Categories
Casserly Consulting Blog

Increased Network Complexity Necessitates Shifts in Monitoring Strategies

network_complexity_monitor_400.jpg

Businesses of all sizes have come to depend on their IT for productivity. IT administrators that constantly monitor their network and infrastructure reduce downtime, leading to higher resource availability. With the increasingly complex makeup of an organization’s network this becomes quite the task.

What Makes a Network Complex?
First we should mention that computers are complex machines and if you’ve ever tried to fix one without the specific knowledge it takes to do so, you more than likely ended up like everyone else who has tried, and called a professional. The traditional computing network was made up of centralized servers, end points in the form of workstations, and some networking equipment that allowed these machines to communicate with one another. Adding the availability of the Internet to that equation makes the network much more complex, mostly due to the breadth of the Internet as it exponentially increases your business’ exposure to threats.

Expanding that even further with the growing number of endpoints on a network due to the deployment of wireless networks that connect all the smartphones, laptops, and tablets to the network; and, all the other connected devices that are out there today… there is a lot of ground to cover. That’s not even considering virtualized data, cloud platforms, a website, and other higher-bandwidth applications such as video streaming or communications systems.

Network Monitoring Best Practices
Before we start listing ways you can monitor your network and infrastructure more effectively, we should mention that as trained professionals, we recommend entrusting your network monitoring to people who are versed with the makeup of your business’ network and infrastructure. Our managed IT services platform is a perfect complement to a large complex network filled with potential problems.

5 Monitoring Practices to Consider

  1. Pay Attention – This goes without saying, but by keeping the health of your network at the top of your list of priorities and monitoring components in real-time, you can be more proactive in fixing issues before they become downtime-causing problems.
  2. Find an Overreaching Solution – By integrating an end-to-end monitoring strategy, it gives you the power to coordinate efforts and present technicians with one version that they can act upon. Find a solution that handles both wireless and wired networks, virtual and physical environments, databases, and applications and supports all necessary protocols and languages to be able to monitor any device or program.
  3. Optimize Bandwidth – Data flow bottlenecks can absolutely hinder your business’ ability to utilize all the tools effectively. Monitoring bandwidth levels can bring about favorable results.
  4. Prepare to Scale – For the modern business, scalability is key. To ensure that the staff of your business has access to the productivity systems they require, being able to scale up or back–depending on the situation–is essential.
  5. Ensure Your Solution Is Flexible– When you choose a monitoring platform, be sure to choose one that doesn’t have inflexible licensing models as you need it to be able to work across all types of devices and applications.

The IT professionals at COMPANYNAME are experts and monitoring and managing business networks. Call us today at PHONENUMBER to find out more about how we can help you run a more efficient business with technology.

Categories
Casserly Consulting Blog

How Technology is Transforming the Way Students Learn

students_learn_technology_400.jpg

To educate the leaders of tomorrow, using technology from the past isn’t going to cut it. While some schools are still using technology from the last century, others are moving forward. Today, we will take a look at classroom technology innovations, and how to get this exciting new technology in the hands of more students.

The Modern Classroom
Like the modern office, the modern classroom is beginning to run on technology; and as a result, it is changing the way teachers need to teach. Teaching strategies that have been the same for decades are being questioned and altered, making the children of today more-or-less guinea pigs in the new way of learning. They are well-equipped for this alteration, however, as they are the first generation of people that have lived in the age of social media and are likely well more advanced at using technology to solve problems than previous generations. So while there are some inherent problems with kids growing up in the age of social media, for education, the concept is a major win.

One strategy modern teachers are using nowadays is called flipped learning. This is where children are asked to watch online lectures, videos, and other materials at home, then do what used to be called homework during class. The classwork isn’t just people sitting quietly at their desks with their five-pound textbook open any longer, it’s now a chance for the children to work collaboratively to solve problems and hone practical skills that can be used throughout their lives. Best yet, flipped learning allows for a more analytical approach to teaching, whereas in the past kids that had trouble with certain concepts would work on problems they didn’t understand at home, away from educators, leading to frustration and higher degrees of failure.

For the school that isn’t ready to flip education completely on its head, there is blended learning, which is a strategic combination of using traditional face-to-face teaching with technology-based assignments to get more out of each lesson plan. So, while there are still in-class lectures, and individual assignments, integrating the use of technology to find answers, present homework, and introduce concepts can go a long way toward getting the children using technology and gaining the skills they are going to need as a member of the future workforce.

