Blog

August 15th, 2014

Virtualization_Aug11_BWhile there are numerous tech systems available to small and medium size businesses, one of the most useful has proven to be virtualization. This movement of physical systems to a virtual counterpart offers many benefits when implemented correctly. Administered poorly however and you could see systems fail. To help avoid this, it is worthwhile being aware of five common ways virtualization fails.

1. Migration is forced before it is ready

One of the biggest reasons virtualization fails is that it is pushed before the company is ready for it. For example, it could be that the IT team is forced to fast-track virtualization, resulting in staff being forced to drop all other tasks and focus on migration.

If you rush, the chances of failure and mistakes always rise. And when it comes to changing systems from physical to virtual, mistakes can be compounded, thus increasing overall migration time and costs.

To avoid this you should take the time to conduct research on solutions available, workloads, applications to the move, and your specific business needs. Once you are across this, you should also take the time to get to know your systems and test them before migration.

2. Trying to implement a management plan after virtualizing systems

Some companies decide to virtualize first, and then try to figure out how to manage systems after migration is complete. This will almost always result in inefficiencies and frustration as the pressure is on not just to learn how to manage but also how to use this solution.

In order to see a more successful virtualization, you should have a management plan in place before you migrate your systems. You should look at how virtual machines will be managed, who will be doing what, as well as what systems you are going to use, and more. One of the best times to develop an overall management plan is when you are in the testing phase, well before actual migration. This will give you an idea of how systems will work in reality and how you can manage them.

3. Virtualization without employee buy-in, or involving employees

We have seen companies implement a virtualization solution without having full buy-in from the employees who will be using and managing the system. What this results in is confusion, resentment, lost efficiency, and, in some extreme situations, sabotage.

In order to successfully introduce a virtualized solution, you should ensure that all employees who will be using the system are not only aware of it but are trained on how to use it and have been given a fair chance to air their opinions. If you can achieve employee buy-in, there is a better chance that the systems will be used more effectively, and employees will be more open to other solutions being implemented.

4. Assuming one solution that works for others will work for you

An easy mistake to make is to only consider solutions successfully implemented by other businesses. The fact is, every business is different, and you should be looking for a solution that meets your specific needs.

If you go with a ready-made solution, or one-size-fits-all solution, it will likely work to some extent. However, there is a good chance that it will not completely meet your needs. This will likely result in either lost efficiency or increased investment in order to get what you need.

We recommend looking for a provider who can meet your virtualization needs with tailor made solutions. This way you will get what you need straightaway and likely not need to invest more in the future.

5. Not managing your virtual solution after implementation

Unlike some tech solutions, virtualization is not really a 'set it and forget it' type of solution. You will need to manage it from the start if you want to be able to get the most out of your systems. This includes ensuring resources are being allocated properly; machines are created and shut down properly; apps and systems are updated; and more.

While virtualized solutions do require less management than their physical counterparts, they still require some management and you will need people to help you do that. One of the best solutions is to work with an IT partner like us who can help manage your systems and ensure that they are working efficiently.

In fact, we offer a wide variety of virtualization solutions. By working with us, we can help take some of the virtualization load off and allow you to focus on running your business. If you would like to learn more, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

August 14th, 2014

Data is an integral component to any business. Without it we would not be able to make decisions, develop marketing campaigns, or even operate. The issue many businesses face however is that the amount of data they generate and capture is increasing exponentially and it can be a challenge to collect and leverage it. One solution is to integrate a data warehouse, but how do you know if your business needs one?

What is a data warehouse?

A data warehouse is a system used by companies for data analysis and reporting. The main purpose of the data warehouse is to integrate, or bring together, data from a number of different sources into one centralized location. The vast majority of the data they store is current or historical data that is used to create reports or reveal trends.

Possibly the biggest benefit of a data warehouse is that it can pull data from different sources e.g., marketing, sales, finance, etc. and use this different data to formulate detailed reports on demand. Essentially, a data warehouse cuts down the time required to find and analyze important data.

While not every business will need one right this minute, a solid data warehouse could help make operations easier and more efficient, especially when compared with other data storage solutions. That being said, it can be tough to figure out if you actually need one. In order to help, we have come up with five signs that show your business is ready to implement a data warehouse.

