Beruflich Dokumente
Kultur Dokumente
06
CYBERTREND.COM
THE MOBILE-CENTRIC
ORGANIZATION
HOW A MOBILE MINDSET
BRINGS GREATER AGILITY
18
CONTACT US
P.O. Box 82545
Lincoln, NE 68501
or
120 W. Harvest Drive
Lincoln, NE 68521
TRACKING THE
SUCCESS OF SAP
34 MOBILITY
a guide to the features you should look for
when purchasing new laptops
46 NETWORKING
building an all-wireless workspace, and how
thin client computing impacts IT departments
36 DATA
charting the difference between business
intelligence and data analytics, and
understanding how big data works
52 SECURITY
personal security best practices, and
understanding today's multi-featured firewalls
40 ENERGY
the latest news and research into
energy-conscious tech
43 IT
advice for IT departments faced with tracking
and disposing of ever-growing quantities of
mobile devices
56 WEB
the pros and cons of mobile Web apps
58 ELECTRONICS
the latest in premium consumer electronics
60 TIPS
smartphone, data usage, security, and other
tips for mobile professionals
Copyright 2015 by Sandhills Publishing Company. CyberTrend TM is a trademark of Sandhills Publishing Company. All rights reserved.
Reproduction of material appearing in CyberTrend TM is strictly prohibited without written permission.
In a tech investment study by Zogby Analytics for Xero recently highlighted by eMarketer, about one-third of SBOs (small-business owners) in the United States say that new
technology is the top investment priority. The second-highest category of importance to
SBOs is other at 24.9%, however 17.1% of SBOs view larger inventory as a top priority.
Trailing after these are going online (13.3%), hiring (7%), and geographic expansion or
new retail space (4.6%). Ironically, the majority of SBOs also cite a lack of a technology
budget as their greatest challenge related to technology.
In its annual survey of executives and senior business leaders worldwide, Gartner
found that growth is a top priority, as it has
been in years past. However, says Mark
Raskino, vice president and Gartner fellow,
explicit mentions of growth were down
from last year. We attribute this decline not
to less interest in growth, but rather to increasing interest in the mechanism that will
create it. Technology, it seems, is a prime
mechanism for growth. The second-highest
priority in this years survey was technology,
and Gartner notes tech has never ranked that
high. Raskino says that its our firm belief
that CEOs are more focused on this area than
at any time since 1999.
Although femtocells, which are devices that extend and boost cellular
connectivity in small areas such as
homes and offices, have failed to captivate consumers, larger businesses have
been giving a boost to the femtocell
market. The latest figures from ABI
Research have the femtocell market
reaching $800 million by 2020. Despite
the significant growth among businesses, ABI points out that femtocells face competition from the DRS
(Distributed Radio System) market,
which include features that reduce interference and improve quality for devices in motion.
30.7%
Lack of budget
for technology
23.9%
New technology
is not a fit for my
old-school business
Leash 30
Distracting 28
Annoying 7
Financial Burden 19
70 Freedom
72 Connecting
93 Helpful
80 Worth The Cost
Expect Deployments In
Next-Gen Voice Services & VoLTE
STARTUPS
Networks Without Networking
Offer Easier Management
CrediFi, a New York-based startup, has aggregated a huge amount of real estate
dataover 10 million square feet of it, nationwidesince it was founded in 2014. Now
the company is set to receive $8 million from a Series A round of funding led by Battery
Ventures. What sets CrediFi apart from other real estate analytics companies is its focus
on commercial real estate
and real-time monitoring
of loans, both new and refinanced. Commercial real
estate is awash on a sea of
debt that is consistently
being refinanced, says
CrediFi CEO Ely Razin.
Its not just knowing what
your asset is doingits
what your competitor,
your neighborhood, your
market is up to, as well.
Scott Tobin, who is a Battery Ventures general partner and now a member of the CrediFi
board, says, Right now, sector participants can access fragmented data about things like
individual property details and lease information, but no one is offering this data in a
single, integrated platform. CrediFi, he says, is doing exactly that. CrediFi plans to use
the new funding to further expand its platform.
To solve some of the challenges investors face in tracking companies, Palo Alto,
Calif.,-based startup Tracxn offers a research platform that tracks more than
20 million companies around the world
and makes the data available in an easyaccess format. To illustrate its ambition,
the company positions itself as a potential
Gartner for startups information. SAIF
Partners recently invested $3.5 million in
Tracxn, which the company plans to use
to grow its team of analysts. According to
the companys press release, it currently
employs 30 analysts and plans to employ
150 by years end, and it works with more
than 50 venture funds.
KEY POINTS
MDM (mobile device management) is a component of EMM (enterprise mobility management), but
EMM also includes mobile content
and application management.
When evaluating an EMM
vendor, make sure it serves customers in your industry so its more
likely to support your needs.
An EMM solution needs to support whatever platforms and operating systems you use most in your
organization.
Try to strike an appropriate balance between securing your corporate resources and not intruding on
employee privacy or inhibiting their
productivity.
What Is EMM?
Bear with us for a dip into some
alphabet soup, and youll come away
with a better idea of what EMM is.
While MDM focuses mainly on the
hardware or device aspects of mobility,
EMM is an overarching solution that
typically includes EMM, MAM (mobile
in the end, the choice of a vendor depends on simply what the company
wants to get out of its mobile management solution. The reality is that a
lot of organizations, when starting out
with mobility, dont need much more
than MDM, he says. If thats the case,
almost any well-known vendor will
doeven some free ones. For those
that need more advanced EMM, look
for a set of features that matches current needs and is likely to scale to
future needs. This is an area where a
vendors road map and goals matter.
Mobility changes so quickly that a vendors ability to stay current in a way
that matches the organizations needs
is critical.
10
KEY POINTS
Most companies are built on
a desktop-centric mindset; even
though they use mobile devices,
mobility still isnt a main focus.
Going mobile gives employees
the ability to do more work wherever they are, but it can also save
money for the business and help
with disaster recovery planning.
Understanding business goals
will help decision-makers determine what mobile trends to get
behind, such BYOD or developing
custom sales apps.
Make sure you have a strong
mobile security strategy in place
that involves containerization and
enterprise mobility management.
Overcoming The
Desktop Mindset
The first step in making your enterprise mobile-centric is relatively
straightforward: focus on mobile devices
whenever making infrastructure decisions. If you truly want to make tablets
and smartphones the main computing
platforms within your company, then
you need to fully embrace that idea and
11
12
ITS IMPORTANT TO
IDENTIFY SPECIFIC
USE CASES THAT
WILL POSITIVELY
IMPACT YOUR
BUSINESS AND
THEN USE MOBILE
TECHNOLOGY TO
SUPPORT THAT
INITIATIVE.
office using technologies such as VPN
(virtual private network) connections and
various networking options that give employees safe access to internal company
resources. And because mobile devices
are getting more and more powerful, it
means that employees wont have to take
as many devices with them on the road,
which lowers the risk of loss or theft that
could put the enterprise at risk.
