Vocatys - Mobile Strategy Leaders
  • Home
  • Services
  • Case Studies
  • Contact
  • Blog

Small Businesses, Stop Outsourcing Your IT

17/9/2014

1 Comment

 
Small Businesses, Stop Outsourcing Your IT
Image source: memegenerator.net
The debate on whether IT should be an internal function, outsourced or a hybrid combination of the two has been going on for a while. There are strong arguments in favour of and against each one of them. So logically speaking, it would depend on a variety of factors, like business requirements, company size, whom one asks, blah blah blah..... right?

WRONG!!

In fact, in the light of my arguments below, I might even boldly describe the entire debate as ‘Rubbish’. But before I launch into another one of my inescapable arguments, let’s have a quick look at some of the pros and cons of IT as an outsourced service and as an internal function. Since this blog is primarily dedicated to small business IT, we won’t even talk about the hybrid combination model. The very idea of hiring an IT staff and then outsourcing that function can only make sense (I guess) in a large organisation.
External (Outsourced) IT
Pros
  • Low cost
  • Access to wider range of expertise
  • Service Level Agreements (SLA)

Cons
  • Poor response times
  • Lack of knowledge about business needs and priorities
  • Poor customer service
Internal IT
Pros
  • Proactive approach with higher response times
  • Intrinsic knowledge of business needs and priorities
  • Higher team dynamic

Cons
  • High cost personnel maintenance 
  • Limited range of expertise
  • Reliability
Now let’s analyse these pros and cons for a small business that uses services such as;
  • Google Apps for Work or Office365 for emails
  • Salesforce or Insightly for CRM
  • Dropbox, Google Drive, OneDrive or a NAS drive for files
  • Cloud-based services for other applications and 
  • Has BYOD or COPE framework deployed

Pros of External (Outsourced) IT
  • With no expensive and eternally outdated hardware such as servers to maintain, the cost of outsourced IT function can become an unjustified expense
  • Small business IT requirements are generally uncomplicated. Cloud-based services come with plenty of technical support and can work independently of other services. This eliminates the need to retain specialised expertise.
  • SLAs for outsourced IT support are complicated and often come with lock-in contracts that can be very expensive to get out of. Cloud-based services do offer SLAs but usually don’t have long term contracts.

Cons of Internal IT
  • The simplicity and ease-of-use of cloud-based systems do not always require a dedicated technical staff maintaining them. Moderate technical acumen within operations staff will more than suffice.
  • With cloud services you have access to the expertise of wide range of IT specialists providing cutting edge technology at extremely affordable prices.
  • Although far less frequent, cloud systems do have outages but the good thing about those times is the knowledge that there is nothing your staff can do and that some of the best engineers would be working tirelessly to get it back up and running without any excuses and overtime pay.

As far as the IT needs of any business is concerned, internal IT function has always been the first choice. Cost is the only primary reason why it is outsourced. Emerging cloud and mobile technologies are, however, radically changing this. You now, not just get better for less but amazing for a fraction and still don’t need an IT whiz-kid to manage it all.

This article was written by Austin D'Mello, Managing Partner of Vocatys, an emerging technology consulting company. If you liked this article please share it with your network. You can also subscribe to the monthly Vocatys newsletter by emailing us at hello@vocatys.com.
1 Comment

Why I Hate Antivirus

10/9/2014

1 Comment

 
Picture
In the world of tech support, the only thing more common than,

“Have you tried restarting your computer?”

is “Try disabling your antivirus.”

The primary purpose of an antivirus software is to protect your PC from computer virus and malwares. It is however, a well-known industry secret that its products don’t always protect your PC from viruses. As a professional IT consultant and the default IT guy to friends and family, I have helped clean viruses and malware from a numbers of PCs that were already running some sort of antivirus.

So if the antivirus isn’t always protecting you from viruses, what is it really doing?

Here are a few things I think it does, in some cases, really really well.

Annoying notifications
Constant pop-ups with sound notifications telling you it’s everything it does, like updating its database, scanning the PC, allowing or disallowing programs and the list goes on. But none of that compares to the noise it will make as it gets closer to renewing your subscription.

Blocking software installations/configurations
For a vast majority of software, it is not just recommended but required that you disable your antivirus before you begin installation. Installing something without first turning the antivirus off can be a grave mistake. I do speak from experience.

Randomly restricting Internet access
This one is a pretty cool feature. Everything could be working in perfect harmony but suddenly on one fine morning when you’re trying to check your emails or get online to read the news you can’t seem to connect. Your Skype is working fine so the Internet is not the problem. You restart your computer but still the same. Disable the antivirus and everything is back to normal. What happened? Your antivirus was updated last night and things got a bit weird is all.

Slowing your computer down almost to a halt
There are two levels of this feature. First one, is a general slowing down of your PC. It’s done so well, you’ll hardly notice. “It’s always been that way” you say, yet when others use your PC they seem a tiny bit frustrated.

I know what you’re thinking now, “So he’s saying we shouldn’t use antivirus at all?? Is he nuts??”

You’re damn right I am! Well only about not using the antivirus bit. As for me being crazy, first here me out and see my suggestions below.

Online security starts with you
If you clicked on dubious links on emails or installed “free” software without verifying the source, you will be infected no matter how good your antivirus is. One of the main reasons antivirus is not just unsuccessful but also annoying, is that it’s trying to not just protect but also compensating for the operator’s lack of awareness. Be hyper alert while clicking on linking by checking where they are actually taking you. Also thoroughly verifying the source before downloading and installing software.

Operating systems and web browsers have come a long way
Apple’s Macs do continue to remain largely virus and malware free. Windows 7 and especially Windows 8.1 are generally very secure operating systems. They come with a host of integrated security features like built-in firewall and Defender (formerly Microsoft Security Essentials) the inbuilt windows antivirus. While browsers such as Google Chrome, Safari and Firefox are immensely secure and reliable, even Internet Explorer 11 is now extremely secure.