1. Heavy reliance on spreadsheets

Regardless of business size, the spreadsheet is among the most important business tools out there. Used by pretty much every department in a company, they can be a great way of tracking data. The problem many business owners run across however is that spreadsheets can grow to immense sizes and can become unwieldy.

Combine this with the fact that each department has spreadsheets that you will likely need to pull data from in order to generate a report. If this is the case, you are creating manual reports, which can take a lot of your time.

If you are struggling to find the data you need because it is spread out across different sheets, in different departments, then it may be time to implement a data warehouse.

2. Data is overwhelming your spreadsheets

Spreadsheets are designed to operate with a set amount of data (rows and columns). Reach, or exceed this limit, and you will find that the file becomes sluggish or will downright prevent you adding more data.

While it can take a while to get to this point, companies will reach it if they keep adding to their data. At this point you will see a drop in productivity and overall effectiveness in how you use your data. Therefore, a data warehouse that can combine data from different sheets may be a great solution.

3. You spend too much time waiting

If you set out to develop a report, only to find out that you need to wait for colleagues to provide the information on their spreadsheets, or to analyze their data, you could find yourself waiting for a longer than expected time.

This makes you highly ineffective and can be downright frustrating, especially if employees are too busy or just can't provide the information needed. Implementing a data warehouse can help centralize data and make it available to all team members more effectively. This cuts down the time spent actually having to track it down and communicating with colleagues.

4. Discrepancies in data and reports

Have you noticed that when team leaders or members in different departments create reports that the data or findings are different from yours, or other reports? Not only is this frustrating, it is also time consuming to sort out and could lead to costly mistakes.

This can be amplified if some departments have data sources that they don't share with other teams, as this can throw doubt into the solidity of your data and other reports. If you have reached this point, and realize that there are discrepancies in your data, it may be time to look into a data warehouse which can help sort out problems while ensuring mistakes like duplicate data are eliminated.

5. Too much time spent generating reports

Ideally, we should be able to generate a report using existing data almost instantly, or with as few clicks as possible. If you find that when generating a report you have to keep going to different sources to check if the data is updated, or to keep manually updating other sources, you could quickly see the amount of time needed to develop a report grow.

Because data warehouses consolidate data, you only have to turn to one source for data. Combine with the fact that many data warehouses can be set up to automatically update if source data is updated or changed, and you can guarantee that the data you are using is always correct.

Looking to learn more about data warehouses, or about the different data solutions we offer? Contact us today.

Published with permission from TechAdvisory.org. Source.

August 13th, 2014

Offie_Aug11_BIt’s undeniable that Microsoft Excel is one of the most popular spreadsheet applications used by businesses today. Not only does it simplify the process of creating spreadsheets with complex built-in formulas and colorful, descriptive charts, but it also allows you to add headers and footers. Let’s take a look at what headers and footers are and how you can make use of them in Excel.

What are headers and footers?

As with Word, Headers and footers are lines of text that print at the top (header) and bottom (footer) of each page in an Excel spreadsheet. They often contain descriptive text such as titles, dates, or page numbers displayed in page layout views and on printed pages.

Headers and footers are useful in providing quick information about your document or data in a predictable format and also help set out different parts of a document. Simply put, they make calculations, graphs, and pivot tables much easier to read and follow.

How to add and remove headers and footers:

  1. Select the spreadsheet for which you want to add headers or footers.
  2. On the Insert tab in the Text group, click Header & Footer; this displays the spreadsheet in page layout view.
  3. To add a header or footer, click on the left, right or center of the Header or Footer text box at the top or bottom of the spreadsheet page.
  4. You can now add a preset header or footer to your document, or create a custom header and footer.
  5. To start a new line in a header or footer text box, press ENTER; to include a single ampersand (&) in the text of a header or footer, use two ampersands. When you are done, click anywhere in the spreadsheet to close Header or Footer.
  6. Return to Normal page view by clicking on the View tab and Normal button.
  7. To remove the header or footer from a spreadsheet, select the View tab and click on Page Layout. Delete the information you want to remove.
The next time you need to repeat text on a page to make information more organized and easier to digest, you can simply do so with Excel's header and footer feature. Looking to learn more about Microsoft Office and its features? Contact us today and see how we can help.
Published with permission from TechAdvisory.org. Source.