In addition to some of the more
common benefits, there are some other
unexpected ones that companies need
to look for as well. Some find that real
estate costs go down because flexible mobile users require less dedicated space,
says Mike Battista, senior manager at
Info-Tech Research Group. This fits into
the idea of supporting remote workers
understanding the goals of your organization. That always has to be the starting
point, says Crook. Mobility for mobilitys sake is not the way to approach it.
Instead of just adding mobile to your current approach, you have to identify specific use cases that will positively impact
your business and then use mobile technology to support that initiative.
Crook says that companies used to
just buy tablets and other mobile devices because executives wanted them,
and then it was up to IT to figure out
what applications work best based on
employee feedback. And while using
employee feedback isnt necessarily a
bad approach, its important to be more
broadly strategic with technology purchases and come up with a game plan
beforehand. Planning ahead of time also
makes it easier to determine whether or
not you want to support trends such as
BYOD policy implementations.
BYOD, by far, is one of the most popular trends in enterprises today because
it gives employees the ability to do work
on their personal devices and it also
saves the business money on acquiring
devices for employees. But you shouldnt
just start supporting BYOD and then
work backward from there. Crook says
you have to get to the point where BYOD
is meeting a specific business goal. For
example, if letting employees use their
own devices for work gives more people
access to a sales-oriented application and
ultimately leads to generating more revenue, then BYOD is a trend that makes
sense for your business.
Disabato also supports this idea of
using mobile devices for sales purposes,
regardless of whether they are consumerowned or company-issued. One example
he mentions is that of a pharmaceutical
sales representative trying to talk with
13
14
bile. I think the strategy and the management havent really caught up with
adoption, she says. This marks a difference between SMBs and larger enterprises, which have resources to work
through their mobile objectives, including
how to protect data, implement policies,
and enforce governance. Many SMBs lack
formal written policies regarding mobile
rules of the business, McCabe says. And
with BYOD [bring your own device], it
gets even more complicated, she adds.
SMBs and enterprises notably contrast
where mobile applications are concerned.
While SMB Groups survey shows SMBs
are acquiring more mobile apps and that
more SMBs are implementing mobilemanagement solutions, an annual Frost &
Sullivan Mobile Enterprise Applications
survey finds that enterprises typically
deploy significantly more mobile apps
for workers. Sterling says 50% of larger
companies have deployed 10-plus separate apps as opposed to 15% for SMBs.
Although a high percentage of SMBs and
15
Managing Devices
Due to limited budgets, BYOD scenarios exist within many companies by
default. Although most SMBs cant afford full-fledged mobile management
solutions, there are options to continue
with BYOD but exact control over how
workers use applications and devices.
Chute cites cloud-based office solutions
as a possible big win for SMBs. Adopting
a cloud-based email solution, for example,
enables a CIO to control how workers access email on devices. This is probably
the most cost-effective way to manage
employee mobility, although when a CIO
is looking for a way to more granularly
secure devices, apps, and data, hell need
to start to look at a formal EMM, he says.
Similarly, Silva says some organizations have migrated to SaaS (software as
a service)-based office-type tools and are
using built-in abilities for device management at no additional cost. Others are
looking to single-instance apps that can
serve personal devices with workplace
email in a single container. This enables
companies to avoid purchasing an expensive EMM suite by simply focusing
on one secure PIM (personal information
management) tool, albeit one with a relatively narrow scope.
Overall, Bamforth says, controlling
BYOD after the fact is tricky. SMBs can
choose what applications and devices to
allow and essentially apply control via
agreement, he says. The first step is getting employees to commit to whats permitted. Be explicit, and apply tools when
permitted to take more control. If nothing
else, take control of critical data, as this
is the one item that keeps IT managers
in companies of all sizes awake at night
when it comes to dealing with BYOD,
he says.
CHRIS SILVA
Research Director : Gartner
Along the same lines, Sterling says addressing BYOD with limited resources
isnt easy. First, she recommends articulating a formal mobility policy, ensuring
that every employee reads and signs off on
it. This includes discussing and agreeing
upon approved devices/software applications, explaining security mechanisms,
and identifying a go-to person for mobility questions and concerns. Just putting this type of information in writing
exerts a certain level of control, she says.
Sterling advises formally reminding employees of policy at least semi-annually.
Secondly, Sterling says, getting ahead
of the curve and doing some homework can help identify apps SMBs can
deploy before employees get frustrated
and search for solutions on their own.
Considering engaging a mobility partner
or enthusiastic worker to identify mobile solutions that make employees jobs
easier, she says.
Avoid Mistakes
Unfortunately, McCabe says, many
SMBs have already made mistakes with
mobile, such as by adopting mobility in
a piecemeal manner without a big-picture strategy. I think the first thing a lot
of businesses need to do is take a step
back, she says. While few SMBs arent
doing anything mobile-wise, many need
to surmise what theyre doing and whats
working and whats not.
16
KEY POINTS
SAP has its roots in financial systems. Since its founding in 1972,
SAP has grown exponentially and
now offers a host of analytics and
other services.
Since the first decade of the
21st century, SAP has embraced a
service-oriented approach.
SAP HANA is an in-memory
processing platform designed to
handle large databases for use in
big data analytics solutions and
other scenarios.
SAP supports the HANA Cloud
Platform and other solutions, but it
also has a strong mobile focus in
terms of both preexisting apps and
application development tools.
18
future and plan out forward-looking stratbusiness, SAP set out to become a serduring this time, the company expanded
egies for growth. At its core, SAP HANA
vice-oriented organization capable of deexponentially from 100 employees, 250
is about giving enterprises the tools they
livering its solutions to customers in a
customers, and DM (Deutsche Mark) 24
need to succeed now and in the future.
variety of ways, whether via in-memory
million in revenue in 1982 to 2,700 emWith SAP HANA, users have access
computing, cloud, or mobile. The ultiployees, 2,200 customers, and DM 707.1
to everything they need in one centralmate goal was to give customers access
million in revenue in 1991. The company
also went global and established
ized platform. Rather than have
14 international subsidiaries to
to open different solutions from
support its customers in 31 difmultiple vendors and hope they
work well together, SAP HANA is
ferent countries. Throughout,
a fully integrated platform where
SAP continued to grow its
each component is guaranteed to
product portfolio, started building
work in harmony with the others.
its SAP R/3 system, and introIt all starts with the fact that
duced the first applications from
SAP HANA serves as a database
that system at the international
to store all of your valuable inCeBIT event in 1991.
