Tech Tips to Make You a Better Business Owner

3 Tech Tips to Make You a Better Business Owner

There’s no doubt about it, business can be tough! You’re juggling employees, customers, suppliers, stakeholders…the list is endless. You’re also operating in a competitive, high-tech economy that keeps trying to speed ahead without you. It’s no wonder you’re craving ways to get ahead of the competition, cut costs, boost productivity and dreaming of a vacation. Here are 3 tech tips that will make your life easier – and maybe get you closer to that ‘World’s Best Boss’ mug.

 

Consider a commuting policy

With better technology and faster internet connections, remote working isn’t just a possibility now, it’s an expectation. Clearly, not for every job (virtual burgers anyone?), but there are a lot of computer tasks in your business that could be done from home. Even if you offer a split week with 1-2 days at home and the remainder in the office, this can be a huge boost to your productivity.

From your perspective, remote employees can be more efficient without the distractions of yet another birthday sing-along, they have fewer absences and stay in the job longer. From the employee perspective, they don’t need to waste time commuting, get their work done faster, and generally feel happier and healthier.

Don’t cheap out on technology

Unsurprisingly, a tech newsletter is advising you to invest in tech, but hear us out. Technology is rapidly becoming the backbone of most businesses, yet we still see people who try and get by with the bare minimum investment and maintenance. And by ‘see people’, we mean they’re our most frequent repair and data recovery clients.

When you take shortcuts with your tech you’ll always get higher failure rates, more downtime, and employees who can’t do their job even though you’re still paying them by the hour. When businesses keep old tech longer than they should, thinking of the immediate cost saving, they usually end up paying more in the long term.

Embrace the cloud

Many of your existing software packages have a cloud version, which would allow multiple people to access it at once and give added backup or synchronization benefits. Your remote workers, mobile staff, accountant or CFO can all view the same reports without anyone having the trouble of sending out separate copies.

Cloud technology is also perfect for notetaking and collaboration using software like Evernote or OneDrive. You and your employees can think of ideas while out and about, make a few notes on a mobile device, and have it all synced perfectly to your desktop when you need it. You can even scan in paperwork and have your entire filing cabinet in your pocket.

Your business tech can unlock multiple possibilities that will make your days run smoother, more profitable and put you miles ahead of the competition. Ready?

Give us a call at 248-360-8967 to make your tech work harder for you.


Most Businesses Won’t Survive a Disaster. Could Yours?

With the crazy weather we’re seeing, natural disasters on the rise and cyber terrorism echoing for years, it’s not a case of ‘if’ a disaster will strike your business, but ‘when’. Surprisingly, it’s not the scope and scale of the event that influences how deeply your business is impacted, it’s your business continuity plan.

Put simply, this is the all-important set of precautions and pre-planned responses to an event, laid out in bullet-proof detail and implemented with one driving focus: keeping your business running with little or no downtime. Think about what would happen if your business was hit by a natural disaster tomorrow. Would it survive? How much downtime would it take to push you into dangerous territory?

According to an IBM study of all the companies that had a major loss of data, 43% never reopen, 51% close within two years and just 6% will survive long-term. For a fraction of those survivors, business even continued as usual thanks to their ‘failsafe’ business continuity plan. It’s more than disaster recovery, it’s full preparedness that bypasses the need for 2+ weeks of downtime, financial ruin, wasted salaries and reputation loss – but it does require a higher level of planning…in advance.

Recommendations to Put You in the Surviving 6%

Prioritize: You’ll need to plan exactly what you’ll recover first and know who’s in charge of making it happen. It goes beyond jotting down a checklist of things to do, it’s taking an analytical, process-based approach to recovery for each unique business perspective. But it’s also realistic: there’s no point dedicating precious time to reviving the email system if your customer data is leaking onto the internet, even if email did rank as your top communication priority!

Backup: Of course, the most critical part of your business continuity is having full backups in three places. Why three? One copy locally which you use each day, a backup on another (disconnected) device in the same location, and one in the cloud. That local backup is your life-saver for system crashes, cyber-attacks and the like; the cloud backup comes into play when your business has taken a major physical hit, perhaps from fire or flood. Some businesses can run entirely location-independent when using cloud systems like Office365, which can be enough to put them in that 6% of disaster survivors.