August 12th, 2014

Office365_Aug11_BOffice for iPad was introduced earlier this year, and with it came full versions of Word, Excel, and PowerPoint that were optimized for use on Apple's popular tablet. While the apps have been popular, especially with Office 365 users, there is always room for improvement. As such, Microsoft has recently introduced a number of updates for some of the apps.

Excel updates

There are three major updates that have been introduced to the iPad version of Excel:
  • Increased pivot table interaction - These tables are among the most useful for business users working with data. With the new update you can now filter, sort, collapse, and expand details. You can now also refresh pivot tables whereby data is pulled from the workbook. Beyond this, you can also change the visual style and layout of the tables.
  • Flick to select large amounts of data - Working with large amounts of data, or spreadsheets with a large number of rows and columns can be tough on the touch screen. So, to make things easier, you can now select large amounts of data by flicking. For example, if you want to select all the rows in one column, you can simply tap on the selection handle of the top row and flick down to select the whole column.
  • Easier manipulation of data - While touch screens are great, and useful, there are times when working with spreadsheets using a keyboard is much better. In the latest update, Microsoft has added increased support for keyboards. This includes support of many familiar keyboard shortcuts, like CTRL+2 which allows users to switch between cell entry modes.

PowerPoint updates

As with Excel, there are three updates that have been introduced to the iPad version of PowerPoint:
  • Presenter View - Many people had taken to using their iPad to run presentations while connected to a projector. In the previous version, your iPad would just show what was actually on the screen, but now you can enable Presenter View. This view shows your slide notes on your iPad's screen, as well as the slides that are coming up next while your presentation runs via the projector.
  • Easier inclusion of visuals - With the new update, all embedded videos and sound recordings now play natively over your iPad; meaning they will play directly from a presentation. You can also add media directly to a presentation from your iPad's Camera Roll, which means you can record and add content all from your iPad.
  • Better annotation tools - There are a number of new annotation tools, including an improved pen and eraser which are designed to make annotations on the iPad's touch screen show up on presentations more easily.

Updates across all apps

Microsoft has been listening to the feedback from Pad app users, and has introduced the three most requested features that apply to all three main apps: Word, PowerPoint, and Excel.
  • Send the file as a PDF - PDFs are one of the most versatile document formats for businesses. Because most systems have software to open these document, it's great for users who don't use Office. Now, you can send the document you are working on as a PDF directly from your iPad. You can find this option under the Share menu.
  • Better image editing - With the update, you can now tap on an image in any Office app to either crop or resize it. If you make any edits, and find they aren't to your liking, there is also the ability to revert to the original image by pressing Reset.
  • Support for third-party fonts - Some businesses prefer to use fonts that aren't included in Office. Up until now, only Office supported fonts could be used on the iPad, but the recent update implements support for third-party fonts (fonts not made by Microsoft) installed on your iPad.
If you are looking to learn more about Office 365 and iPad apps, contact us today to see how we can help.
Published with permission from TechAdvisory.org. Source.

August 7th, 2014

Security_Aug05_BWhen it comes to business security, many small to medium business owners and managers often struggle to ensure that their systems and computers are secure from the various attacks and malware out there. While there are a million and one things you can do to secure systems, one of the most useful approaches is to be aware of common security threats. To help, here are five common ways your systems can be breached.

1. You are tricked into installing malicious software

One of the most common ways a system's security is breached is through malware being downloaded by the user. In almost every case where malware is installed the reason is because the user was tricked into downloading it.

A common trick used by hackers is to plant malware in software and then place this software on a website. When a user visits the site, they are informed that they need to download the software in order for the site to load properly. Once downloaded, the malware infects the system. Other hackers send emails out with a file attached, where only the file contains malware.

