Call-quality issues for internet phones

The earliest phones had power and leakage issues surrounding the wet cell batteries. More recently, cell phones have had their failings as well, such as dropped calls and short battery life. Today, VoIP technology has to deal with some minor complications, too. The keyword, though, is “minor,” and our aim today is to identify these relatively slight hangups and help you optimize an already superior telephony solution. Choppy Voice The main factor in disjointed, start-stop sounding messages in a VoIP environment is packet loss, which occurs if individual data “packets” are lost in transmission. When this occurs, the gateway at the receiving end of the call tries to predict what’s been lost, but when it can’t, the gap in data remains empty. With a simple tweak to your VoIP system’s bandwidth settings, sending and receiving voice data will become smoother and significantly reduce these interruptions. Static Many VoIP systems use an ATA, or Analog Telephone Adapter, to convert analog voice signals to digital signals. This sometimes produces static during calls, with the culprits usually being incompatible power supplies or feedback from the phones plugged into the ATA. Easy fixes include unplugging/replugging the ATA and/or the devices connected to it, or switching to IP Phones, which require no analog/digital conversions. Voice Echo It’s fun to hear your voice repeating throughout the high-walled canyon you’re hiking, but not so great when you’re having a quick chat on the phone. Although VoIP echo won’t totally disrupt your conversation, there are a few things you can do to reduce it, such as adjusting volume and gain settings, upgrading your USB headsets, or implementing VoIP echo cancellation software. Post-dial Delay Commonly referred to as PDD in VoIP parlance, post-dial delay is fairly self-explanatory. It refers to a delay between the time the caller finishes dialing and when they hear ringing, a busy signal, or some other kind of “in-call” information. It can be a nuisance when, instead of the ringing being delayed, it never actually occurs and you suddenly realize that your call has been connected. This is actually an external issue from a vital piece of VoIP technology known as SIP (Session Initiation Protocol). At the moment, the only solace we can offer is that its widespread nature means you’re not alone, and a solution should be coming along soon. By now, it’s clear to most small- and medium-sized businesses that a VoIP phone system can benefit them, even with the occasional delayed ring or scratchy call. Because what we’ve learned from previous telephony advances is that inconveniences like these are manageable. We can help you manage — from VoIP planning to installation to optimization, contact us today for more information. Published with permission from TechAdvisory.org. Source.

Office 365’s apps get a revamp

If you’re one of the million-plus users taking advantage of Office 365’s premium productivity apps, you’ll soon notice some changes. Last June, Microsoft revealed that Outlook, Excel, PowerPoint, and Word will be getting a design revamp in the coming months. Here’s a preview of what’s to come. Simplified ribbon The biggest update is with the ribbon, which is a command bar at the top of a window. The new design now has a simpler, cleaner look that gives users the chance to customize the tools they work with most, simply by pinning apps or files to your Windows taskbar. Even though this new ribbon is designed with simplicity in mind, if you don’t find it helpful you can still revert back to the regular three-line view. Some users may already be using this new ribbon in the online version of Word, while Outlook for Windows will receive it sometime this month. However, Microsoft disclosed that they aren’t yet ready to roll it out to PowerPoint, Word, and Excel for Windows. Improved search option One of the major changes is with the search option in Microsoft Office apps. The developers improved the search experience by using Microsoft graph, so users can now see search recommendations when they move their cursor to the search box. Some have already seen this update take effect, but it won’t be available for Outlook on the web until August. Better colors and icons To make the overall design more aesthetically pleasing, the colors and icons of every app have been revamped, too. They wanted a more modern look crisp and clean no matter the size of the user’s screen, which is why they employed scalable graphics. It first debuted on Word before appearing on Excel, PowerPoint, and Works for Windows last month. As for Outlook for Windows and Mac, users can expect the update later this summer. Office 365 is constantly evolving to benefit subscribers. And to make things even more interesting, users will be chosen at random over the next several months to receive the updates, and Microsoft will gather their reviews to make further improvements. Co-creating new features with customers is something Microsoft truly believes in, so this isn’t simply a social media tactic. So as you hang tight for these coming changes, consider increasing office collaboration by migrating your files to the cloud. Call us today to get started! Published with permission from TechAdvisory.org. Source.

