If you frequently create files whose names vary from those of other files in the same folder by only a date, sequence number, or the like, you can ensure regularized file naming and save effort with this trick. When saving your file, click a grayed-out filename in the Save dialog’s list. That causes macOS to auto-fill the clicked name in the Save As field, where you can tweak it rather than typing a new name from scratch.
Hey Siri, Could You Please Talk Less?
By default, Siri likes to chat, confirming what you say and speaking the results of your commands when appropriate. If you don’t like that, go to Settings > Siri > Voice Feedback and select either Control with Ring Switch (the iPhone’s physical switch) or Control with Mute Setting (iPad) to make Siri be quiet when the device is muted. Alternatively, choose Hands-Free Only to silence Siri except when connected to Bluetooth, headphones or CarPlay. Or set Siri to whisper—hold the Home button to invoke Siri and then reduce the volume, which applies only to Siri’s voice.
Have You Tried Falling Asleep to Music or Lectures?
iBooks in iOS has a built-in sleep timer that can automatically pause playback after a specified amount of time, which is great for listening to an audiobook as you go to sleep (tap the Moon button below the volume slider). What if you prefer listening to content that’s not in iBooks, like music or a college lecture? To set a sleep timer that works for Music, iTunes U, or any other app that plays audio, open the Clock app and tap the Timer button. Next, tap When Timer Ends (iPhone) or the selected sound (iPad), scroll to the end of the list of sounds, and select Stop Playing. When you’re ready to listen as you drift off to sleep, start the timer just before or right after you press Play in your audio app.
How to Quickly Select Items in a List from the Keyboard
Even if you already know this tip, you may not have realized all the places where it works. When you find yourself in a list on the Mac, as in a Finder window, an Open dialog, or a set of auto-completion options, you can usually press keys on the keyboard to navigate within the list. Press M, and you’ll select the first item whose initial letter is M. If multiple items start with M, use the Up and Down arrow keys to move one item at a time. And rather than clicking an Open or OK button, try pressing Return to activate the selected item. So if you assumed you had to use the pointer to scroll through lists and click list items, try the keyboard—it’s faster to type W than to scroll all the way down to Wyoming in a list of states.
The Hidden Dangers of Shadow IT to Your Business
The Hidden Dangers of Shadow IT to Your Business
We all know that using information technology — programs, apps, or internet browsing — carries a certain amount of risk. Nobody wants to have their secure data compromised, but technology brings enough benefits that the risk is worth it. So you vet certain systems, you establish protocols, you update and patch your software, and you keep track of the technology used at work.
But what about the technology your employees are using that isn’t part of your official plan? We’re talking about messaging apps, Excel macros, cloud data storage, collaboration spaces, and even hardware like USB drives, smartphone storage, and personal laptops that you don’t control.
We call this “shadow IT,” and that’s a whole lot of potential holes to cover!
Even if you ignore the dangers of having accounts hacked, data stolen, and websites vandalized, shadow IT can be very inefficient. You don’t control it, so you don’t know where important information is or what work is being done. It makes it hard to avoid duplication of efforts and even harder to manage employee productivity. What are you to do?
Well, your gut reflex might be to “crack down” on using unauthorized technology for work purposes. Swallow that reaction, though — you can’t stop it, and you’ll just harm morale. You’ll also drive usage even further underground; your people won’t be honest with you for fear of reprisal. That means that if a compromise occurs, you’ll be the last to know.
Instead, keep an eye on the situation. Make it clear that you support employees using the tools they need to get the job done, as long as they let you know what those tools are. If your people start using cloud storage apps, that’s fine — but have them explain how they’ll keep that data secure. Just as you empower them to find their own tools, empower them to keep things secure.
You probably can’t come up with a list of all the shadow IT that’s being used at your work, but you can keep an eye on the trends as they develop. Research the technology that’s being used and watch the headlines for data breaches or other compromises.
