hr_payroll_cloud_400.jpg

SMB Human Resources and Payroll Find a Home in the Cloud

hr_payroll_cloud_400.jpg

It’s no secret that cloud computing has become a major part of what most small businesses’ operations. One aspect of business administration that many businesses keep in-house is their HR department. Today, we’ll take a look at HR and payroll software, and how moving your business’ human resources department to the cloud is a good solution.

Human Resources may not be the meat and potatoes of any business, but it is exceedingly important. With all the mandates a business has to stay in compliance of, having people whose job it is to deal directly with the staff on behalf of the company makes a lot of sense. Since some SMBs don’t have a dedicated HR department, there are now platforms available that provide those services. But, let’s first start by outlining what kinds of tasks the average small business has to deal with, with a list.

The top six issues a HR department would have to deal with are:

  • Employee retention
  • Health and safety
  • Personnel
  • Payroll
  • Training and compliance
  • Employee management

Software developers have been creating dynamic human resources software, aiming to take the hassle out of a crucial part of your business. Some are pretty advanced, providing human resources directors useful automations that help them control many of the vast responsibilities placed on them. Some useful HR-related software you’ll see includes:

  • Human Resource Information System (HRIS)
  • Applicant Tracking System (ATS)
  • Onboarding
  • Benefits Administration
  • Time and Compensation Management
  • Training Management Performance, and Recognition Management
  • HR Analytics
  • Wellness Management

It seems overwhelming, but most of today’s most popular and utilized tools check most of the boxes as far as including a useful cache of tools that will allow them to manage any small or medium-sized human resources department competently.

While it once was popular to host all the applications a HR department would use on a single computer or on a very small network, today there are a few HR software vendors that provide a completely hosted solution. This means the software is hosted on secure servers that are managed by a provider, and accessible from anywhere there is an Internet connection.

Human Resources as a Service
Some small businesses have begun to completely outsource their human resources, with some success. HR as a service (HRaaS) basically eliminates the need to hire human resources staff, as the service provides resources that allow for a holistic approach to all the important tasks a human resources director would accomplish without the resounding costs associated with traditional human resources strategies.

Not only does a HRaaS platform eliminate a large section of the costs associated with human resources, it standardizes the approach to HR, eliminating the hiccups that often happen with the traditional method. A business will have their HRaaS platform customized for them and would be assigned a HR professional to help keep everything working properly.

Ultimately, it will be up to you to determine how to do human resources right. If your business is searching for a consultant to help you through hard business and technology decisions, reach out to the professional IT technicians at NuTech Services. Call 810.230.9455 to get started building a more efficient business.

google_keyboard_short_400.jpg

Tip of the Week: Useful Shortcuts for Google

google_keyboard_short_400.jpg

Google is well-known for being a go-to provider for Internet-related services and solutions. Your business might already be taking advantage of them, but are you using them to the best of your ability? With keyboard shortcuts and other various tips and tricks, you’ll be able to take advantage of them in previously unforeseen ways. Here are just a few of them.

Google Drive

  • X allows you to select or deselect items.
  • Shift + A allows you to select all visible items. You can use Shift + N to clear your selection of visible items.
  • Enter or O will let you open an item you have selected, while N will let you rename it.
  • Z lets you move an item to a selected folder, while S will star or unstar them.
  • You can use these shortcuts to create various items:
    • Folder – Shift + f
    • Document – Shift + t
    • Spreadsheet – Shift + s
    • Presentation – Shift + p

Google Docs

  • Ctrl + K: Insert or edit a link.
  • Alt + Enter: Open a link.
  • Alt + Shift + 5: Type with a strikethrough in your text.
  • Ctrl +: Format your text with a superscript.
  • Ctrl -: Format your text with a subscript.
  • Ctrl + Alt + F: Insert a footnote.

Google Sheets

  • Ctrl + Space: Select all contents in one column.
  • Shift + Space: Select all contents in one row.
  • Alt + Shift + 7 or Ctrl + Shift + 7: Apply a border to your selected cells.
  • Ctrl + \\: Clear formatting of your selection.
  • Ctrl + Page Up or Ctrl + Page Down: Jump to either the previous sheet or the next sheet.
  • Ctrl + ~: See the list of formulas.