5 ways you could blow your online reputation

As a small business owner, you’ve probably used social media to establish a connection with your customers and share stories that will shine a positive light on your brand. While social media is a great tool to foster your business name, if used incorrectly it could just shatter your online reputation. Here are some common mistakes you should avoid when implementing social media marketing in your business. Your online reputation will not take care of itself Assuming that your enterprise doesn’t need an online reputation management (ORM) strategy is the most common ORM mistake business owners should avoid and, probably the first one as well. Just because your business’s reviews were positive today, doesn’t mean they will be tomorrow. Your online reputation can change in an instant. Think about it: The key to protecting your business from the harmful bad reviews is a good ORM strategy. In short – this is a process that could make or break your reputation, and you should be extra careful. The more work you put in ORM, the more control you have over what appears in search engines for your products or services. Expressing your personal opinion You’re making a big mistake if you let your emotions get in the way when posting content on your business’s social media profiles. Discussing religion, politics, or other controversial issues may turn off people who matter to your business. Unless they’re relevant to the nature of your business, avoid mentioning sensitive topics. Instead, try to keep a neutral tone, since the goal of your social media efforts is to appeal to everyone. Ignoring or responding aggressively to negative comments Negative feedback can be painful to hear but, if you can put aside your pride, it is a real opportunity for improvement. When customers post a negative comment, ignoring it can make things go from bad to worse. Customers may think that you’re not taking their issue seriously, and could resort to posting complaints on all sorts of platforms, which quickly become impossible to control. Also, don’t let things get out of hand – reply in a timely manner and try to solve problems as best you can, not by posting abusive rants or sending back angry emails to authors of bad feedback. Posting fake reviews (both negative and positive) Another online reputation mistake is to post negative reviews on your competitors’ website to dampen their credibility. This underhanded strategy is ethically wrong. On the other hand, influential websites like Google have algorithms in place to help weed out false customer feedback, so making the mistake of posting fake client reviews to boost your business is such a waste of time and effort. Instead, focus on delivering high-quality products and services to generate authentic customer reviews, which can really pay off in the long run. Being inconsistent To build a good online reputation, you need to be consistent. Your social media fans followed your page for a reason – they have certain expectations that you will post regular and interesting content. Updating social media with ten posts one day, followed by complete silence for the following few weeks, is a bad example of consistency. Don’t disappear for days or weeks on end. Try to schedule a routine and interact with your audience on a regular basis. A credible online reputation is an important part of your business’s public image. If you want to discuss how to establish an online presence and a strong ORM, contact us today and we can give insights from experts. Published with permission from TechAdvisory.org. Source.

Microsoft expands Bing’s Visual Search

How many times have you wanted to search the internet for something you didn’t know the name of? It’s a common problem that Microsoft helps solve with AI features included in its search engine, Bing. Visual Search allows users to replace text queries with images for more nuanced results and it’s now available on your smartphone. How does visual search work? Bing has indexed billions of images posted on the internet and most of them have text descriptions of some sort. This has made it possible for Microsoft to create programs that look for similarities in image contents and labels to create computer-generated definitions of everyday objects. So if you were to take a photo of the White House and upload it to Bing, the search engine could tell you what it is without any human input. Although it may seem like little more than a novelty, Visual Search makes it much easier for eCommerce shoppers to find niche products. Bing can help people identify hard-to-name items and suggest stores that sell them, such as “slip joint pliers” at a local hardware shop or “gaucho pants” at an online clothing retailer. What’s new? In June, Microsoft announced that Visual Search is now available within Bing’s iOS and Android apps, as well as Android’s Microsoft Launcher. Just open the app, tap the camera button and take a photo from your phone or choose an image from the gallery. If you’d like to narrow your search, tap the magnifying glass button and crop your image to highlight specific objects within the photo. In the near future, Visual Search will be added to Microsoft’s Edge browser and Bing.com. It’s a useful feature for finding what you need and helping customers do the same. For insight and support related to any of Microsoft’s products, give our experts a call today. Published with permission from TechAdvisory.org. Source.