In some cases, you will have to crack down on specific apps, programs, or devices being used at your work; they’re just too risky. If you’ve worked with employees and fostered good communication, this shouldn’t be an issue. Remember to avoid blaming employees when shadow IT becomes a problem — especially if they bring the issue to your attention themselves. There’s nothing wrong with asking your people to stop using a specific program or device, as long as you’re transparent and have good reasons.
Last, but not least, try to look on the bright side. Shadow IT may be a little risky, but it also presents opportunities for employees to drive productivity and try out new best practices. If they’re using a piece of technology, it’s probably doing something that the currently “approved” tech is not. They’re also showing self-starter tendencies and trying to do their job better. And that’s always something you should support!
Photo by 卡晨 on UnsplashMore tips just for you…
More great tips from the archives…
- Two Secret Key Combos for Forward Delete on the Magic and MacBook Keyboards
- iCloud Photo Library Users: Do NOT Turn Off iCloud
- Ever Wondered Which Words to Capitalize in a Title? Use Capitalize My Title!
- Tips for Setting Up a Comfortable and Effective Home Work Space
- Tips for Better Videoconferencing
- Set Your Preferred Name and Photo for Messages on iOS
- The Fastest Way to Change Wi-Fi Networks in iOS
- What to Put at the End of Your Emails
- Apple Business Manager Is a Win for Apple-Driven Workplaces
- Find Wasted Space with Storage Management
- Forrester Research and IBM Studies Show Macs Are Cheaper than PCs
- Being an Apple User Means You’re Not the Product
- How to Ask for Tech Support So You Get Good Answers Quickly
- Apple Business Manager Is a Win for Apple-Driven Workplaces
- The Hidden Dangers of Shadow IT on your business
- Need to Stay in Touch? Try One of These Videoconferencing Apps
- Never Send Someone a Password in Mail or Messages: Do This Instead!
- What Are All These New Privacy Request Dialogs in Mojave?
- The Importance of Productivity Tech for Your Road Warriors
Going into Airplane Mode: Flying with Technology
Since 2013, we’ve been able to use handheld electronic devices such as the iPhone, iPad, and Kindle at pretty much all times during airplane flights, including takeoff and landing. That was a big change from previous policy, which banned the use of personal electronic devices below 10,000 feet, forcing passengers to occupy themselves with books and magazines at the start and end of flights.
But now flight attendants ask us to put our devices into “airplane mode.” You probably know how to do this on your iOS device, but if not, here’s how. Swipe up from the bottom of the screen to bring up Control Center and tap the airplane button at the top left. Alternatively, you can open the Settings app and enable the Airplane Mode switch (it’s the first switch in the list). When you land, use the same controls to turn it off again.
What does airplane mode do? It disables certain wireless features of your device. Specifically, it turns off the cellular voice and data features of your iPhone or iPad, and on all iOS devices it turns off both Wi-Fi and Bluetooth. However, only the cellular features are important to your airline—you can re-enable both Wi-Fi and Bluetooth at any time. That might be useful if you want to use the airplane’s Wi-Fi network for Internet access (usually for a fee) or Bluetooth to play music over wireless headphones.
To turn these wireless features back on, tap the grayed-out Wi-Fi and Bluetooth buttons in Control Center, or flip their switches in Settings > Wi-Fi and Settings > Bluetooth. Don’t bother turning them on unless you’re going to use them, though, since you’ll save a little battery life by leaving them off for the duration of a long flight.
Why do the airlines care about cellular? It has little to do with airplane safety; the prohibition originated from the U.S. Federal Communications Commission, not the Federal Aviation Administration. The reason is that fast-moving cell phones used high in the air may light up many cell towers at once, which can confuse the mobile phone network.
How Harley Davidson Used Predictive Analytics to Boost Sales in New York
Harley-Davidson managed to turn their fortunes around by making use of predictive analytics. Here is a detailed analysis of how they made it work.