There are a nearly limitless number of ways you can be tricked into downloading and installing malware. Luckily, there are steps you can take to avoid this:

  • Never download files from an untrusted location - If you are looking at a website that is asking you to download something, make sure it's from a company you know about and trust. If you are unsure, it's best to avoid downloading and installing the software.
  • Always look at the name of the file before downloading - Many pieces of malware are often disguised with file names that are similar to other files, with only a slight spelling mistake or some weird wording. If you are unsure about the file then don't download it. Instead, contact us as we may be able to help verify the authenticity or provide a similar app.
  • Stay away from torrents, sites with adult content, and movie streaming sites - These sites often contain malware, so it is best to avoid them altogether.
  • Always scan a file before installing it - If you do download files, be sure to get your virus scanner to scan these before you open the apps. Most scanners are equipped do this, normally by right-clicking on the file and selecting Scan with….

2. Hackers are able to alter the operating system settings

Many users are logged into their computers as admins. Being an administrator allows you to change any and all settings, install programs, and manage other accounts.

If a hacker manages to access your computer and you are set up as the admin, they will have full access to your computer. This means they could install other malicious software, change settings or even completely hijack the machine. The biggest worry about this however, is if a hacker gets access to a computer that is used to manage the overall network. Should this happen, they could gain control over all the systems on the network and do what they please on it.

In order to avoid this, you should ensure that if a user doesn't need to install files or change settings on the computer, they do not have administrator access. Beyond this, installing security software like anti-virus scanners and keeping them up to date, as well as conducting regular scans, will help reduce the chances of being infected, or seeing infections spread.

3. Someone physically accesses your computer

It really feels like almost every security threat these days is digital or is trying to infect your systems and network from the outside. However, there are many times when malware is introduced into systems, or data is stolen, because someone has physically had access to your systems.

For example, you leave your computer on when you go for lunch and someone walks up to it, plugs in a USB drive with malware on it and physically infects your system. Or, it could be they access your system and manually reset the password, thereby locking you out and giving them access.

What we are trying to say here is that not all infections or breaches arrive via the Internet. What we recommend is to ensure that you password protect your computer - you need to enter a password in order to access it. You should also be sure that when you are away from your computer it is either turned off, or you are logged off.

Beyond that, it is a good idea to disable drives like CD/DVD and connections like USB if you don't use them. This will limit the chances that someone will be able to use a CD or USB drive to infect your computer.

4. It's someone from within the company

We have seen a number of infections and security breaches that were carried out by a disgruntled employee. It could be that they delete essential data, or remove it from the system completely. Some have even gone so far as to introduce highly destructive malware.

While it would be great to say that every business has the best employees, there is always a chance a breach can be carried out by an employee. The most effective way to prevent this, aside from ensuring your employees are happy, is to limit access to systems.

Take a look at what your employees have access to. For example, you may find that people in marketing have access to finance files or even admin panels. The truth is, your employees don't need access to everything, so take steps to limit access to necessary systems. Combine this with the suggestions above - limiting admin access and installing scanners - and you can likely limit or even prevent employee initiated breaches.

5. Your password is compromised

Your password is the main way you can verify and access your accounts and systems. The issue is, many people have weak passwords. There has been a steady increase in the number of services that have been breached with user account data being stolen. If a hacker was to get a hold of say your username, and you have a weak password, it could only be a matter of time before they have access to your account.

If this happens, your account is compromised. Combine this with the fact that many people use the same password for multiple accounts, and you could see a massive breach leading to data being stolen, or worse - your identity.

It is therefore a good idea to use a separate password for each account you have. Also, make sure that the passwords used are strong and as different as possible from each other. One tool that could help ensure this is a password manager which generates a different password for each account.

If you are looking to learn more about ensuring your systems are secure, contact us today to learn about how our services can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
August 6th, 2014

BCP_Aug05_BMost IT experts will agree that in order for a business to survive, they need some sort of recovery or continuity plan in place. Regardless of the type of plan, or systems integrated, all systems need to have a back up mechanism. In the last article, we took a look at four tips to help improve your data backups, and continue this article with the final four.

5. Automate your backup

It can be tough to actually remember to back up your files, especially if your business is busy. Therefore, you could look into an automated backup solution. At the very least, you should set a schedule as to when backups are conducted and set what is being backed up. While this isn't a full automation, a schedule will help.

If you are using solutions like the cloud or NAS (Network Attached Storage), you can usually automate the process by selecting which files and folders to back up and when. The software that powers these solutions will then do this automatically.

