Blog

Work from Anywhere Using Microsoft Office 365 Apps

Have you ever been in a position where you are supposed to work on an assignment or important document but you forgot your laptop or cannot access your desktop? That can be frustrating, but thanks to Microsoft, as long as you can access the internet on your phone or even tablet, you can easily resume working on your assignment. Microsoft 365 is an excellent business tool that provides you with lots of options when trying to access a saved document on another device.

A closer look at Microsoft Office 365

Office 365 is Microsoft’s global offering designed to provide users with access to the company’s top-of-the-line cloud-based tools for collaboration and productivity. The service is complete with web conferencing and high definition (HD) video, calendars, business-class email, online Microsoft office suite, as well as file storage and sharing.

When you stay connected to the Microsoft Cloud, you can be sure that all programs are up-to-date and available for users on a 24/7 basis. Below is a simple outline of just a few of the Microsoft 365 apps that enable us to work from any location or device.

Using Outlook App on your phone to work on the go

When you open your Outlook Application, you will see a calendar function, a file function, and a mail function. When you tap on the calendar function, you can see how similar it is to the one that is on the desktop, which means it will be easy for you to use. The files function will help you view all recently accessed documents on OneDrive and even some of the recently shared files—very convenient!

When accessing the mail function, this is where you are able to see all files, documents, and links shared with you. You can also share a file via OneDrive.

Accessing information shared via a link

Simply click on the link and it will open into SharePoint, which will allow you to view the file. If you need to edit the file, open it in the word App and as soon as you start editing, anyone who has access to the file will see your edits right away. Such an incredible feature! This is great because, after editing, you don’t have to keep sending final copies of the same document to everyone on your team. Documents are updated in real time, which is a real time saver!

Accessing the same information on different devices

It’s frustrating to lose devices such as phones, tablets, and even your laptop. If you travel a lot, you may even damage your laptop or phone. Though this can be expensive, it’s also devastating to lose important documents. Retrieving data from a damaged phone or computer usually requires an IT expert. Data retrieval used to be such an expensive ordeal and sometimes unsuccessful. The good news is that on Microsoft 365 you don’t have to worry if you find yourself in any of the above predicaments. Here is a simple outline of how you can access your information from any device.

Open any browser and type the words office.com, then log in. A page will come up with various Microsoft 365 Applications such as Word, Excel, Outlook, and services such as OneDrive. Click on the OneDrive service, which will immediately take you to all files located on OneDrive. You will then be able to access all files that have been saved to OneDrive.

These files are all live so this means that any changes made, such as editing by anyone on your team, will be there. You can view, share, or edit these files. Let’s say you wish to edit a file that you recently shared with someone. Just open that file and you will see an editing option on the top right. You can do all your editing in the browser. This works with all files including Word, Excel, PowerPoint, and other Microsoft applications. All updates will immediately show up on any shared documents.

There are so many other noteworthy features in Microsoft 365 that can help make your work easier. If you want to learn more about these helpful features, just visit this page: www.Microsoft.ca/GetItDone

Wrap Up

Losing or damaging your phone or laptop is always stressful, but you don’t have to lose any of your important documents when you work with Microsoft 365. You may be home sick for a few days, but you don’t necessarily have to get behind on your projects. It’s possible to work from anywhere using any device with Microsoft’s helpful range of products.

Remember that you can work from home and even share updates in real-time with your colleagues. As long as documents are stored to Microsoft’s OneDrive, they’ll always be right at your fingertips. That’s the epitome of convenience!

 

Microsoft Office 365

Work from Anywhere Using Microsoft Office 365 Apps Read More »

How to Use Keyboard Shortcuts in Quickbooks Pro

Quickbooks offers users at every level, an enterprise-grade accounting program to track income and expenses. This software package was designed to enable businesses to track financial expenditures and income with the level of detail necessary for complete control of company finances. It is somewhat like a soft copy of accounting book. Some people may find it a bit hard to navigate using the mouse or the navigation pad of a computer while working on a given document. The good news is that there are alternatives to achieving the same results by using the keyboard.

Tune into our free Quickbooks Training
CLICK HERE

You may find that your mouse gets lost under a heap of paperwork. Wireless mice are great for today’s busy professionals but they often fall off a table and land in the floor. You may have urgent financial reports due and need a quick fix for these issues. You don’t need to worry because there’s a way to get your accounting work done using some keyboard shortcuts.

Below are a few Control key combinations to make your work not only easier but more efficient while working in QuickBooks Online:

To do this in QuickBooks: Press these keys together:
View a list of Shortcuts CTRL + ALT +?
Create an Invoice CTRL+ ALT + I
Create a check CTRL + ALT + W
Enter an expense CTRL + ALT + X
Open the Customer list CTRL + ALT + C
Open the Vendor list CTRL + ALT + V
Open the Help window CTRL + ALT + H
Find transactions CTRL+ ALT + F
Save and go to a new transaction CTRL+ ALT + S
To close any window Click Esc
Create an Invoice CTRL+ I
Create a check CTRL + W
Display Help in context F1
Open the Customer list CTRL + J
Find the History of any transaction CTRL +H (with transaction open)
Open the Memorized transaction list CTRL+T
Find Transactions CTRL+F
Delete Transactions or list Items CTRL+D
Create new list item CTRL+N (with list open)

Some of these shortcuts will work differently when using various browsers as explained below.

To open the second window in:

Internet Express: Press Ctrl + N (You will be logged into existing company on both windows.)

