Blog

August 22nd, 2014

Productivity_Aug18_AThese days many of us have integrated various apps and programs on our computers and mobile devices into our daily lives. The problem many of us face, however, is that apps and programs are all different and many don't work all that well together, so we need to take time to transfer information or even share the same content. To make things easier, there is a great app called If This Then That (IFTTT), that could help make your devices just that much smarter.

What is If This Then That?

IFTTT is a Web and mobile app that was developed to connect different Web apps like Google Apps, DropBox, Facebook, Instagram, etc, together into one general system. In general, the service runs on conditional statements - or recipes - that fit the IFTTT statement.

The service is set up on a number of different conditional statements that make up what the developers of the app call a recipe. Each recipe is broken down into two different sections:

  • This - Also referred to as a trigger. Each trigger in a recipe is kind of like a requirement in that the set trigger has to happen for the recipe to start working.
  • That - That refers to an action that happens when a 'this' condition is triggered.
Once you have set up a number of recipes, the app runs in the background to check for triggers and then will automatically execute the action when it notices a trigger.

Examples of IFTTT recipes

There are a wide variety of recipes out there that you can create. For example, some of the more useful IFTTT recipes for businesses include:
  • If a photo is posted on the business Instagram account, then it is shared with Twitter and Facebook.
  • If a Square payment is processed, then this creates a line in a specific spreadsheet.
  • If a contact is added to a phone's address book, then this information is placed on Evernote.
  • If an article is posted on a specific blog, then the post is shared on Twitter, Facebook, and Google+.
  • If an email is starred on Gmail, then a reminder is set on my phone to review starred emails.
  • If I enter the office, then my phone is muted.
  • If a client emails an attachment, then a copy is saved to DropBox.
  • If my device is in the office, then my office lights are turned on (if you have Phillips Hue bulbs).
There are a wide variety of supported apps that allow you to create recipes for nearly anything you can think of. The developers are constantly adding support for new channels (apps), including many from the Internet of Things.

How to sign up for this

Because you can access IFTTT from the Web and via an app on your mobile device, we recommend first thinking about how you are going to use it. If you are going to be using recipes for your mobile device, then we recommend downloading the app onto your device. Regardless of how you are going to use it, you can create an account by:
  1. Going to the IFTTT website (https://ifttt.com/)
  2. Clicking Join IFTTT.
  3. Setting a username and password and clicking Create account.
From there, you will be able to log in and start creating rules. If you do want to use your mobile device, you should then download the free app for your device - Windows Phone, Android, iPhone - and then log in using the account information you just created. When you first log in you should see a number of channels (apps) related to your system have been activated. This means you can now start creating recipes.

Creating recipes from your browser

  1. Go to the IFTTT website (https://ifttt.com/) and press Sign in.
  2. Press Create.
  3. Press This and select your trigger - try picking your app first, then click on it to get a list of actions.
  4. Press Create Trigger.
  5. Click That and select an action channel.
  6. Select Create Recipe.
You can also click Browse from the menu bar at the top to find and activate already created recipes.

Creating recipes from your mobile device

  1. Open the app.
  2. Press the mortar and pestle icon at the top-right.
  3. Press the + followed by the + besides If on the next screen.
  4. Select the app from the icons at the top of the screen, and select the related trigger.
  5. Tap the + beside Then and select an action or app.
  6. Press Finish to activate the new recipe.
If you are looking for a cool way to connect different apps, and even save yourself time, then this could be something worth looking into. And, if you are looking to learn more about how you can increase your productivity, contact us today to see how our systems can help.
Published with permission from TechAdvisory.org. Source.

Topic Productivity
August 21st, 2014

BValue_Aug18_AIn many countries around the world, businesses are required to meet the needs of all employees. For able-bodied employees, one system will usually be able to meet needs, but disabled employees may have different requirements. Therefore, businesses should ensure that they develop an accessible technology plan.

What is accessible technology?

Accessible technology, also commonly referred to as assistive technology, is the idea of creating or implementing technology and systems that cater to employees with disabilities. While not every company will have or require accessible technology, it is required by many countries that businesses meet the needs of disabled employees.

To that end, it is a good idea to develop a plan on how to implement accessible technology. To help, here are five steps you could take:

1. Defining your strategy

The accessible technology strategy should be the first thing you develop as it will be the foundation of the overall plan. When looking at your strategy you should define how accessible technology fits into your overall organization plan and how it will fit with your existing strategies.