I gave up on expensive antivirus software many years ago. The idea of yearly subscriptions for a software that was causing more pain than gain all in the name of perceived security wasn’t working for me. Just to be clear though, giving up the antivirus is probably more suitable at a personal level rather than at a corporate level.

What’re your experiences with antivirus? Do you think not using antivirus is crazy or reckless?

This article was written by Austin D'Mello, Managing Partner of Vocatys, an emerging technology consulting company. If you liked this article please share it with your network. You can also subscribe to the monthly Vocatys newsletter by emailing us at hello@vocatys.com.
1 Comment

21 Top MDM Solutions to Kick-Start BYOD For Small Business

2/9/2014

6 Comments

 
21 Top MDM Solutions to Kick-Start BYOD For Small Business
Image source: solutions-review.com
There is a lot of talk about BYOD (Bring Your Own Device) and COPE (Corporate Owner Personally Enabled). Both broadly refer to scenarios where employees are allowed to use essentially personal devices for work. Quite a few large organisations have adopted one of the 2 or a combination thereby reaping their benefits.

Most small and medium sized business tend to avoid BYOD or COPE even though they are likely to benefit from them the most. One of the main reasons for that is security. The idea of employees carrying with company data out of the office where it cannot be controlled or monitored can be very unsettling.

Mobile Device Management (MDM)
It does what it says. MDM is essentially a software solution that can either be installed on-premise or delivered as a service through cloud. Generally using a simple browser based interface, it controls and protects data and settings on all mobile devices connected to the network. So in case any device is stolen or compromised, MDMs can wipe out all important data from that device within minutes. They also perform a number administrative tasks such security updates, configurations and settings remotely with minimal disruption to end users.

With meteoric growth of mobile devices within workplaces, MDM solutions are in high demand and therefore quite a few companies now offer MDMs to suit the needs of virtually any kind of business operation. We have listed 21 MDMs below that are well regarded and would suit small businesses with 10 employees to a medium sized company with up to 250 employees.

Absolute Manage MDM
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“The features available with Absolute Manage MDM allow you to remotely manage the iOS, Android, and Windows Phone devices in your deployment. You can wirelessly (over cellular or Wi-Fi) configure, query, and even wipe or lock managed devices. Absolute Manage MDM is available as an on-premise installation or as a cloud-based solution.”

AirWatch (by VMware)
Pricing
Starting from USD $50 per device per year
Environment
Android, Blackberry, iOS, Windows Mobile
Company Spiel
“AirWatch® Mobile Device Management enables businesses to address challenges associated with mobility by providing a simplified, efficient way to view and manage all devices from the central admin console. Our solution enables you to enroll devices in your enterprise environment quickly, configure and update device settings over-the-air, and secure mobile devices. With AirWatch, you can manage a diverse fleet of Android, Apple iOS, BlackBerry, Mac OS, Symbian, Windows Mobile, Windows PC/RT and Windows Phone devices from a single management console.”

Amtel
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“Amtel simplifies field services mobility management with a complete set of integrated, cloud-based solutions for secure communications, mobile device security, apps and expense management. Our award-winning enterprise class mobile lifecycle management solution is used by organizations worldwide for: securing mobile devices; protecting mobile access to enterprise data; providing a secure corporate communications channel for field employees on mobile phones and tablets; and taking control of apps and expenses for corporate and BYOD devices.”

BlackBerry Enterprise Service 10 (by BlackBerry)
Pricing
Starting from USD $19 per device per year
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“BlackBerry® Enterprise Service 10 (BES10) is the only solution you need for secure device, application and content management, with integrated security and connectivity, for BlackBerry®, iOS and Android™. Deploy, manage and control both corporate and BYOD device users through a simple unified console. Perfectly balance end user and enterprise mobility needs without compromise.”

XenMobile (by Citrix)
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“Citrix XenMobile is a comprehensive solution to manage mobile devices, apps, and data. Users have single-click access to all of their mobile, SaaS and Windows apps from a unified corporate app store, including seamlessly-integrated email, browser, data sharing and support apps. IT gains control over mobile devices with full configuration, security, provisioning and support capabilities. Flexible deployment options give IT the choice to manage XenMobile in the cloud or on-premise.”

Dell Mobile Management
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“Dell Mobile Management enables you to manage and provision access to smartphones and tablets from any device with a browser and internet connection. It also manages applications and content on the devices. With Mobile Management, employees can self-enroll their devices for instant provisioning of corporate access and automated policy enforcement.”

Excitor MobiControl
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“Excitor MobiControl is a comprehensive enterprise mobility solution for managing your entire fleet of mobile assets across all operating systems. The centralized, web-based management console provides visibility and control of your corporate, shared and personally owned mobile devices.”

MaaS360 (by Fiberlink, an IBM company)
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“MaaS360 lets you provision, secure and manage your mobile devices, apps and content—all from a single portal—while minimizing risk to your organization. We make the complex world of mobility simple by giving you a global mobile infrastructure without the burden of a large financial investment.”

GO! Enterprise MDM (by Globo)
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“GO!Enterprise MDM  provides organizations of any size, real-time visibility and control over a variety of mobile devices regardless of operating system, liability, carrier, or email platform. Whether On-Premise or On-Demand (hosted), GO!Enterprise MDM provides a number of features including policy creation, compliance management, device statistics, audit tracking, app management, file distribution, and report generation, all from a single administrative console.”

Good MDM
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“Good provides mobile device management (MDM) to support the complete device lifecycle. IT can easily control device settings on any managed device – corporate liable, BYO or COPE – , and ensure safe access to proprietary business information. MDM is a basic capability for enabling enterprise mobility, and is included in Good for Enterprise, the Good Collaboration Suite, and the Good Dynamics Secure Mobility Platform."

