resources than the average Joe and will often transact huge sums of moneys for business operations using bank wire transfers and personal relationships with the bank managers they often do business with. How can we protect ourselves?

  • Be vigilant, use passwords with more complexity such as characters, numbers, Case sensitive, longer pass phases of 8 or more characters.
  • Use different passwords for different websites, accounts, and emails.
  • Encrypt your emails when sending a sensitive communication, if your organization does not currently have this functionality contact us today!
  • Never divulge account information, credit card numbers, or personal information such as social security, date of birth, by email or phone.
  • Never assume an email is legitimate, call the sender to verify they sent the request, validate the nature of the request.
  • Utilize hard drive encryption tools,  ensure your data is encrypted on your personal computers.
  • Educate the users at your office on using these safe practices and protect you and your clients data from falling into the wrong hands.

Already a victim? Report the activity to the Federal Bureau of Investigation. You can report internet crime by calling your local FBI office or using their website to report the incident at http://www.ic3.gov/default.aspx

Reference: http://www.ic3.gov/media/IC3-Poster.pdf

If your organization would like more information on how to better protect your business and users from this type of fraud contact us today to schedule a time to meet and discuss the challenges that are facing your business today!

July 7th, 2014

image010

A cloud phone system may or may not be right for you, but you shouldn’t have to make the decision alone. As your business technology consultants Cybernut already manages your business network, serves, and email communications. Maybe it is time we manage your business voice communications and take the monthly Shock & Awe out of opening your monthly telephone invoice.

Time to Simplify, Automate, and kick those expensive phone bills to the curb!

image003

Ok, so you’ve used the cloud to store your files or maybe bill your customers. You may have even considered hosted VoIP service, but not all cloud phone systems are created equal. Furthermore, not all cloud phone systems will be right for your particular business. That’s why our experts are here to help. We know the right questions to ask when considering the switch. Connect with one of your experts for a free evaluation and we will tell you if a cloud phone system is right for you.

What to expect with your free evaluation:

  • Network speed test
  • Full network diagnostic
  • Existing hardware compatibility check

 

image005Mobility

Never give your personal mobile number out again. Make and receive calls from your desk phone, computer or mobile device all with your business phone number.

 

image009Call Reporting

Call Reports you access to know who’s been calling. With detailed metrics on who’s called your firm and the duration, you can accurately bill your clients for time spent on the phone.

 

image007Collaboration

Call, chat or share a screen with a colleague all from your easy-to-use Heads Up Display. Regain up to 2 hours a day in lost productivity.

 

image016Conferencing

Host conference calls with moderator control, call recording and participant management. Eliminate the expense and bother of third party conferencing service.

 

Simplify & Love your Business Phone system again.

image017

 

 

 

 

 

 

 

 

Click the CONTACT US below to arrange a time to chat with you about your options!

image021

 

 

July 4th, 2014

BusinessValue_June30_BIn the first part of this article, last month, we began to take a look at the content companies create for social media and how they can go about not only getting it shared but also increasing the overall shareability of the content they create. From creating longer blog articles, to using images, and playing on certain emotions, we shared five useful content sharing tips. In this month's article, we look at five more tips that can help ensure your blog articles and content are more likely to be shared via social media.

6. Lists of 10 items are great

One of the most popular forms of blog article written these days is the list article. These articles usually cover three to more than 20 items or tips related to one central topic. Articles of this type are popular because they are not only quick to write, but are also quick to digest as they can be broken up into easy-to-read sections - perfect for those who scan articles on their mobile devices.

With so many lists out there, it can be tricky to nail just how long your list of tips, ideas, etc. should be. From social data pulled by social media experts over at BuzzSumo, it appears that articles with 10 list items get the most shares. It is therefore a good idea to strive to reach 10 points when creating this style of list article.

Some articles however can get quite lengthy, even with 10 items. One strategy might be to separate the list, like we have with this article. Of course, shorter lists can work well too, especially if these include powerful tips. We suggest trying to aim for 5-10 items when you are writing your list articles.

7. People share what they trust

This has been an age-old truth: people go with companies they trust. It has been proven time and again that users will often follow what their friends and people they trust recommend. What this translates to when it comes to the shareability of your articles is that the source of the content needs to be trustworthy.

