Categories
Casserly Consulting Blog

Microsoft OneNote May Be the Best Note-Taking Tool on the Market

one_note_benefits_400.jpg

Most modern PCs come pre-installed with a handy tool by Microsoft called OneNote (and it’s also included with Office 365). Today, we’ll run through the features that OneNote offers that make it a useful business tool.

Keep in mind, we’ll be focusing on OneNote 2016. Older versions of OneNote have some of the same features, but if you are running an older version of Office, you may want to consider upgrading.

Benefits of OneNote
OneNote was clearly designed with collaboration in mind, as you can save your Notebooks either to your local network drive, or to Microsoft’s OneDrive. You are able to share your Notebooks with others in your organization and work together, letting you collaborate on projects and share notes in the cloud.

While OneNote on its own isn’t the best word processor, spreadsheet app, or presentation software, it offers what can be described as the highlight reel of the other Office 365 applications. You can write, build simple tables, show charts and graphs, and even draw, but it won’t replace your other Office 365 applications.

Note Taking Capabilities
OneNote offers an impressive number of features that make it an excellent choice for quick note creation and organization. As you create a Notebook, you can divide it into tabs, and then divide those tabs into pages. OneNote also has premade templates for you to utilize, or you can create your own, to best arrange the particular information that note is to contain.

Of course, your notes can include more than just text. OneNote allows you to take clippings from web pages and insert them into your note. Another great thing about OneNote is you to pull text directly from images by right-clicking them, or search for text that appears in included images, with a considerably high level of success.

Plus, with the right equipment, OneNote supports handwritten note-taking, and is able to convert it into font-based text with good accuracy. The same can be said of its math function. By typing out or drawing a simple equation, the formula can be both converted to text and solved, as long as it was properly formatted. 

You can format your pages to suit your needs, and OneNote also offers a very handy feature that allows you to link content on one page to content elsewhere in OneNote for quick access. Finally, for added security, notes can be password protected, so if they are shared with someone they shouldn’t be, your data is still safe.

OneNote offers plenty of highly usable features to improve your business’ organization and collaboration. So, tell us, will you try it out in your company? Would you try it out for personal use? What do you use to stay organized? Let us know in the comments!

Categories
Uncategorized

Tip of the Week: How to Automatically Open a Windows App in Fullscreen

windows_apps_full_screen_400.jpg

If you’re a regular user of Windows applications, you’ll notice that they will, by default, open into smaller windows, allowing users to customize the size of their windows as need be. Usually, when you want to increase the size of the app, you have to click the maximize button in the top-right corner. However, you can save a little bit of time each time you do this by setting Windows to default to full-screen mode for this application.

First, you’ll want to pick the application, and find it’s shortcut on your desktop. When we say “shortcut,” we are referring to the little icons on your desktop that open a program, like Microsoft Word or your preferred Internet browser.

Select the app’s icon and right-click it. Go to the bottom of the dropdown menu and you’ll see Properties. Click it and you’ll open a Properties window, which will open up to the Shortcut tab.

You’re looking for the Run drop-down menu. It will be just a few selections down from the top of the tab. Currently, you’ll notice that it’s set to Normal window. However, if you click on the down arrow, you’ll be shown choices for Normal Window, Minimized, or Maximized. Click on Maximized, and whenever you open the program in the future, it will default to full screen mode. Once you’ve done this, click Apply to save the changes.

ib app full screen 1

While it might not seem like it saves a lot of time, it will certainly be more convenient. Just take a moment to optimize your settings now and you’ll save a lot of time and frustration in the future. To learn more about how to save time and optimize your business technology, subscribe to COMPANYNAME’s blog.

Categories
Uncategorized

You Can Now Generate Power By Literally Folding Laundry

new_feng_technology_400.jpg

Wouldn’t it be convenient if you could charge your smartphone just by walking down the street? How about turning your tie into a voice-recognizing security system? Michigan State University has been working toward creating some great new tech that makes these suggestions seem like real possibilities, in the form of a small device.

Nelson Sepulveda, an MSU Associate Professor of Electrical and Computer Engineering, along with his team, developed a device that can create power as it is bent or folded–which means it can be used as fabric for clothing. These devices are called biocompatible ferroelectret nanogenerators, or FENG.

Power is created by the device’s layers as energy is received through other sources; for example, the user’s physical motion. This allows for countless possibilities, including the ability to charge a device through only using FENG technology.

There are other ways that this technology can be used, including security applications. FENG material is very sensitive, so it could make it almost impossible to trick a voice recognition system. FENG could also be used as a speaker, adding to its versatility. In other words, it can work from both sides of the spectrum.