Asaf Jacobi was selling one or two Harley-Davidson motorcycles a week at his New York dealership. One day during winter, he decided to take a walk in Riverside Park and came upon OR Shani, the CEO of Adgorithms. After talking about his low sales numbers, Shani suggested that Jacobi tries Albert. This AI developed by Adgorithms is designed for marketing purposes. It works on various platforms such as Google and Facebook to optimize ad campaigns.
Impressive Results.
When Jacobi gave it a trial, he sold over 15 motorcycles that week. It was almost double, what he had sold all summer. Jacobi kept at it. He went from getting a qualified lead a day to more than 40. In the first month, 15% of the new leads were similar to past high-value customers and were thus likely to purchase. By the third month, leads had grown by 29-30%. Out of those leads, 50% were similar to past high-value customers. Jacobi had to expand the call center to handle all the new business.
How the AI did that.
Today, Facebook, Google, and Amazon are leading in the use of AI. This has given them a major advantage over customers by enabling them to target them with highly personalized marketing campaigns. However, other companies are also starting to join the AI race.
In the case of the Harley-Davidson dealership, Albert the Ai helped to grow store traffic by generating leads, which were simply customers who filled out a form expressing interest.
Making Data work for you.
Albert was given creative content from Harley-Davidson and some performance targets. The AI began to analyze existing data from the dealership. It was able to find characteristics and behaviors of high-value customers within New York. The Ai targeted those who completed purchases, added an item to their online cart, or were among the top 25% of people who spent time on the site.
With this data, Albert went after people on the internet that had similar characteristics. The AI ran tests on a few sample groups and collected data from the tests. It then conducted further tests with more variables. At the end of it all, it had gathered enough data to develop what a high-value customer would look like. It then scaled up the campaigns to reach out to these people.
The Benefits of AI in Predictive Analytics.
For Harley-Davidson, the AI analyzed what was working and what was a waste of money. The AI used what it gathered from these tests to create opportunities that were likely to lead to successful conversions. In short, it allocated resources to what had worked, which helped to improve the ROI for digital marketing campaigns.
The traditional method used by marketers is to create buyer personas. The personas are based partly on historical data, the marketer’s experiences, guesswork, and gut feelings. When a company decides to use personas, it has to rely on guesswork to determine what worked and what failed.
An Ai does need to come up with personas. They find real opportunities by checking the behaviors of online profiles and determining who has behaviors that are indicative of a high degree of conversion.
AI Could Help to Save Time.
Even when equipped with the most complex digital tools, humans can only manage a few tasks at a time. They will also have a hard time making an unbiased application of any insights that they gather. On the other hand, an AI can process millions of interactions a minute. They can also run more than thousands of tests at the same time and make predictions at the same time.
Another advantage of an AI is that it never gets tired. While humans can only manage a few hours of analysis, the AI can work all the time all year round. In addition, the AI modifies its marketing strategy in real time, which means that no money is wasted at any time.
Making Use of AI.
Since AI is still quite new, and since marketers may be wary of relinquishing control to a device, it is wise to adopt AI incrementally. At first, it can be used to run small and short experiments. As the results trickle in, the AI can then be modified.
When carrying out experiments, it is important to define goals. For instance, the goals can be increased leads or better ROI.
When choosing the tool to use with AI, you need to know what you want. Some tools can focus on a single task such as optimizing web content. Other complex tools offer more capabilities. Still, others can produce results but will not act on them without being prompted.
However, you should not be afraid to take the plunge. You will be able to have an edge over the competition that is still not sure whether they should use the technology.
How You Can Ensure Success.
If you decide to use AI for Predictive Analytics, some best practices will help you to succeed. Here are some of them:
1. Have Accurate CRM.
The AI will work with your current CRM. Thus, if it is full of garbage, it will generate garbage. The predictions will only be as good as the underlying data. It is better to have less data, which is accurate than to have silos of data that is full of errors.