What Are Some of the New Technologies?
There are several technologies that are being developed to help students (and people in general) learn more about the world around them. Let’s start in the classroom. One technology that is starting to become common in the classroom is the smartboard. If you haven’t seen one, it is in essence a whiteboard that is hooked up to a computer and has multi-touch capabilities. This provides a more immersive educational experience than the old overhead or slide projector. One feature that a smartboard has is that it can be mirrored to any Internet-connected computer, giving students (or whomever is viewing this content) the chance to follow along when they are out of the classroom or on their personal device within the classroom itself.

Another great tool is the smart table. Smart tables are computer-based, and Wi-Fi connected touchscreen tables that typically have many multi-touch points, some have as many as 80 unique touch points at the same time. Since the technology is more accessible, the smart table is great for younger students that need more hands-on learning.

Another technology that the classroom of tomorrow will almost certainly feature is virtual and augmented reality glasses. These technologies are just in their infancy, but the more applications they begin to create, the more they will be found in schools. AR specifically is a technology that many students can benefit from. Since it is a digital overlay over real life objects, it makes instructional learning more immersive and provides a student practical instruction rather than providing conceptual instruction. It won’t be surprising to see apps developed for tablets and smartphones that will provide step-by-step instructions to students in a wide variety of disciplines.

Securing the Technology
The process of getting students and teachers more connected and modernized isn’t just about acquiring new hardware and software. It’s also critical that teachers and administrators are taught how to use the technology and how to use it safely. Without proper security measures, sensitive information could be at stake, and putting a student’s identity or privacy at risk has deep ramifications. It’s critical that schools consult IT experts who understand IT security before deploying technology that connects to the Internet or the network in general.

How to Get Kids the Technology They Need
One big problem facing a lot of public schools is that they simply don’t have the funding to get enough of the technology into classrooms to make a difference for the students. Most school boards won’t propose major tax increases in order to fund classroom innovation, and it’s unreasonable to expect that educators foot the bill for this technology. For situations like this, teachers have turned to crowdsourcing and social media. The most popular platform used by educators is DonorsChoose.org , which was started by a teacher and can be used by educators to raise funds for school supplies and technology.

Another form of funding can come from social media. Reddit does a gift exchange for teachers. There are people from all around the world looking to help kids get a better education by providing them technology. Another is Digital Wish, where teachers can purchase donated technology and software. The site allows donations that can go into their Digital Wish account to help them purchase the technology they need.

Of course, you can always go the traditional route: writing to your congressman/woman, but a lot of times you’d be better off turning to Adopt a Classroom, a foundation set up for teachers who, on average, spend nearly $600 a year on classroom supplies. Go to adoptaclassroom.org for more information.

The world has seen its technology change quickly and education is going to have to represent where we are in society. Do you know of any technologies that students use nowadays that we didn’t touch on? Leave your thoughts with us in the comments section below and return to our blog for more great technology-based content.

Categories
Casserly Consulting Blog

Tip of the Week: Why You Shouldn’t Just Kill Power to Windows

no_just_kill_power_400.jpg

There’s a big difference between turning off any other appliance, like a stereo or a television, and turning off a computer. A computer takes much more time to shut down than your average device, but why is this the case? Is there a way to speed up this process? This tip will explain these processes and provide some ideas for how you can make this process much faster.

Why Shutdown is So Slow
Let’s take a look at this process as a whole. As a computer is running, there are many components that are doing different jobs. When a computer (or any computing device, like a phone or game console) is shut down, it needs to follow a procedure to make sure data doesn’t get lost. A full shutdown will aim to minimize damage to internal components, empty the RAM, wipe the virtual memory on the hard drive, remove all cached data, close all open applications, and turn off the operating system.

If your computer shuts down without going through this entire process, it could cause file corruption or other damage to its contents that could create issues.

Steps to a Proper Shutdown
It’s important to remember that even though there are a lot of different stages to the shutdown process, but it should go pretty quickly.

The first step in this process is that any applications that are opened are checked to make sure that the data has been saved. If not, the process is interrupted to inform the user. The computer then initiates a sequence that shuts down all services and programs, and it has to confirm that they have indeed been closed before eliminating any unneeded program data. A log is made of anything strange happening during the process, so the user can consult it later. All users are logged out of the system and the computer shuts down on an operating system level. Once this happens, any updates are installed, and the machine is turned off completely.

Speed Up Your Shutdown (and Startup) Times
There are ways your business can improve shutdown speed, but they are somewhat complex and difficult to do on your own with limited IT experience. This is why we recommend working with a provider like COMPANYNAME to make the process easier and more efficient for your organization. We can help your organization make sure that the shutdown process is as streamlined as possible. The same goes for your computer boot times. If you or someone on your staff has a laptop that seems to take forever to ‘wake up,’ there are steps we can take to investigate why and resolve it.