What you are looking to do is to figure out how this form of technology will fit with existing systems and increase overall operating effectiveness. From here, you can define the overall objectives, budget, and vision for the plan.

2. Identifying requirements

In this step, you should look closely at existing technology in the organization and the needs of your employees. Because each company is different and the needs of employees are different you should be careful to also identify the technology needs of your employees.

When looking at both the needs and existing systems you can work to come up with an overall set of requirements, along with a general priority. For example, will you need to modify existing computers or purchase new ones?

The key idea here is that you need to figure out exactly what you need.

3. Picking the new technology

Once you have identified what changes you need to implement, what new technology you will need, and your budget, you can then begin looking for the best solutions. The most effective way to do this is to work with it experts like us who can help you find and integrate the best technology and changes that will meet your adaptive technology needs.

4. Implementing and training

Once you have defined the changes, and new technology to integrate, you need to implement it. This may include altering physical devices and machines where necessary, and then testing the systems to make sure they are working properly.

It is also be a good idea to train your employees who will be using the systems, and the team who will be managing the systems.

5. Maintaining

As with all tech systems, it is important to realize that the solution you implement will not work forever, and will eventually require maintenance, updating, or even replacing. You should take steps to audit systems on a regular basis to ensure they are still meet the needs of your company and employees.

This can be a time consuming and potentially costly step, especially if you neglect it. We strongly recommend working with a company like ours, who can help manage your solution and ensure that updates and any necessary changes are implemented when they are needed, and that should needs change, systems are subsequently updated to meet the new requirements.

If you are looking to implement accessible technology in your business, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

August 19th, 2014

Facebook_Aug18_ASince its release, Facebook has gone from a college-only network to international site that connects millions of people. With more than half of adult users having more than 200 friends on average, our News Feeds have become a highly congested and constantly changing collage of stories and posts. Many of these posts are links to articles that we find interesting. While we would love to drop everything and read a particular link there are times when this isn't possible. To help, Facebook has introduced the new Save feature.

About the Save feature

The idea behind the Save feature is that it allows users to save longer-form content like articles posted on a News Feed. So, if someone has posted a link to an article on your favorite blog and you would like to read it later, you can now save it.

While this feature is similar to various apps like Pocket and Readability, which allow users to save content on the Web to read later, Facebook's version goes a little deeper. In a blog article announcing the feature, the company noted that the Save feature allows users to, "Save items like links, places, movies, TV and music."

Let's say you are at work, and during your break you quickly check Facebook. You come across a post where your friends have shared a link to a restaurant's Facebook Page. If you don't have time to visit the page right at that moment you can save it to view later.

While this feature will prove useful for many users, it is worth noting that when you save content, e.g., an article, you will need to have an Internet connection to access it in the future. Knowing Facebook however, they may integrate a feature like this in the future.

How to save content for later

Facebook has integrated this feature into all versions of Facebook, including the mobile app and browser-based versions. You can save content and links by:
  1. Scrolling through your News Feed until you find an article, link, Place, etc. that you would like to save for later.
  2. Clicking on the downward facing grey arrow at the top-right of the post.
  3. Selecting Save 'content name'. Note: The name will be based on the name of the link in the post.

Accessing your saved content

If you are looking at Facebook in your browser, then you should see a tab called Saved show up in the upper part (the area just below your profile image) of the left-hand vertical bar of the page. For users who access Facebook via the mobile app, press the three horizontal bars at the top-right of the app (located just below the magnifying glass) and you should see a section called Saved under Favorites.

When you click on Saved you should see a new screen open with the content you have saved. It will be divided into different types including:

  • All
  • Links
  • Places
  • Music
  • Books
You can interact with each item by either:
  • Tapping on it - This will open the page, link, or content.
  • Sliding it to the left - This will allow you to archive the content or press More to review, share or Like the content.
If you are looking to learn more about the Save feature, or Facebook in general and how it can be used effectively in your business, contact us today.
Published with permission from TechAdvisory.org. Source.

August 7th, 2014

Security_Aug05_AThese days, the security of various technology based systems is constantly being called into question. From attacks on mobile devices to ever increasing types of malware, many businesses are struggling to stay on top of their security. One of the best ways to help ensure your systems are secure is to be aware of common security issues. To that end, here are five common ways your security can be breached.

