Blog

November 5th, 2014

iPad_Nov03_AWhen it comes to releasing new products, Apple usually holds a massive press event where developers talk about the device and then unveil it to a generally enthusiastic crowd. This happened with the release of the iPhone 6 and 6 Plus, but in mid-October the company quietly introduced two new versions of the iPad. If you, like many others, missed this release, here is an overview of the latest two versions of the iPad.

The iPad mini 3

First up is the third version of Apple's smaller iPad - the iPad mini 3. The immediately noticeable changes with this year's device is the home button. It now has the metal ring right around it which enables the Touch ID feature so that you can unlock your device using your fingerprint.

Touch ID also enables users to pay for items using the Apple Pay feature that has just been released. Sadly, for the iPad mini 3, this is limited only to in-app and iTunes purchases as there is no NFC chip in the device to enable it to work with in-store terminals.

Aside from a slightly changed exterior and the extra Apple Pay related features, the device is more or less exactly the same as the iPad mini 2. It still boasts a 7.9 inch retina display and the same A7 processor found in the mini 2.

The major difference is that you can purchase the mini 3 with 64 GB or 128 GB of storage, which is not available for the mini 2. Unfortunately, the price of the device starts at USD 100 more (USD 399 for the 16 GB version) than the mini 2, which costs USD 299 for the 16 GB version. In other words you are paying USD 100 for the fingerprint unlock and semi-functional Apple Pay.

At this time, Apple has noted they will continue to sell the mini 2, which for many businesses will remain the better deal largely because it is less expensive yet offers exactly the same hardware and size.

The iPad Air 2

As the name implies, the iPad Air 2 is the second version of the popular iPad Air which was introduced last year. As with the mini 3, the Air 2 has seen a slight change to the home button with the introduction of the Touch ID feature that allows users to unlock their devices using their fingerprint.

The new version also enables the Apple Pay feature so users can use their fingerprint to approve purchases. Sadly, there is no NFC chip in the device, so you won't be able to use the device to make purchases at stores.

Beyond this, there are a number of interesting changes that many business users will find useful including:

  • A faster processor - With what Apple calls the A8X processor, the iPad Air 2 is one of the fastest and most powerful tablets on the market. Users have already noted faster website loading times and better overall responsiveness, especially when running graphics intensive apps.
  • A thinner, more mobile body - Apple reduced thickness with the iPad Air 2, making it thinner than any other iPad. At 6.1 mm, you will be able to use the device all day without it feeling awkward in your hand.
  • A less reflective display - While the displays on the iPad have always been top of the line, there have been complaints in the past about how the glass on the device is a bit too reflective. With the Air 2, a less reflective display is being used which supposedly cuts glare down by as much as 56%. This means you will be able to see what is on the screen more easily in more locations and situations.
  • The Apple Sim - For users in certain countries like the US and UK, the cellular version of the iPad comes with what is called the Apple Sim. This sim card is universal in that it allows you to connect to the mobile network of your choice without having to switch cards. This also makes switching networks and plans much easier.
If you are considering picking up the iPad Air 2, the 16 GB Wi-Fi only version starts at USD 499. If you would like to learn more about how these devices can be used in your office, contact us today to learn more.
Published with permission from TechAdvisory.org. Source.

Topic iPad
November 5th, 2014

AndroidTablet_Nov03_AWith the impending release of the new Nexus and other tablets, all of which will be running the latest version of Android, there is a good chance many businesses will be integrating these tablets. As with any new version of a mobile operating system, there are new security features introduced. Android 5.0 is no different; in fact, there are three new security features business users can benefit from.

1. Smart Lock

One of the first steps to ensuring that your Android device is secure is to put a lock code on the screen. Adding a pin code, or pattern code, to your device makes it more difficult for someone else to gain physical access. On the downside, constantly entering the code can be annoying, especially if you need access to your device on a regular basis.