2. Take Your Time.
Although the AI is fast, you do not have to be. A good example is Harley Davidson that started with micro-segments and numerous tests. This helped them to adjust the campaign accurately before they ever went full scale.
3. Let the AI do its Magic.
It can be difficult for business owners to wrap their minds around the concept of a program controlling their marketing campaign. However, they will have to learn how to let go and let the AI work. The AI will work based on proven data and not personal insights. It will allow you to make predictions that are more accurate.
Conclusion.
Although the AI will take away some of the decision-making power, it can help to motivate the sales team and keep the business moving forward. You will also have more time to make other decisions about your business.
Lifelong Learning is Our Competitive Advantage in the Automation Age, Here’s Why
From Telegraphs to USENET and How to Protect Yourself from Spam
When someone thinks of spam they typically think of unsolicited bulk commercial email they receive in their inbox. However, the concept of spam started a little earlier than you might think. How far back? How does 1864 sound? Spam in 1864 you say? Yes, in the form of a telegraph, advertising a local dentistry actually. The Telegraph was so much news that the local paper even reprinted the telegraph that was sent to many households, further propagating the message.
More recently, people consider the first spam email coming out of Digital Equipment in 1978 which went to a total of 393 people promoting their latest computer model. You can thank a Monty Python sketch based on a cafe that only served the canned spiced ham SPAM for the origin of the name. Another early spammer was the lawyers Canter and Siegel posting their “Green Card Lottery” message to USENET, a shared messaging system.
What does all this have to do with today? You don’t want to be known as a spammer. There are three ways to attack the spam problem. First off, you don’t want your marketing emails to be classified as spam. Secondly, you don’t want your mail server to be abused where someone sends spam through your hardware. While this wasn’t sent to you directly, your hardware could be blacklisted, thus affecting your own emails. Lastly, you don’t want your employees to respond to spam. There are ways to filter this at the mail server to prevent them from seeing the messages, or at least classify messages as fishy before their opened. Our company {company} can help you to protect your business from being labeled a bad apple in the email business.
Starting with the most important avenue, ensuring your marketing messages get through, there are some best practices to know about. For starters, don’t just send emails directly to your clients. Putting everyone’s email in the “To:” field of a message is bound to cause problems when someone does a reply-all. If you absolutely have to send a message to LOTS of people, it is better to use the BCC (for blind carbon copy) field of a message. Better yet, rely on a mailing list management package like that offered by Constant Contact. Typically, you don’t want to add people to the mailing list yourself. Instead, people should opt-in. More importantly, with each message you send, there should be unsubscribed instructions.
Protecting your mail server is not an easy task. There are some simple steps you can do like requiring that users are authenticated before sending a message, but someone can just spoof the email headers to make it appear messages came through your server. To best protect your server, in 2012 DMARC, or Domain-based Message Authentication, Reporting, and Conformance was introduced. Combined with the earlier introduced SPF, Sender Policy Framework, this makes sure that any messages appearing to come from your mail server actually came from your mail server. {company} can help you keep up with the latest ways to protect your email servers and thus getting your marketing messages through.
Lastly, it is important to look at the inbound side of spam. With all the talk of Russians hacking servers and the release of inappropriate celebrity photos, most of these attempts are triggered by phishing attacks of targets. You still need to worry about viruses being sent through email, but phishing involves fraudsters sending what look like real emails in the attempt to reveal personal information like passwords and bank account info. You don’t want your employees giving away the farm so that others can then get into your company network or your employees worried about identity theft. {company} can help protect your mail servers from letting these unsolicited emails through.
Contact us at {email} or {phone} to learn more about how we can help you.
What Companies Need to Know About Technology Management
Technology Management has become an important aspect of doing business today.
Here are a few details about what it entails, and why a business may need it.
Technology management is a term that is used to refer to a group of services offered to a business that may not have its own IT department. The process can include project management, technology planning, database services, disaster recovery, security, document services, document formatting, e-billing, mailing, mass printing, and much more. Here is some more information I have prepared on this topic. It should help you gain a better understanding of technology management.