Consider the security risks of your software

Cybersecurity is an issue that hounds businesses of all types. Sometimes organizations invest in security software without realizing the risks that come with it. Here’s why identifying threats before buying cybersecurity products is paramount. Uncover threats and vulnerabilities Every business should evaluate the current state of its cybersecurity by running a risk assessment. Doing so is one of the easiest ways to identify, correct, and prevent security threats. After discovering potential issues, you should rate them based on probability of occurrence and potential impacts to your business. Keep in mind that risk assessments are specific to every business and there is no one-size-fits-all approach for small business technology. It all depends on your line of business and operating environment. For instance, manufacturing companies and insurance groups have totally different applications to secure. After tagging and ranking potential threats, you should identify which vulnerabilities need immediate attention and which ones can be addressed further down the line. For example, a web server running an unpatched operating system is probably a higher priority than a front desk computer that’s running a little slower than normal. Tailor controls to risks Instead of spending time and money evenly on all systems, it’s best that you focus on areas with high risk. You should address these issues immediately after an assessment, but also put plans in place to evaluate their risk profiles more often. Assess existing products Chances are, your organization has already spent a great deal of money on security products and their maintenance and support. By conducting risk assessments more often, you can improve the strategies you already have in place and uncover wasteful spending. You may discover that one outdated system merely needs to be upgraded and another needs to be ditched. Remember, your existing products were purchased to meet specific needs that may have changed immensely or disappeared altogether. It’s much harder to overcome cybersecurity obstacles if you’re not regularly evaluating your IT infrastructure. Contact our experts for help conducting a comprehensive assessment today! Published with permission from TechAdvisory.org. Source.

5 new features to macOS Mojave

Apple had recently announced macOS Mojave, the successor to the current macOS High Sierra, and the new features that will arrive with the new operating system. Here are our top five picks. Dark Mode Did you ever wish your computer windows were not just plain ole white? If yes, you’re in for a treat. The new Dark Mode feature changes the appearance of all your screen elements, such as the dock, taskbar, and windows, from deary shades of white to classier shades of black, making the screen much easier to view at night. Desktop Stacks Are you having a hard time finding a specific file on your desktop because it’s cluttered with documents, pictures, and music files? Mojave’s new “Desktop Stacks” automatically organizes and stacks your documents in one pile based on the type of files. For instance, PDFs will be stacked in one pile while JPEGs will be stacked in another. When you want to find a specific file, simply open the pile and go through them until you find the right one. iOS apps on Mac Your dependable iPhone allows you to read current news, check how your stocks are performing, record voice notes, and control your home accessories. But what if you’re on your computer, your phone is out of reach, and you wanted to do all these things? You won’t need to get out of your seat anymore with MacOS Mojave as popular iOS apps like Voice Memos, Stocks, Home, and Apple News will now be available on Mac. What’s more, third-party developers will soon be able to make iOS apps available on Mac as Apple plans to implement UIKit, a framework Mac programmers use when developing iOS applications, to macOS. This function is expected to roll out in 2019. Markup Screenshots Markup, one of the most convenient tools in iOS, will soon be available for Mac users. This function allows you to write or draw over your screenshot, which is especially useful if you need to pinpoint a specific point on the image and send the file to someone else. Continuity Camera Remember the days when you had to email photographs to yourself, move them to iCloud, or sync your phone so it’s accessible on your computer? Say goodbye to this tedious process with macOS Mojave’s Continuity Camera. This new feature lets you capture images on your phone and have it appear on your Pages document instantly. It also allows you to scan documents on your phone and have it automatically sent to your Mac. There are many more features that are new to macOS Mojave. If you wish to learn more about it, or understand how this update can benefit your business, call our Apple experts today. Published with permission from TechAdvisory.org. Source.