1. You are tricked into installing malicious software

One of the most common ways a system's security is breached is through malware being downloaded by the user. In almost every case where malware is installed the reason is because the user was tricked into downloading it.

A common trick used by hackers is to plant malware in software and then place this software on a website. When a user visits the site, they are informed that they need to download the software in order for the site to load properly. Once downloaded, the malware infects the system. Other hackers send emails out with a file attached, where only the file contains malware.

There are a nearly limitless number of ways you can be tricked into downloading and installing malware. Luckily, there are steps you can take to avoid this:

  • Never download files from an untrusted location - If you are looking at a website that is asking you to download something, make sure it's from a company you know about and trust. If you are unsure, it's best to avoid downloading and installing the software.
  • Always look at the name of the file before downloading - Many pieces of malware are often disguised with file names that are similar to other files, with only a slight spelling mistake or some weird wording. If you are unsure about the file then don't download it. Instead, contact us as we may be able to help verify the authenticity or provide a similar app.
  • Stay away from torrents, sites with adult content, and movie streaming sites - These sites often contain malware, so it is best to avoid them altogether.
  • Always scan a file before installing it - If you do download files, be sure to get your virus scanner to scan these before you open the apps. Most scanners are equipped do this, normally by right-clicking on the file and selecting Scan with….

2. Hackers are able to alter the operating system settings

Many users are logged into their computers as admins. Being an administrator allows you to change any and all settings, install programs, and manage other accounts.

If a hacker manages to access your computer and you are set up as the admin, they will have full access to your computer. This means they could install other malicious software, change settings or even completely hijack the machine. The biggest worry about this however, is if a hacker gets access to a computer that is used to manage the overall network. Should this happen, they could gain control over all the systems on the network and do what they please on it.

In order to avoid this, you should ensure that if a user doesn't need to install files or change settings on the computer, they do not have administrator access. Beyond this, installing security software like anti-virus scanners and keeping them up to date, as well as conducting regular scans, will help reduce the chances of being infected, or seeing infections spread.

3. Someone physically accesses your computer

It really feels like almost every security threat these days is digital or is trying to infect your systems and network from the outside. However, there are many times when malware is introduced into systems, or data is stolen, because someone has physically had access to your systems.

For example, you leave your computer on when you go for lunch and someone walks up to it, plugs in a USB drive with malware on it and physically infects your system. Or, it could be they access your system and manually reset the password, thereby locking you out and giving them access.

What we are trying to say here is that not all infections or breaches arrive via the Internet. What we recommend is to ensure that you password protect your computer - you need to enter a password in order to access it. You should also be sure that when you are away from your computer it is either turned off, or you are logged off.

Beyond that, it is a good idea to disable drives like CD/DVD and connections like USB if you don't use them. This will limit the chances that someone will be able to use a CD or USB drive to infect your computer.

4. It's someone from within the company

We have seen a number of infections and security breaches that were carried out by a disgruntled employee. It could be that they delete essential data, or remove it from the system completely. Some have even gone so far as to introduce highly destructive malware.

While it would be great to say that every business has the best employees, there is always a chance a breach can be carried out by an employee. The most effective way to prevent this, aside from ensuring your employees are happy, is to limit access to systems.

Take a look at what your employees have access to. For example, you may find that people in marketing have access to finance files or even admin panels. The truth is, your employees don't need access to everything, so take steps to limit access to necessary systems. Combine this with the suggestions above - limiting admin access and installing scanners - and you can likely limit or even prevent employee initiated breaches.

5. Your password is compromised

Your password is the main way you can verify and access your accounts and systems. The issue is, many people have weak passwords. There has been a steady increase in the number of services that have been breached with user account data being stolen. If a hacker was to get a hold of say your username, and you have a weak password, it could only be a matter of time before they have access to your account.

If this happens, your account is compromised. Combine this with the fact that many people use the same password for multiple accounts, and you could see a massive breach leading to data being stolen, or worse - your identity.

It is therefore a good idea to use a separate password for each account you have. Also, make sure that the passwords used are strong and as different as possible from each other. One tool that could help ensure this is a password manager which generates a different password for each account.