Why Do You Need Technolgy Management Services?
The break and fix approach may seem like a good way to save money, but it is going to cost you. Such neglect will eventually lead to a major tech disaster in the future. Such disasters could take the form of tech failure or even a major security breach. Such breaches can lead to class action suits if critical information is lost.
However, having to hire an in-house team may not work either. The inflated costs on the payroll are not worth it for most business owners. When you outsource technology management, the IT infrastructure will receive the care of experts. Best of all, it does not cost an arm and a leg. Additionally, your business will get the full benefit of an experienced team of experts instead of just a few IT experts working in-house. Some of the benefits are:
- Proactive Management.
With technology management, you do not wait for technology to fail before fixing it. A technology management company will review your equipment often and make upgrades as they may be deemed necessary. Such a company will also ensure that you work with only the best antivirus and malware protection.
- Better Network Administration.
A good technology management company does not just hire fresh college graduates. People that work for such companies usually have years of experience under their belts. They know how to tweak each system to fit into a unique business environment. That way, a company is able to maximize its output. The result is that you will be getting more value for the salaries you pay your employees.
- Automated Monitoring.
A good company will have hundreds of system monitors that will allow them to take proactive measures to deal with any problem. That way, a company does not have to deal with an aftermath of a disaster.
- Technology Consultancy.
All companies have technology needs that continue to grow as the company grows. However, it is not always easy to know what you need unless you have an expert as part of your staff. A technology management company will give you the advice that you need to choose the right technology. That way, you will always have an edge over your competition in terms of technology utilization.
- Real Time User Support.
When you hire a technology management firm, it will not be much different to hiring in-house staff in regards to response time. Most of them can have an engineer at your office in minutes when you need a technical expert to solve an issue. Such an expert will give all the options you have and make a recommendation on which you should choose.
Some of the Cloud Service solutions you can expect.
Most business today use cloud services. A technology management can help you with these services if you use the cloud:
- Spam Protection.
A major downside of the cloud is spam. It takes up valuable space in the cloud. A good tech management company will provide you with solutions that prevent unwanted messages from ever reaching the inbox.
- Data Backups.
Data backup is another important service that you will get as part of the cloud-based solutions. By offering cloud-based backups, you will get the peace of mind that you need to run your business. You will no longer have to worry about losing backup tapes or the tapes were stolen.
What Types of Companies Need Technology Management?
All businesses, no matter how big or small, need some IT support to operate efficiently in the modern world. Such support can be useful in helping them to avert major disasters to their business operations.
However, different industries will have differing needs. Thus, not everyone wants the same kind of IT support. There is no one-size-fits-all that can work for all businesses. Some of the businesses that may need Technology management are:
- The Financial Sector.
A good tech management firm will provide you with a clear understanding of the current state of your systems. They will identify the vulnerabilities, risks, and prioritize the issues that are discovered. Additionally, they can also help you identify what has been changed since the last audit took place.
- Manufacturing.
Most people think of the manufacturing sector as the huge processing plants and large warehouses. However, these companies have office buildings that allow them to process the paperwork. If the back office operations are not efficient, an office could lose a lot of money. A technology management firm will help you keep an eye on the IT systems to ensure that they are always working well. That way, a company can focus on its core duty of manufacturing.
- Professional Service Industry.
Downtime is more than just annoying to customers. It can have a huge impact on the profitability of a company. Instead of waiting for equipment to break down, the company will often conduct assessments at regular intervals to prevent downtime. Less downtime will mean that employees have more time to work on their projects. Additionally, it will help to keep your customers happy.
- Non-Profits Operations.
Cyber security must be the priority of every business. There is a lot of malware being created all the time. A breach to a company’s network can have a crippling effect on its finances. The effects can be worse for non-profits since they rely on donors. If donors feel that you are not taking care of their money, they will simply move on. A good technology management company will help to ward off any criminals that may want to reap where they never sowed