We recommend that your computers get restarted regularly (based on their performance) so as to help the computer keep itself in top working order. To learn more, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

A Better Way to Be Rid of Old Cables

new_recycle_cable_400.jpg

Are you drowning in old computer cables? Do they sit in a drawer and take up space? Chances are that you’ll have quite a lot of old cables that are sitting around collecting dust due to your organization picking up new devices that come with even more new cables. Sure, you might think you still need that old 25-pin serial cable for that legacy scanner from 1997, but it’s probably time to let go. While there is some merit to keeping old cables around just in case, the proper alternative to throwing out unneeded cables is to recycle them.

Take an Inventory
First, you need to see what cables you have on-hand. This includes cables, wires, and adapters. Basically, keep an eye out for anything that might be of value to your organization. This doesn’t mean to hoard them–rather, keep an eye out for anything that could potentially be useful, but not obsolete in the near future. For example, smartphone chargers with USB Type-A and Type-C cables might come in handy for travel or to keep as spares for staff.

Recycle (Don’t Discard) Your Unwanted Cables
If there are any cables remaining, you should always, always recycle them rather than throwing them in the trash. Modern computer and video cables are typically made out of valuable materials, such as copper and gold. On their own, they might not be worth much, but if everyone recycled their old cables instead of throwing them out in the trash, it would have a pretty large impact.

You can reach out to COMPANYNAME for assistance with getting rid of your unneeded and unwanted hardware. This goes for more than just cables–if you have anything at all that you simply don’t need, we’ll take it off your hands. If you just want a place to drop off your unneeded hardware, just call 1-800-RECYCLING or visit the National Center for Electronics Recycling website.

For help with recycling your unused technology, give us a call at PHONENUMBER.

Categories
Casserly Consulting Blog

5 Useful Cloud Apps for Small Businesses

cloud_apps_400.jpg

The cloud is a great tool that lets businesses take advantage of goods and services in never before seen ways. How does your organization use the cloud? Developers are trying to leverage the cloud to best assist businesses just like yours with their day-to-day functions, all the while improving flexibility and access to important information. Here are five cloud-based applications that your organization can benefit from.

QuickBooks Online
Quickbooks is one of the major accounting and payroll services out there, and Intuit has developed the platform for use in the cloud environment. QuickBooks Online can help your business build out invoices, track sales and expenses, manage accounts, download bank transactions, and schedule your invoices. QuickBooks Online is also compatible with many different devices, and it works well with over 300 other cloud-based applications. This provides your business with a dynamic and affordable solution.

Evernote
Evernote, a note-taking application, is now accessible through the cloud. Following this migration, users have discovered that Evernote is more functional and quick than ever before. Evernote can even save, and archive information found online so that it can be accessed at any time. Evernote has also added encryption to keep stored information safe.

DocuSign
You sign countless documents year after year. If you could get rid of all the meetings and time spent traveling to locations just to sign specific documents, how would you use this extra time? DocuSign makes this dream a reality by providing an application designed for this express purpose. You can remotely sign documents for a myriad of purposes, cutting down the time spent in between getting to a meeting location and signing the actual document.

Slack
Slack is a great communications system that can integrate with other project management and productivity cloud apps. Slack includes many features designed specifically to help your projects finish as quickly as possible, all while including various features, like message boards and instant messaging, so that all users can be kept in the loop on progress.

Asana
Asana is a cloud-based project management software that can be used for collaboration between projects, allowing you to set parameters and milestones that can be worked toward. This gives your team a way to visually gauge how much progress they are making on a project, as well as provides them ways to meet their deadlines, share files, be more productive, and create opportunities for success.

What are some cloud apps that you use to get more work done throughout the day? Let us know in the comments.

Categories
Casserly Consulting Blog

Tip of the Week: Excel Features for the Power User

excel_features_power_400.jpg

As useful as a spreadsheet can be to convey information, they can be a little drab and disengaging if the full capabilities of Microsoft Excel aren’t understood and leveraged. For today’s tip, we’ll go over a few little-known and underutilized features that can help you create spreadsheets with both more style, and more utility.

Visible Zeros
There is a fair chance that, at some point, you will need to input data into Excel that begins with zeroes, whether you’re documenting serial numbers or what have you. The trouble is, Excel has a habit of hiding these zeros, so 0056907 would display as 56907. This unfortunately renders the data inaccurate. However, an easy fix to this is to just add a quotation mark in front of the number. This prevents the zeros from being omitted, so instead of resulting in 56907, you would keep your original “0056907.