If you are looking to learn more about ensuring your systems are secure, contact us today to learn about how our services can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
August 7th, 2014

Hardware_Aug05_ALaptops are one of the most useful tools at a business owner's disposal. These highly mobile devices allow you to take your work out of the office, or even just away from your desk. However, mobile as they are they still rely on batteries. The problem with some laptops however is that batteries don't last overly long, and there may be times when you aren't near a power source and find your battery running low. If you find yourself in this situation, here are six tips that can help preserve battery life until you find a power source.

1. Adjust the brightness of your screen

A brighter screen will cause your battery life to decrease faster. If you are running low on power, try turning the brightness of the screen down as low as it can go while still remaining visible.

Many laptops, including most PCs and all Macs, have shortcuts on the keyboard that allow you to modify the brightness of your screen. On almost all laptops, screen brightness is indicated by a sun icon, and pressing the smaller sun will decrease the brightness. On most laptops you can either just press the key with the brightness labels on it to decrease the brightness, while others will require that you press the FN key and the key with the label.

2. Activate your laptop's battery saver mode

Most laptops have a built in battery management feature that allows you to enable different profiles based on how you are using the laptop. One of the more useful settings is Battery Saver or Eco Mode. These modes have been developed to help extend the battery life when your battery is running low.

When activated, they will often manually override settings like screen brightness and turn off unnecessary services or connections like BlueTooth. To activate this on PCs, you can usually click on the battery icon in the lower-right bar of the main Windows screen and select your power saving mode.

If you have a Mac, press the battery icon at the top and select Open Energy Saver Preferences. This will allow you to modify how your laptop saves energy, including when to turn the screen and hard drives off.

3. Unplug connected devices

Many USB devices you plug into your laptop like hard drives, mice, phones, etc. are actually powered by your computer. Therefore, if you are running off of the battery, you will likely see increased drain if devices are plugged in.

When you are running low on power, try unplugging devices connected by USB. This is especially important if you have plugged your mobile phone or tablet into your laptop to charge.

You should also look to make sure other connection methods like Bluetooth are off. Disconnecting devices should allow your laptop to last a bit longer.

4. Turn off keyboard backlighting

A common feature of many newer laptops is a backlit keyboard. While useful when you are in a low light situation and need to see what keys you are hitting, the backlight does use battery power and can decrease your battery life.

Most laptops allow you to turn the backlight off from the keyboard, much like the screen brightness. The location of these buttons will be different for each laptop, so be sure to consult your user manual if you can't find them.

5. Close unnecessary apps

When working on the computer, many of us will have more than one program open at the same time. Some of these programs aren't 100% necessary to the task at hand, and keeping them open will usually increase the drain on battery.

So, when your battery starts to get low, try closing apps and programs you aren't using. This is especially true for apps that require larger amounts of computer resources like Photoshop or any graphics heavy program. Closing these will give you a precious few extra minutes, or more, of power.

6. Simplify your activities

Finally, along with closing apps that you aren't using, try simplifying what you are doing. What we mean here is focus on one task. If you are writing a blog article, close everything not related to writing including communication apps like email, instant messaging, etc.

The goal here is to try and stay in the same window or program, as switching programs will increase the drain of the battery. Sure, it won't be a massive spike in battery usage, but staying in the same window or app will help increase the time you'll be able to use your laptop on battery.

If you have a laptop and are looking for ways to get more out of your battery, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
August 6th, 2014

BCP_Aug05_AMany businesses are constantly facing a potential disaster. It could be a major fire that wipes out your business, or something as simple as accidentally deleting an important spreadsheet. Regardless of the severity of the potential disaster, businesses need to be prepared and one of the best ways to prepare is to back up your data. In the first part of this article we covered four tips that can help. In this article, we take a look at the next four tips to help ensure your data is backed up.

5. Automate your backup

It can be tough to actually remember to back up your files, especially if your business is busy. Therefore, you could look into an automated backup solution. At the very least, you should set a schedule as to when backups are conducted and set what is being backed up. While this isn't a full automation, a schedule will help.

If you are using solutions like the cloud or NAS (Network Attached Storage), you can usually automate the process by selecting which files and folders to back up and when. The software that powers these solutions will then do this automatically.

Ideally, your backups should be carried out automatically to ensure your data is available should you need it. But you should check periodically to ensure that your data is actually being backed up. This is especially true if you are backing up other systems, as there have been cases where employees have become frustrated by the backup process and simply turned it off. The business owner, thinking their data was being backed up would be in for a bit of a shock when systems crashed, if this was the case.