This can be difficult to establish, especially if you are a new business or new to social media, One of the best ways to achieve this is to include bylines and author bios on your articles. Putting the name of the author (byline) at the top of an article and a brief bio at the bottom will help increase the legitimacy of the article in the eyes of the reader, increasing their trust levels over time,

Another quick way to increase legitimacy is to share an article on specific social networks. Your first thought is likely to be to share away on Facebook, but think about how Facebook is used - people generally share everything, even if it's not trustworthy. Instead, look to the more professional networks like LinkedIn and Google+. Generally, people on these platforms build more professionally oriented networks, often built on trust.

By sharing an article with a byline and bio with your groups in LinkedIn you can quickly build trust, especially if you are active within your network. Once people start to trust your content, there is a higher chance they will read it and consequently share it too.

8. What's old can be new

Have you ever followed a post on Facebook, or any other social media? If you have, you likely know how short of a lifespan content has - when it comes to shares at least. Almost all content posted on social media sites has a lifespan of about three days to a week at most. What do we mean by this? Well, normally after three days you will see the number of interactions - shares, likes, etc - drop by as much as 98%. Go beyond three days and you will usually see another huge drop in the number of shares from the three day mark.

Essentially after three days to a week, your content will likely not be shared or even seen. Most of us know this, and are often quick enough to produce more content and posts in order to keep followers engaged. However, some content can actually be re-shared to keep up or to further interest.

Not all content - articles included - can, or should, be reposted, such as time relevant content like an announcement. Reposting these three weeks after the fact likely does not provide any value to the reader. Content that is written to be always viable however e.g., tip articles, how-tos, etc. are great potential content for resharing.

Some information never really gets old and can be useful to a new audience. Resharing previously posted content like this ensures more people will see and interact with it. For best results, try promoting an article you think was useful about one week after you first posted. Also, be sure to look at season or holiday relevant content - there is a good chance this can be reposted at the relevant time.

9. Know when to share your content

Often, the most important key to increasing the shareability of your content is actually posting it when your desired audience is online. By posting at, or just before, these key times, you increase the chance of the content being seen and interacted with. While there is no set timeframe, you can figure out when best to post through trial and error.

Before you start however, look at your previous content and see when it was interacted with most. Take a look at the days and times, and track this for a few weeks. You should start to see a trend emerge, with the most interactions happening at a certain time and date. Also, apply a little common knowledge. For example, if your target audience is other business owners or managers, posting midday will likely mean content will be missed. However, posting after normal business hours could improve your chances.

From here, try posting content at different times to see what works, and adjust your schedule accordingly.

10. Realize this will all take time

When looking to improve the reach of your content, you need to realize this will take time. Even if you follow these tips, you won't see immediate results. Chances are high this will take months to pay dividends. The key here is to stick with it and to experiment. Try a few different strategies at a time to see what works and doesn't, then go back to the drawing board and improve your plans.

If you are looking to learn more about leveraging social media in your business, we may be able to help. Contact us today for a chat.

Published with permission from TechAdvisory.org. Source.

July 3rd, 2014

AndroidTablet_June30_BWhether you are a bit Google fan or not, the tech giant is now one of the biggest companies on Earth. Each year they host an annual conference to highlight what you can expect in the coming year from the company that promises to "do no evil". Their annual conference, I/O, is usually held in late May or June, and this year was held on June 25 and 26. As with the past few years, the company talked about a new version of Android that they are working on.

Coming soon: A new version of Android

It's true that you can pretty much guarantee a new version of Android to be announced at I/O. This year, Google was true to form and spent the better part of the whole keynote speech talking about the upcoming changes expected with the next version of Android - Android L. Why Android L? Well, the latest version of Android to date is 4.4, codenamed: KitKat. It makes sense that the next big release of Android will start with the letter L. At this time however, it has not been assigned a dessert related name like the other versions of Android because it is still in development.

Names aside, there were a number of interesting changes talked about by the Google staff. Here are five that business users of Android devices will be interested to know about.

1. Material design - A drastic change to the UI

Practically one of the first things talked about, regarding Android L at least, was a newly designed UI or User Interface. In fact, when released, this will be the biggest change to the look of Android since the Ice Cream Sandwich update in 2011. Powering this change will be a new look Google calls material design.

Material design creates a drastically different look from existing versions of Android. This will bring a flatter design with lots of rounded elements and softer edges that will extend to all versions of Android - tablets, phones, Chromebooks, and even Google's apps themselves. From this, it appears that Google wants to extend Android to other devices and it will do so by implementing a card-based design. These cards will play a front-and-center role with Android L, and according to Google they will be able to scale to meet screen size and dimensions. This means that one app will be able to work on different devices, without the need for a specific tablet, or phone version.