Firefox: Press Ctrl + N (You won’t be logged into the second window, but will remain logged into the first one. The second window will allow you to log into the existing company so that you may work using both screens.)

Chrome: Press Ctrl + N (If you go to QBO in that window, you will be logged into the existing company.)

Split Your Screen

There is a way to split your screen by using shortcut keys on your keyboard. This allows you to have all your information on one page for easy reference while working. Just press the windows key and the left arrow for the screen you want on the left, plus the windows key and the right arrow for the screen you want to appear on the right side. If you want to resume normal screen view, simply press the windows key and the up arrow.

Duplicate Your Screen Tabs

Press the Alt+D to copy the address then press Alt+Enter to open a new tab with the URL. All you need to remember is to keep your thumb on the Alt key. Press Alt key down and then hit D and Enter almost simultaneously in order to duplicate the current tab. This works almost like magic! You get to open your tab twice instead of going back to the browser.

Sending Reminders

You can send invoices reminding clients to pay their bills using your QuickBooks Online and the Navigation Bar. Select Overdue Invoices to view and then finally click on the Send Reminders. You can even track the sent invoices and learn whether the client has viewed them. This also allows you to see how many times the customer has viewed them and whether they have ever viewed your email. If not, you may want to check to make sure you have the right email address for this customer.

Choose items in drop-down lists:

  • Press Tab until you reach the field.
  • Press Alt + down arrow to open the list.
  • Press up arrow or down arrow to move through the items in the list.
  • Press Tab to select the item you want and move to the next field.

If you don’t want to open the whole list, but just want to scroll through the items in the text box, press Ctrl + down arrow or Ctrl + up arrow.

Wrap up

Using Shortcuts in QuickBooks Online can be less time consuming because navigating through your accounting books is much easier when you use simple clicks on your keyboard. Plus, you never have to search around under a table for your mouse again. Shortcuts are a quick, easy method of accomplishing any task. That can help you shave valuable time off your workday so you can get home a bit faster and who doesn’t like the sound of that?

Quickbooks Training

How to Use Keyboard Shortcuts in Quickbooks Pro Read More »

Resolving Complexity: Office 365 Updates That Are Taking User Experience to New Heights

Many people usually turn to Microsoft’s online productivity suite, Office 365 because of the apparent breadth and depth of its features, which allow them to accomplish what they are unable to do with other similar products on the market.

However, the business environment is always changing and organizations increasingly put a premium on agility, as staying competitive means being able to do more with less. Time is increasingly more valuable as well. Organizations need technology that requires very little training to reduce onboarding expenses for new employees.

With this understanding, Microsoft is rolling out updates to its Office 365 and the Office.com environment to simplify tasks and take the user experience to a higher level. Once this rollout is complete, users will be able to enjoy a much better experience across Word, Excel, PowerPoint, OneNote, as well as Outlook.

While these user experience updates are set to roll out slowly over the next couple of months, many of them are already available for Office.com users to experiment with. Microsoft has deployed new designs to a select customer group. These will be released in phases and carefully tested, so the tech giant can learn as they go.

A user centric approach

According to Microsoft, every change they are making on the user experience is focused on three key things: incorporating customer input, considering the context under which the feature will be best and most easily applied, and giving people control over their experience.

It is actually because of this user-centered approach that Microsoft is rolling out these updates gradually to allow room for incorporating the new feedback they obtain from customers during the process.

Shadow and depth on Office

As you scroll over the items on Office.com, you will notice that they pull forward with shadow and depth. This is because Microsoft is bringing its Fluent Design system to the web and to Office 365.

More importantly, Microsoft has rebuilt Office on a modern platform to be much faster and far more efficient than ever. So you’ll notice that every item you tap, such as a Word document, opens much faster than ever.

Simplified ribbon

Once you open your document, you’ll notice an updated, simplified, and better version of the ribbon. The new ribbon design will help users focus on their work and collaborate with others in a more natural and informal way.

For those who prefer to dedicate more screen space to showing commands, there is the option to expand the ribbon into the classic three-line view. This option will continue to be available to users so that everyone can choose the experience they prefer.

The simplified ribbon is first rolling out on the web version of Word. It will then become available to select consumers on Office.com and to Select Insiders in Outlook for Windows later on in July.

The simplified ribbon will not be available on Word, Excel, and PowerPoint for Windows yet. Microsoft intends to gather enough feedback from a broader set of users before implementing any changes that could disrupt people’s work. Upon rolling out the ribbon on these products however, users will still be able to revert back to the classic version of the ribbon with just a single click.

New animations

As part of the Fluent Design system, the ribbon has been improved with new animations. The user experience is improved with better speed and velocity to improve the overall look and feel. All these have been designed to be inclusive and accessible so that the user experience is streamlined.

New icons and color in the right places

Along with the new animations, users will enjoy a fresh array of new colors and icons. These will help people find the commands they’re looking for more easily. These new features were developed as scalable graphics. They render with precision on any screen size or type.

Users will be able to see the new icons and colors first in the web version of Word for Office.com. Select Insiders will see these new features in Word, Excel, and PowerPoint for Windows in late June. The new icons and colors will then roll out to Outlook for Windows in July, and ultimately to Outlook for Mac in August.

Personalized intelligent Search

Microsoft is also rolling out a new personalized, intelligent Search feature across its products. This will provide access to commands, content, and people in a more enhanced manner. This feature makes suggestions on actions you can take, the content you may be looking for, and people that you may want to connect with – all based on your past work patterns. For those who love Office 365 and even for those who may not yet be fans, these new updates promise a world-full of new possibilities.