6. Back up your backups

Redundancy of your backups is just as important as actually backing up your data. You should keep a backup of your backup in case something happens to your original backup. While this doesn't have to be carried out as often as the 'normal' backup, this should be done on a regular basis.

In order to really ensure backup redundancy we recommend that if your main backup is kept on-site, then the secondary backup should be on another storage medium that is kept off-site.

7. Don't forget data stored on non-physical drives

What we are referring to here is the data stored on different services like your email, social media, and non-physical locations. This is especially true if you say have you own servers. It's highly likely that there is data stored on these services as well, and should they go down and you haven't kept a backup, you may lose important information.

Essentially, think about critical data that is used in the company, but isn't physically kept on computers. It may feel like this is going a step too far with backups, especially for businesses who use email services like Exchange and Gmail. However, while the chances of these systems going down are incredibly rare, it could still happen. Therefore, you should conduct a monthly to bi-yearly backup just to ensure that data is there somewhere should something happen.

8. Test your backups

Finally, it is beneficial to actually test your backups from time-to-time to ensure that they are not only working but the data is actually recoverable. If you do a trial run on recovering your data, you can get a good idea of how long it will take to retrieve this information when you actually need to recover it. You can then take steps to optimize this and let the relevant people know.

Also, testing is a good way to discover any problems, e.g., if someone has disabled backups, or one solution isn't working. This will ensure that your data is there when you need it.

If you are looking to integrate a data backup solution, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

August 5th, 2014

GeneralHealthIT_Aug05_AThe Department of Health and Human Services has set the final deadline for health-care organizations to transition to ICD-10, and it’s just 14 months away—on October 1, 2015.

ICD-10 is designed to provide better patient care, disease management, and quality measurement—especially for patients under the care of multiple providers.

It replaces ICD-9, whose limited structural design lacks the flexibility to keep pace with changes in medical practice and technology. The longer ICD-9-CM is in use, the more the quality of health-care data will decline, leading to faulty decisions based on inaccurate or imprecise data, according to the Journal of AHIMA.

Originally, the deadline for ICD-10 Compliance was October 1, 2014, and health-care organizations worked feverishly to prepare for it. But then came the Protecting Access to Medicare Act of 2014, which called for delaying ICD-10 implementation. That threw countless health-care organizations back into flux.

Now it’s final, and health-care organizations have necessary certainty to move forward with their implementation processes, including testing and training. How will you use the extra time?

If you are looking to upgrade your systems to ICD-10, or to ensure your practice is ready, contact us today to learn more about how our solutions can help.

Published with permission from TechAdvisory.org. Source.

July 30th, 2014

Windows_July28_AHave you ever gone to talk with a colleague and gotten a look at their computer's desktop only to notice that they have files, apps, and folders strewn about in a seemingly random fashion? Or maybe you are guilty of a cluttered desktop. Many people tend to have somewhat unorganized desktops, especially if they have used the same computer for a number of years. The problem with this is that it can be a chore to find files and folders, and if your desktop has a ton of icons your computer could be more sluggish.

Want to tidy up your desktop? Here are six tips on how you can get your desktop more organized and even reduce virtual clutter too.

1. Before you begin do a bit of recon

Before you go about simply deleting everything off of your desktop, it is worthwhile thinking about what you really want to keep on your desktop. This will be vary from person to person, of course, but most people treat their desktop as a place where they put files, folders, and app shortcuts that they want to quickly access.

Take the time to think about what you use the most and which files and folders you really need to access instantly or which you use all the time. An easy way to figure this out is to simply auto-arrange your icons by right-clicking on an empty area of your desktop (where there are no icons) and selecting Auto arrange icons. This will arrange your icons into a grid format that makes them easier to see and work with. Then, right-click on empty space and hover your mouse over Sort by and select Date modified to order the icons by the date they were last modified, or opened, with the latest at the top.

2. Create holding and app shortcut folders

People often use their desktop to hold files like downloads, photos, screenshots, and even email attachments. This can lead to an incredibly cluttered desktop in a short amount of time.

In truth, you probably don't need all these shortcuts on your desktop. What you can do is create a folder on your desktop where all non-essential files and folders go. A folder like this is great to hold downloads or files that will only be used for a short amount of time.

