Archives November 2012

Mobile Application Management (MAM)

Mobile Device Management does not stop with configuring policies, getting asset information, and securing a mobile device. The MDM solution should also provide the administrators the ability to manage the Apps that are installed on the devices.

SJT Support also provides the Mobile Application Management (MAM) capability that helps administrators perform the following management functions:

  • App Management
  • App Distribution
  • VPP Integration
  • Reports 

App management:

  • Manage the Apps over the Air (OTA) to groups/devices.
  • Automatically get App information from App Store
  • Maintain a repository of all Apps used in the network
  • View the list of Apps and their installation count on mobile devices.

App distribution:

  • Seamless distribution of both in-house and App Store Apps to devices and group of devices
  • Advertise Apps on App Catalog and make user choose to install themselves
  • Get the status of the deployed Apps on the users’ devices
  • Remove Apps when not required anymore

Integrate with Volume Purchase Program (VPP):

  • Integrates with Apple Volume Purchase Program to install commercial apps.
  • Automatically assign redemption codes to users upon installation or revoke when not installed
  • Get notified on insufficient redemption codes

Reports:

  • Comprehensive reports helps to monitor apps installed in device.
  • Specific reports can be extracted like:
    • Apps by Devices – Generates the report based on apps available in the device.
    • Devices with/without specific app – Generates report based on specific app.

Mobile Device Management (MDM)

SJT Support helps enterprises perform mobile device management to configure and secure their mobile devices from a central place. It simplifies the work of administrators by making them perform both desktop management and mobile device management using a single console.Enterprises have to scrutinize the devices that enter inside the company. It can be a corporate owned or personal device (BYOD).

SJT Support Mobile Device Management (MDM) allows you to perform the following:

  • Enrollment of Devices
  • Profile Management
  • Asset Management
  • Application management

Supported Mobile Devices

Apple iPhone, IPad, IPod Touch running iOS 4 and above.

Enrollment:

  • Over-the-Air (OTA) enrollment of devices
  • Manually enroll mobile devices for management
  • Bulk enrollment of mobile devices using a CSV file
  • Authenticate enrollment with a one-time passcode and/or user’s Active Directory credential.

Profile Management:

  • Configure Policies/Profiles – Configure policy settings to access enterprise resources.
  • Restrict – Restrict the use of camera, youtube, safari browser, etc.
  • Corporate access – Provide access to corporate accounts like Email, Wi-Fi, VPN.
  • Device Group – Create a logical group of devices based on department, location, or to distinguish corporate and BYOD and apply policies, restrictions and distribute Apps to all devices in the group.

Asset Management:

  • Get complete information about the device like device details, certificates, installed Apps, etc.
  • Get complete visibility about the devices with out-of-the-box reports.

Application Management:

  • Manage and distribute both in-house and App Store Apps
  • Integrates with Apple Volume Purchase Program (VPP) for hassle free distribution of commercial Apps.
  • Publish the Apps in App Catalog for users to choose and install the Apps themselves.

Security Management:

  • Passcode: Enforce strict passcode to prevent unauthorized access
  • Remote Lock: To prevent misuse of misplaced/lost devices
  • Complete Wipe: To prevent data loss/theft by erasing all the device data making it as good as new.
  • Corporate Wipe: To remove only the corporate data leaving the personal data like contacts, photos, etc. Useful for BYOD when the employee leaves the company.

Audit and Reports:

  • Audit devices that are inactive or have installed a specific App
  • Check whether the devices are passcode compliant.
  • Out-of-the-box reports on Apps by Devices, Devices by Model, etc.

For more information on Mobile Device Management please contact our support team by email at sales@sjtechies.com or by telephone at (856) 745-9990.

Researching Your Competition for SEO

Curious about what your competition does for Search Engine Optimization (SEO)? If your answer is a resounding “yes,” then you’re ready to take your SEO to the next level.

Checking out your competition and learning which keywords they use can help you refine your strategy. This is a common form of analysis to use on any website, whether it’s your competitor’s site or your favorite website.

