Blog

July 10th, 2014

BI_July07_AAs businesses of all sizes continue to integrate more technology, the amount of data available to companies will grow exponentially. However, not all of that available data will be important or even useful. And, as you collect more and more data, it will be harder to process and analyze it without becoming overwhelmed. In order to avoid this, you should ensure you have a well defined data collection system in place.

What is well defined data collection?

Everyone collects data, even people who don't use computers. The key to being able to successfully leverage the data you have available to your business lies in a strong foundation - in this case, how you collect your data. With an appropriate system in pace you will know what data to collect and measure, and just how important it is. From here, you can more effectively analyze and interpret it, allowing you to make more informed decisions.

If you are looking to implement a new data collection system, or improve on how you currently collect it, here are six tips that can help:

1. Think about what customer interactions are important

Often the most important data you need is in relation to your customers. Your first step should be to define important customer interactions. For example, if you own an online store, you will likely want to know where your customers come from, the items they click on, items they add to their cart, and items they ultimately buy.

By first identifying important interactions to track, you can then look for metrics and data collection methods related to these interactions. This makes it easier for you to track the most important data.

2. Think about what behavior-related data is important

Don't just focus on those customers who have completed a purchase or followed through the whole business chain. Think about what behavior could produce data that is important to your organization.

To continue the online store example from above, this information could include how far down the page people scroll, how many pages deep they go when looking at product categories, how long they spend on a site, and where those who don't convert leave from.

Collecting and analyzing data like this can be a great determinant of what is working well and what needs to be improved upon.

3. Look at important metrics you use

Sometimes the way you collect your data will depend on how you plan to measure it. This includes the different metrics you use to define the success or failure of marketing plans, sales initiatives, and even how you track visitors.

Be sure to identify which ones your business currently uses, as these will often point you towards the relevant data you will need to collect.

4. Identify the data sources you are going to use

In many businesses there are redundancies with data collected. For example, a CMS (content management system) will often have some of the same data points as Web analytics, or a POS (Point of Sale) will have some of the same data points as an inventory system. Due to this, you are going to have to identify what systems will provide what data.

On the other hand, many businesses use data from multiple systems for one key metric. In order to ensure that you are collecting the right data, you will need to identify these sources and ensure that they are compatible with your data collecting system. If they aren't, you could face potential problems and even make wrong decisions based off of incomplete data, which could cost your business.

5. Keep in mind who will be viewing the reports

When implementing data collection systems and subsequent data analysis systems, you will likely start generating reports related to this data. It is therefore a good idea to identify who will be reading these reports and what the most important information they will need is.

This information will be different for each audience, so be sure to identify what data they judge to be important. For optimal results, you should think about who will be reading the data reports and what relevant data needs to be collected in order to generate them.

6. Set a reasonable frequency for collection and analysis

This can be a tough one to get right, especially if you work in an industry with high fluctuation or your business is in a constant state of change. Your best bet is to look at when you think you will be needing data. For example, if you are responsible to submit a monthly sales report it might be a good idea to collect data on at least a bi-weekly basis in order to have enough to develop a report at the end of the month.

You should also look at who will be getting the reports and how long different campaigns or business deals will be in place. The frequency will vary for each business, so pick one that works best for your systems and business.

If you are looking to implement a data collection system, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

July 9th, 2014

Web_July07_AFiles and folders are essential parts of any operating system, mobile or otherwise. In larger devices, like computers and laptops, we often have hundreds, if not thousands, of files and folders that we use to keep our systems and processes organized. However, with mobile devices, such as Windows Phone, it is difficult to actually manage your files and folders properly. In fact, it's been one of the most requested Windows Phone features and Microsoft has recently announced a new app to make management of files and folders on your device far easier.

About the Files app for Windows Phone 8.1

In late May, Microsoft posted an article on their Windows Mobile blog announcing that the Files app had been launched. The idea behind this app is that it allows easier viewing and managing of files and folders on your Windows Phone.

