Archives 2013

Top Smartphones for 2013 Holiday Season

2013smartphone2

iPhone 5s

The iPhone 5S was launched with iOS7.  The updated camera with iPhone 5S has become popular against competitors. Also, the iOS 7 includes many new features including fingerprint identification on the home button, control center, multitasking, enhanced Siri and many more.

The iPhone 5S is available with all major carriers.  Contract prices are $199-399 or without Contract prices are $649-$849.

HTC One

The HTC One runs Android 4.3, a quad-core processor, 2 GB of RAM, 1080p LCD displays and an ultra mega pixel camera.  The most popular feature with HTC One is the front facing speakers and dual microphones.

The HTC One is available with all major carriers.  Contract prices are as low as $50 or without Contract price is $550.

Samsung Galaxy Note 3

The Samsung Galaxy Note 3 is the most prevailing Android device on the market.  The Galaxy Note 3 includes many features, such as, the S Pen, 13 mega pixel camera (rear), microSD storage, a removable battery, LTE and many more.

The Samsung Galaxy Note 3 is available with all major carriers.  Contract price is$299.99 or without Contract price is $699.99.

Nokia Lumia 1520

The Nokia Lumia 1520 runs Windows Phone 8 OS.  The 1520 offers a larger display, faster processor, and lower resolution camera than the Lumia 1020.  Features of the Lumia 1520 include integrated Microsoft Office, 20 mega pixel camera, HD 1080p display and many more.

The Nokia Lumia is only available through AT&T.  Contract price is $199.99 or without Contract price  is$584.99.

Google Nexus 5

The Nexus 5 runs Android 4.4.  The Nexus 5 includes a Snapdragon 800 processor, 8 mega pixel camera, HDR+, wireless charging and many more.

The Nexus 5 prices are $349 (16GB) and $399 (32GB).

Moto X

The Moto X runs Android 4.4.  The Moto X includes many features, such as, 10 mega pixel camera with quick capture, touch-less control, face unlock and many more.

The Moto X is available with all major carriers. Contract price is $99 or without Contract price is $499.

LG G2

The LG G2 runs Android 4.2.2.  The LG G2 has 1080p IPS display, 13 mega pixel camera, power and volume rear keys , clip tray, knock on and many more features.

The LG G2 is available with all the major carriers.  Contract price is $199.99 or without Contract price is $603.99.

Samsung Galaxy S4

The Samsung Galaxy S4 runs Android 4.2.  The Galaxy S4 has a 13 mega pixel camera with Dual shot and Drama Shot, Air View that allows you to control your phone with hovering instead of touch, WatchON, S Health and many more.

The Samsung Galaxy S4 is available with all the major carriers.  Contract price is $199.99 or without Contract price is $627.99.

Motorola Droid Maxx

The Motorola Droid Maxx has outlasting power with a 3,500 mAh capacity battery.  The Droid Maxx features include active notifications, always-on listening, Command Center, wireless charging, 10 mega pixel camera and many more.

The Droid Maxx is only available at Verizon Wireless.  Contract price is $199.99 or without Contract price is $499.99.

Sony Xperia Z1

The Sony  Xperia Z1 is waterproof and dust resistant.  The Xperia Z1 has man features that include 20.7 mega pixel camera, full HD TRILUMINOUS display, quad-core processor, 2GB RAM, microSD card slot, and many more.

The Sony Xperia Z1 is available without a contract for $649.99.

 

Important Privacy Settings in iOS 7

The new iOS 7 upgrade resets original settings and adds new settings that users should be aware of.

System Services

The System Services is difficult to find at the bottom of the Privacy > Location Services panel.

Status Bar Icon

Settings > Privacy > Location Services > System Services

The Status Bar Icon setting will appear in three ways:  Purple for Recently Used, Gray for Used within 24 Hours and Outlined for Geofence.  Turn ON this setting.

SBI

Diagnositcs & Usage

Settings > Privacy > Location Services > System Services > Diagnostics & Usage

DU

The Diagnostics & Usage setting detects/records iPhone usage and anonymously sends a report to Apple to improve the device.  Turn OFF this setting.

Frequent Locations

Settings > Privacy > Location Services > System Services > Frequent Locations

FLThe Frequent Locations setting detects/records data about your locations, using GPS coordinates of frequently visited locations.  Turn OFF this setting.

Location-Based iAds

Settings > Privacy > Location Services > System Services > Location-Based iAds

LBIA

The Location-Based iAds collect and share location data based on real-time geographic location of your Apple device.  Turn OFF this setting.

Advertising

Settings > Privacy > Advertising

The Limit Ad Tracking setting prevents adverizers  from targeting your device. Turn Limit Ad Tracking ON.

The Advertising Identifier gives users control over advertisers’ capability to use tracking systems by resetting the Advertising ID.  Reset Advertising Identifier.

RAI

Do Not Track

Settings > Safari > Do Not Track

The Do Not Track setting allows users to have privacy while using Safari.  Turn ON this setting.