You can identify your competitor’s keywords in a few different places on their website:

Keywords in the Code — Start by checking out their meta tags, such as the title tag or the keywords tag. Typically, the first keyword in a title tag is usually the most important. Use these steps to view the code:

  1. Go to the website, and then right-click the page.
  2. Click View Source. A new window opens with the website’s code.

The <title>tag is near the top of the page. If the site includes it, the meta name=”keywords”tag should be a few lines below. Both of these contain your competitor’s keywords.

Keywords in the Text — Checking out your competitor’s content for keywords also helps you analyze your competition. A keyword density checker (search “keyword density checker” in any search engine) can quickly determine which keywords are prominent in their copy. Or, you can simply use “find” (press CTRL-F on your keyboard) to search for specific keywords.

Assuming your competitors follow SEO best practices, it takes only about 10-15 minutes to check these things out and learn some of the ways they handle SEO for their site.

Our highly trained, courteous support staff is waiting to take your call. Whatever time it takes to assist you, that’s the time you’ll receive. We’ll resolve any issue to your complete satisfaction.

Call (856) 745-9990 to get started now or click here

Every Budget is an IT Budget

Summary: Technology will be embedded everywhere and disrupt traditional IT and the vendors and ecosystem that goes with it.

ORLANDO—Global technology spending will surpass the $4 trillion mark in 2016 and digitization of industries will ultimately force a rethink on what is IT overall, according to Gartner.

In other words, the technology pie is going to get a lot larger, but murkier.

The big theme: Cloud, mobile, social and big data will come together to create a technology boom with a bevy of challenges and disruption ahead.

“Every budget is an IT budget,” said Peter Sondergaard, senior vice president of research at Gartner. “Technology is embedded in every product.”

His point: More technology spending will occur outside traditional procurement methods. Consumers will spend more disposable income on technologies. Industries traditionally thought to be non-tech will be digitized. And technology will be embedded into everything.

There will be chief digital officers in most companies. By 2015, 25 percent of companies will have a chief digital officer. The role: Digitize the business.

Gartner’s theme at its Symposium CIO powwow is that there’s a nexus of technologies that will revamp corporate technology, vendors and employment. Nexus is a word that will be beaten to death at this annual CIO leadership therapy session. The forces inside this nexus are all interdependent.

Some takeaways to ponder from Sondergaard’s talk:

  • Big data is the killer application of the cloud.
  • The cost savings of cloud haven’t been realized—subscriptions have trumped pay as you go.
  • 80 percent of businesses are using SaaS.
  • IT departments mostly use private clouds.
  • Two versions of cloud are emerging—IT’s and everyone else.
  • Business process services in the cloud will be a $145 billion market in 2016, doubling from today.
  • Cloud will develop and transform with or without IT’s support.
  • It’s the end of the beginning for corporate IT.
  • Corporate IT needs to think mobile first in all designs.
  • Big software vendors won’t be able to think mobile first.
  • There will be more iPads in the enterprise than BlackBerries in two years.
  • Enterprises will have to spend time monitoring physical assets and the data they spew.
  • Social computing will become more important.
  • 10 organizations in the U.S. will each spend more than $1 billion on social media in 2016.
  • Automated and paid reviews will be common nefarious uses of social media.
  • Continual stream of information will transform decision-making and industries.
  • 85 percent of marketing organizations will outsource the analysis of big data.
  • Companies will be judged based on the quality of their algorithms.
  • CIOs will have to find new workers to do the big data jobs required.
  • CIOs will have to think like entrepreneurs.

And the effects of this disruption:

  • Consumers will spend more disposable income on technology spending. Consumer tech spending was 3% of disposable income in 2011. By 2015 will be 3.5 percent of spending.
  • Security infrastructure will have to be rethought completely because it could hinder progress.
  • Social and reputation wars will become an issue just like malware.
  • The IT market will change. The large IT megavendors are being challenged by at least one of the forces in the nexus. “Are your vendors accelerating your march into the future or putting the brakes on your progress?” asked Sondergaard.
  • Spending on technology outside the IT market will surpass levels inside.
  • 1.9 million IT jobs will be created in the U.S.
  • 6 million jobs in the U.S. created by information economy over the next 4 years.
  • There isn’t enough talent to fill those jobs.