Google Slides

  • Ctrl + D: Duplicate a slide or object.
  • Page Up/Page Down, Up/Down: Move from slide to slide in the filmstrip.
  • Ctrl + Alt + Shift + F: Move over to the filmstrip.
  • Ctrl + Alt + Shift + C: Move back to the canvas.
  • Alt + Shift + Left/Right Arrow: Rotate objects by one degree.
  • Alt + Left/Right Arrow: Rotate objects by fifteen degrees.

By using these shortcuts, you should be able to get more out of your Google services. There are far too many shortcuts to include here, so for the complete list, you’ll need to be in Drive, Docs, Sheets, or Slides. Once you’re in, just use Ctrl + / to pull up the list of keyboard shortcuts for the Google app you’re using.

Do you have any tips and tricks to share? Let us know in the comments.

sell_you_backup_400.jpg

The Benefits of Data Backup Far Outweigh the Costs

sell_you_backup_400.jpg

Businesses don’t like to spend money on solutions they don’t need. You’d rather make sure you hit payroll, dish out Christmas bonuses, and have something left over to grow. With this in mind, a business that doesn’t properly back up their data might not get a chance to make payroll, dish out bonuses, or even keep their doors open. Data backup isn’t something to skimp on, because when the time comes, it can mean disaster for your business.

Imagine, for a moment, just how much you have to lose from a data loss incident. Your business depends on its data, and if it suddenly loses access to it, you could be in a position where downtime significantly impacts your bottom line. In situations like this, you have no time to waste. You have to get back in the game as soon as possible or you risk losing so much traction that it could be hard to keep the doors open.

With this in mind, you can’t possibly achieve this goal without data backup. You have to think of it in terms of a potential loss incident–essentially it is professional risk management. While it’s true you don’t want to make decisions based solely on the what-ifs, it’s hard not to justify it in this case. What it boils down to is this: if you don’t have data backup and suffer from a disaster, your business will, more likely than not, fail. Therefore, the best way to ensure the possibility of success is to implement data backup and prevent a potential loss incident from surfacing in the first place.

Basically, the sheer fact that you know you need to back up your data is enough to justify having a solid backup solution.

The point that we are trying to make is that we shouldn’t have to convince you to go all-in on your business’ data backup and disaster recovery solution. It should be common sense. After all, you’re trying to preserve your business and its future against the possibility that a disaster scenario cuts its life short. You have no reason not to invest in something that could potentially save your business. It doesn’t matter whether it’s from a natural disaster, user error, or hardware failure–there is always the chance that an unforeseen event could spell the end of your organization.

The right data backup solution can go a long way toward keeping your business afloat, even in a worst-case scenario. To find out more about BDR, reach out to NuTech Services at 810.230.9455.

cloud_applications_use_400.jpg

What Cloud Applications Are You Using?

cloud_applications_use_400.jpg

Does your business use any cloud-based applications to go about its daily duties? Chances are that with today’s increasingly online business environment, it’s not out of the question for many organizations to have not just parts of their infrastructure in the cloud, but entirely online infrastructures at that. If you’re still considering the cloud as a tool for your business, we’ll provide a primer of sorts to help you make an informed decision.

Applications
Applications, or “apps,” are pieces of software that can be used for specific purposes in the workplace–but you probably already knew that. If used properly, they can streamline specific processes within your organization. Some apps don’t use connectivity, but there are countless others that utilize it to connect all kinds of workers from the professional spectrum together. These kinds of connected apps are generally found in the cloud, and their wide range of use is one of the defining things about them.

The Cloud
You can think of the cloud like a big data center that gives you access to all sorts of software, processing, and storage options through your Internet connection. Computing resources tend to be made available to users through an “as a service” model, in which users secure access to it by paying a monthly fee rather than purchasing a license outright. Apps deployed through the cloud are slightly more expensive as a result, but the flexibility offered by being able to cancel at any time or add new users makes it a valuable opportunity to save money in the long run. Basically, it creates a situation where you transfer your capital costs of purchasing licenses to an operational cost.

Public, Private, Hybrid
There are several different ways that a cloud solution can be constructed. For example, most of the Software as a Service (SaaS) apps are offered as a public cloud solution, which means that the application and any processing or storage associated with it is on shared hardware. It’s made available through the browser or dedicated app, and for this purpose, its costs are generally lower than more private solutions.