With this app you can:

  • Browse for installed files
  • Arrange files into folders
  • Move files or folders from one location to another
  • Open or search for files
  • Change the name of existing files
  • Share individual or multiple files with other users
While this app is a welcome development, there is one feature that makes it great: It allows you to also access and manage files on your device's SD card - if it has one. This means you no longer have to connect your Windows Phone to your computer in order to manage your files. You can do so directly from your phone.

Where can I get the app?

If you use your device for work we strongly recommend that you install this app, especially if you store files on your device. Find the app on the Windows Phone Store for free. Simply click the Install button in the left-hand ribbon of the page and select your device. You need to be signed into the Microsoft account you use on your phone. You can verify this by looking at the top-right of the page and hovering your mouse over Explore. If you are not signed in hover over Explore and click Sign-in. Enter the username and password of the Microsoft account you use on your phone and you should be able to install the app directly from your browser.

Alternatively, you can install the app directly to your device by:

  1. Going to the Windows Phone Store app on your device.
  2. Searching for Files.
  3. Tapping on the Files app icon (blue square with a white document icon).
  4. Pressing Install.
The app should start to download automatically and install a new tile on your home screen.

Using the Files app

To manage or view the files and folders on your device, simply open the app. You should see a screen open with the option to either look at the files on your Phone or SD card - if your device has an SD card installed.

When you tap on either Phone or SD card, you should see the file structure pop up. Scrolling up or down and tapping on files or folders will open them. If you tap on the square box beside each file you will see a number of options pop up at the bottom of the screen. Pressing the related icon will allow you to interact with that file. For example, if you select a file and press the Trash Can icon, the file will be deleted. You can select multiple files at the same time by simply tapping on the white boxes before hitting any of the action buttons.

If you are looking for a specific file, make sure you don't have any files or folders selected and press the magnifying glass icon at the bottom of the screen. Enter the name of the file or folder you would like to find and it should pop up below the search bar.

Looking to learn more about using Windows Phone in the office? Contact us today to see how our services can help.

Published with permission from TechAdvisory.org. Source.

July 4th, 2014

BusinessValue_June30_ALast month, in the first part of our article about how to successfully share content on social media we covered five tips to follow. From writing longer content, to using images, and playing on specific emotions we highlighted some great information that can really help get your content shared. This month, we take a look at the next five tips.

6. Lists of 10 items are great

One of the most popular forms of blog article written these days is the list article. These articles usually cover three to more than 20 items or tips related to one central topic. Articles of this type are popular because they are not only quick to write, but are also quick to digest as they can be broken up into easy-to-read sections - perfect for those who scan articles on their mobile devices.

With so many lists out there, it can be tricky to nail just how long your list of tips, ideas, etc. should be. From social data pulled by social media experts over at BuzzSumo, it appears that articles with 10 list items get the most shares. It is therefore a good idea to strive to reach 10 points when creating this style of list article.

Some articles however can get quite lengthy, even with 10 items. One strategy might be to separate the list, like we have with this article. Of course, shorter lists can work well too, especially if these include powerful tips. We suggest trying to aim for 5-10 items when you are writing your list articles.

7. People share what they trust

This has been an age-old truth: people go with companies they trust. It has been proven time and again that users will often follow what their friends and people they trust recommend. What this translates to when it comes to the shareability of your articles is that the source of the content needs to be trustworthy.

This can be difficult to establish, especially if you are a new business or new to social media, One of the best ways to achieve this is to include bylines and author bios on your articles. Putting the name of the author (byline) at the top of an article and a brief bio at the bottom will help increase the legitimacy of the article in the eyes of the reader, increasing their trust levels over time,

Another quick way to increase legitimacy is to share an article on specific social networks. Your first thought is likely to be to share away on Facebook, but think about how Facebook is used - people generally share everything, even if it's not trustworthy. Instead, look to the more professional networks like LinkedIn and Google+. Generally, people on these platforms build more professionally oriented networks, often built on trust.

By sharing an article with a byline and bio with your groups in LinkedIn you can quickly build trust, especially if you are active within your network. Once people start to trust your content, there is a higher chance they will read it and consequently share it too.