Hosted Dedicated Server Virtualization

Virtual Dedicated Server Can Replace On-Premise Hardware

A virtual dedicated server  is a virtual machine provided by an internet hosting company.  Unlike normal hosting plans, which put many customers’ accounts on a single server, a Virtual Dedicated Server is reserved exclusively for the account and usage of a single customer.  This means that the Virtual Dedicated Server customer has exclusive rights to their server’s bandwidth, memory and storage space and performance is not affected by traffic and the usage patterns of other customers.

When you purchase a Virtual Dedicated Server, you are actually leasing a server box that is configured and set up according to your preferences, but remain at a remote data center. A Virtual Dedicated Server Server account provides you with a dedicated IP address and full control of server usage and software installation, with admin (root) access to the server.

A Virtual Dedicated Server can be used for a variety purposes, including gaming servers, database management and traffic-intensive websites. Dedicated servers are particularly useful for companies and individuals who run very-high-traffic websites or applications and who need the bandwidth, versatility and consistent performance of a dedicated box. You may install anything you want on a dedicated server, as long as the installed material does not violate the restrictions listed on in the license agreement.

Virtualization is the perfect solution for applications that are meant for small-to medium scale usage.

For more information on Dedicated Virtual Servers please contact our support team by email at sales@sjtechies.com or by telephone at (856) 745-9990.

ABC Host Sandy Relief “Day of Giving”

Sandy Relief: ABC’s “Day of Giving” Will Include Dancing With the Stars, Jimmy Kimmel and More

ABC is giving back.

Today Monday, November 5, 2012, the ABC Network is hosting a “Day of Giving” across the network, which will encourage their viewers to help those impacted by Hurricane Sandy.

ABC’s programming, ranging from Good Morning America in the morning to Dancing With the Stars in the evening, will engage viewers with the relief efforts for Hurricane Sandy.

While Dancing With the Stars is planning to personalize sections of Monday night’s performance show with “Day of Giving” messaging (by including stories of how several of the show’s dancers were impacted by the storm), Good Morning America will kick off the “Day of Giving” by dedicating the 8 a.m. hour to raising money, followed by Live with Kelly and Michael, which will integrate the message into their Halloween episode. (It was postponed due to the storm.)

Next, The View‘s ladies and The Chew will discuss the “Day of Giving” and encourage the audience to donate to the American Red Cross Relief efforts. Katie Couric will engage Katieviewers in the relief efforts as well.

Rounding out the “Day of Giving” will be Nightline, which will devote time to the message and the impact of Hurricane Sandy, and Jimmy Kimmel Live, which will encourage viewers to give to the American Red Cross.

“The effects of Hurricane Sandy have impacted millions of people across the entire North East, including many of our co-workers, friends and families. This unprecedented devastation demanded an unprecedented response, so our team came up with the ‘Day of Giving,” Anne Sweeney, co-chair, Disney Media Networks and president, Disney-ABC Television Group, said in a statement. “This coordinated effort between network and syndicated programming spanning News, Daytime, Primetime and Late-Night will reach tens of millions of viewers with a specific call to action…to do what Americans do best, and pull together in support of those who are suffering. I’m incredibly proud of the team and all of our programs for this amazing response.”

Earlier in the day, ABC announced that it will donate $2 million to Hurricane Sandy relief and rebuilding efforts. ABC will donate $1 million to the American Red Cross for immediate, critical assistance, and another $1 million will be designated for organizations working on rebuilding efforts.

Would you like to help? Text REDCROSS to 90999 ($10 donation) or visit http://redcross.org

To View Full Article Click Here

Benefit Concert for Hurricane Sandy Victims

If you’ve been watching the coverage of Hurricane Sandy and wondering how to help, you’ll have a chance to pitch in on Friday.

Hurricane Sandy: Coming Together,” a benefit concert to aid victims of the storm that devastated the Northeast, will air at 8 p.m. ET on the networks of NBC Universal.

Bruce Springsteen and the E Street Band, Jon Bon Jovi, Sting, Christina Aguilera and Billy Joel will perform in the show, which will be hosted by TODAY’s Matt Lauer. Brian Williams and Jimmy Fallon will make appearances, too.

