Categories
Blog

Microsoft Office For Mac 2016 – What To Expect?

Microsoft Office for Mac 2016 is all set to roll out and Apple fans are looking forward to using this new suite of productivity applications that clones the experience of its Windows version. Here are some of the features that you can expect from Microsoft Office for Mac 2016.

Enriching the Power of Presentation
Microsoft Office for Mac 2016 offer a slew of features for professionals who love to proactively indulge their audience through PowerPoint slides. When your final presentation is displayed on the screen, you can see a “presenter view” on your monitor.

Free Upgrade
The free upgrade is available for entire suite of Microsoft Office for Mac 2016 including – Excel, Word, Outlook, PowerPoint, Outlook and OneNote during the preview period that runs till 2016.

Cloud Power
Microsoft Office for Mac 2016 introduces Apple users to a new level of productivity by introducing cloud powered office 365 applications. As a result, users can access their documents from wherever they are . The new Office 365 is integrated with OneDrive for Business, Sharepoint and One Drive for better efficiency.

Collaboration
It is possible to collaborate with your colleagues and employees on PowerPoint and Microsoft Word through a chat window that runs alongside the document (as in Google docs). The updates made to the PowerPoint and Word automatically flag up.

There is a sharing button on the top right corner of the application that allows you to invite your colleague to contribute to the document. You can share this document as a link or attachment and also control the access rights of the person with whom you want to share the document.

Email Grouping
The email sorting and organization is made much easier in the new Mac 2016. The emails are sorted by conversation and you can apply various search criteria as in the Gmail.

Consistent Ribbon Icons
Consistency in the placement and appearance of “ribbon icons” is one of the major advantages of the Microsoft Office for Mac 2016. Earlier you might be seeing a particular version of ribbon icons under the File, Edit and other menus on your PC, another on Mac, and slightly different version on your tablet. Now, it will look the same across all these platforms. The graphics editing is eased through a new task pane added.

Do you wish to harness the potential of the new Microsoft Office for Mac 2016 for your business? You can easily lease your Macs from MyGeex and gain benefits of Equipment upgrade as well as technology upgrades.

Categories
News

Does Your Device Really Have A Virus?

With the increasing number of digital gadgets in the market, there are just as many or probably more applications available to manage these devices. When you use your smart phone or iPod or any other device, you often get messages or warnings telling you your security is at risk and that there is a virus on our device.

This probably sends a chill up your spine thinking of all the money you spent purchasing the device and you will most likely download the app that will ostensibly protect your device. But how do you know that your device is really at risk? How do you know that you really have a virus or malware? And what exactly is Malware?

What is a Virus?

You will recall from the days of the desktop, a virus is nothing but a computer program that keeps duplicating itself so that your space gets clogged up and your computer malfunctions. Taken from the traditional meaning of the word, a virus infiltrates your system and simply jams it up. Malware (MALicious softWARE) on the other hand is software that can actually harm your PC.

Do Android Viruses Exist?

No, says Lookout while Walter Glenn of Lifehacker says “Viruses may be a more limited problem on smartphones and tablets, but they do exist.” Glenn substantiates his claim with the knowledge that applications on Android run sandboxed and have very little or no interaction with either the OS or other apps. Therefore even if you have a virus it cannot do much harm. So is there any real cause to worry?

What Sort of Malware can an Android Phone have?

Malware can enter phones through SMS or by downloading apps. Either way your system is at risk although as mentioned earlier, the risk is lesser than that for a PC that has malware.

SMS threat

The threat via SMS is through SMS Trojan. An SMS Trojan works behind the scenes and sends SMS from your phone to high priced numbers. The user account is debited each time an SMS is sent without the user being aware of it. By the time the user realizes that a Trojan has entered his phone he is already paid (or is being charged!) a pretty penny.

Downloaded Malware

Most of the downloaded malware is spyware that gains access to your data and sends it to the hacker. These apps are disguised as genuine apps like the Netflix app that appeared in 2011. The spyware could easily be mistaken for the real software and many guileless users were duped.

Conclusion

The lesson to be learned from Netflix is that you should be extremely cautious when downloading apps into your phone. Any which way, downloading too many apps may clog your system and if you download a spyware then Be Ware!

Sources: Lookout, Lifehacker, Securityweek

Categories
Apple

How iPad Air2 Will Contribute To Your Business Productivity?