All you have to do is place your cursor in the search box and all these recommendations powered by machine learning and the Microsoft Graph will show up.

This experience is already available to commercial users in SharePoint Online, Office.com, and the Outlook mobile app. Commercial users of Outlook on the web will also start seeing this experience in action in August.

Wrap up

These updates are a sign of Microsoft’s commitment to making its products more useful to its customers. Against this backdrop, we can expect nothing but the best user experience from these products as the tech giant continues to roll out innovative modifications.

Microsoft Office

Resolving Complexity: Office 365 Updates That Are Taking User Experience to New Heights Read More »

Hmmmmm…What Is Yam Jam?

Yam Jam – The Virtual Town Hall Experience That Brings Your Organization Together

If you are an avid user of Office 365 or have in some way expressed interest in Microsoft’s online environment, then you’re probably familiar with Yammer – the freemium enterprise social networking service that is used for private communication within organizations.

Yam Jam

Also, chances are that you have come across terms such as “Yammer Town Hall,” “Yammer Power Hour,” or “Yammer Time.”  They all refer to the same thing: Yam Jam.

What is Yam Jam?

This is simply a digital meetup on the Yammer network. It provides a unique space for real-time Yammer discussions where people can exchange ideas and learn from one another. One of its strong points is that an organization’s employees have the opportunity to break the typical organizational chain of command and interact directly with senior leaders alongside fellow staff.

As such, you can look at Yam Jam as a curated virtual town hall event that is held within a designated group in the Yammer network.

Attendees within Yam Jam get the rare opportunity to interact directly with subject matter experts, company leaders, or executives as well as with one another (fellow employees). Anyone can participate in Yam Jam because it is actually an open environment on the network. They can ask questions related to the topic of discussion, learn from the experts, and share ideas with one another.

Every Yam Jam event typically lasts about an hour but they continue on after the live event is finished, which is the best part. This makes global engagement much easier and more inclusive, which can be extremely helpful for organizations with remote staff. It brings them together regardless of where they are on the planet. Yam Jam events are also scalable and measurable, in addition to being low cost and focused.

The fun thing about Yam Jam

Yam Jam is not restricted to a single shape and size. The type of event you hold on this network is determined by your specific need. There is also the option to @mention someone on the Yam Jam environment so that they get notified about an ongoing event that they can benefit from.

Thinking about hosting a Yam Jam? Here’s why you should

There’s so much your organization stands to gain from hosting Yam Jam. For starters, the events enable your employees to engage with multiple participants on Yammer, which can promote the culture of cooperation.

Participants on Yam Jam share ideas and insights with one another and receive valuable information that they can use to better their performance and productivity of the organization overall.

More importantly, Yam Jam is a means for the employees to break hierarchy and interact directly with company leadership. Participants can not only gain richer insights from subject matter experts but also get a chance to address pressing matters with the company leadership and reach solutions that may benefit them and the organization as well.

Employees can build a great deal of confidence in their senior leadership from interacting in the Yammer Town Hall. Leaders also get a good opportunity to interact directly with practitioners in a way that helps them remain connected to the massive pool of talent within the organization.

Yam Jam best practices to ensure you make the most of your events

One interesting thing about Yam Jam is that they are rather easy to organize or set up; anyone can do it. To host a successful Yam Jam, here are some tips to ensure you have your best foot forward.

Ensure your participants are Yammer savvy

Yam Jam participants need to have sufficient Yammer knowledge to effectively participate in any event on the platform. As such, it will help to do some due diligence beforehand to be certain that your team or the audience you’re targeting is well-versed on the network. Otherwise, consider offering a Yammer training session before taking the plunge.

Choose an appropriate time and topic

Participants are bound to contribute properly if the time is right and the discussion involves pertinent topics or ones with varying viewpoints. The time is right when the participants are in a position to take part. As such, it is best to consider time zones and days of the week when jobs and other similar engagements are not likely to stand in the way.

Advertise the event properly

People easily forget schedules, so it is important that you keep them properly informed about the event and the exact time, date, and topic of discussion so everyone can prepare appropriately. Remember, the more engaged the participants are, the more interaction the event is likely to achieve. The more interactive the event, the more likely it is to be productive.

Wrap up

Yam Jam can be hugely beneficial to any organization that seeks to improve and become more productive, especially if they provide participants with a proper feedback loop, or means to give feedback at the end of the live event. If you haven’t tried it yet, then no time is better than the present.

Hmmmmm…What Is Yam Jam? Read More »

Sensitive Data Stolen From Naval Contractor By Chinese Hackers

Officials recently revealed that a data breach occurred involving a Navy Contractor where hackers working for the Chinese government gained access to highly sensitive data regarding submarine warfare. Included in the breach were top secret plans for the design of a supersonic anti-ship missile system that was to be used in U.S. submarines by the year 2020.

US Navy Data Breach

American officials have confirmed that these breaches occurred in January and February of 2018, but would say very little else about the breach, citing the secret nature of the stolen plans. An investigation into what happened and exactly how the breach occurred is ongoing and the government is reluctant to speak of the incident while the investigation unfolds.

Though the naval contractor was not identified, U.S. officials confirmed that he worked for the Naval Undersea Warfare Center. This military organization is located in Newport, R.I. They conduct research on underwater weaponry and develop weapons specifically for submarines.