If 1982 to 1991 was the R/2 era,
formation. This means that when
then 1992 to 2001 could be conyoure working on a project and
need access to specific resources,
sidered the R/3 era. During this
you only have to go to one locatime, the companys meteoric rise
tion to find everything you need.
continued as the company went
Once that data is centralized and
from 3,157 employees and DM
essentially consolidated, you can
831 million in revenue in 1992 SAP AG was founded in 1972 by former IBM employees Klaus Tschira, Hasso
take advantage of HANAs builtto over 20,000 employees and Plattner, Dietmar Hopp, and Hans-Werner Hector.
in processing capabilities, which
5.1 billion in revenue by 1999.
enable you to you analyze the data
It was also in this era that SAP
using calculation, text, and relational enbegan supporting Windows operating
to SAPs real-time computing solutions
systems and decided to list itself on the
gines. This in-depth approach makes it
regardless of their location and regardless
NYSE, which was made official in 1998.
much easier to mine actionable insights.
of the platform being used.
Global expansion continued as well, as
And from there, you can start to apply
That leads us to what SAP is today: one
the company increased its presence in the
SAP HANAs tools for specific projects
of the biggest, if not the biggest, providers
Japanese, Chinese, and Mexican markets,
and use cases.
of enterprise applications. The company
among many others.
Another important thing to undercontinues to innovate based on what its
Also within this time frame, the comcustomers want and what the market dicstand about SAP HANA is that it can be
delivered as an on-premises solution or
tates. And while SAP still offers financial
pany established its SAP North America
as a cloud deployment. This isnt simply
solutions, it has since moved into other
headquarters in Newtown Square, Pa. It
an either-or offering, however; a solution
areas with more growth potential, such
started off as a relatively small office, but
called the SAP HANA Cloud connector
as big data, analytics, mobility, cloud
quickly grew and became a major pillar for
bridges the gap for companies using both
computing, and more. In other words, if
the company. In fact, by 1994, American
on-premises and cloud systems.
theres a mission-critical system that you
SAP customers represented more than
Companies that are well-versed in hanrely on to run your business, chances are
one-third of SAPs overall revenue, and the
that SAP has a refined, feature-rich verNorth American facility employed about
dling large-scale databases, have a strong
2,500 workers. Now, across all of North
infrastructure backbone, and want to fully
sion of that solution that you can access
America, SAP has 19,000-plus employees
control their SAP HANA implementation
from almost anywhere.
in 60 different locations. And its from this
can opt for an on-premises model. And
market that SAP launched its enterpriseeven though the after-the-fact manageSAP HANA
focused applications.
ment of the system will primarily be in
The computing backbone of nearly evthe hands of the IT team, SAP and its
erything SAP does, and especially with repartners help throughout the process to
gard to its big data and analytics offerings,
Embracing The
make sure customers get the most from
is SAP HANA. This in-memory computing
Web-Centric Future
their deployments.
platform is designed to give users seamless
SAPs advancement between 2002 and
As for the cloud-based alternative, you
access to the applications and data they
2012 is perhaps the most interesting and
can choose to use SAP HANA in a PaaS
need to run the business more efficiently as
pertinent to enterprises today. With the
(platform as a service) capacity or as a
well as to help companies look toward the
Web solidifying itself as the backbone of
19
Data Warehousing
& Management
Before you can truly jump into the
world of big data and analytics, you need
to have a firm grasp on your corporate
information and turn it into a valuable
resource rather than a jumbled mess of
disparate data sources. SAPs EDW (enterprise data warehouse) tools, which are
built on the SAP HANA platform, can
help you get started by consolidating your
many data sources into one easier-to-navigate resource. SAPs EDW tools give you
the power to choose what information is
actually stored in the warehouse so that
you dont have to sort through gigabytes
or terabytes of unusable or unrelated data
to get to whats really important.
The primary benefit of such an approach
is that it essentially helps you streamline
different business processes and make them
more efficient. IT teams can complete tasks
much faster and give company decisionmakers the information they need to make
SAPs development of solutions that bridge the gap between raw data and real-life practicality is exemplified by the sensors worn by the German Bundesliga football club TSG 1899 Hoffenheim. Worn on the body of each player, these sensors
use SAP HANA to delivery vital physical information to coaches.
20
SAPs initiatives extend beyond analytics and enterprise productivity solutions. For example, SAP Research runs the
Future Energy Center in Karlsruhe, Germany, as a living demonstration of how new sustainable energy and other IT
innovations can be realized.
21
22
A Winning Formula
To Burke, its all about motivation
and transforming overarching companywide goals into smaller personal goals.
Gamification helps to break down
longer term goals into practical steps and
guides people to achieve them.
Gamification techniques can be externally focused, designed to increase
loyalty, sales, or engagement among
customers, or internal, to motivate a
workforce to meet new challenges and
improve overall productivity. Training
and education are two main areas where
As another example, the professionalGames have a different value proposition for players
oriented social networking site LinkedIn
they promise fun and entertainment. Gamification is
grades the strength of profiles based
on a number of factors, and users can
more about motivating people to take action, rather than
improve their gradefor instance, from
entertaining them.
an Expert to an All-Star profile
by fleshing out past work experience or
BRIAN BURKE
Research Vice President : Gartner
adding new contacts.
Internal, or enterprise-driven gamiprogram also needs to know where evfication techniques can be similar, but
Your Success Is In Another Castle
eryone else stands, at any given time,
revolve around fostering an atmosphere
Although gamification can do wonders
which is compulsory for true competiof competition and advancement. This
for an organization, its not the perfect
tion to emerge. You may find that emcan be as simple as creating a leadersolution to every problem. According to
ployees competing against one another
board for sales associates and creating
Burke, The most common problem is that
work toward the goal harder and faster
a trophy that sits on the desk of the top
organizations try to use gamification to
than employees who work independently
sales associate for the week. Other inmotivate people to achieve the organizato achieve the same goal.
centives that can be associated with the
tions goals, rather than their individual
Its also important to have a variety of
top spot can include monetary rewards,
goals. That simply doesnt work. Burke
goals, both short-term and long-term in
prizes, a coveted parking spot, and more.
also warns against confusing gamification
nature. Achieving one of the short-term
If the goal requires more of a team efand games. Games have a different value
goals should be recognized in an open
fort, then by all means, group employees
proposition for playersthey promise fun
way, such as with a badge or some other
into teams and let them work toward the
and entertainment. Gamification is more
token visible to others. If working with
goals together.
about motivating people to take action,
a very large group of people who perAlthough instituting your own internal
rather than entertaining them.
program can work, there are
One other way that organumerous third-party gamifinizations miss the point with
cation vendors who specialize
gamification is trying to apply
in creating scalable programs
it to the wrong problem. For
that let your organization reinstance, leaderboards and
alize its goals. Some of them
plastic trophies wont motiinclude Badgeville, Bunchball,
vate workers to do something
BigDoor Media, Captain
they simply dont want to do.