Kaseya
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“Kaseya’s VSA solution provides MDM capability that extends robust IT policies and automated configuration settings to mobile devices by treating them as computers rather than souped-up cellular phones.”

LANDESK Mobility Manager (by Landesk)
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“LANDESK Mobility Manager helps IT administrators provide mobile workers access to the content and applications they need, while safeguarding corporate information. Mobile access must be easy for the professional outside the office, but IT teams must be able to control that access to information successfully.”

Desktop Central (by ManageEngine)
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“Desktop Central is an integrated desktop & mobile device management software that helps in managing the servers, laptops, desktops, smartphones and tablets from a central point. It automates your regular desktop management routines like installing patches, distributing software, managing your IT Assets, managing software licenses, monitoring software usage statistics, managing USB device usage, taking control of remote desktops, and more. It supports managing both Windows and Mac operating systems. It enables you to manage your mobile devices to deploy profiles and policies, configure devices for Wifi, VPN, Email accounts, etc., apply restrictions on using camera, browser, etc., and to secure your devices like enabling passcode, remote lock/wipe, etc. You can manage all your iOS and Android smartphones and tablets.”

McAfee EMM (an Intel company)
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“McAfee Enterprise Mobility Management (McAfee EMM) manages and secures the mobile workforce. McAfee EMM delivers a simplified, streamlined way to enable productivity with confidence in a world where users, and their devices, go everywhere and anywhere.”

Microsoft MDM
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“By delivering unified application and device management, both on-premises and in the cloud, you can support BYOD (bring your own device) initiatives by empowering people to work from the devices they choose while providing consistent access to, and protection of, corporate applications and data.”

MobileIron
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“MobileIron’s MDM capabilities enable IT to secure and manage mobile devices across multiple operating systems, providing secure corporate email, automatic device configuration, certificate-based security, and selective wipe of enterprise data for both corporate and user-owned devices. The MobileIron Client, Mobile@Work, works with MobileIron Core to apply policies and configure email, Wi-Fi, VPN, and security certificates. It creates a clear separation between personal and business data. Should the end-user leave the company or if the device is lost, IT can selectively wipe all corporate data on the device. The MobileIron Platform allows IT administrators to apply granular controls based on a variety of parameters such as device-type, device-ownership and employee role. With this granular policy framework, the IT administrator can both alleviate end-user privacy concerns and lessen the organization's burden of complying with a wide range of privacy laws.”

Mobile Control (by Sophos)
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“Mobile Control provides an easy way to manage all your smartphones and tablets. Whether you deploy corporate devices, or your employees bring their own (BYOD). Our EMM solution handles them from the initial setup and enrolment, right through to device decommissioning. And our fully web-based console allows administration from any location on any device.”

SOTI MobiControl
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“With the explosive adoption of consumer smartphones and tablets into the enterprise, enforcing corporate policies and best practices while supporting diverse user requirements can be a tough balancing act. Revolutionize your mobility strategy by managing corporate and employee-owned devices with SOTI MobiControl.”

Symantec Mobile Management
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“Symantec Mobile Management (SMM) is an MDM platform that enables enterprise-wide mobile email and application rollouts, safeguards mobile data and devices and provides visibility and control of the mobile environment. The suite delivers integrated single sign-on functionality across in-house and third-party apps, leveraging popular authentication methods including LDAP, SAML, and Kerberos.”

MatrixMobile MDM (by Tangoe)
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“MatrixMobile MDM is a comprehensive monitoring, management, and support software and service suite for mobile devices and applications in the enterprise offering complete control of the device lifecycle—from device setup to decommissioning. Mobile device management provides organizations with unmatched visibility and control of any managed device, whether corporate or individual liable, ensuring safe and secure access to invaluable corporate resources.”

SAP Afaria (by Sybase, a SAP company)
Pricing
Contact sales
Environment
Android, Apple iOS, Blackberry, Mac OS X, Windows Mobile, Windows Phone
Company Spiel
“SAP Afaria's software platform delivers centralized control of all mobile devices and tablets including iPhone, iPad, Android and BlackBerry, as well as the apps that run on them. With keeping technology in mind, SAP Afaria offers Enterprises the flexibility to deploy on premise or partner hosted.”

Read more:
  • http://www.computerworld.com/article/2497055/mobile-device-management/mdm-tools-features-and-functions-compared.html
  • http://technologyadvice.com/mdm-byod/smart-advisor/?tmp_opt_hme_var=rst_at_end
6 Comments

Effortless UX Can Be A Happy Accident For Small Businesses

27/8/2014

0 Comments

 
Effortless UX Can Be A Happy Coincidence For Small Businesses
We have already spoken a lot about how decentralising IT operations in a small business will have a significant impact on IT costs and internal business processes. For those who have missed those articles, you’ll find the links to them below. You can even download the free whitepaper on The DeCent-IT Framework, if you wish to learn more.

Right! Now that the pitch is out of the way, let’s explore how decentralising IT operation can have a serendipitous outcome for your user experience, or as it’s referred to by cool people, UX.

It’s about the experience, man..
UX as a buzz word, generally pertains to the design of your website or mobile app. In essence it is the next step up from customer service. Unlike the latter, it’s about how your clients, customers and/or users experience their entire interaction with your business. It’s about how they discover, acquire and experience your offering, it’s about how it makes them feel.

Think about Apple and its products. Their ads don’t talk about the amazing technology that’s crammed into gorgeous looking iPhones, iPods and iPads but more about how they will make you feel. In the non-technical world Lexus stands as a great example. They go to great lengths to ensure a flawless experience from acquisition to ownership of their cars.

