Thursday, April 26, 2012

Networks and Data Security

The concept of a network is pretty simple, multiple computers or devices connected in order for users to share data or connections.  Where it becomes more complex is the varying types of networks and ensuring they are secure.


First there is the Local Area Network, known also as the LAN.  The LAN is a smaller network focusing on a small area such as a home or office.  The configuration is done one of two ways:

1. Peer to Peer
2. Client/Server

With a peer to peer LAN this basically means there is a maximum of ten computers connected and at least one or more of the computers can also have a printer, scanner or external device which is usable by all the computers on the network.

With a client/server LAN there are multiple computers, one or more servers and additional devices such as printers.The main difference between peer to peer and client/server is that with client/server a network operating system is used to manage storage, connection, security and communications.  This option is more expensive however has the support of the network administration.

Additionally there is the Metropolitan Area Networks (MAN) which allows connectivity between clients in a larger area.  A good example would be multiple office buildings in a larger complex such as a school like UB. 

A Wide Area Network (WAN) is even larger.  This allows connectivity across the country or around the world.  Larger corporations would own a WAN.  Bosch utilizes a WAN and do to the sensitivity and the need for security they have a strict Data Security Policy which is enforced through local "DSP's" (Data Security Partners) who ensure security policies and procedures are are followed strictly. 

This security safety functionality has become a cub business as well http://www.boschindia.com/content/language1/html/17516.htm

Getting More Out of the Internet

Early on in the chapters we learned that a portal is a web site however there is so much more to it then that.  Chapter 5 starts with consumer portals which consist of a variety of types of information such as search tools, sports, weather, financial info etc. This variety allows for larger target audiences which allows for portals to gain organizations who want to monopolize on the advertisement and promotional advantages of a portal.  Good examples of a consumer portal would be Yahoo!, Lycos and Excite.  While initially these sites may have originated s search tools they have developed into general consumer portals.
Another more specific option is  personal portals, also known as horizontal portals. The difference between the personal portal and the consumer portal is the ability to customize your preferences.  This allows you as an individual to get the most out of these same tools.  Again examples would be My Yahoo!, My Excite and My MSN!

Also in the portal family are vertical portals, also known as vortals.  Vortals are a gateway for more specific interests either on a broad topic like medicine or a niche topic. The vortal will contain links, search tools and at times chat boards.

The key to any type of portal is maximizing it's capability.  This has introduced my to the customability of My Yahoo which allows me to really narrow down what I want to see versus the continuous popular media which normally streams on the general Yahoo page.

Wednesday, April 25, 2012

Chat as a Useful Business Tool

In today's society we want everything short and fast.  The need for instantanious gratification has opened up the doors for the use of Short Messafe Service (SMS) and Multimedia Messaging Service (MMS).  The are of talking to people not just face to face but also by phone is slowly depleting.  Text messaging has removed the human interaction. 

There are debates as to the pro's and con's of such a transition.  All new short abbreviation languages have developed to further hasten the communication.  Most would agree LOL is an overused term!

In the work place this need for immediate response has made way for Instant Messaging softwarem allowing not only for internal communications but external to the customer as Live Chat technologies have emerged allowing real time service.

Similar to email this new communication tool must be managed to ensure your correspondence is professional without the short hand of text.  Most tools allow companies to create canned responses which not only show a consistent image to customers but also allows for a faster response and increased utilization of support staff.

Other great features of Live Chat is the utilization of push pages.  This functionality allows a service representative to send a web page directly to the requester, allowing chat to be a learning environment.  Additionally items such as monitoring, feedback and other management tools are right at your finger tips. 

Your Emails Anatomy

Even your email has predefined anatomical structure!  Most e-mail services have the same basic set up so you can be sure there is consistency.  The trick is how to truly use the structure appropriately and more importantly what are the rules of email etiquette.

It begins with the To line which you use to enter one or more e-mail addresses for the receivers of your email.  Typically multiple recipients are separated by semicolons ; or commas.

Next is the Cc line which is for the email receipients who you determine should recive whats known as a courtesy copy aka carbon copy.  This is widely misused in business today.  I urge you to consider two things before using utilizing the Cc:
#1: Is the e-mail urgent for the cc'ed recipients, do you expect a response?
#2: Are you using it to ensure your boss is aware of what you are doing as a means to prove you've completed a task?