Up, Conteneo, Crowd Twist,
Countering employee apathy
Enterprise Gamification,
toward using enterprise softPugpharm, IActionable,
ware, on the other hand, is an
Leaderboarded, NextBee, and
area where gamification can
PunchTab. Another advantage
generate success.
of these organizations is that
many of them have preconfigTake Your Goals
ured software and systems that The social networking site LinkedIn uses gamification techniques such as rating the
To The Next Level
can be applied to your needs strength of a profile based on various factors.
As long as gamification
quickly and efficiently.
continues to produce favorable results, its bound to stick
form the same task, allow gamification
Business Boosting
around, even if the term itself doesnt last.
to elevate particularly dedicated indiGame Mechanics
According to analysts at TechNavio, the
viduals within the group or break up the
Theres no one right way to impleGlobal Gamification market is expected
group into teams that compete against
ment a successful gamification program.
to show a compound annual growth rate
one another. You may more effectively
Organizations investigating new ways to
of 68.4% through 2018. Couple this with
motivate inexperienced or struggling
motivate its employees have a handful
Gallups recent finding that only 30% of
employees by grouping them with the
of ways they can use gamification to bolU.S. employees are engaged at work and just
high achievers. Its also a good idea to
ster those efforts. Some key elements
13% of employees worldwide are engaged,
mix individual goals (and the associated
of a successful gamification system inand you can see how creative solutions such
incentives) with department- or groupclude regular and immediate feedback
as gamification will find a welcome place in
wide goals (and incentives).
on progress. Everyone involved in the
many organizations.
23
24
Build A Bridge
Mobile marketing can help to create
a better connection between you and
your customers. Smartphones are the
most personal devices that people own,
says Wong. They track our location,
exercise, entertainment, shopping, social media and morethey know what
we like and how we feel. You can use
the more personal connection to target
marketing efforts in ways that feel natural and when theyd be most receptive
to your brand. For instance, Starbucks
recently introduced a feature on its
Starbucks app to let customers pay before even walking into the store, so you
can walk in and ask the barista for your
order in the pickup area. No need to
wait in line.
A recent mobile marketing campaign from an airline allowed those who
booked a flight via mobile device to
receive free lounge access. The goal was
to help convince customers that the mobile website was easy to use for booking,
as well as to build trust in booking
flights via mobile device. The threeweek campaign generated 34% more
booking and delivered a 38% increase
in mobile revenue. Brands that develop
truly useful mobile programs, and work
hard to provide useful tools and information to their customers (and dont
take advantage of this relationship),
Mobile Matters
If you don't already have a mobile
budget, you need to get one now, says
Wong. Users now spend more time on
mobile than they do watching TV and
just about as much time on mobile as
desktop (if not more). Its likely that
Agency Advice
When selecting an agency to help
your organization, the agencys mobile
marketing strategy is something important to ask about. Mobile should not be
looked at as a separate entity, but part
of the overall strategy, says Hanson,
who also notes, Executives should ask
their agencies to deliver a holistic approach and be leery if mobile strategies
arent included in your marketing plan.
Whatever the plan, it should have a
strong appeal. Reaching your audience
means understanding human emotion,
says Wong. Find a mobile marketing
campaign that can recognize when users
want to see your message and respond
to them accordingly. Clearly, now is
the time to master your mobile marketing strategy.
25
KEY POINTS
If adopting many cloud services,
it can be worthwhile to assign an
internal employee to learn about and
track cloud offerings.
When eying public cloud providers,
youll want to be more strict with areas
such as data residency, security, and
network abilities.
A third-party audit can offer
reassurance about a public cloud
providers abilities, particularly for
organizations with demanding data
governance requirements.
Test-driving a prospective service
from a public cloud provider should
be a key part of judging that providers
ability to meet the organizations
requirements.
26
Meeting Requirements
Generally, an organization pinpoints
the requirements it wishes a public cloud
provider to fill before it actually begins
comparing providers, which will naturally weed out some providers and help
form a short list of candidates. When
choosing a provider, companies should
test-drive solutions, Keegan says. Youre
going to need time to actually use some
of their services, test-driving them so
that you get as much visibility as possible
into what the experience is going to be
like using their service, he says.
Keegan recommends running a production workload in the providers
cloud, bursting workloads if possible
from the companys primary data center
to the providers cloud to determine
what performance is like. Note how
simple or complex migrating applications is; what visibility into the providers platform for the application is like;
and if the company, provider, or both
maintain control. The only way youll
know is to test it yourself, he says.
Also check how well the providers
cloud-resiliency attributes work. If
running important workloads in the
27
28
ASSIGN RESPONSIBILITY
Comparing public cloud
providers and their offerings isnt easy, in part
because there are a lot
of offerings on tap, says
Dave Bartoletti, Forrester
Research principal analyst. While providers try to
help companies calculate
how much storage, disk,
performance, and other
resources they need,
the process is involving,
Bartoletti says. Working
with an MSP (managed
service provider), trusted
partner, or cloud brokerage
solution are options, but
Bartoletti also advises
companies train someone
CORPORATE TRAVEL?
NEED A VACATION?
Let our #missionbird take you where you need to go.
Our diverse fleet of 22 aircraft offers a travel experience above the rest.
KEY POINTS
Cloud computing adoption is becoming increasingly commonplace,
but many organizations arent prepared for the disruption that cloud
adoption can bring.
Some companies may find they
need to adapt their operating model
and company culture to shift to a
cloud model.
Shifting to a cloud model will
potentially impact employees in an
organization but most notably will
likely impact IT staff the most.
Despite the internal changes
that may accompany cloud adoption, experts generally agree that
adopting a cloud a model is still
ultimately worth the effort.
30
ALL COMPANIES ESTABLISH an operating model, either explicitly or by default. The clearer the model, the more
efficiently the organization operates,
says Ed Anderson, Gartner research vice
president. The older the organization, the
more entrenched the operating model is
in company culture, to the point it can
become part of the companys identity.
Now, introduce cloud computing
to such organizations and watch what
wrinkles surface. While cloud adoption is
becoming increasingly common and arguably even mandatory to stay competitive,
many companies arent prepared for the
internal disruption adopting a cloud model
can introduce, including to company culture. When cloud services are introduced,
organizations have to rethink their operating processes if they want to recognize
the full benefits of the cloud, Anderson
says. Whereas cloud services are dynamic,
flexible, available on-demand, etc., many
organizations dont operate assuming their
technology has these attributes, he says.
Thus, companies adopting cloud solutions must ask how they need to operate differently to fully capitalize on cloud,
Anderson says. Those that do can potentially bring about a new era of innovation,
agility, growth, and competitiveness. Those
that stick to old, established operating
models likely wont reach their true cloud
potential. No matter what, introducing
cloud services will challenge the status quo
and almost always create some tension and
disruption in the organization, he says.