The Sea Dragon Project

The stolen data consisted of 614 gigabytes of information closely related to a project called Sea Dragon. In addition, radio room materials related to cryptographic systems were stolen along with, signaling and sensor data. The Washington Post has obtained more detailed information about this breach but, at the request of the U.S. Navy, they have agreed not to publish those facts. The military believes releasing these documents could further harm national security and put other military projects in jeopardy.

One of the more alarming details of the breach was that this naval contractor had highly sensitive information about Sea Dragon stored on his personal computer and phone. These devices did not have the necessary security protocols for storage of classified government documents. The contractor was using a normal unclassified network for his phone and computer despite knowing that the information he was privy to was of top-secret nature. Charges may be filed against the individual for not taking basic steps to secure the data and following NIST guidelines.

Problems with Naval Contractors

This incident has sparked highly-charged discussions about the Navy’s ability to properly oversee its vast network of contractors. Many of these people have access to the designs for America’s latest weaponry. Loss of these plans and blueprints could result in a devastating effect on America’s military capabilities.

Last week, the inspector general’s office at the Pentagon confirmed that Jim Mattis, Defense Secretary, was currently reviewing the handling of all military contractors. Mattis and his team will investigate whether there are other blatant cybersecurity issues that could possibly leak classified information to the Russians, Chinese, or North Koreans.

The Navy, working in conjunction with the FBI, is currently leading the investigation into what happened.

The naval spokesman, Cmdr. Bill Speaks, commented saying, “There are measures in place that require companies to notify the government when a ‘cyber incident’ has occurred that has actual or potential adverse effects on their networks that contain controlled unclassified information.” He added that “It would be inappropriate to discuss further details at this time.” The FBI has declined to comment.

Is the Sea Dragon Project Sunk?

Little is known about the Sea Dragon project, except that the project was designed to provide a “disruptive offensive capability” by “integrating an existing weapon system with an existing Navy platform.” In addition, the Pentagon said that the project has to date, cost over $300 million. The Navy had plans to begin underwater testing as early as September of 2018, but those plans will now most likely be placed on hold.

Military experts believe that China will now be able to develop technology that will render the Sea Dragon project ineffective. There is some speculation that other weaponry projects could also be compromised.

The government has set in place an extensive array of security protocols and guidelines to ensure that events like this do not happen.

According to the Nist.gov website:

All Department of Defense (DoD) contractors that process, store or transmit Controlled Unclassified Information (CUI) must meet the Defense Federal Acquisition Regulation Supplement (DFARS) minimum security standards by December 31, 2017, or risk losing their DoD contracts.[1]

Stopping Hackers in their Tracks

DFARS regulations were created to stop cyber breaches like Sea Dragon from taking place. All government contractors and sub-contractors are required to use high-level security protocols anytime they store, process or transmit sensitive government data.

According to a study done by IBM in 2014[2], human error is involved in as many as 95 percent of all data breaches. Cyber breaches are successful because hackers prey on human weaknesses. Most commonly, hackers lure an unsuspecting victim into giving access to the cyber thief believing him to be a legitimate person or company. Hackers are able to sell the information they obtain on the Dark Web.

Many governments around the world now employ a staff of hackers who work continuously to steal data from large companies, individuals, hospitals, various government organizations, non-profits and many others. The stolen information will fetch a high price on the Dark Web. In the case of Sea Dragon, the data loss could place an advanced Naval weapons systems into the hands of the Chinese.

[1] https://www.nist.gov/mep/cybersecurity-resources-manufacturers/dfars800-171-compliance

[2] https://securityintelligence.com/the-role-of-human-error-in-successful-security-attacks/

Sensitive Data Stolen From Naval Contractor By Chinese Hackers Read More »

Northcentral Technical College in Wisconsin Targeted by Cyber Thieves

Northcentral Technical College (NTC) in Wisconsin has experienced a crippling cyber attack that shut down most of its classes from Monday through Wednesday. The cyber attack triggered system outages all over the school causing school officials to issue a public notice on the homepage of the college website that read:

“We apologize for the inconvenience but we are continuing to experience IT system outages. NTC’s Information Technology team is working diligently to bring information systems back online. We will continue to post updates to this page as they are available.”

Cyber Threats

Cyber forensics investigation underway

The college would not release any specific information about the data that was lost, but they did reassure their students and faculty that no one’s personal data was stolen. They have since hired a cyber forensics team who will perform a thorough investigation of the cyber intrusion. School officials want to know what type of information was targeted and whether any data was lost or compromised.

Marketing and public relations director, Kelsi Seubert, commented saying, “NTC’s Information Technology team is working extremely hard to bring information systems back online and we will communicate additional updates to students and staff as they are available.”

Seubert also sent an email out to students and faculty that reassured everyone that an investigation was underway but would require some time to complete. She also mentioned that the initial attempted hack occurred on June 4th.

The school has stated that all classes will be resumed on Thursday and that campus life would soon return to normal. A few classes that were not impacted by the breach were carried out as usual.

Summer school

The summer class schedule had just begun on Monday with students showing up to take advantage of Northcentral’s summer learning programs. The school offers a unique array of subjects ranging from technical diplomas to Information Technology training. Students can take summer courses to get additional credits so they can graduate sooner, or they can catch up on classes they may have missed.

The school has a flexible curriculum that includes virtual educational opportunities, online classes, late-start classes, winter enrollments, and many others. They offer associate’s degrees, certifications, and technical diplomas. In the accelerated credits program, students can get three credits in three weeks by taking augmented versions of the class.