The key here, is this folder is used for non-important, or temporary items. If you don't plan on keeping it, put the file, icon, etc. into this folder. Once you are done with the file, simply go into the holding folder and delete it.

It could help to also create a shortcut folder. When you install new programs on Windows, a shortcut icon is often automatically added to your desktop. However, these desktop shortcut should be for frequently used programs only. For programs that aren't really used that often, it is best to create a separate folder the shortcuts. This not only reduces desktop clutter, but puts shortcuts in one central location, making them easier to find.

3. Be ruthless

Once you have your folders set up, it's time to start getting rid of the clutter. As with any clearout you should be ruthless. If you haven't used a file, folder, etc. in the past two months or so, you should seriously question whether you can get rid of it.

To make this easier, open your desktop via the File Explorer. You can do this by opening any folder and clicking Desktop from the left-hand menu bar. This will make all of the icons and files on your desktop easier to see and work with.

Go through these and uninstall programs you no longer use, delete images you no longer need, move unimportant files, and place files in their relevant folders. Once complete, take a look at your browser to see where it downloads files too. If you have your browser set to download files to your desktop by default, try going into the settings and changing the download location to another file like the Downloads folder.

4. Stick with it

Once you have de-cluttered your desktop, try to stick with the rules you have set. With downloads ask yourself whether these need to be on the desktop or whether they can go into a folder somewhere else.

Of course, sticking with it won't always be easy, so maybe take time once every month or two to revisit your desktop and clean it up a bit.

5. Use the taskbar or Start for apps, not the desktop

With Windows 8 and 8.1 you can actually pin apps to the Start menu, so when you click it the apps are available in the window that pops up. This is a great alternative to simply having program shortcuts on your desktop. Pin apps to the Start menu on Windows 8 and 8.1 by opening your apps list (clicking the down arrow from the Windows Start screen) and right-clicking on the program you would like to pin. Select Pin to Start to be able to access it when you hit the Windows key on your keyboard.

If you prefer the traditional desktop view of Windows 7, or are using Windows 7, why not pin your important programs to the taskbar at the bottom of the screen? This can be done by right-clicking on an open app and selecting Pin to Taskbar. The programs will remain at the bottom of the screen, and can be opened by simply clicking on them.

6. Strategically pick your wallpaper

An interesting way to minimize clutter is to pick a wallpaper that you enjoy looking at. Be it a favorite picture, slogan, etc., try to frame the image so the focus is in the center of your desktop. Then, place your icons around the image in a way that they still allow you to see the image. If you can't see the image, then you have too many icons and it may be time to get rid of a few.

Also, having an image you like also serves as a reminder to try to keep icons to a minimum in the first place. This could be a proactive solution to keeping desktop clutter down.

If you are looking to learn more about using Windows in your office, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 30th, 2014

SocialMedia_July28_AOne of the main ideas behind LinkedIn is that the network is a virtual venue for people to share their thoughts, ideas, and observances with other like-minded users. Earlier this year the company introduced a new feature to their platform that allowed a select few users to create blog posts directly on LinkedIn. Now, the company has decided to open this up to all LinkedIn members.

About LinkedIn's new publishing platform

Like other social networks, LinkedIn allows users to publish posts on their profile which are then visible to other users. In the past, there was a limit as to how long the posts could be, which influenced how users shared the content they generated. Most would simply copy and paste a link to their content into a post on their LinkedIn profile.

In an effort to make sharing thoughts, ideas, expertise, etc. easier, LinkedIn has implemented the long-form post. This feature allows you to create longer content, such as blog articles and opinion pieces, and post this directly on LinkedIn. In other words, you can now use LinkedIn as a blog which is shared with your connections.

If you create long-form content, this could be a useful way to get posts out to an even wider audience than through your blog. This is because when you publish a post on LinkedIn, it becomes part of your overall profile, with the post being visible under the Posts section of your profile. New long-form posts will also be published and shared with all of your contacts automatically.

This means that you could technically increase the overall reach of your content, especially if the content you produce is useful to your LinkedIn connections.

Writing long-form content on LinkedIn

If you would like to start publishing long-form content using your LinkedIn profile, you should be able to do so by:
  1. Logging into your LinkedIn profile.
  2. Pressing the pencil in the box that says Share an update…
Note: This update is still rolling out to users, so you may not be able to produce long-form content just yet. If you don't see the pencil in the Share an update… box, you will need to wait for a few weeks, or until you get an email from LinkedIn saying the feature is ready for you to use.