The following explores such disruption
and how companies can anticipate and
react to them.
Those Impacted
Broadly, implementing a cloud
model can potentially disrupt everyone
in an organization, although if done
correctly, disruption can prove beneficial to purchasing, skills enablement,
architecting solutions, IT management,
and enabling IT to help employees
work differently. Longbottom says processes can become far more dynamic,
thus impacting how marketing and sales
approach their markets; workers can
more easily try to drop or continue
new functions and capabilities, thereby
impacting business development; and
developers can move to a continuous
delivery, DevOps model to meet the
needs of a highly dynamic business.
Typically, cloud disruption most
acutely impact IT; application migration and compatibility; data migration,
management, and integration; and security, Anderson says. Beyond adapting
to manage technological aspects of the
cloud, IT will need to manage relationships and details concerning external
services and cloud providers delivering
those services, which may require developing new skills.
Bartoletti says organizations may
need to increase investments in training
for everyone from IT to developers or
provide them the time to train themselves. Constant learning is now part
of the job, and thats absolutely important, he says. Fundamentally, cloud
31
32
who milk certain skills theyve developed, is another option Bartoletti cites.
Specifically, he says, reinforce that the
cloud isnt a competitive threat but
a new means for doing jobs better.
Similarly, Longbottom says enlisting a
business champion can drive a shift
to the cloud. Arguing the case on technical grounds will never work. Whats
needed is someone who can argue the
case at a business level, he says. This
might mean the CIO enlisting the COO,
CFO, or other executive to emphasize
how adopting a cloud model will position the business to better deal with the
modern markets, more rapidly change
to meet new needs, and deal with highly
flexible market conditions.
Ultimately, its likely companies will
question whether the effort is worthwhile considering the disruption a
cloud model can bring about. Anderson
believes its a question every company
must ask itself. Benefits arent always
obvious, and other factors like industry,
geography, company culture, etc., all
play into the potential for success, he
says. Most companies will eventually
find value in cloud services and deal
with the resulting disruption, he says.
Longbottom agrees, noting that a
majority of non-cloud IT platforms run
at about 10% server utilization, 30% to
60% storage utilization, and 30% network utilization. The wastage in energy, licenses, space, and resources to
run such underutilized systems is horrendous, he says. Cloud allows utilization rates to be upped to the 80% levels
in most cases. Further, because public
cloud entails sharing resources, prices
should be more predictable and result
in a platform cheaper than one operated
in-house.
Grossner points to survey results
as evidence that enterprises intend
to increase cloud service adoption.
Specifically, he forecasted the North
American off-premises cloud services
market would climb from $40 billion
in 2013 to $200 billion in 2018. I dont
think wed be seeing that rate of adoption unless they believed the challenges
were worth it, he says.
GO DEEP
STAY AHEAD
OF THE CURVE
Missing CyberTrend when youre on the go?
View or download the digital edition at
www.cybertrend.com to get up to speed on
the latest technology news and information
about products for your company.
TECHNOLOGY FOR
BUSINESS
Screens
In recent years, many laptop manufacturers have switched from LCD
to LED screens. The LED screens are
brighter and more energy efficient than
LCDs, and picture quality is clearer,
as well. Whether you should purchase
touchscreen models is another question.
For many companies, a touchscreen
isnt necessary, although some operating systems are designed to work with
34
Processor
There have been some significant advancements in processors over the past
few years, but the basic rule of thumb
hasnt changed: The more powerful the
laptops processor (and memory, too,
as well discuss next), the greater the
laptops ability to keep up with more
intensive applications. If you decide
to choose one of the more advanced
processors available, then expect to
pay a premium for that laptop. When
considering a laptop purchase for your
company, be sure to look at your employees needs and what software they
will use.
Memory
Many laptops come with 4GB of
RAM, which is considered the bare
minimum today for business computers and is often upgradable to 8GB.
Numerous laptops have 8GB of memory
or more built in. Some models may have
as few as 2GB of RAM, but those are
typically bare-bones models designed
to run Web-based applications that
dont require much onboard computing
power. Many laptops also use something called cache memory to give you a
small amount of superfast memory that
can be used to cycle through tasks and
speed up overall performance.
Storage
Laptop storage has become more interesting as storage prices have fallen.
In fact, when looking at full-featured
laptops, you may find few models with
less than 500GB of built-in storage;
many will offer 750GB or more. You
can also find laptops or laptop/tablet
hybrids that come with as much as
128GB, 256GB, or 512GB of SSD (solidstate drive) capacity. SSD storage is still
more expensive than a HDD (hard disk
drive), though, and isnt necessary for
many enterprise-related functions, so
you may want to go with a more traditional storage option. You may come
across laptops with large HDDs and
smaller SSDs during your search, but
35
36
The interesting thing about data analytics as a concept is that it can be a part
of business intelligence or it can be a category that business intelligence falls into,
depending on how you look at it. If BI is
your primary analytics focus, then youre
typically looking for insights about
some aspect of my operations that could
maybe change my planning or response
activities, Rouda says. In that specific
situation, you would see data analytics
as being a part of business intelligence.
Youre using it to develop models and
apply them in different ways to improve
your business, and data analytics is simply
one part of that process.
However, if you dont focus on BI or if
you want to use analytics for other types
of projects, data analytics becomes its own
separate entity. The other way of viewing
it is that data analytics is a much broader
space that isnt just applied to business
operations, but could be done for research
and development, understanding new
products and market opportunities, and
All of the hype around big data and its million use cases
is really based on the ability to do analytics. The reason
it becomes big data is because its a larger size, more
variety, faster response, and other attributes like that.
NIK ROUDA
Senior Analyst : Enterprise Strategy Group
says. This is an invaluable tool for improving internal systems and making
sure you meet operational goals.
With data analytics, however, you
could be looking at absolutely anything,
and it may not be business-related at
all, Rouda says. His example is looking
at taxi cab traffic patterns in New York
City. You can determine if certain people
are being discriminated against or if certain parts of the city are underserved.
Rouda admits that this could be a business analytic for taxi cab companies, but
that for sociologists, its all about the
data itself. In fact, he says, New York
City has made this information available to the public and people have been
using it in all sorts of creative ways.
These use cases also illustrate where
information actually comes from when
using either business intelligence solutions or data analytics. In the sales
forecasting example, the numbers are
coming directly from internal sales
teams and customer records. And in the
New York City taxi cab example, the
analysis is based on publicly available information that anyone can use for a variety of purposes. What does traffic look
like right now? Rouda asks. Wheres a
good place for me to start a new business
because there are lots of people passing
by? Wheres a good place to buy a house
because I know Ill be able to get home
and that it wont be too busy? Data analytics is just much more general and not
necessarily tied to business.
37
38
tools, it can more effectively make decisions that affect its general performance.
Unlocking the secrets contained within
big data can lead to greater operational
efficiency, cost reductions, more accurate
market trend predictions, and various
other deep insights.