The Bcc line is next in the structural layout.  This allows you to send a blind courtesy copy to designated recipients.  The Bcc is not visible to other recipients only to the sender and the Bcc recipient. This is potentially another misused feature which can be misconstrued as a means to tattle on others.  More appropriately a forward to the appropriate recipient with a note in regards to why you are forwarding.




Next up is the Subject line which contains a short description of what the purpose or content of the message is. This should be brief but enough to grab the recipients attention, this determines whether they open your email or not.  A good article I came acrossed suggested to treat it like a news headline.  See the article for other good advice http://www.lyris.com/email-marketing/108-Email-Subject-Lines-15-Rules-to-Write-Them-Right


Attachments or the Attach Line will contain the filenames for any attachments you have chose in the message.  A good tip is to keep these brief as well. 


The meat of your email structure is the message body which contains the message you are sending.  Treat this as a formal letter when using for business.  All to often people treat email as a casual interaction.


Finally the signature file is the closing of your email.  You can set up an automatic signature which contains all of your business information.  Additionally we use the signature to promote anything new and exiting we want all customers to know.  Most organizations have a pre-determined format, here is an example of my business signature file:


Amy Cronin

Bosch Security Systems, Inc.
Supervisor - Pre-Sales, Customer Service, Key Accounts & Sales Support (ST/SCS1-AM)
130 Perinton Parkway
Fairport, NY 14450
www.boschsecurity.us

Tel.: 1 (585) 678-3751
Mobile: 1 (585) 719-6790
Fax: 1 (585) 223-9180
mailto: amy.cronin@us.bosch.com

Bosch makes it possible for customer's to check order status and track shipments online

Check the status of new product orders and track your shipments online anytime!  

Visit our Customer Care Portal today to sign up for this new service – http://www.boschsecurity.us/en-us/Service/CustomerCare/portal.

Did you miss the 2011 Safe & Sound Tour? Check out our demonstration videos to see what nearly 7,000 people have experienced in the industry's largest product exhibit truck, and keep an eye out for the 2012 schedule - coming soon at www.boschsecurity.us/safeandsound!

Thursday, April 19, 2012

SoundCloud - Sharing Your Sounds

SoundCloud is a social media site which allows you to easily share sounds.  Navigation of the site is simple enough with features such as recording and uploading.  Sharing your sounds and tracks is possible through social media sites such as Twitter, Facebook, Foursquare or Tumblr.  For an avid blogger this would allow for narration etc.

Unfortunately I have had technical difficulty actually recording my own sounds.  Trouble shooting my browser etc was unsuccessful.  Apps are available for both iPhone and Android users.  As an Android user I downloaded this quickly from my Google Store and was operational within moments.

Recording via the cell phone worked great!  Enjoy some Tom Petty http://soundcloud.com/amycronin216/tom-petty


Mobile Devices - How did we everl live without them?

Mobile devices have allowed constant connectivity between employers, employees and customers.  More and more companies are utilizing laptops, smart phones and tablets.  While Blackberry may have been the tool of the recent past it has been replaced with the latest and greatest Android and Apple technologies.  Connectivity is no longer limited to just email.

This mobility offers advantages for not just companies but it's employees.  Personally speaking the flexibility this allows me as a working mother is priceless!  I am able to connect from lacrosse games and my customers are provided the same level of support as if I was in the office.  Having direct connectivity to my office has also allowed business travel to be more productive.  Fast and immediate responses are now possible due to the new mobile technology.  There was a time when traveling or out of the office you had to get back to people when questions or issues arised, now there is instant gratification.

As with most things this comes with its disadvantages.  Cellphones and tablets present a new challenge to the IT field in regards to management.  With security being such a large concern with businesses today protecting data could be challenging.  Additionally a recent concern for both employees and employers is the concept of tracking work time as was documented in a recent USA Today Article http://www.usatoday.com/money/jobcenter/workplace/story/2012-04-15/workers-sue-unpaid-overtime/54301774/1.

Have laptop will travel is my motto, I couldn't live without my mobile office.


After being introduced to Symbaloo I will never go back to the standard bookmarks menu.  I have this set to my homepage and utilize it daily.  I have all my favorite links such as Linked In, FaceBook, Google Reader and my email and news connections as well. The ability to customize my start page has proved to be very beneficial.

The easily laid out tile feature makes this tool so simple to use. Simple search functions with web-mixes available to be utilized makes this so user friendly.  I was overwhelmed at first but with a little time to play I will not go back to the olden days!

This puts my PLN at my fingertips!