The Unusual Suspect
Companies put a great deal of effort into developing UX strategies. They even hire specialists and teams who focus on nothing but user experience. There are currently over 300,000 UX professionals listed on LinkedIn. Small and medium sized businesses, however, don’t always have the luxury of hiring specialist staff for activities that are not a must-have but more like, would be good to have.

But just like glycerol is a by-product of biodiesel, a decentralised IT operation can substantially influence user experience of a small business. While it’s not a core UX strategy in itself, it will act as a catalyst to boost overall user experience in the following ways.

Better Design
One of biggest benefits of a decentralised IT operation is seamless collaboration throughout the business. Improved and well documented internal communications is a goldmine for great ideas. It’s not to say that the product or service design needs to be democratised but input from an engaged staff will always result in a brilliant design.

Better Delivery
The delivery of your services or products is just as important as their design. For the best user experience, every touch point of your business needs to be identified and optimised. When staff are well connected and informed, they can provide information, support and customer service to prospects and customers effortlessly. Thereby making interaction with the business a great experience.

UX via Social Media
Decentralising IT results in higher employee engagement. This in turn makes your staff your primary brand ambassadors. With the power of social media, your brand ambassadors could not only help spread the word but actually engage with your customers creating an all-round user experience at a personal level.

Refocus Resources
The significant cost savings brought about by a decentralised IT operation. This could allow even small businesses to channel those savings towards product design and delivery initiatives that adds to the user experience.

Experience Comes from within
A happy exterior is a natural extension of a happy interior. True user experience begins within the business. The experience you provide your staff with, is the experience they will provide your customers. Decentralised IT operation creates an environment of trust, authority and responsibility. It will heighten employee experience and therefore user experience.

Was this article helpful?

Would you invest time and money on user experience?

Have you involved your staff as brand ambassadors? How did that workout?

We would love to hear from you. Feel free to leave us a message below.

This article was written by Austin D'Mello, Managing Partner of Vocatys, an emerging technology consulting company. If you liked this article please share it with your network. You can also subscribe to the monthly Vocatys newsletter by emailing us at hello@vocatys.com.

Read more:
  • http://www.vocatys.com/blog/the-worst-kept-secret-to-amazing-small-business-it
  • http://www.vocatys.com/blog/3-small-steps-for-smbs-one-giant-leap-for-remote-working
  • http://www.vocatys.com/decent-it.html
  • http://www.smallbusinessmiracles.com/our-blog/user-experience-ux-matters-small-business/
  • https://smallbusiness.yahoo.com/advisor/ux-beyond-design-emotional-connection-163048931.html
  • http://en.wikipedia.org/wiki/User_experience
  • http://www.business2community.com/online-marketing/ux-beyond-design-emotional-connection-0898245#!bKUbtp
0 Comments

3 Small Steps For SMBs, One Giant Leap For Remote Working

20/8/2014

0 Comments

 
3 Easy Steps for Small Business Remote Working
Image source: nasa.gov
Remote working or telecommuting is nothing new. In fact, it has been around since early 1970s. Since then a number of companies, mostly large enterprises, have dabbled with it with varying degrees of success. Companies like Yahoo and Best Buy, after years of offering remote working options, decided to end those programs. Whereas, companies like Unilever and IBM have currently around half of their staff working remotely and are increasing that number steadily.

There is a plethora of articles online, discussing the advantages and disadvantages of remote working but there is one thing both, proponents and critics do agree on, remote working is not for all. It’s certainly not, one size fits all.

Amazingly though, thanks to emerging cloud and mobile technologies, it’s not all that black and white any more. Small and medium sized businesses that may generally classify themselves as non-conducive to remote working, can also reap its advantages, of which there are many.

So follow the 3 steps below to systematically assess, swiftly implement and effectively monitor, remote working for your small business.

Assess the needs of the business, FIRST!
“In case of emergency, put the oxygen mask on you before assisting children travelling with you.”

The above statement stands equally true in business. There would be no work, let alone remote work, if there was no business. So first things first, comprehensively assess current business requirements and processes. While doing that, it’s imperative that “industry best practices” are consciously ignored, for best practice is only another name for mediocrity.

If done objectively, in most cases, this step will highlight some vital benefits of remote working for your business. If, for any reason, the benefits are not clear or non-existent, either hire an expert for a second opinion or simply stop wasting time and get back to work.

Create a list of best and worst case scenarios
“Hope for the best, prepare for the worst.”

In order to maximise the benefits of remote working, you need to be acutely aware of every possible scenario. A number challenges arise both for the business and its staff when you introduce remote working. Some key challenges would be;

  • Striking the right work-life balance
  • Workplace isolation
  • Lack of face-to-face communication
  • Performance management
  • Business liabilities and WorkCover

While uncertainty cannot be eliminated, careful consideration of the best and worst outcomes will greatly help avoid ambiguity and mitigate risks.

Identify and procure the best available technologies
“The best things in life are free.”

There are scores of cloud and mobile technologies being built for businesses seemingly every day. For remote working there are collaborations tools, cloud-based CRMs, secure communication and productivity apps. Each one with their own features, benefits and shortcomings. In this final step, patience and due diligence will play a pivotal role in the success or failure of your remote working program. The one thing to remember here is that a high price tag does not mean a better product.

When deployed with a thorough understanding of business needs, accommodating for various outcomes and supported by the best available technologies, remote working can be extremely effective. Given the range of benefits that it brings, remote working cannot and should not be ignored.

Remote working is one of many proven strategies that comprises the DeCent-IT Framework. Developed exclusively for small and medium sized businesses, it is a process based tool-kit that will significantly cut IT costs and dramatically improve business operations. For more information download your free copy of The DeCent-IT Framework Whitepaper.

This article was written by Austin D'Mello, Managing Partner of Vocatys, an emerging technology consulting company. If you liked this article please share it with your network. You can also subscribe to the monthly Vocatys newsletter by emailing us at hello@vocatys.com.