A Needle In A Haystack
Any time you are forced to extract
pertinent facts from large amounts of
mostly unimportant data, problems will
arise. Scientists and researchers are always looking for the nuggets of gold in
large pools (or streams) of data collected
in surveys, tests, experiments, and recorded events. Financial organizations
analyze markets and economic forces to
determine investment opportunities. And
media and advertising companies use
complex algorithms to determine how to
craft messages that resonate with their
intended audiences.
Another reason big data is a slippery
term is due to the fact that technology
SOURCE: IDC
IDC's annual Digital Universe study reveals that the amount of data on the planet is expected to grow 10-fold by 2020.
39
Greenovations
ENERGY-CONSCIOUS TECH
The technologies
that make our
lives easier also
produce some
unwanted side
effects on the
environment.
Fortunately, many
researchers,
manufacturers,
and businesses
are working to
create solutions
that will keep us
productive while
reducing energy
demands to lessen our impact on
the environment.
Here, we examine some of the
newest green
initiatives.
Tesla's new Powerwall is basically a battery for the home that can store energy from solar panels or the grid and
let you use it later. In this photo, the Powerwall is mounted on a garage wall near another one of Tesla's products.
40
According to research done at the University of Illinois, nearly 7% of the power used in data centers is consumed
by serial links in computer architectures. Reducing the power used by the links results in significant savings.
41
SPEED OF CHANGE
You use CyberTrend
to keep tabs on the latest
.COM
Get the latest issue right now
online at www.processor.com
or on your iPad via the iTunes Store.
43
44
Select A Provider
For comfort and familiarity reasons,
using the same ITAD provider that handles their other IT equipment makes
sense for some companies. Other companies, however, are realizing there are so
many unique parts to doing mobile device
disposition well, that they use a mainstream ITAD supplier for most equipment and a different one that specializes
in mobile devices, Schafer says.
LaFleur suggests sending a request for
proposal (the IAITAM has templates available) to different ITAD vendors and use
their responses to base a selection on. He
also advises taking bids from providers that
specialize in mobile devices to see how they
compare with standard ITAD providers in
terms of resale value they can return.
Other considerations in choosing a provider should include the chain of custody
and transportation logistics the provider
offers. For example, find out if the provider
uses a third party for transportation, will
seal devices while in transit, and conducts
a one-to-one serial number match for enhanced security. For recycling purposes,
ensure any provider is familiar with local
and global recycling laws.
Overall, LaFleur says, its key to manage
the disposal vendor as if it were a part of
46
What To Expect
One thing you'll need to consider
is if your IT staff has the expertise to
manage the virtual desktops. "Moving
to a centralized architecture has repercussions on the skill required to manage
the user workspace, says Troni. For
example, the Gartner expert notes "In
Maintenance
Compared with traditional desktop
maintenance, theres little IT will need
to do when it comes to physical component upgrades in a thin client setup.
Thin client equipment has a life cycle
that ranges between six and eight years,"
says Troni. "During this time, the hardware will need some software upgrades,
but typically, IT will not upgrade components over the life cycle. If IT wants
to optimize or change virtual desktop
performance, everything is done over the
central management platform. Of course,
IT staff can make bulk enhancements to
systems, if needed.
Maintenance will be even less if you
select zero client solution, which is a
thin client device without an operating
system, processor, or drivers. Instead,
these boxes have connectivity for a keyboard, mouse, monitor, audio, and USB
devices, so you can connect all the typical PC peripherals, such as a printer
and speakers. The zero clients network
connection delivers the entire virtual
desktop from the serveryou can think
of a zero client as an advanced KVM
(keyboard, video, mouse).
47
Certied Piedmontese beef tastes great: lean and tender, juicy and delicious.
But theres more to it than just avor. Certied Piedmontese is also low in fat
and calories. At the same time, its protein-rich with robust avor and premium
tenderness. Incredibly lean, unbelievably tender: Its the best of both worlds.
piedmontese.com
The Feasibility
Generally, experts agree all-wireless access workspaces are feasible, though theres
disagreement as to whether theyre plausible
for everyone. Lazar believes all-wireless is fine
for some companies but notes that despite
802.11ac bringing wireless abilities on par
49
Need To Know
Rapoza says the initial setup for a wireless-only workspace is very simple. And if,
like many organizations, all your core applications are cloud-based, theres no real
need for a server closet, he says. While allwireless approaches are often associated with
smaller office settings, even larger enterprises
are considering all-wireless approaches
when facing refreshes due to costs savings,
Zimmerman says.
Although Landry says such an environment is absolutely possible, going wireless
50
Data Protection
Common sense and awareness of identity theft news stories mean that you likely
already know the personal data youll
want to keep private at all costs, including
your Social Security number, credit card
numbers, and other unique identification numbers. However, some online
services, such as those used by financial
institutions, may require that you provide some sensitive information to complete online forms. Tang advises asking
52
No Phishing
On the Web, scammers can lurk anonymously and trick people into providing
money or personal data for things such
as fake contests, phony tech support, and
financial schemes. Some red flags include unsolicited emails or phone calls
requesting private personal or financial
information (including online account
passwords), too good to be true offers, and hidden fees buried in terms of
service contracts. You may also receive
phishing emails, many of which promise
to provide a free item if you click a link
within the email message. Some of the
most common giveaways in phishing messages are gift cards for retail stores and
popular electronic items.
Another type of phishing is scareware,
which involves an email instructing you
to take some kind of immediate action
that requires clicking a link. If you click
the link, the message says, youll prevent
a drastic occurrence (such as having your
account deleted) or fix something wrong
(such as deleting viruses that have been
found on your PC). Be suspicious of
any such messages, even if they look like
they are from a reputable source, as even
trusted sources can be hacked.
Businesses must also worry about a
new type of phishing attack called spear
phishing, because it uses personal (sometimes detailed) information that targets
a specific person or organization. Spear
phishing scams are harder to detect than
the average win a free iPad by clicking
this link phishing message. For instance,
most spear phishing emails will address the
recipient by name and include details about
DATA BREACHES
Youll want to keep abreast of the
latest news regarding massive data
breaches, such as the Anthem or
Target breaches. If, unfortunately,
your data was leaked during those
breaches, you need to respond very
quickly, for instance, to check and
monitor your account status, change
your passwords, and take any other
necessary actions recommended by
the organizations who are investigating the breaches, says Alan Tang,
Info-Tech Research Group director of
research, security, and risk.
53
Firewalls Today
WHAT YOU NEED TO KNOW
54
A Little Background
face when it comes to securing networks is the simple fact that the PCs,
laptops, and mobile devices that help
make up the network are kind of nave.
When connected, after little more than
a handshake, computers readily share
information and communicate freely
with one another.