Adding a Drop-Down List
Adding a drop-down list to a spreadsheet is a simple, yet effective way to limit the input a particular cell will accept. The first thing you have to do is select the cell that needs to have drop-down capabilities, and then click Validate in the Data tab in the header menu. On the Settings page of the window that pops up, there will be a menu labelled Allow. From that menu, select List and highlight the cells that make up the options you want in your drop-down, and finally, click OK.

Accessing Tools on the Developer Tab
Depending on your needs, you may require some more advanced capabilities in your spreadsheet, like creating option buttons, creating macros, and other features. These can all be found in the Developer tab, which is hidden by default. In order to access it, you will first have to access the Excel menu at the top of your screen and select Preferences. Once you’re provided with the Preferences menu, select Ribbon & Toolbar. You will then see a list of the various options that you can add or remove from your Tabs. Selecting Developer will give you access to the tools that tab contains.

Shading Every Other Row
If spreadsheets have any faults, the eye can easily wander when one is looking at them. Adding shading to the formatting, more specifically, to break up individual rows can be very helpful to someone trying to read the information the spreadsheet has to share. To do this, you will need to highlight the area where you want to display the effect or use the Select All shortcut (Ctrl + A) to apply the effect to the entire sheet. In the Home tab, click into Conditional Formatting and select New Rule from the drop-down menu. You will then have a Style drop-down menu to select from, from which you should pick Classic, after which you should select Use a formula to determine which cells to format. Enter the formula =MOD(ROW(),2) and pick your desired color, and your spreadsheet should be striped quite nicely.

Do you know any other tricks to improve the use of Microsoft Excel? Share them in the comments!

Categories
Casserly Consulting Blog

The 3 F’s of a VoIP Solution

hosted_voip_400.jpg

Communication is pivotal to the success of your business, but it’s hard when you have a telephone system that seems like it was built for an age long past. A modern telephone system that utilizes the cloud is the ideal way to approach collaboration in the workplace. You have some options for this, but the easiest to take advantage of is a cloud-hosted Voice over Internet Protocol solution.

Compared to the traditional telephone system, a VoIP phone solution provides substantially more freedom to go about your business as you see fit, as well as the flexibility to adjust needs on a whim and the functionality you expect from an enterprise-level modern phone system.

Freedom
If all you’ve ever known are corded desk phones with a limited reach, then you don’t know the heightened experience of putting on a wireless headset and taking your business on the road. Traditional telephone systems are limited in scope because you’re tied to your desk or within a certain radius of your handset. VoIP phone systems can be used on any connected device, be it a desktop, a laptop, or even a mobile device. Since it’s a cloud-based application, your business can make use of it wherever and however it pleases.

Flexibility
When you implement a traditional telephone system, chances are you have a specific setup in mind that caters to your current needs. Now imagine that your organization is growing at a staggering rate and you don’t have enough phones for everyone. Knocking down walls, running cables, and changing your physical infrastructure just to add a few phones to your network is an overly complicated and expensive process. A cloud-based VoIP system allows you to add new numbers and users when they are needed. As long as your network can sustain the bandwidth (have the IT professionals at COMPANYNAME consult your Internet service provider for more information on this), you can add as many users as you need.

Functionality
A traditional telephone system is subject to the whims of phone providers. This in itself isn’t inherently bad, but the fact that so many of them bundle together unnecessary services makes for a frustrating and expensive system. For example, your business certainly doesn’t need 300 channels of cable television in addition to its phone system. Instead of bundling unnecessary services together, a VoIP solution offers you the opportunity to customize the solution to fit your specific needs. This includes additional options like instant messaging and video chat, in addition to all of the tried and true basics like conference calling and voicemail. Basically, you only pay for what you actually want and need, not what the provider thinks you want and need.

Could your organization use hosted VoIP? COMPANYNAME can help. To learn more, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

How a Data Backup Can Be Used, No Disaster Necessary

data_backup_no_disaster_400.jpg

Data backup may not directly help you boost your productivity, but it is a core component of any responsible business’ continuity plan. Each year, thousands of businesses that don’t take threats into account are forced to close their doors because they didn’t have a contingency plan in place. For every business that plans for the worst there are two that don’t, either because they see the strategy as too cost prohibitive, or because they just don’t understand the amount of threats that could put their business in the position where they would need to close.

There are several aspects of a backup and recovery strategy that business owners (who do see reason to implement one) have to square away. By breaking the strategy into three core parts, your organization can secure a positive ROI from a backup and recovery system that, with any luck, you’ll never have to use.