If you do see the pencil icon, click on it to open the long-form post screen. It looks like most other Web-based publishing and writing platforms with the usual formatting buttons and text field where you input the content.

You can write your article directly on this page, but many choose to write using a program they are comfortable with and then copy and paste into the text field. If you want to add images to your post, you can simply click where you would like the image to slot into the content and select the camera icon from the menu bar above the text field. Select the image and hit Submit. You can then resize the image by clicking and dragging on it.

Saving and editing your content

Once you have finished writing we strongly recommend you hit the Save button at the bottom of the text field. This will save the content to your profile, but will not post it. This means you can edit the content before publishing. To do this, click on Preview which will open your post in another window, allowing you to see what the post will look like on your profile.

While in Preview mode, be sure to check the spelling and grammar, along with the overall formatting. If you spot anything that needs to be changed simply switch back to the editing tab on your browser and make any amendments.

When you have finished writing, formatting, and editing you can then hit the Publish button. This will then publish the content on your profile and share it with your connections.

If you have content that you think your connections and colleagues would benefit from reading, then this new LinkedIn feature could prove to be useful and should be considered as a larger part of your overall content strategy.

Looking to learn more about LinkedIn and how you can leverage it in your business? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
July 24th, 2014

Productivity_July21_AERP, or Enterprise Resource Planning, is often seen to be the domain of large businesses. However, with numerous new software solutions being released on a regular basis, small to medium businesses are quickly realizing the power of these back office automation and management tools. While it is true not all businesses will need it, there are several indicators as to when you should implement ERP.

There are several common business situations that indicate your business may be ready to implement an ERP solution. Here are 5:

1. Your business is entering the growth stage

If your business is experiencing a period of growth of profits, sales, and employees, chances are high that the number of systems and processes you use and require are also growing. If not managed properly, you could see a significant slowdown in growth due to inefficient processes.

By integrating an ERP solution, you can avoid this largely because these systems allow you to manage processes from a central location and provide you with the right resources when you need them. Essentially, they provide the platform that can support the systems and processes that enable healthy growth.

2. You have a tough time accessing business information

Companies without ERP often see employees wasting time tracking down important information. Think about the time you need to spend looking for accounting data. Is it available at the click of a button, or do you need to search for it across different locations?

If you are spending more time tracking important information than actually using it, you would do well to look into an ERP solution. It can centralize information and make it much easier to access when you need it, thereby increasing your overall productivity.

3. Finance and HR processes are becoming harder to manage

Companies with a small number of employees or customers can likely get by without specific software to help track relevant information and can use spreadsheets instead. But as soon as you see growth, you will quickly find out that spreadsheets simply won't cut it and managing Finance and HR related activities and information will become an uphill struggle.

If your teams rely on paper or other base information to develop reports and fill orders, you could see labor costs shoot up, possibly becoming your biggest expense. By integrating an automated solution like an ERP, you can cut back on these costs and make your employees' jobs more manageable.

4. Databases contain double entries and errors

When each department uses their own software to keep information, it can become impossible to manage it all and ensure that all systems contain not only the same information but are up-to-date. When different departments have different information for the same client, person or function you are going to see inefficiencies and errors made.

These mistakes and the time spent correcting them can result in increased wages, decreased productivity, and even potential loss of sales. By implementing an ERP, you can ensure that everyone is accessing the same information which is not only correct but also up-to-date.

5. There are numerous processes carried out on different software and systems

It is common to see many businesses invest in different software and systems for different functions and departments. In many cases, this can lead to high overhead and management costs which in turn can eat away at profits.

Many ERP solutions are developed to support a variety of business processes and departments. What this equates to is one solution that covers all aspects of your business. This is almost always more affordable than multiple systems. The same can be said if you need to add new employees. With traditional systems this means investing in new software licenses. However, with ERP you can usually add a user for a low monthly cost, or even no cost at all - depending on the solution you integrate.

If you are looking to learn more about ERP and how it can be implemented in your organization, contact us today and discover what might turn out to be a successful solution for increased profits and productivity.

Published with permission from TechAdvisory.org. Source.

Topic Productivity