Last week, we touched on how Apple’s MacBook Air can boost your business productivity.  Now for the next weapon in Apple’s arsenal for businesses.

iPad Air 2 is the latest Apple tablet to hit the market (October 2014) and it is faster, thinner AND the sleekest tablet ever produced by Apple or its competitors! Apart from all superlatives, it is all set to contribute to your business productivity in the following ways.

Easy to Manage
iPad Air 2 is slimmer with a thickness of just 6.1mm ( 0.24 inches) than iPad Air ‘s 7.37 mm ( 0.29 inches) and Samsung Galaxy Tab S10.1 6.6 mm ( 0.26 inches). At 15.68 ounces ( 0.98lbs) iPad Air 2 is the lightest tablet ever built, still it allows businessmen to carry their business data efficiently and access it whenever required.

Improved Display and Enhanced Efficiency
Creating impact with display is very important for any business. You can use the 9.7 inch display for maximizing your impact. The picture quality is better than the iPad Air and for efficient working you can pair iPad Air 2 with a Bluetooth keyboard. It is equipped with Apple’s new A8X chip which makes it easier to jump between applications, and open and close them easily.

Data Security
iPad Air2 is empowered with embedded Touch ID fingerprint scanner that require you to register your fingerprint to access documents and apps. It will help you to save your business data from tampering and save you from irritating password prompts. It is a serious advantage for businesses that are fiercely competitive and extreme security-minded.

Productivity Boosters
The iPad Air 2 operates on iOS 8 that offers a slew of highly productive business features for users. The Notification Center allows users to install their widgets in “Today” panel. These can be small apps with real time updates that allows users to follow their business news. There are various productive apps such as PCalc Lite Calculator (for fast and easy calculations), Evernote Widget ( for easy note making), Yahoo Weather App (for quick weather forecast), etc.

Connectivity
You can connect this tablet with other Apple products such as iPads, Mac computers and iPhones through a feature called Handoff –with the condition that these products should be connected to the same Wi-Fi and Apple ID.

Do you want to enjoy benefits of iPad Air without spending a fortune? You can easily lease your Mac’s and iPads from a trusted Computer Leasing and Support Partners MyGeex. Avail fast delivery and 3 years warranty and support with Applecare.

Categories
News

Security On The Cloud

Microsoft, in an annual SMB Cloud Adoption Study 2011, found that nearly 50% of the small sized businesses plan to adopt cloud service in the next three years.

Businesses that have moved or are considering a shift to cloud computing are often concerned about the security of their data.

This concern is not unfounded. Jeff Beckham of Cisco lists the top five security risks of cloud computing. These relate to transfer of data, software interfaces, data storage, user accounts, and data separation.

Data Transfer

When businesses use cloud computing there is a great deal of data travelling over the internet, often from unsecure networks.

This means that data can be hacked while it is being transferred to and from the cloud. The first precaution therefore is to ensure that your data travels over a secure network.

Using (IPsec) Internet Protocol Security can also mitigate this risk to a great extent. IPsec is any internet protocol that uses encryption and decryption while transferring data over the internet.

What this means is that your data will be coded when it is despatched and decoded when received. In other words while your data travels over the intricate network it is coded and only the decoder stored in your computer and that of your provider can decode it.

User Interface

A user interface is a program or API that interacts with the database to store, retrieve, or update data.  The (CSA) Cloud Security Alliance recommends that you learn how your service provider keeps your data secure. This includes learning about the user interfaces the provider uses. A weak interface – one that does not include nor has checks and controls – can put your data at risk. Therefore it is important to discuss security issues with your provider before you sign the agreement.

Data Storage

Although your service provider may use encryption while transferring data between his server and your computer, few providers use encryption within their own network. Hyun-Suk Yu, Yvette E. Gelogo, & Kyung Jung Kim advise that ensuring data security within the cloud is one of the necessary factors to be considered before accepting the cloud computing package.

Conclusion

The security concerns discussed here are the three major concerns regarding data security. Organizations must keep in mind that employees of the CSP can always access their accounts and data. Therefore it is advisable to consider the sensitivity of the data before deciding to put it on cloud storage. In fact one must be extremely cautious when migrating to cloud computing and consider all aspects carefully before signing the dotted line.