From the demo of material design that Google played, the new UI looks great. It looks clean, modern, and more colorful than ever before. If you are wondering what this design will look like when it comes to apps, take a look at the latest version of the Google+ app for Android, it has already been switched over to reflect the upcoming new style from Google. Or, check out this YouTube video from Google that highlights what the material design UI will look like.

The company also showcased a number of new changes to the UI that will make Android even easier to use. One of the biggest was how the apps interacted. Using the new version, the presenter searched for a restaurant and one of the search results was to an app installed on the phone. Tapping on it opened the app, without you having to close the results, to be able to then search for the restaurant. Overall, this will be a big change in the way Android looks and interacts with other apps.

2. Improved notifications

While a drastic change to the UI is pretty big news, Google wasn't content to just redesign the look of Android. They also showcased an improved notifications function. In current versions of Android, you need to unlock your device and swipe down from the top of the screen to view your notifications which are displayed in chronological order.

In Android L, your notifications will be viewable, and actionable from your locked screen. For example, if you get a new SMS, you can read it directly from your phone's screen, without having to unlock the device and open the relevant app or notifications center.

The other big change will be to how your notifications are displayed. Google is going to take a different approach to this and instead of showing these chronologically, it will display notifications sorted by relevance and importance.

Finally, Google will fix one of the biggest annoyances with Android - if you are working in an app, say giving a presentation, and you receive a call your device will no longer close the presentation and open the phone dialer. Instead, it will show what Google calls a 'Heads Up Notification'. This is a small notice displayed on top of the app that you currently have opened. In the example shown, a game was being played when someone called. Instead of the game closing, you saw the call info hover on top of the app. You could answer, hang up or even send a quick auto-reply SMS (e.g., I am busy, will call you back later) without the current app being closed.

3. Trusted environments

Having a screen lock on your device, such as a pattern or number lock, is essential for all users. This is one of the best ways to ensure that others can't physically access your device and the data within. While screen locks are a security must, there are times when they are more of an inconvenience than anything.

Take for example during a presentation. If you are using your Android device to show a slideshow, and pause for a time on one slide, long enough for your phone's screen to switch off, it is a hassle to unlock the screen and reopen the app.

Google's fix for this is a feature which establishes a trusted environment or device e.g., an Android smartwatch or your Office Wi-Fi. When you are in range of the watch, or the Wi-Fi connection, your device will automatically be unlocked and accessible without having to enter your PIN or code.

Move out of range however, and your device will lock, requiring the PIN or swipe code to unlock. This could be a useful feature for many businesses, especially those who use Android devices on a regular basis.

4. Deeper ties with Chrome and the Web

Many Android users utilize the recent app button on a regular basis. With one tap of the button, usually located on the bottom right of your device, or by pressing the home button, you can open previous apps. With the introduction of Android L, this will also show tabs that you have open in Chrome. This could be useful, especially if you use Chrome on your desktop and want to quickly access the same page on your device.

5. Business oriented APIs

The API, or application programming interface, is an essential part of the mobile device. It is the API that specifies how different apps should work together. With Android L, Google will include some business oriented APIs, with the most important being a set that allows both personal and business data to exist on the same device, without being mixed. In other words, you will be able to use a personal device for work, likely without mixing accounts, something which the BYOD crowd should find incredibly useful.

When can we expect Android L to arrive?

As of the writing of this article, there is no set release date for Android L. During the keynote numerous mentions were made of it being released sometime in the fall. Bear in mind that this is for Nexus, Google Play, and likely new devices released just after Android L. When, or if, it will be made available for other users is unknown, but likely won't be until early next year.

In the meantime, keep reading our blog for updates. And, if you have any questions regarding Android in your business please give us a shout today.

Published with permission from TechAdvisory.org. Source.

July 3rd, 2014

GeneralHealthCare_July03_AA strategy commonly used in manufacturing and aviation offers the potential for better health care at lower cost, according to a recent report.

That strategy - systems engineering - is an interdisciplinary approach to designing and managing complex systems.

According to "Better Health Care and Lower Costs: Accelerating Improvement Through Systems Engineering," a report from the President's Council of Advisors on Science and Technology (PCAST), the key is the use of tools such as alerts and checklists that adjust for the human factor.

It’s worked in many industries. As one example of using systems engineering, U.S. commercial airlines have reduced fatalities significantly since the 1960s, with the risk of dying now one in 45 million flights. Similar gains have been seen in space stations, satellites, and education.

Now forward-thinking physicians are embracing systems engineering with the same level of devotion. Simply having doctors and nurses in an I.C.U. make their own checklists for what they thought should be done each day decreased the average length of stay by half.