In an earlier version of Android, the ability to use your face to unlock your device was introduced, but it hasn't really been all that popular. With Android 5.0, Google has introduced a feature called Smart Lock.

This feature uses either NFC, Bluetooth, or your face to unlock your device. Essentially, you pair your device with another device and when it is in range it will automatically unlock. For example, you can pair your computer with your phone via bluetooth. When your phone is near your computer, it unlocks and allows you access without having to enter the pin. If you prefer to use your face to unlock your device, this feature has now been improved and moved to be part of Smart Lock.

2. Automatic encryption from first boot

As businesses continue to integrate tablets and other devices, the amount of data stored on these devices increases. As a result, you eventually end up with important data on your device that you need to keep secure. One of the best ways to do this is to encrypt your device.

On older versions of Android, device security was fairly complicated when not automatic. Now, any device running Android 5.0 is automatically encrypted when the device is started up for the first time.

This encryption will ensure that the data on the device is secure from the start, something which many business users will likely find quite useful.

3. SELinux

SELinux, or Security Enhanced Linux, is a security model implemented in Android last year which is configured to help minimize security threats. All developers must include SELinux enforced security on their apps. What this has done is increased the overall security of apps installed on devices and reduced the number of vulnerabilities that could compromise device security.

For most users, the updated requirements and measures introduced by Android Lollipop will lead to increased overall device security from the apps through to other features.

If you are looking to learn more about the latest Android release features get in touch with us today.

Published with permission from TechAdvisory.org. Source.

November 4th, 2014

Office365_Nov03_AOffice 365 for business is unique in many ways; one being that many plans come with full versions of Office 2013 that you can install on your computer. All plans come with Office Web Apps (OWA), a Web-based version of popular Office apps like Word and Excel. One thing you need to know before signing up for an Office 365 plan is whether you will actually need this to include Office 2013 or whether OWA will be sufficient. Here are five questions to help you decide.

1. Am I comfortable doing all, or most of my work in a browser?

Because Office Web Apps is browser-based, you will be spending a fair amount of time in your browser. Many of those who have switched to OWA have found that it takes time to get used to working with the system. Because of the way many of us work, you will start to see multiple windows and tabs open with different documents which could lead to increased confusion and more time finding the tab and window you need.

What's more, you will need to ensure that all browsers on all computers in your company are kept up-to-date if you want to use OWA. For example, older versions of Internet Explorer may not support OWA. This means you will need to spend time ensuring that everyone within the business is updating when necessary.

To get around this, you can work with a company like us who can ensure that browser activity is not only secure, but also up-to-date, which basically guarantees OWA will work when you need it to.

If, however, you are not comfortable using your browser for everything, then it may be a good idea to go for an Office 365 plan that includes the full version of Office 2013.

2. Am I going to collaborate on files with users both in and outside of the organization?

Many business tasks are real team efforts, where users need to collaborate on documents. While this is possibly with any Office program, one of the biggest weaknesses of traditional Office installs is version control.

If you have shared one document with a number of different users you will quickly find that the changes they make and send back to you are likely going to need to be manually added back into the original document. This takes time and can lead to confusion, errors, and a lack of productivity.

With OWA, any document you create is stored on your OneDrive account and can be easily shared with other users. When the document is opened, all changes are made directly to the main document in real time. This means each user can see the changes show up as they are being made, which increases the effectiveness of collaboration.

Of course, this is possible with almost all Office 365 plans - especially if you also integrate SharePoint, but OWA offers by far the easiest solution to collaboration. So, if you collaborate a lot, then OWA may be a better version of Office to use. That being said, if you just need a few people to edit documents or offer comments, then Office 365 plans with Office 2013 will usually be the better option.

3. Will I need to format documents, or need advanced features?

The Web-based versions of Office offer many of the key features found in the desktop versions. However, some advanced features, like in-dept formatting, adding charts, etc. are not currently available with OWA.

While many users find OWA is enough to meet their day-to-day document production needs, those who use the advanced features of each Office app will be better off with Office 365 plans that offer full installs of Office 2013.