It’s also likely that FENG technology can be used to aid in discovering new ways to make technology more efficient for longer periods of time. This can help businesses achieve much more overall than they were previously able to, all without losing the ever-important battery charge. Read more about FENG here

What are your thoughts on FENG? Do you think that this will become a new standard for building new devices? Let us know in the comments, and be sure to subscribe to our blog for even more great business technology information.

Categories
Uncategorized

How the Convenience of The Internet of Things Can Come Back to Bite Us

internet_of_things_issues_400.jpg

While the Internet of Things has made many common tasks much easier through automation, it has also increased the potency of particular cybersecurity threats. For an excellent example, one only has to turn to the increasing prevalence of botnets that are powered by IoT technology.

An Overview of the IoT, and Why It’s Great For Botnets
If you wear a fitness tracker that automatically syncs to your phone, or have an Internet-connected security camera watching your house, you are utilizing the Internet of Things. Usually labelled as ‘connected’ or ‘smart,’ these devices collect data and process that data via a connection to the Internet.

While these devices have proven to be very useful, there is a major problem with them that seems to be present throughout the IoT: a noticeable lack of security measures. Combining this lack of security precautions with their need to connect to the Internet creates the ideal conditions for a botnet to gather.

A botnet pools the resources of a large network of infected devices to overcome the target’s security through a brute force attack. The attack on Dyn that made dozens of the web’s most popular sites go dark was a botnet, proving that this method of attack is no joke.

A New-ish Face on the Scene
While there is no shortage of botnets already, a new derivative of the infamous Mirai is using the same IP cameras to infect thousands of devices in China. This particular botnet has been named Persirai, and is just one of many that warrant concern.

For example, there is another botnet that Kaspersky Lab has concluded to have infected about 300,000 IoT devices. While this botnet, codenamed Hajime, is still dormant, it could potentially rival Mirai if it were to meet the expectations of security experts and become active.

Keeping Your Business Safe
Luckily, there are a few ways you can help to reduce the impact that a botnet can have on your business. A good rule of thumb is to follow business continuity best practices. As an example, your business data shouldn’t only be kept in one place. An offsite backup solution will allow you data to be preserved if you ever are assaulted by a botnet. It always helps to have a firewall solution in place as well, as they can mitigate some botnet attacks.

If you need help protecting your business against the vulnerabilities that the IoT creates, give us a call at COMPANYNAME. Call us at PHONENUMBER to get started.

Categories
Uncategorized

Tip of the Week: Options for Quieting a Noisy Computer

quietier_pc_400.jpg

How much noise does your work desktop make? Chances are that the majority of it comes from the fans. These fans are designed to cool down the systems while also maintaining an acceptable noise level. However, the longer your technology lasts, you might realize that these fans seem a bit louder than usual due to your machine needing more work from them to keep the innards cool.

It’s also worth noting that your PC might be caked in dust from years of use. With the dust blockading the fans, they’ll have to work a bit harder than before to get enough airflow, which means that they will create more noise. It’s certainly worth checking out if your computer has suddenly grown louder than you’re used to.

Unlike other fans that you might have in the office, computer fans don’t have settings that you can easily adjust. Furthermore, it’s unwise to mess with your PC fan speed in general, since it’s designed to keep your PC components at an optimal temperature. It might be a better move to just replace the noisy fans and upgrade to better, more quiet fans. Since fans are one of the few mechanical parts in most modern computers, they are the components that will show significant wear and tear, even if you take proper care of your computer.

Disclaimer: If you’re looking to replace your computer’s fans or do any work requiring you to open the case and swap out parts, then it’s highly recommended that you either know what you’re doing or have the assistance of an IT professional.

If you’re seriously contemplating changing out your fans, keep the following in mind:

  • A bigger fan will move more air at lower speeds, which makes for a quieter experience. Just make sure that your computer’s tower can accommodate it.
  • Look for fans that change their speeds to the amount of heat created by the PC. This keeps the fan’s noise levels to a minimum, even when it’s not being used as much.,
  • More powerful, high-end desktops require a lot of airflow. By these, we mean PCs dedicated to intensive tasks, such as gaming or video editing. These often have to use multiple fans, so there’s no way around that. However, a technician can probably install some sound-muffling foam to keep the noise to a minimum.

While your PC’s fans could be a major source of noise, there could be other problems associated with a loud computer. If you want to get to the root of the problem, reach out to COMPANYNAME for professional technology consultation and maintenance. To learn more, call us at PHONENUMBER.

Categories
Uncategorized

You Will Soon Be Able to Search the Web With Your Smartphone Camera, Thanks to Google Lens

innovative_google_lens_400.jpg

While many instances of augmented reality may seem gimmicky, Google is taking strides toward making AR a purposeful utility in our mobile devices. This was made apparent when Google’s CEO, Sundar Pichai, announced Google Lens.