In comparison, a private cloud that’s hosted in-house on a network or server unit is much more secure and customizable, as you’re controlling all of the maintenance and management of the system. For this specific reason, however, we recommend private cloud systems only for businesses that have the assets to take care of them; this includes those who outsource IT maintenance or those who have an in-house IT department who can provide the necessary management and oversight of the system.

For the best of both worlds, a hybrid approach can work. After all, some data is more sensitive than other data is, so anytime-anywhere access to it might not be in your business’ best interests. By combining the cost-effective public cloud model with the security of the private cloud, you can maintain adequate accessibility and data security.

Cloud Services
Just like there are many different types of clouds, there are many different cloud services, all for both businesses and individual users. There are generally three major categories that these cloud services are split into:

  • Software as a Service: Software delivery is the name of the game here, including communications (like telephone and email), productivity (Office 365), and even security.
  • Platform as a Service: Development is the main reason to go this route. This lets users create applications, collaborate on projects, and test new software without purchasing or paying for hardware.
  • Infrastructure as a Service: Virtualized environments that can be used for processing, storage, software, and so much more, are what a user gets from Infrastructure as a Service.

To learn more about how the cloud can help your business, reach out to NuTech Services at 810.230.9455.

totw_replicate_relocate_400.jpg

Tip of the Week: How to Replicate and Relocate Text Easily

totw_replicate_relocate_400.jpg

Sometimes, things are written in the wrong place. Fortunately, there are means of moving them if they happened to be written using a computer. These processes are relatively very simple and are so commonly used that the shortcuts are right next to each other on the keyboard. For today’s tip, we’ll review how you can cut, copy, and paste content in effectively any program you use.

Once you have your content selected, whether it’s text or an image, all you have to do is press two keys.

To cut a word or phrase from one place in your content, press Ctrl + X. To copy this content instead, keeping the original and duplicating it elsewhere, press Ctrl + C. Pasting your content is just as simple – with the place you want the content added selected, press Ctrl + V. This will insert your content where you want.

If you happen to be copy-pasting from a website to another document, it may not be a bad idea to paste it without bringing any formatting from the website over. Otherwise, it is apt to look funny on your documents. Pasting without formatting is almost as simple as regular pasting, you just add another keystroke in the middle: Ctrl + Shift + V.

Of course, any of the tasks can be accomplished with the mouse alone. Right clicking on a word, an image, or a group of selected text will bring up a menu that includes all of the above options. However, your cursor is generally more accurate than the mouse, so you may have to undo your efforts (Ctrl + Z) a few times before it’s right.

Real World Example:
Let’s say you want to send a webpage link to someone in an email or instant message. In your web browser, click the address bar (that’s the part with the ‘http://… “). That will highlight the URL. Hold down Ctrl and press C. Then go into your email or instant messenger, click where you want to paste the URL, and hold down Ctrl and press V.

Whichever you use, it’s bound to be more time-efficient than rewriting anything that needs to go in a different spot. Make sure you subscribe to our blog, so you can be alerted whenever we upload more content!

robocaller_stop_400.jpg

Fingers Crossed! The Robocalls May Soon Stop

robocaller_stop_400.jpg

While many of us rely on phones to remain productive during the day, too often are we now picking up the phone to a spammer’s snake-oil sale: “Hello, we are reaching out to inform you that there has been an issue with your account” or similar nonsense. While this is enough of an irritant in our daily lives, it isn’t as though a business can wait for a call to go to voicemail to find out if it was legitimate or not.

Chances are, you’re all too familiar with exactly the kind of scam I’m describing. The one that makes the Do Not Call List sound like wishful thinking, that makes it look like someone from your area – or even your contacts list – is trying to reach you.

Chances are, you’ve answered one of these calls, only to hear silence, broken after you say “Hello?” As soon as you do, a (likely prerecorded) voice launches into its tirade, being a nuisance and bothering people.

Chances are, you may have even received angry phone calls from people you’ve never met, let alone called, claiming that your number has been the source of repeated calls just like these.

You aren’t alone.

Unfortunately, the scammers responsible are talented at skirting rules and regulations.
Calls like these have been harassing users for quite some time, simply because the scammers understand how to cheat and find loopholes. This is all despite the efforts of regulatory bodies like the FCC (the Federal Communications Commission).

In November of 2017, the FCC enabled telephone providers to block calls that were presumably fraudulent. This was based on many factors, like the calls coming from invalid numbers or numbers with no service provider attached.

However, the rules outlined in the 2017 Call Blocking Order weren’t enough to stop scam robocalls for long.