This is good, vital even. But most
other devices and networks cannot be
trusted, and computers are not built to
treat any and all incoming transmissions like the wretched hive of scum
and villainy that they potentially are.
Instead of throwing up roadblocks to
the computers ability to exchange information, however, we can use software and purpose-built devices that act
as gatekeepers: this is the firewalls job.
In this article well take a closer
look at the firewalls purpose, the types
available, and how firewall technology is moving forward to tackle modern threats.
55
NEARLY EVERY mobile device user is familiar with mobile websites and standard
(or native) mobile apps, the former accessible via a Web browser and the latter
downloaded from app stores. Arguably
fewer users are as experienced with mobile Web apps. In terms of reaching customers, clients, and employees via mobile
means, each of these avenues has distinct
pros and cons. The following focuses on
what mobile Web apps entail in relation
to the other two options and why businesses might consider developing them.
56
Reaching Customers
For businesses seeking the best way to
reach customers, clients, employees, and
others via mobile there are various considerations to weigh regarding using mobile Web apps and websites vs. devoting
resources to developing standard mobile
apps. In terms of development issues, for
example, mobile Web apps are based on a
generic translation engine, whereas native
mobile app code can be highly optimized
to take advantage of specific hardware and
OSes, Valani says. Additionally, mobile
Web app frameworks can lag behind native mobile app frameworks, he says.
Valdes says depending on how mobile Web apps are implemented, theyll
have more limited user experience and
functionality vs. native apps. Conversely,
depending on execution, native apps will
have higher development and maintenance
costs, and theyll be more difficult to update. Similarly, the Forrester report states
that mobile apps shine at interactive experiences on targeted devices and can offer
customers deeply engaging experiences.
Mobile Web, meanwhile, delivers a consistent experience on every device.
In a 2013 article, Al Hilwa, IDC program
director of application development software, describes an enlightened coexistence
between Web and native device application
platforms that could prevail. Although
native apps will remain dominant, Hilwa
states the Web platform will make significant inroads, to that point Web technologies may infuse the majority of mobile
apps one day. Initially, various development tools that generate installable native
apps will support Web technologies, he
writes. These hybrid apps may be written
primarily in HTML and JavaScript and take
advantage of browser components available
on a native device platform, he states.
Forrester describes hybrid apps as one
part app and one part Web. Similar to mobile apps, hybrid apps have a presence in
app stores and on touchscreens, load like
apps, and have local storage and security
abilities. Like mobile Web, hybrid apps display content in an embedded browser. In
Questions To Ask
For Valani, deciding if a mobile Web
app, standard mobile app, or mobile
website approach is best is essentially an
apples and oranges scenario. Trying
to correlate reach and end users would
imply that customers prefer one type of
app container over the other, he says.
Numerous other external factors are involved, however, including social ranking,
trustworthiness, update frequency, integrated ecosystem, and personalization.
Bottom line is the business shouldnt
focus on the technology but on the value,
he says.
Specifically, Valani believes the container should be a secondary issue. In general, businesses should focus more broadly
on mobile innovation, including by asking
how it will make workers more productive, provide the business a competitive
edge, provide other unique or enhanced
services, and enable the organization to
leverage existing investments. Questions
business administrators, architects, and
developers should consider include: Is native hardware access needed? Does a large
pool of Web developers who understand
HTML, CSS, and JavaScript already exist?
Do you need to deploy an app on multiple
devices? Is the fact that code may not perform equally across devices acceptable? Is
there a release-management strategy for
mobile apps?
When determining an approach, Valdes
stresses the need for businesses to know
their users, needs regarding the businesss
digital channels, and the high-value and
high-priority use cases for specific channels. Organizations will likely need a fullfeatured, content-rich website accessible
by desktop PCs, tablets, and a variety of
mobile phones, he says. Further, there
might be a subset of functions that can be
packaged into a mobile Web app with an
easy-to-use, touch-centric interface. Lastly,
there might be a small handful of scenarios
for which a dedicated, high-performance
native app makes sense, he says.
57
58
59
Smartphone Tips
ADVICE FOR HANDLING EMAIL, CALENDAR & CONTACTS
WINDOWS PHONE
Delete Email In Bulk
Get Help
Need more help? Tap the Help+Tips
tile. This app provides access to quick
hints, how-to articles, and frequently
asked questions. The videos can be particularly helpful when a visual walkthrough is in order.
60
ANDROID
Set Up Encryption
If you have added an event to your calendar, the entry can be public or private
depending on the setting used. If there is an event in your calendar you would like to
keep private, launch Calendar, access the event, tap the event name to open it, press
the Menu key, tap Edit, and make sure the event is set to Private rather than Public.
Report Spam
Just because youre using your smartphone for a majority of your emailing these
days doesnt mean you have to put up with spam. To take care of unwanted messages, just tap the offending piece of email to view it, press the Menu button, and
then tap Report Spam. Depending on your phone, you may need to tap the More
icon to see the Report Spam option.
61
BLACKBERRY
Add Contacts To Your
Home Screen
Launch the Contacts app and highlight the contact you wish to have on
your home screen. Press the Menu key
and select Add to Home Screen. A small
box will appear, with an icon for the contact and the contacts name. You can
change either by tapping on it. When
youre satisfied with the name and icon,
tap the Add button.
62
Roaming, the ability of a phone to stay connected even when youre outside of the service area offered by your mobile provider, is a handy option but
it can also be an expensive one. In many cases, roaming can incur additional
costs, especially if you use data services when youre outside of your carriers
coverage area.
You
can
control the services that are
available when
youre roaming,
and either have
your BlackBerry
turn data services off automatically or
ask you what
to do when you
start roaming. Turn data services off, or have your BlackBerry prompt you when youre roaming, to
F r o m y o u r control roaming costs.
BlackBerrys
Home screen,
access Settings, select Network Connections, and Mobile Network. Select the
Data Services While Roaming drop-down menu and tap either Off (to turn
data services off) or Prompt (to have your BlackBerry ask you what you want
to do when you start roaming).
iOS
Manage Your Email, Calendar
& Other Notifications
Are you getting so many unnecessary
notifications that your email and calendar ones are getting lost in the shuffle?
You can control that. Access Settings and
tap Notifications. Tap Sort Manually,
and then tap Edit. Now you can slide
app/notification types around to determine which are (and arent) included
in the notification area and the order in
which they appear.
63
Excel Formulas
MAKE THEM WORK FOR YOU
64
Calculate Percentages
You can calculate percentages in a variety of ways using Excel, depending on
MATCH Function
Excels MATCH function makes
it easier to find the location of a specific
figure relative to its order in a column.
For instance, if you are searching
for the number 780 in a column of
30 cells, you can type the formula
=MATCH(780,B1:B30,0) to find your
exact match. If the information is located
in the 15th cell, for instance, youll receive
the result of 15 from the formula. You can
also use a 1 or -1 modifier in place of the 0
to find the number that is greater than or
less than your desired figure.
