Did Microsoft Just Win the Internet?

Microsoft Surface 6

Good news for people wanting a new Microsoft Surface Pro 6 2-in-1. It is all grown up. No longer just for schools, video-games, and weekend play, the new Surface Pro is ready for prime-time. It has a sleek new look and a thicker, black non-slip coating on the exterior. This makes it much more professional-looking than previous versions. In fact, that is one of the main selling-points—its classy, elegant appearance.

Microsoft Surface 6

Tablets are generally seen as more convenient than a laptop or a clunky, antiquated desktop. However, they also have a screen size that’s easier to view. This makes them portable, but more useful than a smartphone screen would be. Plus, with the addition of a keypad along with the touchscreen, this is a multifunctional device.

Additionally, it is as useful as it is attractive. At a whopping 67-percent faster speed, the eighth-generation Intel quad-core i5 processor handles work and play with equal capability. One of the things customers requested was a more professional-looking workstation, with faster processing using multiple cores and Microsoft Pro 6 definitely provides that.

What Are Its Primary Features?

One of the primary selling points is the more professional appearance. The muted colors that the Pro 5 were available in, included blue, red, and silver. The black-colored cover that has only been provided in the Pro 6 is considered much more appropriate for the work environment than the brighter options previously offered.

A second feature that makes the upgrade beneficial is the advanced speed. Although the Surface Pro was already considered fast, the newest iteration is significantly more so. It can be purchased with either 8GB or 16GB of memory and comes with 128GB, 256GB, 512GB, or 1TB SSD.

What Makes It Better Than Previous Versions?

The superior speed of use and professional appearance are its main selling points. Truly, it depends on what one is buying the tablet for. If it is for a child’s homework or video game playing, then the Pro 5 might be a better choice. The Pro 6 has less desirable graphics for gaming, while the Pro 5 has the most superior graphics capabilities of the two, and includes a faster and more capable CPU. If one is buying the tablet for business purposes, the Pro 6 is likely the preferred option, as it has superior speed without all the glitz.

How Are the Surface Pro 5 and Surface Pro 6 Similar?

Both Pro 5 and Pro 6 are available with the following attributes, and some would argue that they are nearly identical. They have a 12.3-inch display, which is more than enough for most users and is the same size as many laptop computers. Both are available with 4GB, 8GB, or 16GB of RAM. They each have a battery-life of around 13 hours.

Some of their notable features include the following:

  • Headphone Jack
  • MicroSDXC Card Reader
  • Mini-DisplayPort
  • Surface Connect Port
  • USB-A 3.0 Port
  • Multi-touch PixelSense

One of the main things that previous versions have that this one does not is the truly impressive graphics. The Surface Pro 5 is sold with an Intel® HD Graphics 620.

What Are Other Options?

One of the primary aspects that other devices have is their port options. For example, many laptop options have Thunderbolt connectors, which allow them to handle larger files much more quickly than older machines. If you’re planning on using a two-in-one for heavy audio or video usage, you may want to consider your options thoroughly. Without Thunderbolt or USB-C, simple tasks like transfers or opening files can take quite a long time. Much of the time spent doing a project can be waiting for files to transfer, render, load, etc.

Neither the Surface Pro 5 or the 6 comes equipped with a USB-C or Thunderbolt 3 connector. This wasn’t considered a major issue with previous devices. However, since recent editions of modern 2-in-ones have them now, it is a bit surprising.

Some of the competitors in the field include the following:

  • Dell XPS 13 2-in-1
  • Eve V
  • HP EliteBook x360 G2
  • HP Envy x2 (Qualcomm)
  • HP Spectre x360
  • Lenovo Miix 720
  • Lenovo Yoga 920
  • Surface Book 2 (13 inch)

Although there are lots of options, Microsoft has been around since 1975. As a long-time contender, it has more than proven its abilities and staying power.

In Conclusion

When one doesn’t want to sit at a desk all day, perhaps a tablet is the best option. It allows for mobility, versatility, and flexibility. With a Microsoft Surface Pro 6 you can make the best of work and play. Although the graphics are not as great as they were with the Surface Pro 5, they are decent. Both are light enough to take into the office or on vacation. With a one-year warranty and a first-class support system, you cannot go wrong. Microsoft just keeps getting better and better.

October 16th Is Steve Jobs Day

Steve Jobs Day

Steve Jobs Day Sheds Light On Apple Founder’s Legacy

In today’s modern world, the name “Apple” has become synonymous with technology. It’s no wonder then that Steve Jobs, the company’s late co-founder, has become such an influential figure in American history. His contributions are well documented in motion pictures, books and an authorized biography.