Data Backup
Deciding on a backup platform is obviously the first step in the process. There are several strategies a small business can use to cover its assets. They could use cloud storage, network attached storage facilities that use hard disk drives or tape backup drives, or even a manual system where people protect the data by backing it up to a hard drive and then take a copy with them when they leave. No matter what platform you choose to utilize, you have to understand that if you look at your data as an asset, it stands to reason that you would want to protect as much data as you can. At COMPANYNAME, we offer a comprehensive backup and disaster recovery service that utilizes network attached storage that pushes copies to the cloud in real-time. This not only provides the kind of data redundancy every organization needs, it allows our clients to thoroughly plan their data recovery strategies.

Before we go into recovery, we’d be remiss not to mention that some data simply isn’t important. Small businesses often have a lot of data they collect but don’t do anything with, so it just sits on their infrastructure taking up space. Some businesses look to data analytics to cut down on dark data, but for the small business that doesn’t have a backup strategy, it might just be putting the cart before the horse.

Data Recovery
If you are looking for a positive ROI, this is where it begins. A business needs to establish acceptable parameters for the recovery of their data. To do this, an organization is going to have to establish what are known as their recovery point objective (RPO) and recovery time objective (RTO). Before we elaborate, we should say that if you are in a position where you need to restore a large portion of your data–whether it be because of malware, natural disaster, sabotage, or blatant negligence–you absolutely have to have these plans made (and tested).

The recovery point objective defines how much data your business could reasonably afford to lose in order to be able to sustain operational effectiveness. Recovery time objective is the maximum time you believe you can go without your data before your business fails. Each figure isn’t static throughout your business. Some of your data is more important than other data, of course, and has to be weighted this way. Therefore, some systems that hold more crucial data will have different RPOs and RTOs than less critical systems.

How the System Provides a Calculable ROI
This is where you can put it all together. How do you calculate the return on investment on systems that you hope you will never ever use?

  • Establish your organization’s hourly realized revenue. To do this you take the amount of revenue your organization has taken in over the past year and divide it by the total working hours you and your staff have logged for that time.
  • Figure out how much you would stand to lose both with and without a backup and recovery system in place.
  • Multiply the hourly realized revenue with both scenario-specific figures you’ve calculated in step 2 and take the difference. This number represents the total avoided loss, in dollars.
  • Finally, plug that figure into this formula to measure your backup system’s ROI:

ROI = (Avoided loss – Cost of backup and recovery system x 100%)

Without a disaster hitting your business, you may think that backup and recovery strategies are a waste of time and resources, but the ROI is clear.

If your business is looking for a backup and disaster recovery solution that can seriously save your business in the event of a disaster–something no ROI calculator will ever tell you–call the IT professionals at COMPANYNAME today at PHONENUMBER.

Categories
Casserly Consulting Blog

Know Your Tech: Wizard

kyt_wizard_400.jpg

At first glance, you might not think about computing when the term “wizard” pops up. However, there is a certain type of program that is used exclusively for the purpose of helping someone install something on their computer.

A Wizard’s Goal
Traditionally, a wizard has been represented by an old man with a beard, robes, and a pointy hat. They might cast spells or have mysterious powers that help guide a young hero on their quest. Ultimately, this is their purpose–to help a hero walk a path that they themselves cannot follow.

Not coincidentally, a wizard program on your computer serves a similar function. Like the mysterious figure Merlin mentoring the legendary King Arthur, or Gandalf the Gray aiding Frodo Baggins in his quest to destroy the One Ring, the wizard software is meant to help the user toward a certain goal. The goal can vary, but it’s usually something like installing or configuring a program on your computer, or perhaps running a scan of your PC.

Qualities of a Wizard
A software wizard will generally break down tasks into a step-by-step process that a user can easily follow. Each step will show up on a separate page. The wizard is designed in such a way that each step must be followed in the correct order before proceeding with the task at hand. Wizards will often use progress bars to show the user how much time they must invest in order to follow the process to completion.

Wizards these days go by different names, or their functionality has been absorbed by other programs on your computer. Some virtual assistants and office assistants work in much the same way, eliminating any need for wizards. However, it’s worth mentioning that wizards are so helpful that many applications and online forms emulate wizards to make things easier for the users–gone, but certainly not forgotten.

Be sure to subscribe for more great tech terms.

Categories
Casserly Consulting Blog

The Internet of Things Gives Great Power to Our Phones

iot_power_to_phone_400.jpg

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit – despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes – including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!