Money collected will be donated to the American Red Cross relief efforts. The special will air Friday at 8 p.m. ET on NBC, USA Network, SyFy, MSNBC, CNBC, Bravo, E!, Style Network, G4 and more. It will also be live streamed on NBC.com.

The American Red Cross is providing shelter, food, emotional support and other assistance to those affected by disasters like Hurricane Sandy. To donate, visit RedCross.org, call 1-800-RED-CROSS or text the word REDCROSS to 90999 to make a $10 donation.

“Hurricane Sandy: Coming Together”

This Friday night, the networks of NBCUniversal will host “Hurricane Sandy: Coming Together,” a one-hour live telethon to benefit the American Red Cross, from 8:00 – 9:00 p.m. ET.

Hosted by Matt Lauer (NBC’s “Today Show”), the November 2 program will feature scheduled performances by Sting, Bruce Springsteen, Christina Aguilera (NBC’s “The Voice”), Bon Jovi and Jimmy Fallon (NBC’s “Late Night with Jimmy Fallon”). NBC Nightly News Anchor Brian Williams will also appear.

The networks of NBCUniversal include NBC, USA, E!, G4, Syfy, Bravo, Oxygen, Discovery and A&E, which represent a huge swath of the most popular channels on cable TV. The telethon will be broadcast from the New York studios of NBC at 30 Rockefeller Plaza. It will air live across the East Coast and tape-delayed on the West. It will also will be live-streamed on NBC.com.  All donations will go to the American Red Cross to help with relief aide of Hurricane Sandy.

Tune in Friday night from 8:00 – 9:00 p.m. ET, as the American Red Cross and NBCUniversal Networks host a live telethon benefit.

Preparing Your IT Network For A Severe Storm

South Jersey Techies wanted to provide you with some suggested preparations to safely secure your workstations and networks from any storm damage.

Suggestions for Storm Preparations in Your Office:

  • Time to do backups of all data: Make back-ups of all data processing software, files, records, etc.  and transport back-ups off-site, via disk, USB drive or in the cloud.
  • Document the layout: Get all of the network addresses, the router and firewall configurations.
  • Shut off all sensitive electrical equipment, such as computers.
  • Ideally all electronic devices should be unplugged or plugged into surge protectors.
  • Review inside storage arrangements and relocate all important materials and equipment to safe areas away from windows.
  • Update call lists and contact info: All key personnel need to register their updated cell numbers, home email addresses, and physical addresses.
  • Leave before you need to: Don’t get stuck in traffic, airports, train stations and in queues. Give yourself ample time.

If you need your data backed up or are unsure as to the last time a backup occurred, please contact our Support Team.  We are here to help ensure that your data is safe and that you are able to be up and operating as soon as the storm passes. Our Support Team can be reached at (856) 745-9990.

Suggestions for Storm Preparations in Your Home:

  • Monitor National Weather Service forecasts at http://weather.gov .
  • Bring outdoor objects, such as lawn furniture, garbage cans and other loose items, inside the house or tie them down securely.
  • Make backups of computer data (consider storing in the cloud or on a USB drive), keep computers or other sensitive electronic devises plugged into a surge protector or unplug entirely.
  • If you have a sump pump for your basement, make sure it’s working.
  • If the power goes off, unplug appliances like refrigerators and freezers and sensitive electronic equipment like TVs and computers so that they won’t overload when power is restored.
  • Keep family supplies on hand, such as:
    • Water, one gallon per day, per person
    • Food, non-perishable food (keep a manual can opener handy) and pet supplies, if needed
    • Medications, contact lenses, glasses and first aid kit
    • Batteries, flashlights and battery operated radios
  • Keep cell phones charged while possible, and if possible, have extra charged cell phone batteries.
  • Keep copies of any important documents either scanned or digitally saved on a USB drive, off-site or in a plastic bag.
  • Car filled up with gas; keep some water, food, first aid kits, contacts, blankets and pet supplies in the car as well.

If you have any issues or questions, please feel free to contact our support team by telephone at (856) 745-9990.

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.