Now, we all have had to deal with the huge nuisance of neighbor spoofing. Neighbor spoofing has almost certainly affected you directly, and if you’ve been lucky enough to avoid it, it’s happened to someone you know.

But you may be asking, what is neighbor spoofing?
If your phone rang, and you have caller ID enabled, you’ve probably developed the habit of checking the number before you answer it – after all, a local number is probably safe to pick up.

Neighbor spoofing has made it so that assumption is no longer the case.

Instead of using a fake number to call their targets, scammers using neighbor spoofing will actually use someone’s real number to call someone relatively nearby – sometimes literally next door. If you’ve ever received an angry phone call from someone demanding an explanation for someone with your number repeatedly calling them and harassing them, your number just so happened to be the one that these cybercriminals spoofed.

There have even been reports of people receiving calls from their own number, claiming to be from the phone company as an attempt to “verify a hacked account.”

Neighbor spoofing is also a very effective method for scammers because it can bamboozle the automated protections already in place to stop scam calls, just like it fools the targeted phone’s user. This also keeps the Do Not Call list from affecting these scammers’ attempts (as if it ever stopped them before).

Additionally, many apps may add some unwanted complications, even if they are effective.
There are mobile applications available that are intended to stop robocalls from ringing your smartphone in the first place. One such application, the aptly-named RoboKiller, does this in two ways. First, RoboKiller references a list of numbers identified as spam, and blocks these calls completely. Second, it uses a patented analysis of the call’s audio fingerprint to compare it to those of other spam calls. Regardless of the number it appears to come from, RoboKiller can identify if it is a match to a known attempt.

You’ll only know that you were targeted after you read the notification that RoboKiller provides.

Meanwhile, RoboKiller responds to the scammer with a time-wasting prerecorded message. You can then review the calls that RoboKiller blocked by opening the app on your phone. There, you can listen to a recording of blocked calls to determine which calls were spam, and which were legitimate attempts to reach you. From there, you can whitelist a number by pressing the Allow button.

Users of RoboKiller can also add numbers to their list of permitted callers to allow them to come through. RoboKiller is a subscription-based application that charges $2.99 each month ($24.99 for an annual subscription), which may be seen as a relatively low cost if you’ve received enough of these calls.

As RoboKiller states on their website, “With RoboKiller, you don’t stop neighbor spoofing. You take action in the fight against the robocall epidemic.”

However, this approach isn’t without some worries.

For one, consider the cost of admission for this app. Yes, $2.99 may seem like a bargain if you have a smartphone, but what about all the people who still don’t? Furthermore, many mobile users today are of older generations, and may not understand how to work the application (or again, may not have a device that is compatible with the app). Yet, these worries may not be necessary for long.

Both the government and the telecom industry have had enough.
It wasn’t long after the 2017 Call Blocking Order was released that the attorneys general from a full 40 states came together to form the Robocall Technologies Working Group. This is a bipartisan commission intent on collaborating with service providers to learn about robocalling technology with the ultimate goal of stopping it.

On October 8th, the attorneys general of 35 of those states signed a letter to the FCC stating that the efforts of law enforcement had not and would not be sufficient to stop abusive scam attempts and robocalls. In this letter, the attorneys state some chilling facts:

  • 30.5 billion illegal robocalls were made in 2017 alone, up from the estimated 2016 total of 29.3 billion.
  • Estimates have placed the total calls made by the end of 2018 to be somewhere near 40 billion.
  • Phone scams allowed cybercriminals to steal an estimated $9.5 billion in 2017.
  • August of this year saw 1.8 billion scam attempts in the 4 billion illegal robocalls made that month.

Facts like these only highlight the pervasiveness of these scams, and how important it truly is to eliminate them as much as possible. In fact, the Federal Communications Commission has gone on the record to demand that mobile providers figure out a standardized system to help prevent these calls from reaching mobile users, echoing the demands made by the attorneys general.

This system would rely on call authentication to ensure that only legitimate calls would make it though, and that spoofed calls would be caught by requiring all calls be verified as coming from the correct source.

Not only did Commissioner Ajit Pai release a statement to the press demanding that this system be created, he sent a letter to 14 telecom CEOs, including AT&T’s John Donovan, Charter’s Tom Rutledge, Verizon’s Hans Vesterburg, T-Mobile’s John Legere, Comcast’s Brian Roberts, and Google’s Sundar Pichai.