Ideally, your backups should be carried out automatically to ensure your data is available should you need it. But you should check periodically to ensure that your data is actually being backed up. This is especially true if you are backing up other systems, as there have been cases where employees have become frustrated by the backup process and simply turned it off. The business owner, thinking their data was being backed up would be in for a bit of a shock when systems crashed, if this was the case.

6. Back up your backups

Redundancy of your backups is just as important as actually backing up your data. You should keep a backup of your backup in case something happens to your original backup. While this doesn't have to be carried out as often as the 'normal' backup, this should be done on a regular basis.

In order to really ensure backup redundancy we recommend that if your main backup is kept on-site, then the secondary backup should be on another storage medium that is kept off-site.

7. Don't forget data stored on non-physical drives

What we are referring to here is the data stored on different services like your email, social media, and non-physical locations. This is especially true if you say have you own servers. It's highly likely that there is data stored on these services as well, and should they go down and you haven't kept a backup, you may lose important information.

Essentially, think about critical data that is used in the company, but isn't physically kept on computers. It may feel like this is going a step too far with backups, especially for businesses who use email services like Exchange and Gmail. However, while the chances of these systems going down are incredibly rare, it could still happen. Therefore, you should conduct a monthly to bi-yearly backup just to ensure that data is there somewhere should something happen.

8. Test your backups

Finally, it is beneficial to actually test your backups from time-to-time to ensure that they are not only working but the data is actually recoverable. If you do a trial run on recovering your data, you can get a good idea of how long it will take to retrieve this information when you actually need to recover it. You can then take steps to optimize this and let the relevant people know.

Also, testing is a good way to discover any problems, e.g., if someone has disabled backups, or one solution isn't working. This will ensure that your data is there when you need it.

If you are looking to integrate a data backup solution, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

August 5th, 2014

HealthIT_Aug05_AAs we move toward the October 2015 compliance deadline for ICD-10, the Journal of AHIMA has tackled three misconceptions about the new coding system.

ICD-9 isn't so bad. In reality, ICD-9 is obsolete, and the longer it is in use, the more the quality of health-care data will decline, leading to faulty decisions based on inaccurate or imprecise data. This could lead to increased operating costs along with mistakes which could have a negative effect on your practice and overall billings.

More codes create confusion and difficulty. Almost half of the new codes reflect the ability to differentiate one side of a patient's body from the other. Moreover, more codes, which are more precise, will in fact make it easier to find the right code. It's true that it will take time to learn the new codes, but in the long-run you should see overall efficiency increase, along with more accurate medical records which will make your job easier.

We could just use SNOMED CT or move right to ICD-11. Terminologies such as SNOMED and classification systems such as ICD-10 different roles—albeit complementary ones. And, ICD-11 won’t be ready for prime time until 2017, and that dates marks the beginning, not the end, of the process toward adoption. Remember, ICD-10 was first used by World Health Organization members 1994—and 10 year’s later it’s just going live on a widespread basis.

If you would like to learn more about ICD-10 and how you can ensure that your practice is ready for the October 2015 deadline, contact us today to learn how we can help.

Published with permission from TechAdvisory.org. Source.

July 30th, 2014

Windows_July28_BHave you ever seen a colleague's desktop that is covered in icons, shortcuts, files, and folders? Or maybe it's you that is disorganized. It's not uncommon for desktops to get cluttered, especially if you have been using your computer for a number of years. The issue with this however, is that desktop clutter can make it harder to find what you are looking for and can even slow your computer down.

Want to tidy up your desktop? Here are six tips on how you can get your desktop more organized and even reduce virtual clutter too.

1. Before you begin do a bit of recon

Before you go about simply deleting everything off of your desktop, it is worthwhile thinking about what you really want to keep on your desktop. This will be vary from person to person, of course, but most people treat their desktop as a place where they put files, folders, and app shortcuts that they want to quickly access.