Taking note of the online shift from text-based content to image/video-based content, Google is doing its best to improve the search engine’s ability to reflect that shift. Utilizing machine learning, Google Lens can view images that are either saved in the device’s memory or visible to its camera and complete tasks based on those images.

For example, Google Lens can:

  • Identify a species of flower that the camera is focused on.
  • Log into a WiFi network just by viewing the SSID sticker on the router.
  • Translate text that the camera is pointed towards into a different language.
  • Provide information and reviews on local restaurants, stores, and other establishments that the phone is pointed at.

When it’s launched, Google Lens will have the ability to interact with both the Google Assistant and Google Photos. Google Assistant will allow you to add an event to your calendar just by pointing your camera at an information board. Google Photos will allow the user to check details like opening and closing hours of a business. If you happen to have a screenshot of someone’s business card, you can call them directly from the image.

More Google apps will follow these two, providing users even more functionality.

So, what do you think? Do you see these features making your day-to-day business tasks and responsibilities easier? Which Google app do you most look forward to Google Lens augmenting? Let us know in the comments!

Categories
Technology

Advice for Passing Your Next IT Audit With Flying Colors

b2ap3_thumbnail_your_it_audit_400.jpg Most people think of audits and immediately cringe, but the fact of the matter is that businesses wanting to maximize output can really benefit from an audit. Audits can be great ways to ensure that a business’ priorities are being given their due attention, and that best practices are being utilized. An audit of your IT infrastructure and network can go a long way toward helping you determine if there are changes you need to make in order to maximize the profitability of your organization.

Here are three of the most common problems that our technicians find when conducting our comprehensive IT audits.

Outdated Software
It doesn’t matter if it’s the operating system on your workstations or the software on the servers, if you fail to apply critical updates and security patches to your operating systems, then your network will be vulnerable. This is a big red flag during any IT audit. Since outdated versions of software can become problematic for your integrated security protocols, by not properly updating your mission-critical software, you could be putting your business at significant risk.

An Absent Business Continuity Plan
As a part of a risk management strategy, any organization that doesn’t have a business continuity plan is ignoring the truth. The facts suggest that a disaster could happen at any moment, whether a company is ready or not. If you fail to prepare for a disaster, you’re staring failure in the face.

Poor or Lackluster Implementation
When it comes to regulatory compliance, COMPANYNAME will audit your internal processes, and analyze how they could be more efficient or secure. If you have outdated IT policies, they can end up costing you a lot more than a passing grade on an IT audit. If you haven’t properly tested your infrastructure, or if you’ve failed to deploy modern security best practices like multi-factor authentication, then your organization will perform poorly on an IT audit. Furthermore, if an auditor sees that your organization’s IT department splits responsibilities on a per-task basis, you’ll be more likely to score lower than if all IT resources understood how to perform every task necessary to their position.

These are only a few ways that your company could fail to perform as intended during an IT audit. If you want to ensure that your organization can pass your next audit, then you’ll want to ensure that your IT understands the importance of adhering to security best practices and industry standards.

Lastly, it is incredibly important that you remember that auditors aren’t the ones who are trying to sink your business. If anything, they are attempting to help you improve the way your organization operates. They are simply doing what your IT department should be doing in the first place by checking to see if you have unpatched or vulnerable systems, or aren’t adhering to best practices.

COMPANYNAME can help your business ensure its security by performing an IT audit. We can comb through your network for any potential issues and suggest ways to resolve them. To learn more, reach out to us at PHONENUMBER.

Categories
How To

Tip of the Week: Got a Solid State Drive? Here’s How to Take Care of It

b2ap3_thumbnail_ssd_better_than_hdd_400.jpg You may have purchased a solid state drive because of its many benefits over the hard disk drive. Although, if you want to get the most bang for your buck with a SSD, you’ll want to follow these best practices.

Install the Latest Operating System
Operating systems are updated periodically, but they are implemented with the idea in mind that more devices will be using a solid state drive compared to the normal hard disk drive. By upgrading to the latest operating system, you’re guaranteeing that your OS will be able to support your SSD.

Avoid Manipulating Data or Activating Wasteful Settings
An SSD can only rewrite data so many times before it’s unable to do so. While this limit isn’t low, the standard SSD can handle 40 GB of data writing every day for up to 10 years. Therefore, it’s a bad move to use your SSD to copy files or download data, as this puts unnecessary strain on the device. This means that you want to avoid the following features that your technology might be equipped with:

 

  • Benchmarking: While SSDs are fast to write data, it’s important to avoid running speed tests to see exactly how fast yours is. This will only shorten the lifespan of your drive, as it will use up valuable cycles that would be better used elsewhere.
  • Hibernation: Your computer can save system memory to the hard drive before it’s powered off. While this can help, you get back in business and resume operations quickly in the near future, it takes up more cycles on your SSD than you might prefer. Contrary to popular belief, putting your device to sleep and hibernation are two very different things, as letting your device sleep is much safer and more efficient for SSDs than for HDDs.
  • Defragging: When you defrag your device, it actively looks at the data to organize it on the mechanical level. While defragging improves the performance of HDDs, the benefits provided to SSDs aren’t noticeable, but the wear and tear might be if you proceed to perform them unnecessarily.