Some Good Reads:
  • http://en.wikipedia.org/wiki/Telecommuting
  • http://www.forbes.com/sites/edwardlawler/2013/05/15/remote-working-whos-right/
  • http://tech.co/remote-work-trend-booming-2014-08
  • http://tech.co/tips-managing-remote-team-2014-08
  • http://thefutureofwork.net/assets/Managing_a_Remote_Workforce_Proven_Practices_from_Successful_Leaders.pdf
  • http://sloanreview.mit.edu/article/set-up-remote-workers-to-thrive/
0 Comments

The Worst Kept Secret To Amazing Small Business IT

13/8/2014

0 Comments

 
Secret to Amazing SMB IT
Image source: theyec.org
Small business IT has become one seriously complicated affair. You have hardware & software management, IT procurement, cloud, managed IT, in-house IT, SLA’s, desktop support, audits, server health checks, server reports, software deployment, training etc. etc. etc. The list goes on.

Our dependence on technology, may it be for personal or business use, is increasing every day at a phenomenal rate. So cutting IT out of your business completely is certainly not the answer but at the same time, increased adoption of technology doesn’t have to mean increased complications in its management.

When it comes to small and medium sized businesses the only true solution is ….

….. wait for it ….

….. Decentralised IT Operation Management….....

Now before you start calling me names, allow me to present my case.

The Rationale
In essence, decentralised IT operation management is delegating the basic ongoing management of IT by letting end-users perform elementary IT functions.

“Give a person a fish and you feed them for a day. Teach a person to fish and you feed them for a lifetime”.

We carry around with us mobiles phones that in most cases, are more powerful and capable than the desktops we use at work. In this age of Information Technology, our understanding of bits and bytes is rapidly expanding. Even 2-3 year olds use tablets and phones without reading the manual and for all other answers we don’t have (and even for the right questions), we have Google.

The Method
In order to effectively decentralise IT you will need to;
  • Develop a clear understanding of your current operations and business requirements
  • Adopt and migrate to emerging cloud and mobile technologies to access powerful and secure technologies without the need for large upfront capital and expensive maintenance costs
  • Develop and deploy strategies such as BYOD (Bring Your Own Device) and COPE (Corporate Owned, Personally Enabled) that once again reduce equipment costs and increase productivity

 The Functions
Once the right strategies are in place, here are some of functions that can be easily delegated to end-users.
  • Updates, security patches and general device management.
  • Installing and uninstalling approved apps and programs
  • Basic troubleshooting
  • Setting up new employees
  • Deleting departed employee
  • Business systems recommendations

The Benefits
Finally, if you’re still doubting it, here are some key benefits of decentralising your IT operation.
  • Significantly reduce IT operation costs
  • Eliminate upfront IT related capital expenses
  • Access the latest technologies
  • Boost employee engagement
  • Increase productivity
  • Make IT a strategic functions as opposed to an operations function
  • Reduced conflicts between IT department and end users

Technology is changing everything; the way we live, the way we work, the way we communicate, our expectations from life and people around us. Businesses not only need to evolve but they need to evolve fast. Fortunately, small businesses are, by nature, agile. Therefore a decentralised IT function in a small business will result in a robust operation that can easily take on any competitor no matter how big.

This article was written by Austin D'Mello, Managing Partner of Vocatys, an emerging technology consulting company. If you liked this article please share it with your network. You can also subscribe to the monthly Vocatys newsletter by emailing us at hello@vocatys.com.
0 Comments

Bitcoins (Part 2 of 2): The Silver Bullet for Small Businesses

5/8/2014

0 Comments

 
Bitcoins are accepted in this cafe
Bitcoins are Accepted in this Cafe. Image source: Wikipedia.org
In our last Bitcoin post “Bitcoins (Part 1): What’s All the Fuss About?” we spoke about how they worked. We explored some advantages and disadvantages of using digital currencies such as Bitcoin. In this post we will explain why we think the biggest winners in the adoption of Bitcoins will be small businesses.

Before we dive into it, it is worth reiterating that Bitcoin is only one of many digital currencies out there. It is often referred to as a cryptocurrency, which is a form of digital currency that relies on principles of cryptography for secure exchange of information. Since its creation in 2009, there have been quite a few that have cropped up. As of May 2014, there were more than 275 cryptocurrencies being traded in online markets. Bitcoin certainly leads by a long way in terms of popularity and adoption.

Irrespective of which cryptocurrency eventually wins the race or if they all end up existing concurrently like our physical currencies, Bitcoins and the like are here to stay. Hence for simplicity, small businesses adopting Bitcoin will experience some extraordinary results. While not exhaustive, the following should cover most bases.

Low Operating Cost
Normally with Bitcoin there are no fees, except when payment needs to be urgently processed. These fees again are negligible, often less than one percent. This would allow small businesses to receive payment without high friction rules like minimum EFTPOS limits and credit card surcharges.

Go to Market…Fast
As compared, it is extremely easy to set up an account and start accepting Bitcoins. New businesses starting up and old businesses changing direction, often struggle when it comes to setting up transaction accounts and merchant facilities, resulting in delays in ‘go to market’ strategies. Adopting Bitcoins will dramatically streamline that process.

Lower Risks
According to a LexisNexis report in 2013, merchants pay up to US$2.79 for every $1 lost in fraudulent transaction. Chargeback frauds can have a devastating effect on a small business. With all onus on the merchants to verify the transaction, a chargeback will still result in the merchant being held solely accountable. Bitcoin transactions, however, are irreversible thus significantly reducing such fraud risks.