Cyber breaches on the rise

Security breaches and cyber-attacks have become common in the news. Though it seems like everyone should know by now what it takes to prevent them, cyber thieves are escalating their tactics with each new attack.

In over 90 percent of these events, human error is to blame. A school official or teacher may have inadvertently clicked on a suspicious link. The latest phishing attacks include emails that look almost identical to what you might get from a bank or credit card company. Often, the email will say that something is wrong with your account. Cybercriminals use fear to gain access to your personal log-in information. An email might say something like:

“Alert! You have been locked out of your ABC Credit Card account due to suspicious activity. Click the link below to sign in and change your password.”

Once you click that link, you may be redirected to a phony website where the hackers will steal your password and username. Now they have legitimate access to your credit card account. They can go online and buy the merchandise having it shipped to an address overseas.

In this situation, never click on the link that’s embedded in the email. Instead, open a fresh page in your browser and navigate to your credit card account the way you normally would. Log in and check your messages. In most cases, there’s absolutely nothing wrong with the account; it was just a ruse to get you, the consumer, to give away your password and username to cyber thieves on the other side of the world.

Third party vendors

Colleges and schools do business with a wide number of third-party vendors. If these vendors have access to any of your important data, then they should be thoroughly vetted in advance. Though a school or business cannot control the activities of third-party vendors, it’s important to make every effort to ensure that they are observing stringent security regulations.

Faculty training

All school faculty should attend regular security meetings to learn about the latest cyber threats and how to avoid them. Training employees and teachers have proven to reduce the number of cyber breaches. Training should include facts about how security breaches occur and what to do to stop them. Faculty should understand the difference between ransomware and malware. They should be familiar with the many types of phishing and spear phishing attacks. These are just a few of the many ways an organization can protect itself against cyber- attacks.

Northcentral Technical College life returning to normal

Though school administrators have reassured everyone that no financial, personal, or confidential information was stolen, the investigation into what happened is only just beginning. It often takes months for an organization to realize the full extent of a cyber-breach. It can be years before the true cost of the security breach is fully understood.

Northcentral Technical College located in Wausau, Wisconsin, is a community college and member of 16 schools in the Wisconsin Technical College System.

Northcentral Technical College in Wisconsin Targeted by Cyber Thieves Read More »

Psst… Do You Want to Know a Secret?

Amazon’s Alexa Has Some Answers to Questions You Probably Don’t Even Know to Ask.

Amazon Alexa Commands

Alexa is a top-selling gadget for Amazon, and the list of things it can do is ever increasing. Most people who use Amazon Alexa ask the same things over and over -but this virtual assistant can answer a lot of questions you’d never think of. Plus, with new “Skills” (commands) being added all the time, you’ll wonder how you ever got along without it.

But first, a little about Alexa for those of you who aren’t familiar with its capabilities.

Alexa is the cloud-based brain behind the Echo speaker. It’s a “virtual assistant” capable of voice interaction. You can ask Alexa to make to-do lists, set alarms, stream podcasts, play audiobooks and music, and provide other real-time info like weather, traffic, and news. Alexa can also control smart devices in your home if you install the Skills for them. However, unlike mobile-based virtual assistants like Apple’s Siri, Alexa is a dedicated, in-home device.

Here’s a basic list of what Alexa can do.

  • Answer questions: Alexa can find facts for you, calculate mathematics, look up terms, make conversions or even tell a joke.
  • Report the latest headlines and sports news: It can give you a brief about what’s in the news with audio clips that go along with it.
  • Let you know about the current traffic or what the weather will be: Alexa can read the latest weather forecast in your area, or in other locations, plus it can inform you about the most recent traffic accidents or incidents that may slow down your commute.
  • Stream music: Just ask Alexa to play your favorite album in your Amazon Prime Music Library. Alexa can also access music services like Pandora and Spotify, iHeartRadio and TuneIn.
  • Set an alarm: You can ask Alexa to set a recurring alarm to wake you up in the morning or let you know when the chicken in the oven is done based on your commands.
  • Control your smart home devices: Alexa is compatible with devices like Philips Hue and Lifx smart bulbs, Belkin WeMo smart switches, Internet-connected thermostats like the Ecobee3 and the Emerson Sensi, and home platforms like Wink, Insteon, and SmartThings.
  • Order products from Amazon: Order anything you would via your computer online such as household items you typically reorder. Alexa can even track your orders.

Now that you’ve got the basics covered, here are some fun questions you can ask Alexa.

(Remember to say “Alexa” before you ask the question.)

Education and Trivia

Whether you’re curious about when Napoleon was born, how to translate a term from Spanish to English or if you want a trivia fact, Alexa can inform you. Here are some fun questions to ask:

  • How do you say where’s the bathroom in [language]?
  • How long is the Appalachian Trail?
  • What’s the closest airport to [location]?
  • What time is it in [city]?
  • What is the capital of [state or country]?
  • How high is Mt. Everest?
  • How old is the oldest person alive today?
  • What’s the meaning of life?
  • What day will the 4th of July be on in the year 2025?
  • What is the mass of Pluto in grams?

 Travel

  • What’s the weather going to be in New York City this weekend?
  • What time is Delta flight 162 landing in Atlanta?
  • What time is it in Paris?

Conversions

  • How many liters are in a gallon?
  • How many ounces in a pound?
  • What is the conversion rate between the US dollar and Canadian dollar?