4. Will I need more Office apps than just the core five?

Currently, OWA apps available to users are: Word, Excel, PowerPoint, OneNote, and Lync. These five major apps cover the majority of document production needs for most users, however, if you require other Office apps, like Access, or Publisher, that aren't included in OWA, then you will be better off going with an Office 365 plan that offers Office 2013.

5. Will I be constantly connected to the Internet?

In order to get the most out of OWA you will need to have a strong and constant Internet connection. While you can create documents offline, you will need to connect in order to save and update them. If you spend a lot of time out of the office, this may be a real inconvenience, especially if you often struggle to find a solid Internet connection.

What we recommend is talking to an Office 365 vendor like us. We can explain the different Office 365 plans in depth and how you can integrate them into your office. Contact us today to learn more.

Published with permission from TechAdvisory.org. Source.

November 4th, 2014

GoogleApps_Nov03_AWhen it comes to the security of online systems, every security expert is quick to agree that two-step verification is a much stronger way to secure your accounts, especially when compared to using just a password. In fact, many suggest that if it is offered by an online platform, you should enable it. Google does indeed offer two-step verification and has even introduced a new way to secure your accounts using a USB key.

Google and two-step verification

In order to further secure your Google account, beyond a difficult-to-guess password, your main option is two-step verification. The way this works for Google accounts is you need to provide a cellphone number for your account. When you try to log in you are either called or sent an SMS with a code to enter. Alternatively, you can download the Google Code generator which generates a code which you then need to enter when logging into your accounts.

While this works well when you have your mobile device with you, or when you are near the phone number linked to your account, it doesn't work so well when you aren't. In order to make things a little easier, Google has introduced a new two-step verification method that utilizes a special kind of USB key.

Two-step verification via USB key

Take a look around your desk, chances are high that you probably have a USB key or USB storage device within easy reach. While it would be cool to be able to use one of these to log into your account, you can't use just any USB key. Instead, you need to use one that is FIDO Universal 2nd Factor (U2F) compliant.

If you have one of these keys, once configured, you can stick it into one of your computer's USB ports and press a button. The coding on the stick will then talk to Google servers, sending cryptographic code back and forth, thereby unlocking your account.

This guarantees two things: Firstly, that you are logging in using two-factor verification and are therefore you; and secondly, that the Google site you are logging into is actually Google and not a malicious or fake site. Essentially, this further increases your overall account security.

A few caveats

While these security measures are a good idea in practice, there are a few caveats regarding this authentication method:
  1. You have to buy your own key, which costs anywhere from USD 15 and up.
  2. It will only work with Google Chrome and Chrome OS. This means that if you are trying to log into your account on another browser, or a mobile device, it won't work.
If you are worried about account security, then using a USB key like this could be a good idea, and if you are looking to learn more about implementing this method and ensuring all of your accounts are secure, contact us today.
Published with permission from TechAdvisory.org. Source.

October 31st, 2014

Security_Oct27_AOne of the biggest business technology trends of the past half decade or more is the increasing amount of business that is conducted online. These days, many businesses have integrated online solutions into daily operations and have reaped the benefits. The downside to this is the on-going threat to online security. With an ever-increasing number of online attacks, it is important that you take steps to ensure that you remain secure. Here are five tips on how to maintain security while working on, or browsing, the net.

1. Use two-factor authentication whenever possible

Two-factor authentication, or two-step authentication as it is also known, is the idea of using two pieces of information to log into accounts: Your usual password and a code that is usually sent to a mobile device or generated by a code generator.

By utilizing this safety feature, you can further increase the security of your accounts, largely because the chances of someone getting their hands on both the generated code and your password are slim.

Some sites don't use a code and instead ask a question that needs to be answered every time you log in. If this is the case, make the question something that is difficult for a hacker to guess. For example, use your address from 10 years ago instead of your current address.