International Business
Rampantly growing ecommerce is forcing even the most traditional businesses to have an online presence. But buying and selling online, especially if trading internationally, results in businesses having to navigate the multi-currency conundrum, not to mention the incessant international transaction fees. International transactions with Bitcoin happen within 10 mins and attract none or very little fees. Bitcoin allows small businesses immediate pathway to international trade with almost no hassle.

Free Publicity
Given the popularity and the publicity that goes with everything Bitcoin, a lot of small businesses are advertising they accept Bitcoins just for the press. Accepting Bitcoin does not cost much, if anything at all, to setup but it will undoubtedly have a positive impact on the brand image.

Attract Cool
At the moment, the decentralised nature of Bitcoin makes it cool. We are talking sub-zero! Small businesses accepting Bitcoins are automatically cool. This will attract an entire subculture of customers that would not normally shop with them. It’s simply cool to buy with Bitcoins. Likewise it will widen the scope of suppliers to select from as well.

Challenge the Big Dogs
One of the key areas where larger competitors often hold a distinct advantage is operations. Emerging mobile and cloud technologies are already closing that gap. Bitcoins with its ability to attract new markets, reduced risks and low operational expenses like bank and merchant fees, will see marked improvement in operations, therefore allowing them to effectively compete with the big dogs.

Flexible Finances
Businesses where finance is controlled by multiple people and need multiple authorisations for even small spends, can often be caught short if one of the authorising individual is not physically available. Bitcoins can be set up for multiple authorisations and with easy access through various mobile wallet apps, everything becomes location independent and easy.

Taxation
Governments are generally approaching Bitcoins in two forms viz. as Currency or as Property. Earlier this year, the Internal Revenue Service in the US ruled Bitcoin as a ‘Property’ for tax purposes. The Australian Taxation Office is still in the process of making the call on that. If declared as Property, Bitcoins will be subjected to capital gains tax which should not affect businesses that do not intend to hold on to them for extended period of time and/or intend to use an exchange to swap them for equivalent cash immediately. If declared as Currency, however, Bitcoins will be considered as foreign currency and will come with certain tax breaks.

With the right strategy small and medium sized businesses can make Bitcoin their silver bullet. Bitcoin adoption is still in its growth phase. Early adopters will yield the biggest reward.

This article was written by Austin D'Mello, Managing Partner of Vocatys, an emerging technology consulting company. If you liked this article please share it with your network. You can also subscribe to the monthly Vocatys newsletter by emailing us at hello@vocatys.com.

References:
https://en.bitcoin.it/wiki/How_to_accept_Bitcoin,_for_small_businesses
http://www.coindesk.com/small-businesses-enjoy-success-accepting-bitcoin/
http://www.coindesk.com/survey-results-59-merchants-accept-bitcoin-boost-ecosystem/
http://www.washingtonpost.com/business/on-small-business/bitcoin-presents-promising-but-risky-payment-alternative-for-small-businesses/2014/04/02/6637aad8-ba7b-11e3-9a05-c739f29ccb08_story.html
http://readwrite.com/2013/11/06/why-small-businesses-have-the-most-to-gain-from-bitcoin
http://en.wikipedia.org/wiki/List_of_digital_currencies
http://en.wikipedia.org/wiki/Digital_currency
http://en.wikipedia.org/wiki/Cryptocurrency
https://coinmarketcap.com/
http://www.abc.net.au/news/2014-06-30/tax-office-delays-ruling-on-bitcoin/5559816
http://en.wikipedia.org/wiki/Chargeback_fraud
0 Comments

Do This Before You Let Your Old Smartphone Go

30/7/2014

0 Comments

 
Factory reset on Android phones is not enough
Image source: Android Central
This article mainly outlines security flaws and options for Android based smartphones. As for all you iPhone users starting to feel smug, please keep reading. It’s one of those posts where there is something for everyone.

In their blog post earlier this month, Avast published some very interesting and somewhat worrying information. According to the blog, they bought 20 used Android phones from eBay and using easily available standard forensic tools, were able to extract personal data of previous owners. They apparently found around 40,000 stored photos including, and as expected, hundreds of naked selfies of women and men. They also found emails, text messages, phone logs, contacts and even google searches.

They claim they found all that data despite a ‘Factory Reset’ done on those phones by their previous owners. While there were no specific details as to which of those phones were reset, they did bring to light some important facts about how data is stored and deleted on most data storage devices.

So essentially when you delete anything on your phone, what you are really deleting is the link to that piece of information on the storage drive. The information remains there until new data is written on top of that. So when you do a factory reset you’re only deleting the index of links to all your data and not the data itself. Therefore using basic data retrieval techniques one can retrieve pretty much most of the information on that phone just before the factory reset.

Before we start worrying though, do note that the phones were all old and Android based. When asked, Google responded by point out that Android version 4.0 and above, used by 85% of the users, did not have the security flaws of the previous versions.

The new versions have an option to encrypt all data on the phone with a cryptographic key that is generated based on the passcode provided by the user. But this option is not turned on by default therefore making new users as vulnerable.

Depending on the exact version and make of your smartphone, the steps to turn on the encryption feature will slightly vary but the following should be a good guide.

Charge Your Phone
Depending on the amount of data on your phone, encryption process can take at least an hour. So make sure your phone is fully charged and for complete peace of mind leave it plugged in. Losing power midway will most likely result in catastrophic data loss.

Backup
It is the golden rule of all IT. Before you do anything and often when you do nothing it is imperative that you always back up all your data. In this case, a backup of all your photos, messages, contacts, emails etc. will save you a lot of time and heartache if thing do hit that fan.

Encrypt
This is where things could be different based on versions, makes and models. Generally speaking on your phone,

  1. Go to Settings
  2. If there are tabs on top, go to either ‘More’ or ‘General’ and find Security
  3. If there are no tabs scroll down and find Security
  4. Tap Security
  5. Tap ‘Encrypt Phone’ or ‘Encrypt Device’
  6. From here on carefully read and follow on-screen prompts

Once the process is complete, you can rest assured all your data and photos no matter what kind are all safely encrypted.