Test: Make sure all employees know what the plan is if something goes wrong, and their specific roles in these scenarios. You can test, prepare and rehearse your continuity plan under simulated disaster conditions, which will uncover new obstacles, priorities and additional threats.

As your IT environment becomes more complex, carrying more responsibility and risk, so does the importance of a robust business continuity plan. The best BC plans look beyond disaster recovery, taking into account scalability of your system and scope of your individual business, to create strong battle lines that will keep your business operational, both now and for the long term.

Give us a call at 248-360-8967 to create a custom business continuity plan for your business.

Future computing: The Internet of Things

Some thirty years ago, the personal computer revolution began — and no other technology has evolved more quickly.

Now there a new revolution, often referred to as the Internet of Things. Here’s what you need to know about it.

The term Internet of Things (IoT) made little sense to me when I first heard it. I thought: “Oh no! Not another meaningless tech-industry marketing term — like Web 2.0.” But then I visited my pool-supply store and the sales person asked me whether I wanted to connect my pool pump to the Internet.

As you might expect, my first reaction was: “Why?” I left the store a bit bewildered and spent the next several months looking into the topic of new Internet-connected devices. What I’ve discovered took me by surprise — and I teach computer technology.

The Internet of Things extends far beyond just attaching your thermostat (or pool pump) to the Internet. In the broader sense, IoT could encompass any instance in which objects or organisms (including people) are fitted with sensors that collect and transfer data over a computer network. No human-to-human or human-to-computer interaction is required.

IoT isn’t driven simply by convenience; the ultimate goal is collecting and processing large amounts of data in real time. More than fifty years of technology discovery and development has brought us to this point.

For example, with nanotechnology (more info), we can now build data-collecting sensors that measure in billionths of an inch. These tiny devices are described as nanoelectromechanical systems — or the somewhat larger microelectromechanical systems (MEMS; more info).

finger print

Building a ubiquitous data-collection system

These data sensors are so inexpensive and so tiny they can be placed everywhere: in cars, homes, clothes — and even in our bodies. That potential flood of data collection would easily overwhelm our current IPv4 Internet-addressing scheme. Which is why we’re moving to the more-capable IPv6 (more info).

This newer addressing system uses 128 bits, an address space so large that each person on earth could be given a few Octillion (10 to the power of 27) IP addresses and there would still be a lot of addresses left over. In short, it will be nearly impossible to run out of IPv6 addresses.

With many ways to collect data, we also need ways to move the information to the computers that will process it. In the past, this connection was via Ethernet cabling. But now we live a mobile world. Advances in Wi-Fi and cellular transmission rates now make it more practical to move mountains of data wirelessly. And if GPS is added to a sensor, we can know exactly where the data came from.

Data processing has also grown exponentially over recent years. Massive server farms and cloud-storage facilities make real-time processing of huge amounts of data — popularly called Big Data — cheap and practical. (Cloud storage is about a tenth the cost of local storage.) And all this “Big Data” is now stored in “Data Lakes,” where it might reside for years or even decades to come.

Currently, hard drives still do the heavy lifting in data storage. But tech companies are working on new forms of computer memory (RAM) and data storage. For example, Carbon nano tubes (CNT; more info) could increase storage in our devices up to a thousandfold — while using less electricity. It’s quite possible that in the next five to 10 years, your smartphone might have 10TB of RAM/disk storage and a month of battery life.

And what becomes of all this collected information? Businesses use sophisticated data analytics to process it — outwardly to “make our lives better,” but mostly to make a profit. For the most part, the information is cleaned, sorted, and combined with other data to build models of our online behavior. That information is then used essentially to convince us to purchase products and services.

Connecting everything to the Internet

What does the Internet of Things offer us today? It’s far more than you might realize. You might be familiar with products such as the Nest (site) thermostats and smoke alarms; or wearables such as Fitbit devices that monitor heath and exercise.

But IoT is rapidly expanding into more prosaic things; for example, I found a BBQ propane-tank sensor that will notify you that it needs refilling or that you forgot to turn off your gas grill. And then there’s that pool pump I mentioned that can be monitored and controlled via a smartphone app.

Other uses of IoT include monitoring your wine collection. Sensors embedded in corks report temperature, acidity, bottle location, and other properties. IoT sensors are being used in casino chips and golf balls to track location and movement. A golfer’s performance can be monitored and tracked over time. Parking spaces can be fitted with IoT sensors; as you enter a parking garage, you can be notified ahead of getting to it where an open space is located. Power companies are using IoT in appliances and solar systems to manage and track energy usage.