2. Audit who has access to what data

Between all of your online accounts and social media profiles you will likely be surprised at just how much information about you can be found online. There are a multitude of scare stories online, where someone has had their accounts hacked and identity stolen, largely because they had left pertinent information online without even thinking about it.

It is a good idea to audit what information you have online. This includes looking at the contact and personal information you have on social media profiles, account information, etc. Ideally, if it is not necessary information, then it shouldn't be shared. As for social media profiles, make sure only the absolute basic personal information is online and limit who can see this information.

3. Watch what is posted on social media

Because of the nature of social media, we often feel the need to share our whole lives online. This can often lead to oversharing, and even sometimes oversharing of personal information. There are stories online of thieves monitoring social media for businesses posting about how they are going to be closed for a holiday, with all staff gone. Once a thief finds this information, they then break into the business without worrying about people being there.

If you are going to share information online, be sure to limit the potentially sensitive information that you post, especially if the content is shared with the public.

4. Change your passwords regularly

It seems like almost every week news breaks of a password or account information breach. What this translates to is the fact that your accounts are always facing a potential risk. Therefore, you should make it a habit to change your passwords on a regular basis.

Most experts recommend at least once every three months, but if there is a breach where your account information may have been leaked then naturally change your passwords straightaway.

To ensure maximum security, you should use a different password for each account, and keep these as separate as possible.

5. Work with an IT partner who can offer enhanced Internet security

Ensuring that your business is secure online can be an on-going battle that you will likely not win easily. One of the best steps to take is to work with an IT partner like us. We offer a variety of Internet security solutions that can help stop malware intrusions before they infect your systems, block access to potentially harmful sites, and even scan Internet-based email solutions. In other words, we can help improve your overall online security.

If you are looking to learn more about how we can help your business be secure online, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
October 30th, 2014

eyeball

Many business owners and managers we work with wait FAR too long to have us check and update their computer network’s health and security. Unless we are actively performing regular daily/weekly/monthly maintenance, a nasty virus, malicious hacker, unexpected software corruption, hardware failure or dozens of other problems could catch you off guard and result in extensive downtime, data loss and expensive data recovery efforts.

That’s because many businesses do not perform regular maintenance on their network and therefore are overlooking many serious threats that are increasing all the time. At some point, disaster strikes and they find themselves in a real mess, with a network down and employees sitting idle, waiting to get back to work.

By then the damage is done, and it can cost thousands of dollars to get the network back to normal, if that’s even possible. What saddens me even more is the fact that almost every one of these costly disasters could have easily been prevented if someone had checked their network’s security and health to remove these threats on a regular basis.

No More Excuses! Our Free Network Checkup Will “Exorcise”
The Demons Hiding In Your Computer Network

From now until November 7th, we’re offering a FREE Network Checkup ($697 value) so that you have no excuse for not making sure your computer network is safe and sound. Schedule your FREE Network Checkup to “see” if you are truly safe from spyware, viruses, hackers and other SPOOKY disasters by calling our office at 317-522-4099 or fill out the form below and we will call to schedule an appointment.

Schedule your FREE Assessment
  1. required
  2. required
  3. email required
  4. required
 

cforms contact form by delicious:days

October 30th, 2014

Hardware_Oct27_AFollow any tech blog for a couple of months and it quickly becomes apparent that there are new devices, systems, and hardware introduced on a near daily basis. Because of this, it can be tempting to feel pressure to rush out and upgrade your hardware on a regular basis. As a small business this can be prohibitively expensive. The problem is, how do you really know when it's time to upgrade your systems? Here are five tips that could help.

1. Replacement parts are difficult to find

Computers, servers, and even mobile devices are made up of a number of different parts of hardware that rely on other parts in order to operate properly. If one breaks down, there is a good chance that the whole system will stop working.

Luckily, for many newer pieces of hardware and systems, replacements are easy to come by. But, if something breaks and you are having trouble finding replacement parts then it might be a good idea to consider upgrading. The reason for this is because parts that are more difficult to find are usually going to cost more when you can actually find them. While this may be ok for one system, if you have more than one system using the same components there is a good chance that these will also need to be replaced, leading to increased costs.