Take the time to think about what you use the most and which files and folders you really need to access instantly or which you use all the time. An easy way to figure this out is to simply auto-arrange your icons by right-clicking on an empty area of your desktop (where there are no icons) and selecting Auto arrange icons. This will arrange your icons into a grid format that makes them easier to see and work with. Then, right-click on empty space and hover your mouse over Sort by and select Date modified to order the icons by the date they were last modified, or opened, with the latest at the top.

2. Create holding and app shortcut folders

People often use their desktop to hold files like downloads, photos, screenshots, and even email attachments. This can lead to an incredibly cluttered desktop in a short amount of time.

In truth, you probably don't need all these shortcuts on your desktop. What you can do is create a folder on your desktop where all non-essential files and folders go. A folder like this is great to hold downloads or files that will only be used for a short amount of time.

The key here, is this folder is used for non-important, or temporary items. If you don't plan on keeping it, put the file, icon, etc. into this folder. Once you are done with the file, simply go into the holding folder and delete it.

It could help to also create a shortcut folder. When you install new programs on Windows, a shortcut icon is often automatically added to your desktop. However, these desktop shortcut should be for frequently used programs only. For programs that aren't really used that often, it is best to create a separate folder the shortcuts. This not only reduces desktop clutter, but puts shortcuts in one central location, making them easier to find.

3. Be ruthless

Once you have your folders set up, it's time to start getting rid of the clutter. As with any clearout you should be ruthless. If you haven't used a file, folder, etc. in the past two months or so, you should seriously question whether you can get rid of it.

To make this easier, open your desktop via the File Explorer. You can do this by opening any folder and clicking Desktop from the left-hand menu bar. This will make all of the icons and files on your desktop easier to see and work with.

Go through these and uninstall programs you no longer use, delete images you no longer need, move unimportant files, and place files in their relevant folders. Once complete, take a look at your browser to see where it downloads files too. If you have your browser set to download files to your desktop by default, try going into the settings and changing the download location to another file like the Downloads folder.

4. Stick with it

Once you have de-cluttered your desktop, try to stick with the rules you have set. With downloads ask yourself whether these need to be on the desktop or whether they can go into a folder somewhere else.

Of course, sticking with it won't always be easy, so maybe take time once every month or two to revisit your desktop and clean it up a bit.

5. Use the taskbar or Start for apps, not the desktop

With Windows 8 and 8.1 you can actually pin apps to the Start menu, so when you click it the apps are available in the window that pops up. This is a great alternative to simply having program shortcuts on your desktop. Pin apps to the Start menu on Windows 8 and 8.1 by opening your apps list (clicking the down arrow from the Windows Start screen) and right-clicking on the program you would like to pin. Select Pin to Start to be able to access it when you hit the Windows key on your keyboard.

If you prefer the traditional desktop view of Windows 7, or are using Windows 7, why not pin your important programs to the taskbar at the bottom of the screen? This can be done by right-clicking on an open app and selecting Pin to Taskbar. The programs will remain at the bottom of the screen, and can be opened by simply clicking on them.

6. Strategically pick your wallpaper

An interesting way to minimize clutter is to pick a wallpaper that you enjoy looking at. Be it a favorite picture, slogan, etc., try to frame the image so the focus is in the center of your desktop. Then, place your icons around the image in a way that they still allow you to see the image. If you can't see the image, then you have too many icons and it may be time to get rid of a few.

Also, having an image you like also serves as a reminder to try to keep icons to a minimum in the first place. This could be a proactive solution to keeping desktop clutter down.

If you are looking to learn more about using Windows in your office, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 30th, 2014

SocialMedia_July28_BLinkedIn is one of the best social platforms for business users who want to share thoughts, ideas, and content with their colleagues and connections. This professional oriented network offers a wide number of features that allow and encourage this, including the newly implemented ability to create long-form content for your profile and connections.

About LinkedIn's new publishing platform

Like other social networks, LinkedIn allows users to publish posts on their profile which are then visible to other users. In the past, there was a limit as to how long the posts could be, which influenced how users shared the content they generated. Most would simply copy and paste a link to their content into a post on their LinkedIn profile.

In an effort to make sharing thoughts, ideas, expertise, etc. easier, LinkedIn has implemented the long-form post. This feature allows you to create longer content, such as blog articles and opinion pieces, and post this directly on LinkedIn. In other words, you can now use LinkedIn as a blog which is shared with your connections.