Pai demanded that these changes be ready to deploy in one year, giving telecoms a ticking clock to establish what they call the SHAKEN/STIR framework (Secure Handling of Asserted information using toKENs/Secure Telephone Identity Revisited). This move was met with the approval of the attorneys general, who went on to encourage the FCC “to implement additional reforms, as necessary, to respond to technological advances that make illegal robocalls and illegal spoofing such a difficult problem to solve.”

As the attorneys general said: “Only by working together, and utilizing every tool at our disposal, can we hope to eradicate this noxious intrusion on consumers’ lives.” Fortunately, this will also benefit the businesses that have been affected.

With any luck, we’ll only have to deal with the robocalling nuisance a little while longer. For assistance in keeping other scams from interrupting your business and putting it at risk, reach out to NuTech Services. We have the experience to stop the other threats you would otherwise deal with on a daily basis. Call 810.230.9455 today.

suprised_help_desk_400.jpg

You May Be Surprised What You Are Missing Without a Help Desk

suprised_help_desk_400.jpg

Businesses these days rely on technology in order to function properly, but what happens when this technology doesn’t operate as intended? If your organization doesn’t have a dedicated help desk on-premise, you’re probably suffering from unnecessary downtime and technology troubles with no recourse.

Of course, not all businesses have the luxury of hiring in-house technicians to function as a help desk. In cases like these, outsourced solutions are viable alternatives, if they aren’t outright better overall. Here are some of the best reasons why your organization should implement an outsourced help desk solution.

Help Desk Support Minimizes Downtime
You may have heard the excuse, “I would have done the work, but I didn’t know how,” or “My computer wasn’t working properly.” If you don’t have anyone available to help your staff with their issues, chances are they are being ignored and piling up, resulting in a situation where your staff simply can’t do their jobs–not because they don’t want to, but because they literally can’t. If you have someone your staff can reach out to for assistance with the technical side of their job, they’ll be more likely to get assistance and improve their productivity. Most importantly, you’re keeping downtime to a minimum, as it is a huge blow to your bottom line if left unchecked.

Help Desk Support Provides a Single Point of Contact
Even more confusing for some employees is who to actually contact in the event they need help with their technology. Sometimes the organization will have several numbers compiled in a location for all to see, but this isn’t helpful, as the employee might wind up having to reach out to several vendors just to resolve a basic issue. By using a help desk solution, there is only a single phone extension or email address to inform, making this kind of assistance much more accessible.

Help Desk Support Can Augment In-House Assistance
Let’s say that your internal IT department is responsible for helping your employees out with their technology troubles. This is fine and all, but chances are that they don’t have enough time to implement new solutions, keep your hardware and software updated, monitor your network for inconsistencies, and manage all of your organization’s devices, let alone take a call from Susan down the hall because she can’t access her email. You can help your business’ IT department out by taking this one responsibility off their shoulders and handing it to an outsourced, remote help desk.

If your business finds itself falling short in terms of help desk support, look no further. NuTech Services can help your business get the support it needs to maintain operational efficiency. To learn more, reach out to us at 810.230.9455.

totw_pro_plan_400.jpg

Tip of the Week: Three Pro Business Tips

totw_pro_plan_400.jpg

While running a business can be quite rewarding on a professional level, it can be extremely challenging, with countless obstacles to overcome–particularly in regard to technology and its management. Thankfully, there are ways your business can minimize the pain of managing technology. Here are just a few of them.

Be Prepared to Lose Power
Electricity is perhaps the most important part of using technology in the workplace, as without it, the devices that empower your business’ operations just won’t function. In some cases, you might suddenly lose power, leading to data loss and other disaster scenarios that could strike your business down if you’re not prepared for them. With progress grinding to a halt, downtime will ensue, creating a considerable loss for your business.

Even if you’re not losing power, an excessive amount of it can create a surge, damaging the infrastructure itself and harming the individual components that make it up. It’s ultimately in your best interest to take measures against these events, as you made an investment that needs a substantial return. Surge protectors can be helpful to prevent excessive power from crippling these important machines, but in some cases, you’ll want a more powerful solution. An uninterruptible power supply, or UPS device, can help your servers, workstations, and other important technology shut down properly in the event of a power outage or surge, giving you the ability to minimize damage done.