8. What's old can be new

Have you ever followed a post on Facebook, or any other social media? If you have, you likely know how short of a lifespan content has - when it comes to shares at least. Almost all content posted on social media sites has a lifespan of about three days to a week at most. What do we mean by this? Well, normally after three days you will see the number of interactions - shares, likes, etc - drop by as much as 98%. Go beyond three days and you will usually see another huge drop in the number of shares from the three day mark.

Essentially after three days to a week, your content will likely not be shared or even seen. Most of us know this, and are often quick enough to produce more content and posts in order to keep followers engaged. However, some content can actually be re-shared to keep up or to further interest.

Not all content - articles included - can, or should, be reposted, such as time relevant content like an announcement. Reposting these three weeks after the fact likely does not provide any value to the reader. Content that is written to be always viable however e.g., tip articles, how-tos, etc. are great potential content for resharing.

Some information never really gets old and can be useful to a new audience. Resharing previously posted content like this ensures more people will see and interact with it. For best results, try promoting an article you think was useful about one week after you first posted. Also, be sure to look at season or holiday relevant content - there is a good chance this can be reposted at the relevant time.

9. Know when to share your content

Often, the most important key to increasing the shareability of your content is actually posting it when your desired audience is online. By posting at, or just before, these key times, you increase the chance of the content being seen and interacted with. While there is no set timeframe, you can figure out when best to post through trial and error.

Before you start however, look at your previous content and see when it was interacted with most. Take a look at the days and times, and track this for a few weeks. You should start to see a trend emerge, with the most interactions happening at a certain time and date. Also, apply a little common knowledge. For example, if your target audience is other business owners or managers, posting midday will likely mean content will be missed. However, posting after normal business hours could improve your chances.

From here, try posting content at different times to see what works, and adjust your schedule accordingly.

10. Realize this will all take time

When looking to improve the reach of your content, you need to realize this will take time. Even if you follow these tips, you won't see immediate results. Chances are high this will take months to pay dividends. The key here is to stick with it and to experiment. Try a few different strategies at a time to see what works and doesn't, then go back to the drawing board and improve your plans.

If you are looking to learn more about leveraging social media in your business, we may be able to help. Contact us today for a chat.

Published with permission from TechAdvisory.org. Source.

July 3rd, 2014

AndroidPhone_June30_AGoogle Docs is becoming an increasingly popular tool for many business users, especially due to the fact that the solution offers a powerful suite of productivity apps like Docs and Slides. Earlier this year, these apps went mobile, with Google releasing standalone mobile versions of Docs and Sheets. The popular presentation creation app Slides was missing however, with Google explaining that it would be released 'later'. Well, Google has delivered on their promise and released a Google Slides app for Android devices.

What exactly is the Google Slides app? I thought it was part of Google Drive...

As many who use Google Apps know, productivity apps like Slides, Docs, and Sheets are part of Google's cloud storage app - Drive. If you have used the Drive app on your phone or tablet, you likely also know that you can create, edit, and share documents via this app.

This development is an effort to extend the capabilities of Drive, while simultaneously making it easier for users to access their individual files. For example, if you are a heavy user of Slides it can be a little annoying and time consuming to open the Drive app, search for the file you want, open it, and start editing. Now, if you have the app installed you can open it for immediate access to your related files, in this case Slides.

The key here is to think of the Slides app as a branch of the Google Drive App, as all of your files are still linked to Drive. Create a presentation using the Slides app and it will show up automatically on Google Drive as well as in the app. This app has all the same features as the Drive version, it is just that the app has been specifically written for mobile devices and designed for ease of use.

What can I do with this app?