2. Repair costs outweigh replacement costs

Some hardware components can only be repaired by experts with highly specialized skills. What this means is that should this hardware break, you will likely be facing a fairly high repair bill. What we recommend is to always get a quote on how much it will cost to repair your broken hardware first.

When you have this quote, look at the price of replacement components. If it's more affordable to replace, then this is usually a better option. Of course, you are going to want to ensure that any replacement parts are actually compatible with your system, so before you go purchasing be sure to ask check with your IT partner.

3. You are running 'legacy' systems

Legacy systems are computers and technology deemed to be old by experts. For example, computers running Windows XP, or computers purchased before the release of Windows 7 would be considered legacy systems.

While these may be working like a charm now, they will eventually break. When this happens, you will see higher repair costs when compared with new technology. Beyond replacement costs is the fact that many manufacturers and software developers have stopped supporting older systems. This means that should an error occur, you will not necessarily be able to get support from the company who made the hardware. This can lead to repair delays and lost productivity.

Now, not every "old" system will need to be replaced right away. What we recommend is talking to an IT partner like us. We can help you determine if your older systems do actually need to be replaced, and suggest affordable alternatives.

4. Hardware is impeding productivity

If you or your employees are struggling to complete work because of constant computer crashes, or slow systems, productivity will be lower than it could be. Should you notice this in your office, it is a good idea to look into upgrading your systems in order to enable employees to do their jobs properly.

5. Your systems don't meet minimum requirements

If you are going to install new software or systems that require other hardware components, be sure to look at the minimum requirements. Almost every piece of software indicates which requirements must be met in order for the software to work.

If your systems don't meet these minimum requirements, then the software won't work. Should they meet them, but just barely, the software will work but there is a good chance that it won't work as well as it could do. Should you not meet the requirements, you will need to upgrade your hardware.

Looking to upgrade, or for some advice on how you can keep your systems working? Contact us today to learn more about our services and how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
October 29th, 2014

BCP_Oct27_AWhen it comes to business continuity plans, many companies need technology in order to support their plan and systems such as backups and recovery. While this technology may be in place to support current continuity needs, there will come a time when this needs to be upgraded. The issue is how to know when an upgrade is really necessary? Here are five tips that can help you determine this.

1. New technology and systems offer increased resilience

When it comes to continuity and the systems supporting it, businesses need to ensure that they are resilient. This means implementing hardened systems that will remain working in adverse environments; systems like UPS (uninterruptible power supplies), etc., so that should a disaster occur services will still be available.

Beyond this, it is a good idea to implement systems that can be switched from one location to another quickly and easily. A good example of this is implementing cloud storage and backup which can be recovered to other systems with minimal fuss.

Technology that increases the resilience of your systems and continuity plans is worth implementing.

2. Enhanced data protection and availability

During and after a disaster, it is vital that businesses have access to their data. If your data is not protected in an efficient manner, or easily accessible once it has been backed up, you could see a decrease in business effectiveness and delays in fully recovering.

Technology or systems that enhance data protection and availability over your existing systems are worth including in an upgrade, so that you can benefit from data being available when you need it most.

3. Systems offering increased communication

Communication during and after a disaster is crucially important if your business is to survive and recover full operations. When a company faces disaster, communication networks need to be strong and available at any time. So, if you can find systems that enhance the ease and effectiveness of your communications then these could be worthwhile upgrading to.

4. New technology is available to simplify plan development and auditing

If you have developed a continuity plan in the past, you know that it can be a time consuming task. While essential, many business owners do not have the necessary time to commit to this. This is where systems and technology can help.

A system that makes the auditing and development of plans easier may be worth including in an update.

5. Technology that decreases costs

With businesses operating on narrower margins, many business owners want systems to keep costs low or at the very least ensure costs don't rise. If the systems you are looking at have been proven to reduce operating costs, then it may be a good idea to consider them.