Steve Jobs Day

October 16 is known as Steve Jobs Day, which was declared in 2011 by the Governor of California. The day brings forth the opportunity to reflect on the life of the famed innovator and how his contributions have helped advance the human race. From iPhones to iPads and every single app in between, one could argue that humanity would not be as technologically savvy without the work of Steve Jobs.

In August of this year, Apple achieved what no other company in history has done. It became the first publicly traded U.S. company to reach $1 trillion. Not only is this historic in terms of branding, but it brings to light the incredible ingenuity the company has displayed throughout the years. Along with his partner Steve Wozniak, Jobs’ innovations have helped solidify an incredible legacy likely to stand the test of time.

The Early Years

Jobs grew up in the San Francisco bay area in the 1960s. By the age of 10, he had developed a fascination with electronics, likely due largely in part to time spent with his father building crafts. This hobby paved the way for Jobs’ establishment of Apple in 1976, along with his co-founder Steve Wozniak.

Jobs sat at the helm of Apple’s operations until 1985, when he broke ties with the company and established NeXT computers. Apple later purchased NeXT and paved the way for Jobs’ return to the company in 1997.

Apple Computers

While Jobs can’t be credited for inventing the first computer, his founding of Apple paved the way for its widespread use. The computers that came before Apple was expensive and typically used only for business purposes. The introduction of the Apple II, the brainchild of Jobs and Steve Wozniak, changed this concept forever. Marketed as the world’s first mass-market personal computer, the Apple II meant users could now access the technology from the privacy of their own homes.

More than two decades later, in 1998, Apple released the iMac, an all-in-one computer. One of Apple’s lesser-known inventions is the iBook, which was introduced in 1999. The laptop came equipped with Wi-Fi technology and a few upgrades to its design. People today may remember it for its tangerine and blueberry color options and clamshell design.

The Apple iPad, introduced in 2010, has made the Internet even further accessible. This tablet computer was built more for entertainment than previous devices, making it a staple in many households, utilized by children and adults alike. The product was deemed so successful that Apple sold more than 15 million of these devices in its first year.

The iPhone

Of all Apple’s products, none is as influential in the tech world as the iPhone. Apple’s introduction of the iPhone marked a paradigm shift for the traditional mobile phone. Apple’s version, like the majority of its most revolutionary products, boasted a sleek, simple design that helped further uncomplicate technology for the masses.

Introduced in 2007, the phone has undergone a radical series of redesigns over the years, each year presenting more opportunities for productivity than the last. Prior to the invention of the iPhone, mobile phones’ primary purpose was to access chatting and emailing. Today’s version is utilized for web-surfing, Facetiming, social media and the utilization of an endless stream of apps available for download at users’ fingertips. Frequent updates and new designs ensure Apple users are getting the best product possible, which has helped the brand amass its own population of loyal followers.

The iPod

One of Apple’s most significant inventions to date remains the iPod. While mp3 players had been on the market for several years, Apple’s version was seen by many as far superior, and so it began to dominate the market. Able to store thousands of songs, the iPod grew in success with the help of other products, such as Apple iTunes, which was released in 2001. The new technology allowed users to organize their digital library on both their personal computer and through their devices. The iTunes Music Store went live in 2003.

Not all of Jobs’ best inventions were technological. The innovator is also credited with inventing the world’s first glass staircase. The design, which was awarded a patent in 2002, has been used across some of Apple’s flagship stores and has since been adopted, in some sense, by both commercial and residential properties the world over.

Steve Jobs Day is a day designated for honoring the Jobs legacy, but his impact is seen daily, in the hands of millions. While Apple, as a company, has certainly carried on without him, Jobs is one innovator unlikely to ever be forgotten.

Does Power BI Make Sense For Your Business?

Business Intelligence

If you could draw insights from your data within five minutes flat, would that get your attention? Microsoft’s Power BI is an online service, with a connection to other Software-as-a-Service (SaaS) applications, that lets you analyze, visualize and transform data quickly and easily. Through the use of Power BI dashboards, interactive reports, and rich visualizations, your company will make sound decisions in less time, and with no effort.

What Are Microsoft’s Power BI Ease-of-use Features?

We believe tearing down skill level barriers is one of the most vital benefits you can get from Microsoft’s Power BI and makes sense for every business owner. At its core, Power BI is designed to be a tool for everyone.