Energy saving tips for your PC

You want to save energy, but you need to use your PC every day. So maybe you just resort to turning off your computer when you’re not using it. But a plugged-in PC or electrical appliance, even when turned off, consumes standby power. Here are some tips on how you can save energy with your PC. 1. Disconnect your external devices Devices that connect to your PC like printers, sound systems, and webcams consume power, too. That’s why you should disconnect or remove these devices from your PC as soon as you’re done using them. 2. Use a smart strip, especially for computers you cannot turn off A smart strip is a series of several electrical outlets in one strip, with circuits to monitor and maximize your gadgets’ power consumption. By connecting your PC and its peripherals (printer, speakers, scanners, etc.) to the smart strip, you don’t need to unplug your equipment when you’re not using them. 3. Adjust your computer’s energy settings You can also consume less energy by adjusting your PC’s power settings. For example, you can make sure your hard drive and monitor go into “sleep” mode when they’re left idle for a few minutes. Lowering the screen brightness will also help you save electricity. 4. Shutdown and unplug your computer when not in use If you are not yet using a smart strip, then it’s best to shut down the computer when you’re not using it. Also, make sure to unplug it, as leaving it plugged consumes standby power. 5. Use a charger only when charging your laptop When we charge our laptops, it’s easy to just leave them there and forget about them. This results in the eventual degrading of the battery. Leaving the charger plugged on the wall also consumes standby power. So either use a wall outlet with a timer, or plug your charger on a smart strip instead. 6. And should you be in the market for a new PC, choose one that’s Energy Star compliant Energy Star is the U.S. Environmental Protection Agency (EPA)’s symbol for energy efficiency. Every product that earns the Energy Star symbol is guaranteed to deliver quality performance and energy savings. Studies have shown that a single Energy Star compliant computer and monitor can save from $7 to $52 per year in electricity bills. Saving energy is a combination of smart choices in hardware plus developing good energy-conservation habits. These tips should help you achieve that. If you need assistance in choosing the best hardware for your needs, call us and we’ll be glad to help you out. Published with permission from TechAdvisory.org. Source.

How consumer habits changed the web

The average web user’s attention span gets shorter every day. People don’t want to spend hours sifting through a website to find the information they need; they want it as soon as the page loads. To keep up with the times businesses have drastically changed how they develop their websites. Bite-sized content While there are several elements that make an effective website, the most successful ones offer ‘snackable’ content. These are bite-sized chunks of information that give visitors everything they need to decide whether a website is worth their time. Microsoft’s homepage, for instance, gets straight to the point, promoting each of their services with one line of text and links to more details. Besides accommodating short attention spans, concise content is easier to share on social media and increases brand awareness. The point is, if you’re working on your website, make sure you’re not overloading visitors with walls of text. You can expand on products and services on separate pages, but even those need to be broken up into digestible segments. Loading time How fast a page loads is a crucial part of a website’s user experience. If it takes over three seconds to load, users will click away and go to a more responsive site. This is why modern websites optimize their content for speed and responsiveness. High-resolution photos and videos slow down a website, especially if users are on mobile devices and networks. One way around this is by implementing mobile-friendly image formats that are quick and easy to load. Another popular solution among website producers is Google AMP (Accelerated Mobile Pages). This solution creates a stripped-down, mobile-optimized version of websites so images and videos render quickly. Personalization Today’s internet users also want tailor-made experiences whenever they visit a site. They want the website to know what they’re looking for ahead of time so they don’t have to spend time digging for the information they need. Websites like Netflix, for example, use analytics to recommend movies and television shows a user might like based on their viewing history. While most businesses don’t have access to the same resources as Netflix, they can utilize Google Analytics to understand the people visiting their website and use the insights to customize the content accordingly. Some websites even ask what visitors are looking for to direct them to pages where the content is customized to their needs. If you want to increase customer engagement and page visits, make sure you’re doing all these things with your website. Web trends can also change at any moment, so stay tuned to our blog to know about the latest developments. Published with permission from TechAdvisory.org. Source.