Sports

  • What is the latest medal count from the Winter Olympics?
  • Who had the best batting average last season?
  • What are last season’s standings for the NFL?
  • Who’s winning the [team’s] baseball game today?
  • When does [team] play next?

Cooking

  • What temperature should I cook the turkey at?
  • Start a timer for 30 minutes for the biscuits.
  • How many calories are in a Golden Delicious apple?
  • How many minutes are left on my timer?
  • How many ounces are in 3 cups?
  • How many tablespoons are in 1 cup?

Everyday Needs

  • Is the [store] pharmacy in [city] open right now?
  • What are the hours for [business]?
  • How far away is the Walmart in [city]?
  • What time does [restaurant] open?
  • Find my phone. Call [number].
  • Buy paper towels on Amazon.
  • Add milk to my shopping list.

Weather Details

  • Will it snow today?
  • How many inches of snow will we get today?
  • What will the weather be like on Friday?
  • What is the weather in Boulder, Colorado today?
  • How many inches of rain did we get in [city] yesterday?

Party Time

  • Play Happy Birthday.
  • Play light rock.
  • Play [album].
  • Play country music.

Silly Stuff

Alexa’s easter-egg commands will make you laugh.

  • Sneeze
  • Beam me up
  • High five
  • Play rock scissors, paper.
  • Tell me a Star Trek joke.

These are just some of the things Alexa can do with its built-in commands. You can enable so much more by adding Skills to Alexa. For example, you can download a Skill from Domino’s Pizza, so Alexa can order a pizza with your favorite toppings. Or, download an Uber Skill, so you can ask Alexa to schedule a pick up for you. Download an app from Capital One, and Alexa can help you with financial management. You can also use the Alexa app on your smartphone to download additional Skills. Alexa can handle over 15,000 Skills, and the list is growing all the time.

Most are free to enable. Just go to Amazon and look under Alexa Skills to find them. Here are some that may interest you:

Cooking, Food and Drink: All Recipes, Save the Food, Bartender, Ingredient Sub, Anova Precision Cooker, Beer Calculator, Meat Thermometer, Best Recipes, Meal Idea

Fitness: 7-Minute Workout, 5-Minute Plant Workout, Fitbit, Track by Nutritionix, Guided Meditation

Entertainment: Radio Mystery, Short Bedtime Story, This Day in History, Valossa Movie Finder, Jeopardy

Finance: Capital One, Opening Bell, TD Ameritrade, Cryptocurrency Flash Briefing

Productivity: Giant Spoon (marketing), Quick Events (calendar)

Weather: Big Sky, Feels Like, Fast Weather

Travel: Kayak, Uber, Lyft, Airport Security Line Wait Times

Skills for Kids: Sesame Street, The SpongeBob Challenge, Amazon Storytime, NASA Mars, 1-2-3 Math, Word of the Day, This Day in History

Skills for Seniors: Senior Portal, VoiceFriend, EngAGE Workout, AARP Now News

It’s a good idea to check regularly to see what’s new with Amazon’s Alexa because she’s getting smarter all the time!

Psst… Do You Want to Know a Secret? Read More »

Microsoft Reveals Innovative Features for Its New Outlook 2018

The new features in Outlook are designed to help users save time and be more productive. Since we spend so much time writing and answering emails, this is one area where most of us would love to be able to get done faster. Microsoft designed Outlook with lots of thought and effort. In addition, they add exciting features every year or so. They do plenty of solid research when designing all their products because they believe in finding out what users are asking for and providing that.

Microsoft Outlook 2018

Intuitive design

You can see the planning that went into developing this version of Outlook. Most people will pick up how the new features are used pretty quickly though since this version is similar-looking to older ones. All Office 365 products share a similar look and feel in their design. The Ribbon contains many of the same features whether you’re using Word, Powerpoint, or Outlook.

Outlook’s new design is so streamlined that the new features transform the way you connect to your people and technology. It will infuse power into every productivity task. It comes with better security to ward off hackers. Keeping your email safe and secure is an important job. Today’s software programs and apps must contain higher level security features in order to address the growing number of data breaches going on all over the world. Microsoft does a good job of incorporating better security measures than many other companies.

There are a lot more new things to see and do in the new Outlook 2018. It can be configured to give users the convenience they’re looking for in an email program. Once you learn the ins and outs of the program, you can fly through otherwise boring tasks.

Below, we check out 5 of the coolest new features in Outlook. They should help you get your work done each day with time to spare.

  • Multiple time zones

Traveling around the world? Trying to sync appointments with people on various continents? Whether you’re just flying to Chicago or going to Tanzania, you can configure Outlook to set up meetings based on whatever time zone you choose. Appointment times will sync up depending on where everyone is. Each person is given the meeting time in their own time zone so no one will be late for the meeting. This is a super convenient feature that everyone will appreciate since the business world is now a global affair.

It’s easy to set this feature up. Open the Windows version of Outlook, then add an event by selecting File > Options > Calendar Time Zones. Now choose the option, “Show a second-time-zone.” If you’re using Outlook on the web, you should click on the drop-down arrow called “Time Zone.” This item can be found in your Calendar. If using a Mac, you can add extra time zones by navigating to Outlook > Preferences > Calendar Time Zones. With a little practice, you can become a pro at setting up various meetings with customers and team members around the world.