Maintain a Steady Internet Connection
The Internet is an invaluable tool that can help your business succeed, and the Internet plays a larger role in its functionality than it ever has before. A lack of Internet ultimately becomes downtime for many organizations, as they depend on the Internet for various services and communications. More often than not, there’s nothing you can do about a lack of Internet if it comes from your service provider. To keep this kind of downtime from sinking operations, many businesses have implemented backup Internet connections, just in case they ever have to use it. This comes with a downside–you’ll have to maintain that connection–but it will likely be worth the investment if you ever need it.

Place Boundaries on Your Staff
Even the best employees are known to make mistakes from time-to-time. While you can trust them for the most part, nobody is perfect, nor should you expect them to be. Some might even try to implement their own solutions with the intention of making their jobs easier and more efficient. This is called shadow IT, and it can be dangerous. You have no way of knowing whether it’s putting your business at risk. You can implement measures to ensure that your employees aren’t downloading unauthorized applications through the use of administrator and user privileges. If you limit what your users can do with their machines, then you have less to worry about.

NuTech Services can help your business ensure managing IT doesn’t become a hassle. To learn more, reach out to us at 810.230.9455.

bing_google_war_400.jpg

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

bing_google_war_400.jpg

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple–they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to NuTech Services’s blog.

8_data_backup_terms_400.jpg

8 Data Backup Terms You Should Know

8_data_backup_terms_400.jpg

Data is an asset, there’s no getting around this fact. Therefore, your business needs to consider it important enough to protect with a data backup and disaster recovery solution, as even something unlikely, like a natural disaster or hacking attack, could place your organization in peril. We’re going to take a look at some of the different kinds of data backup and disaster recovery you can expect to see, as well as four terms that you should understand.

The Types of Backup
Here are four of the most common types of backup that you can expect to see in an office environment:

  • Full backup: This type of backup makes a copy of all selected files in their entirety. Most backup solutions will have to initially go through this process, and since this is such an intensive process, it will take longer than other data backup types. If this is your preferred method of backup, it will likely have to be done after-hours, as it takes a long time and could tie up processes that are needed during the workday.
  • Differential backup: This type of backup only backs up changes made to the data. This allows for faster backups, but the process of recovery is much slower.
  • Incremental backup: This type of backup is much like a differential backup, with the main difference being that an incremental backup will always back up the data regardless of if a full backup was completed or not.
  • Mirror backup: A mirror backup makes a real-time duplicate of the source and backs it up. This creates complete redundancy, but it also comes with various issues. For example, if the material is deleted by mistake, the mirror will also be deleted. This reason alone dissuades IT technicians from using mirror backups as a viable solution for their backup needs.

Now that the types of data backup have been explained, we’ll go over some of the backup-related terms you might want to know.

  • Business continuity: A business continuity plan is designed to help your business get back in proper functioning order if you’re ever hit by an unfortunate situation. All organizations need to have a business continuity plan in place.
  • Disaster recovery: Disaster recovery is specifically there in the event your business suffers from a disaster involving data loss. This includes cyberattacks, sabotage, user error, and even weather-based disasters that destroy infrastructure.
  • Recovery Point Objective (RPO): RPO is a benchmark that represents which data will be recovered by your business if it wants to get back to normal business operations following a disaster.
  • Recovery Time Objective (RTO): RTO is a benchmark that represents the time needed for your business’ data to be restored. Minimizing this number is critical to keep downtime as low as possible.

NuTech Services can help your business by equipping it with a comprehensive data backup and disaster recovery system. To learn more, reach out to us at 810.230.9455.

evernote_tips_400.jpg

Tip of the Week: Using Templates in Evernote

evernote_tips_400.jpg

The note-taking application Evernote is a favorite of many users, as it allows them to keep extensive notes in an organized fashion. Its true utility goes beyond that of a digital scratch pad, however, as it has additional features that offer much more. For this week’s tip, we’ll review one particularly useful feature: templates.

What Are Templates?
Evernote’s templates are handy, pre-built structures for notes that provide users with a simpler means of organizing specific types of information. Instead of taking time struggling with your formatting each time you start a new note, you can apply one of the templates that Evernote offers on their website. Those with a subscription to Evernote Plus, Premium, or Business can even use formatting they’ve created in past notes to generate their own templates for repeated use.

Applying Templates in Evernote
Once you’ve acquired a few templates, either from the Evernote website’s collection or from a past note, applying one of your choosing is relatively simple.