And that’s just the consumer side. Things get really interesting when you look at IoT for the business-to-business (B2B) market. Farming, automotive, security, and heath care are taking advantage of Internet connectivity.

In farming, for example, cameras have been mounted on booms attached to tractors. As the machines are driven though the fields, the cameras take images of each plant and also record its GPS location. An onboard computer system processes the images in real time and determines whether a particular plant needs a shot of fertilizer, pesticide, or water — or is doing fine. The health of the plant is recorded and archived (again, Big Data) so that farmers can make year-over-year comparisons.

For the dark side of electronics in farm equipment — and our cars — see a related Wired story. It tells why we don’t really own the vehicles we think we paid for.

Many newer cars already have Wi-Fi and Bluetooth connectivity built in. Your next new car will most likely have at least four high-definition (HD) cameras, a hundred or so performance sensors, and a cellular data-service plan — not for you, but for the automobile manufacturer to keep tabs on the car.

 

car

You and millions of other drivers will be “testing consumers,” so manufacturers can produce better cars. But they’ll also be able to monitor wear and tear on individual vehicles. In theory, they could use GPS data to tell you, via your onboard navigation/information system, that it’s time to change the oil — and here’s the location of the nearest dealer.

Onboard cameras and computers can now prevent unsafe lane changes, assist in emergency braking, and help with parking. The videos from the cameras can be stored, so should you have an accident, the images can be downloaded and used for any follow-up investigation.

IoT is rapidly finding its way into security. For example, retail stores that suffer heavy losses to shoplifters might install wireless cameras. Though some are visible, others are hidden. Yes, that mannequin actually is watching you.

These connected cameras can capture the face of anyone who enters the store; they then immediately compare that information against a list of known shoplifters. If there’s a match, the store’s security staff can then track the person’s movements throughout the store.

IoT, Big Data, and cloud storage let stores share a common database of known shoplifters. Someone caught stealing at the local department store will be recognized and watched at the nearby home-improvement store. The next time you enter a store, check out your image on a conspicuously placed, high-definition screen; it’s there to remind you that you’re being watched.

Residents of my town are concerned about the number of robberies. To help the police, some homeowners are installing IoT cameras that are connected to systems running License Plate Recognition (LPR) software. Every car that drives by has its license plate recorded with the LPR software. If a particular car was used in a previous burglary, homeowners, neighborhood watch groups, and the police are immediately notified. When a large number of homeowners install these cameras, the path the burglars take can be tracked by police in real time. (This obviously raises privacy issues. It might also be adapted for unwarranted profiling.)

In health care, IoT-equipped pacemakers monitor heart rhythm. If a pacemaker detects an abnormal rhythm, it can notify a doctor, dispatch emergency-medical personnel, and initiate treatment. Moreover, if the device is equipped with GPS, it can send out your exact location.

IoT is assisting with pain management and neurological diseases. I was recently told that doctors have imbedded Windows 10 computers into patients. Using wireless connections and the Internet, doctors can remotely manage pain or, in the case of those with neurological diseases, send software updates that help patients cope with their illness.

The dark side of ubiquitous IoT applications

We are a well aware of security on our phones and computers. But the concept of billions of devices connected to the Web raises real concerns over hacking, privacy, and personal security. For example, there was an uproar when it was shown that smart TVs might be capable of sending private conversations back to Web servers. And it was recently shown that hackers could take control of cars remotely. Anything attached to the Internet is a potential target.

Potentially more difficult, will be finding a balance between security and privacy. For many, having your neighbor record your comings and goings and sending that data to police computers is unacceptable. But if you’ve been the victim of a burglary, you might think it’s okay. And will you be comfortable knowing that your car’s manufacturer — and possibly your insurance company — can track your driving habits?

Again, one of the foundations of IoT is targeted marketing. Not too long ago, a woman who was still in high school began receiving drugstore ads targeting pregnant women. The woman’s father (angrily) asked the chain store that sent out the ads why; he was told that, thanks to Big Data, it knew his daughter was pregnant. I’m sure that’s not the way we’d want to learn about a loved one’s private matters.

Gleaned from windows Secrets article by Doug Spindler

Larry The Computer Guy

Serving South Eastern Michigan

248-360-8967