It is important however to not integrate technology simply to save money. You should aim for solutions that are affordable, but that will also offer these worthwhile benefits and more.

We recommend talking to us to find out how we can help you find the services and technology your business needs to ensure your business continuity is not only working but will also deliver when you need it.

Published with permission from TechAdvisory.org. Source.

October 29th, 2014

OSX_Oct27_AIn mid-October, Apple released the much anticipated next version of their popular operating system OS X. This year's version of OS X is named after America's most popular National Park, Yosemite. This latest version, like many before it, sees a number of new changes introduced. Here is an overview of the major changes incorporated in Yosemite.

Upgrading to Yosemite

The good news about Yosemite is that Apple has made this a free upgrade for users with compatible Macs. You can get it by going to the Apple Store on your Mac, and logging in using your Apple account. For businesses, we strongly recommend contacting us before you do this as we can help back up your systems and install the update so that your systems will work perfectly.

A new look for OS X

Last year Apple released a drastic redesign of their popular mobile operating system - iOS. This redesign brought about a modern look to the system with translucent menus and a clean, semi-transparent design. Apple has brought this style of design to Yosemite.

When you first start up Yosemite you will notice that bars like the launch bar at the bottom are translucent. Many icons have also been updated with clean and consistent design and menus have been somewhat flattened, making them easier to read.

Overall, the new look makes systems running this version of OS X easier to look at, while modernizing them and bringing them more in line with other Apple systems.

Enhanced continuity between devices

Apple has noted before that they are striving to bring their desktop OS and mobile OS closer together, eventually reaching a point where they are more or less one and the same. With Yosemite, they make a big jump forward by introducing a number of mobile and desktop features. One of the most useful being Handoff which allows users to start a task on their iPad or iPhone and continue this on their laptop, or vice versa.

Instant Hotspot is another feature that allows users to instantly share their iPhone's data connection with their desktop - no need to enter a password as the system uses iCloud to ensure that the connection is secure.

If you have an iPhone that is running iOS 8 and a laptop or desktop with Yosemite installed, and connected to the same Wi-Fi network, you will be able to answer calls to your iPhone from your computer, or even send and answer text messages via the Messages app on any device.

Improved AirDrop

AirDrop is a feature that Apple has been trying to get working properly for a number of years now. When it works, it works really well, but with the last update to iOS 7 and OS X Mavericks, it simply didn't work when you needed to transfer files from your phone to your computer.

Yosemite fixes this, as this version of AirDrop now has the same protocols as the mobile versions, so you can swap files between devices on the same Wi-Fi network.

Notifications Center

This feature has been updated to make it much more useful, mainly due to the introduction of the Today view. Similar to the view introduced in iOS 8, this shows you, at a quick glance, useful information for the day. By default you can see your calendar, stocks, weather, etc.

There is also support for widgets. Because Apple has enabled this, software developers can now create widgets that can be placed in the Today view of the Notifications Center. This is similar to the new feature that was introduced with iOS 8, and can be accessed by swiping four fingers from the left of the track-pad to the right on your laptop, or pressing the bulleted icon at the top-left of your menu bar.

Improved Spotlight

While Spotlight has long been a feature of OS X, it has been updated in Yosemite. Now, instead of just searching for files on your computer it can also search for applications. You can also use it to search the Web, so when you enter a term you see results from pages like Wikipedia, the Apple Store, iTunes, and more.

As in other versions of OS X, you can access Spotlight by hitting Command + Spacebar. You then see a search bar pop up in the middle of your screen. Simply type what you are looking for and a window will drop down with results.

These are just a few of the new features that business users will benefit from when they upgrade to Yosemite. If you would like to learn more, please contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Apple Mac OS
October 28th, 2014

Web_Oct27_AFor many businesses the cloud has become a driving factor that supports numerous technical systems. These systems have been proven to reduce costs, increase productivity, and ensure security of vital data. However, there are still a large number of cloud related terms that can confuse. To help, here is an overview of 10 commonly used cloud terms.