Sources: Cloud Security Alliance, Wikipedia, MicrosoftIETF Tools, Science & Engineering Research Support Society 

Categories
News

Private vs. Public Applications In Cloud Computing – The Debate Continues

One of the many concerns being voiced by businessmen with respect to cloud computing is loss of control. This concern stems from the fact that many organizations have their in-house programmers write applications specific to their needs. These applications are written to integrate with the software of the current cloud service provider.

When the organization decides to change the provider, many of the applications have to be rewritten resulting in additional costs in terms of time and resources.

The obvious solution to this problem is that organizations should use the applications written by the new service provider.

So how should businesses approach the private versus the public application problem?

Public or Private Applications – a matter of control

When writing applications for cloud computing, the approach would depend on the model the company has opted to deploy.

Whether the cloud is a public cloud or a private cloud would also be a factor in deciding the approach to development.

The problem of control would be minimal where the organization only rents the infrastructure since the data and applications would be built and owned by the organization.

Under the SaaS model where the organization rents the provider’s software along with the infrastructure, the problem with control would be the greatest.

Writing Applications for Cloud Computing

From a programmer or developer’s perspective, one major factor when considering private applications over public ones is that applications do not generally stand alone. Every application interacts with other applications, databases, and other objects. If most of these objects or frameworks are provided by the service provider, then using a public application may be a better option since it would be better integrated.

If on the other hand the database is stored locally, private applications may work better because they can then be tested locally to a great extent and only their integration with other applications stored on the cloud will have to be tested real time. Says Barney Beal of  Techtarget, “There are, of course some applications that simply aren’t made for the public cloud. For example, a retail bank’s demand deposit account program.”

Conclusion

Given the various factors on which the decision of whether to write private applications or use the ones provided by the service provider is based, one cannot advocate for one or the other. The needs of the client with regard to the volume of data, the number of applications he needs, the level of security required, and the sensitivity of data will all combine to form the basis for deciding on a solution.

Nor can the decision stand alone. The decision for development must be taken in conjunction with the decision about the deployment model. Since cloud computing is a relatively new concept, there are still a lot of teething troubles with developing software for cloud platform. With time and experience, will come the knowledge to take better decisions, and write better code.

Sources: UNH, Tech Target

Categories
Blog

How Small Businesses Can Benefit From Apple’s MacBook Air?

Apple’s MacBook Air is becoming essential for businesses due to its user friendliness, sleek design and reliable service life. If you think your business is small and doesn’t need this product, here are reasons why you should consider it seriously.

Thinner, Powerful and Lighter

MacBook Air is lighter, thinner and powerful than most laptops found in the market and it is ideal for small businesses – not to mention 12 hours of battery life that the 13- inch version can deliver (11 inch version bears up to 9 hours battery life). This means it will continue from the client meeting over a morning cup of coffee to the product demo in the evening without getting unplugged anytime. Sounds good?

Massive Data Storage

MacBook Air models bear flash memory (as found in your iPad) with storage capacity of 64 GB ( it can be upgraded up to 256 GB) that can yield better data storage and faster startup times. The system memory is upgraded to 4GB from 2 GB in the previous versions and is equipped with Intel HD Graphics 3000 technology that makes it one of the speedier gadgets around for purchase.

Embracing the Concept of Next Generation Wireless Technology

MacBook Air is equipped with the newest 802.11 arc technology that escalates Wi-Fi speeds to high level. The wireless performance is 3X faster than the previous generation and it allows you to work efficiently and effectively with zero hassles. It also allows you to work freely and collaborate with your team from wherever you are.

Set Up Your Office Wherever You Are

Most Mac products are empowered with key applications such as iMovie, iPhoto, Pages, GarageBand, Keynote and Numbers. It allows you to be productive and meticulously aligns your schedules, irrespective of whether you are attending the office or traveling for a business meeting. You can easily surf your mails, set up Face Time calls with your team, send texts and more. There is even an application that allows you to find new productive applications useful for your business.

Like all other Apple products, Apple MacBook Air strikes balance between mobility, user-friendliness and performance that means you can count on it to make an impact on your clients.

If you think Apple MacBook Air is out of your budget, you can lease your Macs from MyGeex – Your Computer Leasing and Support Specialists. Whatever be your technical requirements, MyGeex can deliver – sometimes on the very next day!