DNT


Popular Tools in Excel 2013

Excel 2013 has easy access tools that generate professional-looking results quickly.  There are several new features with the new version that should not be overlooked.

Flash Fill

Flash Fill identifies and adapts to basic formatting to automatically input your data.  This tool performs several tasks such as merging information from multiple columns, adding formatting to current column and fixing anomalies with data.  Flash Fill will recognize and apply the selected format to your data but if data differs from row to row, it will not format correctly.

EFF1

Recommended Charts

rcRecommended Charts identifies data guides the user to choose the best chart type for their data.  The main objective of using a chart is to highlight your work in a significant way.

      1. Open the Excel Spreadsheet needed to create a chart.
      2. Select the Insert Tab.
      3. Select the Recommended Charts button to see suggested charts.

Recommended PivotTables

rptRecommended PivotTables are interactive tables that can analyze data, compare data and detect patterns/relationships.  In previous versions, PivotTables were too complex.

      1. Open the Excel Spreadsheet needed to create a table.
      2. Select the Insert Tab.
      3. Select the Recommended Charts PivotTables to see suggested tables. 

Quick Analysis

Quick Analysis is an additional way to generate a chart for data. To generate a chart to highlight your work in a significant way, select the data and click the Quick Analysis Icon.

Untitled

Timelines

Timelines let you filter through PivotTables, similar to a slicer.  The timeline will be embedded alongside the Pivot Table.

  1. Select the PivotTable.
  2. Click the contextual Analyze Tab.
  3. Select Insert Timeline (in the Filter Group).
  4. Then select OK.
  5. In the upper-right corner you can select years, quarters, months or days.

Excel_New_Ftrs.FigE

Cloud Support

Cloud Support by Microsoft allows users to save Excel files to SkyDrive or SharePoint site.  Saving to SkyDrive or a SharePoint site allows users to review and edit files from any device with an Office 365 subscription.

Apps for Excel

appsMicrosoft offers Apps for Excel to enhance what you can do with Excel.  Categories for Apps include Content Management, Financial Management, Productivity, Workflow and Process Management and many more. 

Present Online

Present Online is a way to share workbooks and allows others to update it.  Present Online requires the installation of Lync (if you have Office Professional Plus; Lync is already installed).

  1. Sign into Lync.
  2. Open all workbooks you need to share. (Close workbooks you do not want to share).
  3. In Excel, click the File Tab.
  4. In the left pane, choose Share.
  5. Click Present Online.
  6. Click Present.
  7. Select a Lync meeting or create a new one.
  8. Click OK.

 

National Cyber Security Awareness Month Tips

360px-US_Department_of_Homeland_Security_Seal.svg

October is National Cyber Security Awareness Month by Department of Homeland Security.

National Cyber Security Awareness Month encourages vigilance and protection by sharing tips and best practices in regard to how to stay safe.

Small businesses are a large target for criminals because they have limited resources dedicated to information system security.  Cyber criminals look for access to sensitive data.

Create a cyber security plan

The Federal Communications Commission offers a Cyber Planner for small businesses.  The planner guide allows specific sections to be added to your guide, including Privacy and Data Security, Scams/Fraud, Network Security, Website Security, Email, Mobile Devices, Employees, Facility Security, Operational Security, Payment Cards, Incident Response/Reporting and Policy Development/Management.

Generate a personalized Small Biz Cyber Planner Guide.

Establish Rules and Educate Employees

Create rules and guidelines for protecting information.  Educate employees on how to post online in a way that does not share intellectual property.  Clearly explain the penalties for violating security policies.

Network Protection

Deploy and update protection software, such a antivirus and antispyware software, on each computer within your network.  Create a regularly scheduled full computer scan.

Manage and assess risk

Cyber criminals often use small businesses that are less-protected to get to larger businesses.  Being a victim of a cyber-attack can have a huge impact on any business including financial issues, loss of possible business partner(s) and many more issues.

Download and install software updates

Installing software updates from vendors can protect your network for unwanted viruses and malware.  Vendors frequently release patches/updates for their software to improve performance and fine-tune software security.  (Example:  Adobe Reader, Adobe Flash and Java updates are critical for protection.)

Backup important business data and information

Create a backup plan for all data including documents, databases, files, HR records and accounting files.  A regularly scheduled backup can be a full, differential or incremental.

  • Full Backup:  Backup of all data.
  • Differential Backup:  Backup of all data that has changed since the last full backup.
  • Incremental Backup:  Backup of all data that has changed since the last full or incremental backup.

Control physical access

Protecting physical property is a very important role in protecting intellectual data.  Create a physical security plan to prevent unauthorized access to business computers and components. 

Secure Wi-Fi

Securing your Wi-Fi network consists of a few configurations.  Configure a device administrator password for your wireless access point (WAP) or router, require a password for Wi-Fi access and do not allow the WAP or router to broadcast the Service Set Identifier (SSID), also known, as network name.