Caveats
The preceding steps will certainly keep your data safe but encryption in Android has its own drawbacks.

  1. Slower Performance – Encryption will reduce the performance of your phone. Depending on the version, model and make this effect will vary.
  2. Irreversible – Once encrypted, the device cannot be reversed back to unencrypted state. The only way back is factory reset.
  3. Time consuming – This one’s a one-time issue. It does take a long time to encrypt, especially if you have a lot of data.

We recommend, if you have the latest whiz bang mobile, a tendency to take photos in front of your mirror, about an hour to kill or simply want everything super secure, certainly go ahead and encrypt you phone. On the other hand if your phone is a bit old or performance is important, encryption is not advisable. In any case before you decide to discard your device for a new one be sure to first encrypt it and then perform a full factory reset before you let that phone go.

iPhone
Apple iPhone and iPad run on iOS which uses AES 256 algorithm with a software key generated by the information users provide. This is a default setting and is always on and cannot be turned off. When an ‘erase all content and settings’ is done on the phone, the data index and the encryption key is deleted and without the key all the encrypted data is effectively rendered unrecoverable.

Now before all you Apple users start to feel smug and relax, a forensic scientist Jonathan Zdziarski presented a very revealing paper at a conference earlier this month. He indicated Apple devices ran up to 44 undisclosed services in the background which cannot be turned off. While previously denied, Apple did later acknowledge their existence and insisted they exist for diagnostic purposes alone. True as that may be, these services which can be broadly classified as backdoors can pose potential threats.

In conclusion, smartphones in general are amazing at what they do but there are always pitfalls. Growing use of technology does come with its own set of risks. The right way to mitigate these risks is not shunning the technologies themselves but by better understanding the way they work.

We invite you to share with us any experience you have had relating to encrypting your Android device or your opinions on Apple security. If you liked this article please share it with your network. You can also subscribe to our monthly newsletter by emailing us at hello@vocatys.com.

References:
https://blog.avast.com/2014/07/09/android-foreniscs-pt-2-how-we-recovered-erased-data/
https://source.android.com/devices/tech/security/index.html#filesystem-encryption
http://www.zdziarski.com/blog/?cat=11
http://www.theguardian.com/technology/2014/jul/11/factory-wipe-on-android-phones-left-naked-selfie-photos-and-worse-researchers-find
0 Comments

Bitcoin (Part 1): What’s All the Fuss About?

22/7/2014

0 Comments

 
Everything about Bitcoin
Image source: bitcoinexaminer.org
Technology is disrupting everything these days. Even things we didn’t think could or should be changed. Bitcoin is disrupting money as we know it.

Like money, Bitcoin is a payment system. Unlike regular currency, which is regulated by a government and comes out of a central bank, it has no single administrator and is not physically stored in any particular location. Payment are made and received electronically using various wallet applications on mobile devices and computers.

Every payment is recorded in a public ledger called Block Chain Ledger. This is maintained by a network of servers that anyone can join. Every single Bitcoin transaction is recorded in this ledger and can be examined by anybody. In return for maintaining these ledgers, owners of those servers forming the network are rewarded with newly created Bitcoins. This only method of creating new bitcoins is called Mining.

Due to its decentralised nature, governments across the world are either treading carefully, hesitant or completely closed to Bitcoin. A currency that cannot be controlled and tracked does pose a number of issues. Australia is among very few countries that is open towards Bitcoin and has released tax guidelines around its use.

What’s awesome about it
Here are a few things we find incredibly amazing about Bitcoin.
Low or No Fees
In the vast majority of cases and unlike banks and credit cards, there are no fees to hold and transact in bitcoins. Some merchants may charge a fee of less than one percent but that’s only if you need them to prioritise the processing of your transaction for faster payments.

Immediate Use
Starting an account does not require paper work, identification documents, huge security deposits for businesses and lengthy complicated approvals processes. Simply use one of many bitcoin wallets available for free and start paying and accepting bitcoins.

Secure and Fraud Proof
It uses military grade cryptography that makes it almost impossible to steal unlike your credit card details. For businesses plagued by chargeback frauds this is a great way to accept payment as Bitcoin payments are irreversible.

Simple and Fast International Payments
With most banks charging high fees and still delaying transaction for up to 3 days, international payments with Bitcoin can be completed in 10 minutes irrespective of the location. It’s free in most cases but may attract a fee of less than one percent for even faster transaction times.

Multi-signature
For business and in some cases personal use where spending requires multiple authorisation, Bitcoin can be set up where payments will need more than just one person to sign.
What’s scary about it
There is no light without dark and although an evolution, Bitcoin comes with its own set of issues.
Volatility
As a currency, Bitcoin is very new, the supply is limited and trading volumes are low. These are some of many speculated reasons for high volatility in its value. Starting at US$0.30  in 2011, peaking at US$1135 but dropping to $693 three days later and today 22nd July 2014 at US$624.85 (AU$665.47).

Pricing
For businesses, this volatility makes it very hard to correctly price their products and services which in turn can affects consumers. 

Taxation
Countries are starting recognise the validity of bitcoins and in case of Australia have released tax guidelines. However invoicing, general accounting and reporting in bitcoins can become complicated and cumbersome.

Irreversibility
It comes at a cost but credit cards and pay pal transaction do protect consumers from fraudulent businesses. With bitcoins, once the payment is made it cannot be reversed. This means you need to do your homework well before you pay anyone for anything.