If you create long-form content, this could be a useful way to get posts out to an even wider audience than through your blog. This is because when you publish a post on LinkedIn, it becomes part of your overall profile, with the post being visible under the Posts section of your profile. New long-form posts will also be published and shared with all of your contacts automatically.

This means that you could technically increase the overall reach of your content, especially if the content you produce is useful to your LinkedIn connections.

Writing long-form content on LinkedIn

If you would like to start publishing long-form content using your LinkedIn profile, you should be able to do so by:
  1. Logging into your LinkedIn profile.
  2. Pressing the pencil in the box that says Share an update…
Note: This update is still rolling out to users, so you may not be able to produce long-form content just yet. If you don't see the pencil in the Share an update… box, you will need to wait for a few weeks, or until you get an email from LinkedIn saying the feature is ready for you to use.

If you do see the pencil icon, click on it to open the long-form post screen. It looks like most other Web-based publishing and writing platforms with the usual formatting buttons and text field where you input the content.

You can write your article directly on this page, but many choose to write using a program they are comfortable with and then copy and paste into the text field. If you want to add images to your post, you can simply click where you would like the image to slot into the content and select the camera icon from the menu bar above the text field. Select the image and hit Submit. You can then resize the image by clicking and dragging on it.

Saving and editing your content

Once you have finished writing we strongly recommend you hit the Save button at the bottom of the text field. This will save the content to your profile, but will not post it. This means you can edit the content before publishing. To do this, click on Preview which will open your post in another window, allowing you to see what the post will look like on your profile.

While in Preview mode, be sure to check the spelling and grammar, along with the overall formatting. If you spot anything that needs to be changed simply switch back to the editing tab on your browser and make any amendments.

When you have finished writing, formatting, and editing you can then hit the Publish button. This will then publish the content on your profile and share it with your connections.

If you have content that you think your connections and colleagues would benefit from reading, then this new LinkedIn feature could prove to be useful and should be considered as a larger part of your overall content strategy.

Looking to learn more about LinkedIn and how you can leverage it in your business? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
July 29th, 2014

Office365_July28_BCloud-based applications, like Microsoft's Office 365, are increasingly gaining popularity in today’s fast-paced world. With various updates and increased integration with Microsoft apps, most businesses are quick to adapt to these changes for better work solutions. With that in mind, Office 365 just introduced its latest update, a simplified login solution to Yammer. If you’re not familiar with the name, don’t worry, we’ll take a quick look at Yammer and how this simplified login works to help your business.

What is Yammer?

Yammer is Microsoft’s social network platform, focusing on your business and your organization’s clientele. In order to join, you must have a working email address from your company’s domain, which will also enable you to create external networks to allow non-employees like suppliers and customers to communicate with your company effectively and easily.

What is simplified login and how do I turn it on?

Simplified login integrates Yammer and Office 365 through user mapping to save you time when signing into Yammer via Office 365. Here’s how to turn on the simplified login feature:
  1. Administrators must sign into Office 365 using the global administrator account.
  2. Select Admin, Sharepoint; and once in Sharepoint admin center, select Settings.
  3. On the Settings page, under Enterprise Social Collaboration, select Use Yammer.com service.
  4. Click on Yammer from Office 365 to check that you won’t have to log in again and can start connecting with people right away.
If you previously made Yammer the primary social experience for your organization, you can enable this for your Office 365 users by following these steps:
  1. Access Sharepoint admin center and select Settings.
  2. Under Enterprise Social Collaboration, click the Use Sharepoint Newsfeed button to clear previous settings
  3. Select Use Yammer.com service and click Ok to apply changes. Each of these two updates might take up to 30 minutes to complete
  4. Once you’re done, Yammer will replace Newsfeed in the Office 365 navigation.
Keep in mind that users without existing Yammer accounts are taken to a streamlined signup and verification process. And although user mapping saves time, it’s not a complete single sign-on solution, meaning when you go to Yammer.com directly or use Yammer mobile apps, you still need to log in with your Yammer.com credentials. Looking to learn more about Office 365 and its functions? Call us today and see how we can help.
Published with permission from TechAdvisory.org. Source.