According to the PCAST report, systems engineering, with an emphasis on high-quality data to assist health-care providers and measure progress, is the wave of the future in health care. Contact us today to learn more about how our services can help your practice.

Published with permission from TechAdvisory.org. Source.

July 3rd, 2014

AndroidPhone_June30_BAs Android devices continue their steady penetration into the business world, we are starting to see a wider number of business oriented apps arrive on the Google Play store. One of the latest apps released could be incredibly useful for business owners who use Google Apps. In late June, Google announced that they had released the Slides app.

What exactly is the Google Slides app? I thought it was part of Google Drive...

As many who use Google Apps know, productivity apps like Slides, Docs, and Sheets are part of Google's cloud storage app - Drive. If you have used the Drive app on your phone or tablet, you likely also know that you can create, edit, and share documents via this app.

This development is an effort to extend the capabilities of Drive, while simultaneously making it easier for users to access their individual files. For example, if you are a heavy user of Slides it can be a little annoying and time consuming to open the Drive app, search for the file you want, open it, and start editing. Now, if you have the app installed you can open it for immediate access to your related files, in this case Slides.

The key here is to think of the Slides app as a branch of the Google Drive App, as all of your files are still linked to Drive. Create a presentation using the Slides app and it will show up automatically on Google Drive as well as in the app. This app has all the same features as the Drive version, it is just that the app has been specifically written for mobile devices and designed for ease of use.

What can I do with this app?

As we stated above, the main focus of the Slides app is to allow you to create and edit presentations from your Android device. As such, there are a number of useful features:
  • The ability to create and edit presentations offline. As long as you have accessed a Slides presentation while online, it will be made available for you to open and edit offline as well. You can also save individual presentations to your device's hard drive and have the file updated when the presentation is.
  • Advanced sharing features. You are able to share your presentation from a mobile device and have users on their devices or computers collaborate on the same file.
  • Automatic saving of presentations created and edited on the Web. As long as you have an Internet connection, changes made to files via the app will be synced with Google Drive and reflect on all versions of the presentation. If you are offline, the changes will sync when you are next online.
  • The ability to open, edit, and save Microsoft PowerPoint presentations directly from the app. This is a big feature, largely due to the fact that many businesses use PowerPoint instead of Slides. What this means for you is that you can view these files without PowerPoint installed on your device.
  • Full editing capabilities. You are able to create slides, add text, edit slide order and the overall format of your text and slides.
  • Present directly from your device. You can run presentations on your device or connect to a projector using adapters that can usually be purchased for your device.

Where can I find the Slides app?

This app is available now on Google Play. To install it you can:
  1. Open the Google Play app on your device.
  2. Press the magnifying glass and type in Google Slides.
  3. Tap on the app and select Install.
  4. Open the app when it has been installed.
When you open the app, you should see all of your slides related to your Google account pop up in the app.

If you are looking to learn more about Google's apps on your Android device contact us today to see how we can help ensure that you get the apps your business needs most.

Published with permission from TechAdvisory.org. Source.

July 3rd, 2014

HealthcareIT_July03_AThe compliance date for ICD-10 is farther away than it once was, but it’s still coming — and health-care practitioners should be moving forward with preparedness plans, if the results of a recent survey are any indication.

The survey — which questioned physician practices, hospitals, payers, vendors, and others — was conducted by eHealth Initiative and the American Health Information Management Association (AHIMA).

It found that most health-care organizations are using the extra time afforded by the delay of ICD-10 compliance to October 15 to invest, train, and test. Most organizations said they're ready for testing, but some are more prepared than others. Around 40 percent of respondents said they'd start end-to- end testing by the end of 2014, and 25 percent reported that they’d begin by the end of 2015. And, to minimize productivity loss, 68 percent of respondents said they will conduct additional training, with 31 percent hiring more coders to help with the transition.

Concerns about ICD-10 remain, however. One pertains to preparedness, with 45 percent of respondents reporting that they don't have a good sense of their partners' readiness. Another pertains to financial impact, with 38 percent of respondents saying they thought their revenue will decrease, and 14 percent saying they think it will stay the same. Only 6 percent think it will increase.

Clearly, while the ICD-10 transition seeks to improve accuracy of claims and quality of care, not everyone has a clear plan to derive value from it. But now, it seems, is the best time to prepare. We recommend that you contact us today to learn more about how we can help ensure that you are ready for ICD-10.

Published with permission from TechAdvisory.org. Source.