As we stated above, the main focus of the Slides app is to allow you to create and edit presentations from your Android device. As such, there are a number of useful features:
  • The ability to create and edit presentations offline. As long as you have accessed a Slides presentation while online, it will be made available for you to open and edit offline as well. You can also save individual presentations to your device's hard drive and have the file updated when the presentation is.
  • Advanced sharing features. You are able to share your presentation from a mobile device and have users on their devices or computers collaborate on the same file.
  • Automatic saving of presentations created and edited on the Web. As long as you have an Internet connection, changes made to files via the app will be synced with Google Drive and reflect on all versions of the presentation. If you are offline, the changes will sync when you are next online.
  • The ability to open, edit, and save Microsoft PowerPoint presentations directly from the app. This is a big feature, largely due to the fact that many businesses use PowerPoint instead of Slides. What this means for you is that you can view these files without PowerPoint installed on your device.
  • Full editing capabilities. You are able to create slides, add text, edit slide order and the overall format of your text and slides.
  • Present directly from your device. You can run presentations on your device or connect to a projector using adapters that can usually be purchased for your device.

Where can I find the Slides app?

This app is available now on Google Play. To install it you can:
  1. Open the Google Play app on your device.
  2. Press the magnifying glass and type in Google Slides.
  3. Tap on the app and select Install.
  4. Open the app when it has been installed.
When you open the app, you should see all of your slides related to your Google account pop up in the app.

If you are looking to learn more about Google's apps on your Android device contact us today to see how we can help ensure that you get the apps your business needs most.

Published with permission from TechAdvisory.org. Source.

July 3rd, 2014

HealthcareIT_July03_AThe compliance date for ICD-10 is farther away than it once was, but it’s still coming — and health-care practitioners should be moving forward with preparedness plans, if the results of a recent survey are any indication.

The survey — which questioned physician practices, hospitals, payers, vendors, and others — was conducted by eHealth Initiative and the American Health Information Management Association (AHIMA).

It found that most health-care organizations are using the extra time afforded by the delay of ICD-10 compliance to October 15 to invest, train, and test. Most organizations said they're ready for testing, but some are more prepared than others. Around 40 percent of respondents said they'd start end-to- end testing by the end of 2014, and 25 percent reported that they’d begin by the end of 2015. And, to minimize productivity loss, 68 percent of respondents said they will conduct additional training, with 31 percent hiring more coders to help with the transition.

Concerns about ICD-10 remain, however. One pertains to preparedness, with 45 percent of respondents reporting that they don't have a good sense of their partners' readiness. Another pertains to financial impact, with 38 percent of respondents saying they thought their revenue will decrease, and 14 percent saying they think it will stay the same. Only 6 percent think it will increase.

Clearly, while the ICD-10 transition seeks to improve accuracy of claims and quality of care, not everyone has a clear plan to derive value from it. But now, it seems, is the best time to prepare. We recommend that you contact us today to learn more about how we can help ensure that you are ready for ICD-10.

Published with permission from TechAdvisory.org. Source.

June 26th, 2014

Security_June23_ABusinesses are relying increasingly on virtual machines to handle more critical data and tasks than ever before. Still, many are misguided about their security needs in a virtual environment. There are several myths that if believed can have serious consequences; leaving your organization vulnerable to an attack. Understanding these issues is key to helping you make better and safer decisions about the virtual environment of your business.

Myth No.1: Existing endpoint security will protect our virtual environment

Most traditional endpoint security solutions are virtual-aware and provide low levels of protection. This simply isn’t enough. Depending on the virtualization platform used (VMware, Microsoft, etc.), your traditional endpoint security suite can probably recognize virtual endpoints. However, this physical software often can’t bring its full tool set of anti-malware to the virtual world, meaning it can only perform basic tasks such as on-access scanning.

Therefore what you need is a solution that has been designed to keep both virtual and physical computing environments secure. There are a wide-number of solutions out there, and the best one for your business will depend largely on the virtual environments you employ. We strongly recommend talking to IT experts like us, as we can help determine, or even offer, the strongest security based.

Myth No.2: My existing anti-malware doesn’t interfere with my virtual operations

Performance issues can create security gaps that don't exist in your physical environment. Traditional endpoint security uses an agent-based model where each physical and virtual machine has a copy of the security program’s agent on it. This agent communicates with the server while performing security tasks. This is fine for physical machines, but if you have 100 virtual machines running off of one main environment that has been infected with malware, you’ll also have 100 instances of malware running on the machines.