  • RSVP

Invite the whole crew to a picnic at the lake. After all, fun outdoor events are a good way to build camaraderie. Outlook makes it easy to send invitations, whether it’s a party, picnic, big meeting with the boss or just a lunch date. RSVP keeps track of who is coming (Tracking Option) and whether RSVP’s have been replied to. You’ll get reminders about the event based on how you set it up. You can get daily or weekly reminders. This feature is offered for both the meeting organizer and attendees.

  • Office Lens for Android

This is a really simple but helpful feature that lets you integrate the Microsoft Office Lens into your Outlook email program. It only works for Android though. It’s easy to use but very useful. Simply open an email that you want to send to someone. Next, tap the photo icon while creating your message. Now you can take a pic of anything and embed it in the document. You might want to include a photo of a colleague sitting across from you. You could snap a photo of a whiteboard or even a document. Outlook optimizes the photo, then embeds it into your email. There are countless uses for this handy feature.

  • BCC warning

We’ve all accidentally sent emails to the wrong person. Sometimes, it can be quite embarrassing. This is often the case if you get “BCC’d” on an email and decide to reply. Often people use BCC because they do not want the other people included in the email to know that a specific person got a copy of it. In the new Outlook, if you should hit “Reply All” to an email where you were BCC’d, you will get a warning message. It may say something like, “You were bcc’d on this email. Are you sure you want to reply to all?” We all need someone around to double check our actions from time to time and this feature might save you some embarrassment one day.

  • Bill-pay reminders

What if an email program could remind you when bills are due? Wouldn’t that be convenient? Outlook has the ability to identify the bills in your inbox, then put together a summary of them each day. This will appear at the top of your email when you first turn it on. Two days before the due date for each bill, you’ll get a reminder. The email program automatically adds an event to your calendar for the actual day the bill is due. Now there’s no excuse for forgetting to pay the light bill.

Conclusion

Outlook has many more really helpful features designed to make your life a little easier. Once you learn all the tips and tricks, you’ll cut time off your work day and get things done more efficiently. If you’d like to learn more about the new Outlook 2018 features, please visit this article.

Microsoft Reveals Innovative Features for Its New Outlook 2018 Read More »

What Are Code Signing SSL Certificates and Why Use Them?

The concept of Code Signing SSL Certificates includes protecting users against phony software and assuring that the software is not infected with a virus. Most reputable companies require this certificate before accepting a product and using it. In today’s world, it’s the safest method of guaranteeing that software has not been altered or compromised.

Code Signing

Types of Code Signing SSL Certificates

There are several types of Code Signing SSL Certificates. The Business Validation SSL certificate requires that the software manufacturer or developer provide verification documents to the Certificate Authority. Once these documents are submitted, it can take three days for approval. This approval guarantees the authenticity of the digital program.

Code Signing SSL Certificates for Individuals are used less, though still important. If an individual programmer creates an app or software product and wants to include a Code Signing SSL Certificate, then the programmer must provide documents that prove his/her identity.  The Certificate Authorities check to make sure this person is who he says and that he is the author of the digital work.

What is a Code Signing SSL Certificate?

This certificate is a way for the programmer to digitally sign his or her work. An authentic Code Signing SSL Certificate includes a company or individual’s name, their signature, and often a timestamp, though this is not required. With this certificate, end users can feel confident that the program will work as promised.  SSL Certificates are used on software programs, applications, script, code, and drivers.

Improving Internet Security

Security on the World Wide Web has become an important commodity. There are phishing attacks launched daily. Along with that, ransomware has become quite prevalent. Attackers lock your computer files then demand a ransom be paid, usually in Bitcoin. Add to that so many computer viruses and worms hid within suspicious links that it’s difficult to keep up today.

In spite of the great amount of publicity about these attacks, many are successful due to a poorly educated public. Most users admit they sometimes click on links or visit sites they probably shouldn’t. It’s human to think that bad things only happen to other people.

Large reputable companies like Microsoft simply can’t take chances with their security or risk exposing end users to harm. The cost in both time and money would be too great; not to mention the damage to their reputation. That makes the Code Signing SSL Certificate very critical to businesses with a strong reputation to protect.

With this certificate, we can be assured of two important elements:

  • Content Source Authentication — ensures the developer’s code legitimacy
  • Content Integrity — verifies that the code is authentic and has not been tampered with

How to view the SSL Certificate

To authenticate a software program, click on the certificate that has been issued. You should be able to view the publisher’s name. There may be other information such as the timestamp. If it isn’t there, then the software originates from an “Unknown Publisher”. It may or may not be authentic. It could contain spyware, ransomware, malware, or other viruses. In some cases, thieves download authentic-looking programs onto your computer with a dangerous script running in the background. These lines of code can allow the Software Pirate to steal passwords and/or personal information.

How do Code Signing SSL Certificates work?

Just like other SSL Certificates, the Code Signing Certificate is created based on the public-private key pair. Though a key pair is related mathematically, the private key can only be decrypted by its original owner. Public keys are made available to anyone with access to the public repository. If you have a message that you only want one person to be able to read, this can be done using a private key. It always remains confidential and private to its respective owner.

This history of Cryptography

The concept of cryptography began as early as 1874 when William Stanley Jevons wrote a book called The Principles of Science. In it, he described various ways of creating a message that could only be read by the intended party. His theory was to produce a long random number that could only be known by one other person. For years, various mathematicians worked on the idea until 1970 when a British cryptographer working for the UK government came up with what he called, “non-secret encryption”.