Be Mindful of Your Saves
The nature of SSDs make them more suitable for data storage of particular varieties. For example, it’s not recommended that SSDs be used to save large files, or the temporary files created by background processes. In these cases, it’s better to rely on a hard disk drive for saving this kind of data.

On the plus side, SSDs have a much longer lifespan than your typical HDD thanks to the many differences in their composition, including the use of flash storage and the lack of fast-moving internal parts. By keeping these best practices in mind, you can take a great technology and make it last even longer, allowing your business to experience fewer replacement costs overall.

Does your business rely on SSD or HDD? If you’d like a chance to improve the way your organization functions, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

b2ap3_thumbnail_windows_bugs_400.jpg When a security researcher tweeted about what they thought was “the worst Windows remote code exec” in his memory, a recent incident came to mind: one that allowed a targeted file to implement remote code execution processes in order to manipulate any infected system. This vulnerability let the infected machine spread the issue to others and could be set off if a certain file were to be scanned by the Microsoft Malware Protection Engine. Scary stuff!

Regarding the incident, Microsoft was quick to resolve the issue. Thankfully.

The researchers who uncovered this vulnerability were Tavis Ormandy and Natalie Silvanovich from the Google Project Zero team. Once the pair had discovered the vulnerability, they took to Twitter to announce it to the world, including to Microsoft and the Microsoft Security Response Center.

Upon the notification, the MSRC confirmed that the vulnerability was indeed present, and that there were quite a few pieces of software within the Microsoft Malware Protection Engine that allowed a “specially crafted file” to run code placed on the system. This vulnerability was so widespread that it could be found on just about any recent Windows machine, including those running Windows 7, 8.1, 10, and even Windows RT.

Though this particular problem has been resolved, its urgency serves to remind all business owners that their software solutions need to be up-to-date at all times. While problems are often resolved by programmers, hackers always try to outdo them, creating a vicious, neverending cycle. Unless you want your business to be caught in the crossfire, you should patch your software whenever new updates are released. If you try to function without them, you’ll be leaving your organization wide open to attacks–attacks that can easily be preventable with proactive maintenance.

Does your organization need this type of proactive maintenance and management? If you think that it’s a hassle to keep an eye out for updates, you’re right. You shouldn’t have to worry about this, especially not while keeping your operations afloat. COMPANYNAME can provide the IT you need by taking care of these updates for you so you can stay focused on running your business. To learn more, reach out to us at PHONENUMBER.

Categories
Cloud

Can Your Cloud Provider Provide a Personal Touch?

b2ap3_thumbnail_private_cloud_is_best_400.jpg Cloud technology has become an integral part of doing business today. This has led to a need for, and subsequent availability of, cloud services from a variety of sources to be able to meet the needs of a business. These services aren’t all created equally, however, and as a result, the source of cloud services is a critical consideration to take into account when choosing a provider.

The vast majority of these public cloud services come from one of two sources. First, there are cloud solutions that are provided by the well-known, multinational technology companies. These cloud services include the likes of Google Drive, Microsoft OneDrive, and Dropbox, to name a few. Alternatively, there is also the prospect of utilizing hosted solutions that are delivered through a managed service provider.

Consider the service that one could expect to receive from a big box solution provider. While the products are excellent, it is extremely unlikely that–should you ever require support–these providers will offer the in-depth insight and dedicated attention to resolve your issue efficiently and effectively. After all, chances are slim that these providers would feel much impact from losing one client thanks to their size and scope. Therefore, major providers will almost certainly be considerably less involved in providing the attention that your business would benefit from. What’s more, since these providers have to serve the lowest common denominator, there is the chance that the cloud solutions they have available simply aren’t suited to meet your business’ specific needs.

This is not the case when it comes to what a managed service provider can deliver.

When an MSP offers a cloud solution, that offer is made with the promise of personalized service and attentiveness to the needs of their clients. With the more personal business relationship that is formed between you and the MSP, their services are more focused upon providing you with a solution that fits your needs, instead of the one-size-fits-most approach that larger firms and corporations take. The MSP will always be there if you ever need assistance in managing your cloud solution, and is willing to help you optimize your service level so that you will receive the attention and resources that you need,,, without breaking the bank on a service package filled with things you don’t.

If you’d rather your cloud computing experience be one that is personally handled by a resource that’s invested in your business and its success, reach out to COMPANYNAME. Give us a call at PHONENUMBER.