This high level of duplication can cause massive performance degradation and waste tons of storage capacity. Therefore, you should make an effort to ensure that all of your systems including the main ones are without malware. This not only makes every system secure, but can also speed up overall operations.

Myth No.3: Virtual environments are inherently more secure than physical environments

Sadly, this just isn’t always true. Virtualization is designed to allow software, including malware, to behave as it normally would, and malware writers will target any and all weak points in a business’s network to accomplish their goals. An attacker who compromises one virtual machine and finds a way to jump to the hypervisor - the system that enables the virtualization - then has access to every virtual machine on that host.

Therefore, malware scanners on both the user and main systems would be a good idea. If it does happen to get on a system, the chances of it spreading are drastically reduced.

Myth No.4: Using non-persistent virtual machines effectively secures a network

In theory, any machine that encounters malware is wiped away and recreated cleanly. However, we are now seeing malware that is designed to survive teardown of individual machines by spreading across the virtual network. This allows it to return when new virtual machines are created.

Additionally, being too eager to create new machines on demand can result in virtual machine sprawl, which happens when virtual machines are created but then forgotten. This leads to an unmaintained virtual endpoint operating without your knowledge. Even if the rest of your virtual machines are secure, it’s possible for one machine to eavesdrop on the traffic of another virtual machine, leading to privacy and security risks.

The best solution to this is to employ an IT manager who can track and maintain systems. Many IT partners offer a solution like this, so experts like us may be able to help ensure your systems are secure.

Myth No.5: Specialized virtual security programs are more or less the same

There are various approaches to virtualization security and your network will probably need a blend of available options. This all depends on what you’re trying to protect.

A non-Web-connected server is going to have entirely different security needs than a virtual desktop of a server that manages customer information. Implementing one without the other simply just won’t do in today’s world, where attackers are set on getting their hands on your data.

Proper security is vital in making virtualization a critical component of your business IT infrastructure. Looking to learn more about virtualization and its components? Contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
June 25th, 2014

Productivity_June23_AOne of the most frustrating tech issues a business faces is slow Internet connectivity. Despite today’s technological advancement, many businesses suffer from lowered productivity as a direct result of a slow Internet connection. If this is a daily annoyance for your business too then it's time to learn some ways to help fix your slow Internet connection and speed up business performance.

5 ways to combat a slow Internet connection:

1. Control devices that interfere with the connection:

Wireless devices can be one of the reasons for a slow Internet connection. It’s wise to talk to us about a wireless network analyzer so that you know the sources of interference. Believe it or not, most of these sources might be coming from the company kitchen!

Good examples include the microwave, cordless phone, security alarm, and other wireless devices which use the 2.4GHz band. These can interfere with 802.11g or single-band 802.11n routers. The best solution is to reposition these household electronics to either help solve the problem completely or at least minimize the chances of interference.

2. Control applications that hog bandwidth:

Without your knowledge it’s most likely that employees are using applications that are hogging the bandwidth. It’s vital that you are aware of these applications, especially ones that have video conferencing and streaming abilities which tend to be responsible for weak bandwidth in corporate environments. Other applications such as torrent and gaming apps can also be responsible. It is best to make sure that these apps are not installed on your company computers, of if they are, make sure their use is regulated.

Believe it or not, one of the biggest bandwidth hogs is YouTube. Some companies, when they audit their network usage, have noticed that streaming services like YouTube can take up more than half of their total bandwidth. While in some positions, video streaming may be necessary, it's likely not for the majority of roles. Therefore, it would be a good idea to implement a rule about the use of YouTube during business hours e.g., it should only be used for necessary tasks.

Some would recommend blocking services like this, but if your business uses Google's other services, blocking YouTube could actually end up blocking access to other Google services. It would be a good idea to consult with us as to the best way to limit use.

3. Reposition your router:

As simple as this might sound, your router might also have to be repositioned to help increase your Internet speed. You might want to try raising your router so that broadcast range can be more effective. If this doesn’t work, which sometimes it doesn’t, try placing your router in the center of your office for a more equal signal distribution. The best solution however, is to place your router as near to computers and other receivers as possible.