Cryptographers and scientists saw the important applications for military use. Being able to send messages that the enemy could not read became a vital function of national security for all governments. Though this type of cryptography is still used today, it’s more common usage now is to protect software programs from alteration.

Why are SSL Certificates necessary?

When an application or program does not have a Code Signing SSL Certificate, any programmer can go into it and change lines of code however they want. This leaves everyone vulnerable. Maybe the programmer improved the software but maybe he added a Trojan worm.  Individuals and especially companies have a lot at risk and simply cannot afford to download malware or ransomware that would lock up all their files.

Reputable software manufacturers want to ensure that their products are free from tampering and the Code Signing SSL Certificate makes alteration impossible. It’s the perfect way to let users know that the software or app is authentic.

The process of creating a Code Signing SSL Certificate

There are multiple steps required in the process of creating the Code Signing SSL Certificate. The process begins with the actual code signing itself. This confirms the identity of the person or company that created the software. The steps are briefly outlined below:

  1. The software developer requests a Code Signing SSL Certificate.
  2. The identity of the developer is certified.
  3. A special Code Signing program is used to attach the SSL certificate to the software as a digital signature.
  4. The developer can now send the program out to publishers.
  5. Publishers double check to make sure the digital signature is authentic.
  6. A time stamp is often entered so that the certificate doesn’t expire.

Conclusion

Once you have a Code Signing SSL Certificate, you can assure users that it’s safe to use and contains no viruses or malware. Big publishers often require these certificates so they can use this as a selling point when reselling the software or app to end users. Many people will not buy a piece of software if it does not have this certificate.

What Are Code Signing SSL Certificates and Why Use Them? Read More »

THE 7 C’S OF COMMUNICATION

From the word go, the term communication indicates that there is more than one party involved in the conversation. For there to be effective communication, both parties must understand what the other is saying. Communication in business is somewhat different from casual communication, say among friends. In business, the stakes are higher. Much more is involved and there is much more to lose, therefore, it is important that the communication is as effective as possible.

Effective Communications

There are certain rules that need to be followed for communication to be effective. These have been summarized as the 7C’s and are believed to guide communication especially in business. The 7C’s of communication is meant to inform people who do not know much about the rules of communication. Below, we discuss the 7C’s of good business communications.

  • Conciseness

First of all, communication needs to be concise. Conciseness simply means that you get to the point. Communication in business that does not convey to the other party exactly what the person is saying can be frustrating. It not only wastes time but can also lead to mistakes when the information conveyed is not understood. For this purpose, it is important that the message is conveyed in a concise manner. Of course, don’t be abrupt or rude, but be sure that you make your point. In today’s fast-moving world, business people appreciate it when you say what you mean and don’t leave listeners wondering.

  • Completeness

The message communicated needs to be complete. Do not assume that the person you are talking to will fill in the blanks or read between the lines. Ensure that before the conversation comes to an end, the person you are talking to has understood you completely. It is common knowledge that different people react in various ways to information that is presented to them. In addition, each person’s level and speed of understanding varies. Leaving people to complete information for themselves opens up the material being conveyed to misinterpretation. Depending on the level of communication, mistakes that arise as a result of incomplete information being passed can end up being quite costly to the business.

  • Clarity

Always remember that clarity is key. Imagine a situation in which you need an employee to make certain purchases for your business. You give the employee the instructions, focusing mainly on the exact items to be purchased, the quantities needed, and the budget. The employee when making the purchases, however, ends up purchasing the wrong items or the wrong quantity. Can you imagine the impact that this would have on your business? This is just one of the reasons why there needs to be clarity on the information being passed. Say exactly what you mean, exactly how you mean it.

  • Consideration

Keep in mind, whenever you are communicating with someone else that the other party is a human being with needs, feelings, life experiences, and certain biases. Knowing your audience is important if you are going to communicate effectively. Whether you know your audience or not, however, strive to be thoughtful in all your communications. Consider the other person’s feelings, their beliefs, their culture, and their biases. This can ensure that the message you are conveying is not received in a negative light. If possible, ensure that the message resonates well with your client.

  • Correctness

Correctness means that the message you are delivering must be accurate. Do not rely on fake news sources, for example, to inform the information passed. Instead, verify the facts before communicating with others. This will maintain your credibility with the other party and increase their trust in you. Secondly, the correctness of information reduces the chance of misleading information being passed on to others. This, in turn, protects you from liability for misrepresentation. Even large news organizations report incorrect information nowadays. Though this can temporarily improve their ratings, it also tarnishes their reputation. People will always return to the most reliable news source at the end of the day.

  • Confidence

First impressions are everything. They matter a lot. First impressions dictate how your audience will receive the piece of information that you are attempting to pass on to them. A good communicator is confident. This inspires confidence in listeners. A poised speaker is more likely to be received in a positive light. Their message will be regarded as important.

  • Conversational

Communication that is conversational is important for both parties. Such communication ensures that no one is left out and that, at the end of the day, the ideas of both parties are taken into consideration. Conversational communication prompts both parties to listen well and respond appropriately. It can prevent misunderstandings.

Final thoughts

Good communication is an important part of the business. Business owners who communicate well are often more successful than those who don’t. They’re more respected in the community and more likely to build healthy, long-standing relationships. The art of being a good communicator is something that comes naturally to a few people but it can be taught. And, it’s well worth the time and effort to learn this trait. Especially, if you’re planning on being in business for a long time.

THE 7 C’S OF COMMUNICATION Read More »