Round Up Or Down
If you work with figures that have multiple decimal numbers and need to round
up or down to a specific decimal place,
then Excel has two easy functions you
can use to get the job done: ROUNDUP
and ROUNDDOWN. For example, take
a number you want to round up, such
as 12,345.678 and decide what decimal
place you want to round to. Then, use the
function =ROUNDUP(12,345.678, 2) and
Excel will automatically round it up to
12,345.68.
WORKDAY Function
WORKDAY lets you take a start date
and a number of days to determine what
your end date will be with weekends and
holidays taken into account. For example,
you need to enter the DATE formula,
The MATCH function is helpful if you want to find a specific figure in a long column of numbers. It shows you where your
query is located in relation to the array you provide in the formula.
REPT Function
Typing the same thing over and over
can quickly get repetitive, especially if
you need 32,767 instances of the same information. If you think that number is
oddly specific, youre right. Its the maximum number of times you can use the
REPT function, according to Microsoft.
To use the REPT function,
simply take a word, number,
or other entry (Repeat,
in this instance) and tell
Excel how many times you
want it repeated by typing
=REPT(Repeat,5) into a
cell. You can also use this
function to better visualize
data. For instance, you can
use symbols to represent
sales figures or your amount
of customers and watch your
growth over time.
65
Rootkit Attacks
WHAT TO DO TO FIGHT BACK
What Is A Rootkit?
A rootkit is software that infects and
gains privileged access to a computer.
This means it can perform administratorlevel type tasks, says Michela Menting,
practice director with ABI Research. The
primary feature is that it can hide itself in
the system and remain undetected.
One way to think of how a rootkit
wreaks havoc, says Jim OGorman, an
instructor of offensive security measures, is to envision that you are driving
66
popular with malicious hackers and cybercriminals, which is why they have such
a negative connotation.
NOT ALL ROOTKITS ARE MALICIOUS, HOWEVER, ABI RESEARCH'S MICHELA MENTING
SAYS THEY ARE EXTREMELY POPULAR WITH
MALICIOUS HACKERS AND CYBERCRIMINALS,
WHICH IS WHY THEY HAVE SUCH A NEGATIVE
CONNOTATION.
Unfortunately, the likelihood of being hacked or unwittingly downloading malware on a computer is extremely
high. Especially in the network-connected environment
of a company, even if you take all precautions necessary
someone else may not have and you get a virus from
them internally.
MICHELA MENTING
Practice Director : ABI Research
What To Do
For typical users, arguably the worst
news concerning rootkits is that getting
rid of one can be beyond their scope.
Olds says, in fact, most users should
probably seek an experts help if they
suspect a rootkit infection. Though some
security programs can detect and remove
specific rootkits, Menting says, there are
so many variants that it can be impossible
to detect and remove them all. Often,
she says, getting rid of a rootkit requires
a radical solution.
If a user suspects a rootkit, he should
first disconnect the system from the Internet to cut off possible remote access and
prevent data from leaking, Menting says.
Next, remove data from the infected computer and scan it for malware on another
device. (Menting notes that if the data
contains unknown [or zero-day] malware,
this step may not guarantee the malware is eradicated.) Finally, the computer should be purgedwipe the hard
drive and reinstall everything, she says.
OGorman, in fact, says starting over is
the only real solution, because really, you
cant trust cleanup methods, as you are
never really sure if they worked.
67
up data can include camera roll images, documents, audio, and settings,
depending on the options you choose.
Android users can manage incremental backups for apps and device
settings by signing into the associated
Google Account from their smartphones or tablets. The Android Auto
Sync feature routinely syncs in the
background; how and what it syncs
partly depends on the options you
choose, but by default the feature backs
up OS data, contact information, documents, and select app data (such as
Facebook and Twitter).
If you have a device running one of
the latest versions of Windows Phone,
you can sync documents stored on your
device with Microsofts OneDrive cloud
68
Dont Forget
Your App Data
App data encompasses a broad
range of digital information, but in
our context it means third-party apps
and the content you create using those
apps. Consider, for instance, notetaking services that exist as both cloud
services (where all of the information
that is associated with those services
is stored in the cloud) and applications
(where your app-related information
is stored locally). As you take notes
with the app, it stores those notes locally and in the cloud simultaneously
and in real-time. Such an app-service
combination is different from a notetaking app that does not have an associated cloud service; with this type
of app, everything you add is stored
only in the device and is therefore
vulnerable to loss. Make sure you know
how your apps work so you dont get
caught unawares.
Also keep in mind that some apps
are more flexible than others. Apples
Be Careful
When Traveling
If you travel frequently, you probably have quite a few travel-related
routines. When it comes to keeping
all of your data intact, though, its important to remember that travel disrupts the routines youve established
at the office. For example, if you regularly sync your tablet and smartphone
with your computer but typically leave
the computer behind when traveling,
the backup that otherwise occurs with
every physical sync wont take place
during your travels. If you keep that
sort of thing in mind while traveling,
you will remain aware of what data resides in the danger zone (i.e., stored
on your device, but not backed up anywhere else) in the event your device
gets lost or stolen.
Physical Backup
Finally, you cant sync a certain
amount of valuable device data to the
cloud (or to your main computer via
the cloud), so be sure to back up that
data as often as possible to a second
device (such as a laptop) or storage solution (such as a microSD card or portable hard drive).
You can customize which apps are backed up in iCloud by toggling the
ON/OFF button next to each app. Be sure to activate the Find My iPad feature
in case you need to locate a lost iOS device.
69
PowerPoint Tips
ADD CHARTS & GRAPHS TO YOUR PRESENTATION
70
Highlight Important
Data In A Chart
Whether youre presenting numerous
charts or need to add emphasis to specific data within a chart, sometimes its
Insert A Chart
Linked To Excel
If youre used to working in Excel and
prefer to construct the skeleton of your
chart first, you can use Excel to compile data and create a chart for use in
PowerPoint. Start by entering values in
an Excel workbook. Highlight all necessary data cells, click Insert, and apply a
preferred chart style in the Charts pane.
Next, select the newly created chart and
click Copy in the Home tab. Open a current or new PowerPoint slide and find
the Clipboard pane on the Home tab.
Modify Data
In An Existing Chart
Add Animation
If you want to emphasize a particular
data group, you can add animations to
a graph or chart. Under the Animations
tab, the Animation pane has a variety
of animations you can apply to a chart.
Explore extra effects
by expanding the pane
and clicking More
Entrance Effects,
More Emphasis Effects, or More Exit
Effects at the bottom
of the menu. To stagger the animation of
individual objects,
click Effect Options
in the Animations
pane and select one
of the following
functions: As One
Object, By Series, By
Category, Be Element
In Series, or By Element In Category.
71