4. Consider an upgrade:

If your wireless networking equipment is old then it probably needs an upgrade. Keep in mind that technology moves at an extremely fast pace and your wireless network might be outdated in just a few years.

We strongly recommend talking to us, as we can help recommend the best upgrade solution. For example, the two most common upgrades include installation of a new repeater or wireless amplifier and replacement of your current antenna. Because antenna's are so varied, we can help make sure that the antenna being installed is compatible with your router.

5. Use the latest network technologies:

As mentioned earlier, technology moves fast which is why it is essential that you become familiar with its recent advancements, particularly in the area of wireless networking. There are countless apps, software, and hardware out there that can help boost the speed and performance of your router, some of which can even be downloaded for free. Our networking experts can help ensure your business has the latest and greatest, so be sure to consult with us first.

Dealing with a slow Internet connection can be a huge pain. If not taken care of right away, it can have immense impact on your overall work output. Looking to learn more about ways to improve your Internet connection for maximized productivity? Connect with us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
June 25th, 2014

iPhone_June23_ALook around the office at the mobile phones your colleagues are using. There is a good chance that the most common phone is Apple's iPhone. Known for its usability and sturdy build it is simply the favorite choice for many users. In early June, Apple introduced the latest version of the operating system for iPhone users - iOS 8. When it is pushed to devices in the fall, there will be a number of new features introduced, including an improved Notification Center.

About the iPhone's Notification Center

The Notification Center feature was introduced with the release of iOS 5 and is available on every Apple mobile device. The idea behind it is that it can show you an overview of alerts and updates from specific applications. On iPhones and iPads this is an area where all of the most important information can be accessed quickly.

You can access your Notifications Center by swiping down from the top of your screen. When it is open you will see three views:

  • Today - Important information about the day, including upcoming calendar events, the weather, and other relevant information.
  • All - All alerts, including emails, messages, and updates from apps like Twitter.
  • Missed - Notifications that you have missed in the past 24 hours.
If you tap on any notification or alert, the app associated with it will be opened and allow you to view the content or update in full. For example, when you get a new email, Notification Center will alert you and show who it's from and even some of the content. Tapping on the message will open the Mail app, allowing you to interact with it directly from the main app.

For many users, this is among the most useful iOS features, but many have commented that it feels unfinished. Sure it provides a way to quickly access important information but it is largely static and limited in use. Apple aims to change this with the release of iOS 8.

Notification Center's iOS 8 update

When Apple introduced iOS 8 in early June, they announced that the Notifications Center will be getting widgets that will help make the Center even more functional - providing you with greater information all in one place. Those who have used an Android device before are likely well aware of widgets. These tiny versions of apps display useful information without having to open the app itself.

For example, on Android devices you can add an email widget to your main screen that allows you to read and reply to emails directly from your home screen without having to open the full version of the app.

Apple has decided to take another path with the implementation of widgets, instead baking them into the Notifications Center. With iOS 8, you will still be able to swipe down to access your Notifications Center, only now there will be way more information. In the example Apple demonstrated, there were widgets showing the latest scores of a baseball team and eBay auctions that you could bid on directly from the screen, without having to open the eBay app.

Of course this was just a demo, but you can bet that when iOS 8 is launched, you will start to see useful apps updated with widgets that you can add to Notification Center. If for example you use a note app like Evernote, there is a good chance that you will be able to create or edit a note in the Notification Center, without having to open the app itself.

It is clear that with the impending update, Apple is striving to implement a better and easier way for you to interact with your phone. For many business users this will mean less time having to open apps and search for the information they need. It will be interesting to see what business-oriented apps developers come up with next in terms of making the iPhone an even more effective business device.

Contact us today to learn more about the iPhone and how it can help improve your business.

Published with permission from TechAdvisory.org. Source.

Topic iPhone
June 24th, 2014

Facebook_June23_ASocial media platforms have become a useful tool for businesses to increase reach, as well as draw in potential customers, whether through advertisements or online campaigns. One of the most popular social media platforms, Facebook, is starting to roll out extended video and frequency buying capabilities to help businesses achieve better market penetration. The real question is: What is it and how does it work?