  • In Evernote, start a new note.
  • In the body of the note, click Templates to view the ones you have saved.
  • From there, you can search for any templates you have, delete ones you no longer want or need, edit their names, and of course, apply them to notes.
  • If you want to edit a template, follow the same process, and once you’ve made the changes that you want, save it as a new template. Note: only those with Plus, Premium, or Business accounts are able to do this.
  • Plus, Premium, and Business users are also able to create their own templates this way.

So, what do you think? Is this a welcome change to Evernote? What other improvements would you like to see them make down the line? Let us know in the comments!

microchip_technology_400.jpg

What Do You Know About the Microchips That Power Your Technology?

microchip_technology_400.jpg

Computers are made up of many complex pieces of technology, and any business that uses them must have at least a working knowledge of them (or know someone who does, like a managed IT provider). Among these pieces of technology are “chips,” or microchips, that are responsible for making sure the technology, whatever it may be, works as intended. We’ll discuss some of the different kinds of chips the everyday user or business owner may be involved with when thinking about their computer.

Generally speaking, microchips in computers are made out of a variety of materials, but the most common is silicon. These microchips are responsible for acting as semiconductors and give your devices the ability to perform various tasks. We’ll get into the details about a couple of them here.

Memory
One of the more notable uses of microchips in devices includes temporarily storing data. These kinds of chips have a familiar name that you’ve probably heard before–Random Access Memory, or RAM. As long as the chip is receiving power, it can store data on the device. Once the device is turned off and the chips are no longer receiving power, this temporary data is wiped. Depending on what the device is used for, the computer might have many RAM chips installed on it; otherwise, the device will be slowed down considerably by resource-intensive tasks.

Microprocessors
Microprocessors have a lot to do with your device’s CPU, or central processing unit. You’ll often hear the comparison of a CPU to the brain of the human body. The CPU is responsible for processing all of the programmable commands on the device. Microprocessors generally rely on logic to function as intended. Of course, depending on the kind of device, various strength microprocessors will need to be used, as the same kind of microprocessor won’t work for every single kind of device out there.

Other Kinds of Chips
Depending on the device used, you might find various device-specific chips in use. For example, some devices that have cameras might have chips specifically designed for use with video recording or picture taking. Others that have networking abilities might have chips designed for use with those. Basically, chips are responsible for both the everyday functionality of your devices, as well as some of the specific, more advanced features that not everyone will be using.

For more information about technology or devices, stay subscribed to our blog.

wireless_connection_400.jpg

How to Get the Best Wireless Connections in Your Office

wireless_connection_400.jpg

There are plenty of small irritations to be found in the office, from a pot of coffee that someone neglected to refill to the sound of a squeaky chair under the office fidgetier. However, none are quite as infuriating (or as detrimental to productivity) as an inconsistent Wi-Fi signal. What makes the Wi-Fi so spotty, and how do you resolve that?

What Do You Expect from Your Wi-Fi?
Many businesses have a tendency to either deal with their Wi-Fi as-is or will haphazardly add new networking components to their infrastructure as needed. Neither of these approaches is ideal, especially in light of the fact that you’ll need your Internet connections to be reliable as you grow your network.

A much better alternative is to design your Wi-Fi network keeping a few additional factors in mind, including your office’s particular setup and any future growth plans you may have. This way, you will not only create a network that works for your current needs but is also flexible enough to shift and adapt as your business does. Whether you’re first designing your office’s floor plan or taking another look at its setup, the key is to go about it from a strategy-first perspective.

The Process
Your first order of business is to determine where the demand for a signal will be the greatest. After all, if you have a group of employees reliant on their wireless connectivity huddled together in one area of the office, you aren’t going to want to place your equipment in a way that creates a dead zone there. This will help you to identify obstacles and inform you of where you may want to consider placing additional routers to make up for their effects.

Once your Wi-Fi has been set up and your employees are settled, you should still be collecting performance data and listening to the input that employees have about their connections. Remember, wireless is still an evolving technology, so as it develops it is likely that you will need to adjust your strategy to accommodate it.

Long story short, you’ll probably need to make this an ongoing process to ensure that your Internet is as usable as possible for everyone in the office.

The professionals at NuTech Services are also here to assist you with any of your technology needs. If you need help with your business’ IT solutions, give us a call at 810.230.9455.