1. Cloud app

A cloud app, or cloud application, is any application that is supported by a cloud service, or is accessed over the Internet. The key difference from other apps is that the vast majority of cloud apps are not installed on a device, rather they are accessed via a Web browser.

Some mobile apps are cloud-based, whereby an app is installed on the device and allows you to access data that is stored in the cloud.

2. Cloud burst

Cloud burst is a term used to reference a specific setup that many companies employ. Essentially, this is the idea of implementing a private cloud solution that provides for most usage requirements. When demand exceeds capacity, the company can integrate a public solution to cover the excess demand thereby "bursting" into another cloud.

A good example of this is when a company uses a private cloud solution to store data. When the threshold for maximum data storage is reached, they can implement a public cloud solution to increase overall storage. All essential information stays in a private cloud, while non-essential information is moved to the public cloud.

3. Cloud

The cloud is any service or solution that is delivered to a user via their Internet or network connection. To many, this term has come to be associated with the Internet.

4. Cloud management

Cloud management is often used to refer to a set of software or administrative panels that are specifically designed to allow business managers, owners, and IT teams to monitor and manage their cloud-based solutions. This often includes data, applications, and cloud services.

These tools are of strategic importance because they help to ensure that your cloud resources are functioning optimally and that users are able to interact with them properly. They also allow you to audit who has access to what and even add new accounts when needed.

5. Cloud provisioning

Cloud provisioning is the actual deployment of a cloud strategy. This often includes the selection of solutions and then which data and solutions will reside on either public or private clouds. Services are then deployed and data is migrated, usually with the help of an IT partner.

During the provisioning process, IT partners will also take the time to develop processes regarding how you will interface with the cloud solutions you will be implementing and set who has access to solutions.

6. Cloud storming

Cloud storming is the act of connecting multiple cloud services into a useable platform for your business. Some companies also use this term to refer to the idea of brainstorming about the cloud and how to use, or implement, it in daily operations.

A good example of cloud storming is where a company implements a cloud-based CRM solution from one provider, a cloud-based productivity suite, and cloud-based email at roughly the same time in order to better support operations while reducing operating costs.

8. Public cloud

Public cloud services and solutions are just that: public. They are available for any person or company to purchase or subscribe to and implement. With these services, all data or apps are hosted outside of the company and accessed over the usual Internet connections.

Public cloud services are usually the most common type of cloud implemented by companies who are first moving over to the cloud.

8. Private cloud

A private cloud is any cloud solution that is hosted by a company's own resources. This could be on servers kept on-site, or rented servers that are then configured so that the solution is only available to the company, not the public.

While mainly large companies will employ private clouds, smaller companies looking for a niche cloud solution are starting to implement these as well.

9. Hybrid cloud

A hybrid cloud is a solution implemented by companies that has elements of both public and private cloud solutions. Essential data or business processes are hosted or delivered by a company's own cloud service, while less essential services are delivered by public clouds.

Many larger companies employ this model of cloud computing for data storage as it allows them greater control over where their data is being stored, while ensuring that essential or highly regulated data can be stored in a secure manner; managed by the company.

10. Cloud portability

This is the level at which data maintained or stored in one cloud service can be moved to another. It is also used by experts when moving whole systems, such as apps, from one provider to another. If the overall portability is low, then it will be difficult for the user to move either apps or data from that provider.

Another similar term used by experts is 'Vendor lock-in', which is used to describe a dependency on a certain cloud provider and the general difficulty of moving away from this provider due to lack of other solutions or mechanisms that enable transfer. For many companies, it is a good idea to look for a provider that won't lock you into their cloud, or at the very least offers some portability options.

If you want to know more about how the cloud can benefit your business then connect with us today.

Published with permission from TechAdvisory.org. Source.

Topic Web