How to minimize risks after a data breach

Despite efforts to protect your data, some breaches are beyond your control. When an online company with your personal details gets hacked, you have no choice but to manage your risks on your own. These practical tips can help you reduce risks of identity theft and other threats. Determine what was breached Whether its names, addresses, email addresses, or social security numbers, it’s critical to know exactly what type of information was stolen before determining what steps to take. For example, if your email address were compromised, you’d take every precaution to strengthen your email security, which includes updating all your login credentials. Change affected passwords immediately Speaking of passwords, change yours immediately after any breach, even for seemingly safe accounts. Create a strong password comprised of alphanumeric and special characters, and make sure you never reuse passwords from your other accounts. Once you’ve changed all your passwords, use a password manager to help you keep track of all your online account credentials. If the website that breached your information offers two-factor authentication (2FA), enable it right away. 2FA requires two steps to verify security: usually a password and a verification code sent to a user’s registered mobile number. Contact financial institutions In cases where financial information was leaked, call your bank and credit card issuers to change your details, cancel your card, and notify them of a possible fraud risk. That way, banks can prevent fraud and monitor your account for suspicious activity. Note that there are different rules for fraudulent transactions on debit cards and credit cards. Credit card transactions are a bit easier to dispute because they have longer grace periods. Debit card fraud, on the other hand, is more difficult to dispute, especially if the fraudulent transactions happened after you’ve notified the bank. Place a fraud alert on your name Hackers who have your personal information can easily commit identity fraud. To avoid becoming a victim, contact credit reporting bureaus like Equifax, Experian, or Innovis and request that a fraud alert (also called credit alert) be added to your name. This will block any attempt to open a credit account under your name and prevent unauthorized third parties from running a credit report on you. Putting a credit freeze on your name might result in minor inconveniences, especially if you have an ongoing loan or credit card application. Still, doing so will greatly reduce your risks of getting defrauded. These steps will ensure you don’t fall victim to identity theft in the event of a large-scale data breach. If you want to take a more proactive approach to protect your sensitive information against breaches, contact our cybersecurity experts today. Published with permission from TechAdvisory.org. Source.

How to wipe data from your old smartphone

Our mobile phones contain some of our most private data. There are contact details, confidential business emails, financial information, and possibly even risqué pictures that you wouldn’t want falling into the wrong hands. Factory reset is one way to get rid of everything if you’re moving on from your old phone, but there are a few other things you must do first. 1. Encrypt your Android phone You can make sure unauthorized personnel don’t have access to your data by encrypting it, making it virtually unreadable. Those who own a newer phone will likely have their data encrypted by default, but if you’re unsure, you need to double-check. Simply go to the system settings in your phone and search for the Encryption option. The title and location will depend on which phone you’re using, but it should be easy to find. Once there, you’ll see whether your device is already encrypted or whether you should begin the encryption process. Keep in mind that it takes an hour or more to encrypt data, and you can’t use your device during that time. 2. Remove SIM card and storage cards Now that your data is encrypted, remove your SIM card and external memory cards. Both are linked to your identity and contain sensitive information so it would be best if they never left your possession. 3. Perform a factory reset You can now begin the actual data wiping process: Look for the Backup & reset section in your system settings where you will see the Factory data reset option. This is where you will remove data and accounts from your phone. It will ask you to either verify your fingerprint, or input your password, pattern, or PIN for protection before starting the process. 4. Sever ties to specific websites The final step is to manually remove your old device from Google and other websites it is associated with. Just go to the site, choose your device, and remove it from the list of Trusted devices. And don’t forget your password manager and multi-device authentication apps; sign in to those and sever any connections there as well. As long as you’ve followed these four handy steps, you’ll be safe when getting rid of an old mobile phone! But for those who are still anxious about their data, just give us a call. We’ll make sure to protect your files from prying eyes, and we’ll even provide valuable tips and tools to secure your new Android device. Published with permission from TechAdvisory.org. Source.