What is Video Views Objective?

Following the introduction of video metrics and Premium Video Ads, Facebook has now introduced expanded video capabilities, called Video Views Objective. This feature will enable businesses running video ads to choose video views as an objective for their campaigns. In short, this allows businesses to take advantage of two solutions to direct Facebook users to additional content. All businesses will be able to plan their campaigns using the traditional broadcast model of reach and frequency.

Video Views Objective (VVO) will be added to Facebook’s Ads Create Tool, Power Editor, and its ads application-programming interface. Ads created using VVO will automatically be optimized to be shown to targeted Facebook users who are most likely to view videos across devices. This will allow businesses to take people on a deeper journey with their brand by encouraging them to take action right after they have watched a video, and sending them a targeted brand message later on.

How does this help businesses?

As mentioned earlier, you will be able to encourage those who have viewed your videos to view additional content with two new solutions. Firstly, businesses who work with a Facebook account representative can create audiences of people who have already watched their videos. Ads can be created for those specific groups to help move them from awareness to affinity and consideration of the brand’s product or service.

A second way businesses can encourage increased engagement is by adding a call to action, which invites people to learn more and visit a specific destination, such as a page on their website, after viewing a video.

You can also gain more control over the number of people who will view your videos by utilizing reach and frequency buying. This will predictably manage audience sizes and the number of times your ads are shown to these audiences. Traditional broadcast ad campaigns are planned and bought by focusing on the number of people you can reach and how many times you can reach them. This helps align Facebook media delivery with the reach and frequency levels that deliver business results.

Facebook is a versatile tool in that it can be used to exhibit a business's core values, as well as enhance customer engagement and experience. Looking to learn more about Facebook for business? Call us today for a chat.

Published with permission from TechAdvisory.org. Source.

June 20th, 2014

Office_June18_AMicrosoft Outlook, though commonly known to be an email application, also has a wide range of other useful functions to handle business matters. Among these is its ability to store up names, email addresses, and details of contacts from a local directory or the user’s server. The significance of creating an address book is obvious when it comes to detecting email recipients but it is also useful in organizing your company’s client list.

Since Outlook's Address Book is the go-to application for many distribution lists, email addresses, and other important contact details, knowing how to use it can be really useful. However, before you create a new address book, it is a good idea to keep in mind that Outlook Address Book is NOT your list of contacts but a collection of different folders containing different sets of contacts.

This does sometimes confuse, so to help you understand more easily, here are the types of address books you can create in your Outlook profile:

Global Address Book

This can only be used in conjunction with a Microsoft Exchange account. Global address lists are a collection of all the names connected to your account in Microsoft Exchange Server.

Outlook Address Book

This is used interchangeably with Contacts although they are different in context to each other. Your Outlook Address Book is a collection of your contacts with details added in the e-mail and fax number fields.

Internet Directory Services (LDAP)

The Lightweight Directory Access Protocol, or LDAP, is used to find email addresses that are not in your local directory. This can only be accessed with the use of a steady Internet connection.

Third-party address books

You can set up address books from third party service providers through their given setup program.

To create an address book for a specified list of clients you can:

  1. From the Info tab, go to File then click Account Settings.
  2. Two options will be listed in the dropdown menu – Account Settings and Social Network Accounts. Choose Account Settings and click Address Books from the pop-up window.
  3. Tick on New then Add Account.
  4. In the Add Account dialog box, more options will appear – Internet Directory Service (LDAP) and Additional Address Books. Choose Additional Address Books and click Next to continue.
  5. You will be directed to the next window with options Outlook Address Book or Mobile Address Book. Mobile address books will create a list of names with the mobile number field filled in. Choose between the two and hit Next.
  6. Your chosen type will be automatically saved to your Outlook profile and to be able to use this, you will have to restart your program first.
Outlook Address Book not only helps sync your business database to several applications but also makes the client database organization an easy task. Understanding how to work this to your advantage can really help streamline and organize your contacts.

We can help you apply better technology tools to your business, so get in touch!

Published with permission from TechAdvisory.org. Source.