Anonymity
Transacting in bitcoins is completely anonymous. Great feature when your identity needs to remain unknown. But for businesses legally required to verify the identity of their customers, bitcoins can be debilitating.
In conclusion…
We believe in the future, the very near future, all money will be digital. Bitcoin is among quite a few digital currencies that are pushing their way into our lives. So far Bitcoin has been the most popular and widely accepted yet it is still under development. Technically speaking it is still in Beta. Its exact future is anyone’s guess but for now its advantages far outweigh its disadvantages and we think it’s here to stay.

This article was written by Austin D'Mello, Managing Partner of Vocatys, an emerging technology consulting company. If you liked this article please share it with your network. You can also subscribe to the monthly Vocatys newsletter by emailing us at hello@vocatys.com.

References:
  • https://bitcoin.org/en/
  • http://en.wikipedia.org/wiki/Bitcoin
  • https://www.kabbage.com/blog/does-accepting-bitcoin-make-sense-as-a-small-business-owner
  • https://coinreport.net/coin-101/advantages-and-disadvantages-of-bitcoin/
  • http://finance.yahoo.com/news/bitcoin-pros-cons-consumers-merchants-140041526.html
  • http://bitcoinembassy.ca/about/what-is-bitcoin/advantages-disadvantages
  • http://en.wikipedia.org/wiki/Legality_of_Bitcoins_by_country
  • http://www.abc.net.au/news/2014-06-30/tax-office-delays-ruling-on-bitcoin/5559816
0 Comments

IT Vs Users? Here’s an Easy Solution

16/7/2014

0 Comments

 
Solution to IT vs Users
Image source: Vocatys
May it be internal or external, the idea of IT operations within any organisation being a fully integrated business partner, has forever been wishful thinking at best. The IT department needs to control all systems for maximum efficiency and security. Whereas, the users need easy and immediate access to various systems to maximise their efficiency and therefore productivity.

Mathematically speaking, the IT department’s efficiency is inversely proportional to the users’ efficiency. Neither can be truly efficient without costing the other its own. But the biggest loser in this scenario is the organisation itself.

Now imagine if users didn’t have to get clearance from the IT department every time they needed access to new programs, remote access to files and emails. And at the same time, IT department didn’t need to worry about day to day upkeep of eternally outdated hardware, never ending security patches and software updates but instead focussing on the very needs of the business and its users that they are there to service.

Imagine if their efficiencies were directly proportional to the users’.

Here are two easy solutions that have started transforming that imagination into reality for many.

Cloud Computing
While the concept and its origins can be traced back to 1950s, it’s only since around 2006 when Amazon.com introduced Elastic Compute Cloud, has it come into popularity. Cloud computing has a wide range of benefits for virtually any organisation of any size, within any industry sector including government, education and not-for-profits.

One of the key benefits is the ability to use computing as a service or utility. This way businesses do not need to buy and maintain expensive hardware and software. They just pay a monthly or yearly fee to access as much or as little computing power and space required.

It creates a major shift in focus for the IT department. Now for the first time instead of worrying about system security and uptime, IT can focus on the actual needs of the users and actually play an intrinsic role in the growth of the business. User on the other hand will have access to updated technology and systems allowing them to do their jobs without having to worry about IT trying to control everything they do.

Mobile Technologies
The dramatic and continual rise of smartphones is a great indicator of the seismic shift in our day to day computing. In the vast majority of the cases we are carrying mobile phones in our pocket that are more capable than the computers we use at work. The software and hardware of these phones and tablets are designed and built with almost surgical focus on user-friendliness and rarely need any tech support. A vast array of enterprise apps, on the other hand, seamlessly convert them into business devices that can be easily used and managed by users themselves.

Its desirability and competitive pricing has resulted in such levels of popularity that according to various reports, by the end of 2015 there would be more internet connected smart devices than people on earth. This fact has also given rise to BYOD (Bring Your Own Device) model, allowing employees to use their own smartphones, tablets and/or computers for work.

Without the need to constantly maintain and troubleshoot ageing computers IT can once again focus on being a true business partner that can leverage emerging technologies to increase user productivity and engagement. Users too, will see increased efficiency due to free and flexible access to a host of services that work effortlessly without the constant need for support.

In conclusion, these emerging technologies are already making their presence felt. The opportunities and threats they present are extreme. Depending on the choices they make, businesses can overthrow their biggest competitors, breakaway from the peloton or succumb to the smallest player in the industry. Strategic use of technologies to eliminate operational inefficiencies will be critical to the success of any organisation.

This article was written by Austin D'Mello, Managing Partner of Vocatys, an emerging technology consulting company. If you liked this article please share it with your network. You can also subscribe to the monthly Vocatys newsletter by emailing us at hello@vocatys.com.

References:
  • http://en.wikipedia.org/wiki/Cloud_computing
  • http://www.itu.int/en/ITU-D/Statistics/Pages/facts/default.aspx
  • http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2014-e.pdf
  • http://teqy.co/facts-internet-things-infographic-exigent/
0 Comments
<<Previous

    Author

    The Vocatys Team writing on Breaking News on Emerging Technology, How-To's, Why-To's, Company News and some seriously mundane ramblings!


    Archives

    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014


    Categories

    All
    Apps
    Bitcoin
    Breakup
    BYOD
    Cloud Strategy
    Data Analytics
    DeCent IT
    DeCent-IT
    GoT
    Heartbleed
    Internet Security
    IoT
    IT Support
    MH370
    Mobile Hijack
    Mobile Security
    Mobile Strategy
    Responsive Design
    RiskEverything
    SMB
    Social Media
    Video


    RSS Feed

What We do

DeCent-IT Framework
Mobile Strategy Consulting
Business IT Support
Apps & Websites

Company

About Us
Careers
Contact
Legal

what Our clients say

"Vocatys is the game changer that IT support companies don’t want you to know about."

- Director, Liquid Learning Group
© 2016 Vocatys Pty Ltd  |  44 Market St Sydney Australia