That’s why Microsoft not only filled it with the best data analytical features available; but also made Power BI incredibly easy to use. That way, everyone at your business or organization will benefit from intelligent, data-driven analysis—regardless of their skill level.

  • Build intuitive charts and graphs in minutes

Plug in your data, select your graphics and start showing off. With Power BI, you won’t have to rely on hard-to-schedule graphic designers to make your data beautiful ever again. After connecting your data sources to Power BI, you can immediately start using the drag-and-drop menu to build stunning visualizations. Choose from the standard bar or column charts, as well as treemaps, pie charts, and even more specialized graphs such as waterfalls and gauges. You can also build custom graphics using the library of visualizations the Power BI community is continually putting online. Keep refining by removing individual elements, isolating key categories, adjusting axes, and more.

After you’ve transformed your data, you can then take your most useful charts and graphics and quickly combine them all into a custom dashboard with just a few clicks. Create several panels for managing different aspects of your organization, or use only one so you can glean insights at a glance. You can even share these dashboards with other team members, driving efficiency and high-level decision-making throughout your organization.

  • Explore your data using natural language

Finding the answers you want is as easy as asking a question. One of the most exciting features of Power BI is its ability to interpret queries and questions phrased in natural language. To start exploring through your data, ask a simple question, such as “What were the sales numbers for last quarter?” Power BI will then automatically select the corresponding data and choose the appropriate visualizations to depict it. If you’d like to dive in further, keep refining your question, until you’ve found what you need—or what you were looking for all along.

When finished, you can operationalize that custom data by including it in your dashboard or by sharing it with the rest of your organization. In this way, Power BI helps remove any potential barriers to data exploration and promotes a culture aligned with data analytics. Everyone will finally be able to uncover exactly the information they need.

  • Access data analytics wherever you are

The Power BI mobile app puts everything you need in your palm. Today’s workers aren’t just sitting in their office all day. They’re always on the go, so it’s essential they continually have access to the data analytics they need. The Power BI mobile app does more than connect with the rest of your Power BI data, so you can check it while you’re away. It offers full integration to help you focus on only the information you need.

For example, once you create a custom dashboard within Power BI, it will automatically appear in your Power BI mobile app, where you can scroll through to view it through the easy-to-use interface. You can take it another step further; tell the mobile app to notify you if any data points you’re tracking exceed a certain threshold. That way, it saves you the trouble of constantly monitoring your phone while you’re out of the office.

The Power BI mobile app also makes it easy to annotate live data and share it through text, email, or through the app itself—giving you further control over your data wherever you go.

  • Seamlessly connect all of your data

You get native integration with hundreds of data sources, apps, and services. Before you can begin sharing and collaborating with your data, you first have to make sure that everyone can access it in one place. Power BI makes this easy by automatically connecting to hundreds of different data sources, as well as many more apps and services that your organization may already use. That includes native integrations with SQL Server, Azure, SAP Hana, Office 365, Microsoft Dynamics, Adobe Analytics, Salesforce, and much more. New combinations are continually being developed as well, helping to extend further, Power BI’s reach.

With this level of flexibility, you can finally create a convenient way for your entire organization to view all its data under one umbrella. For example, after connecting your CRM system and website analytics software to Power BI, you could create a graph directly comparing website visitors with your sales. Dive further, and you could even correlate the average time a visitor spends on your website before making a purchase.

Once you open up this capability to your entire organization, the possibilities of new and valuable insights are endless. Which you’ll agree, Microsoft’s Power BI does make sense for your business.

Business Intelligence

Did you find this article informative? If you liked this one, check out our other content we think you’ll find interesting.

What Are The New Changes in Microsoft Outlook?

https://i1.wp.com/www.archynety.com/wp-content/uploads/2018/09/Outlook-Microsoft-starts-with-the-implementation-of-its-simplified-custom-ribbon.png?w=770&ssl=1

New Calendar, Mail, and mobile Outlook features help you get things done, was the title of the April 30th, 2018 blog from Microsoft’s Outlook team, about the newest features. Since then, Outlook has received more modern additions, from mobile management to enterprise information protection all designed for user simplicity. So, let’s step inside and see what new changes Microsoft Outlook has.

What’s New Inside Outlook Calendar?

With the familiarity of Outlook and making it easier to get things done, and customizable, so you stay in control, it couldn’t be any simpler than Bill Pay Reminders. That’s correct, inside Calendar you can automatically track these events.

At the top of your email, you’ll get a summary card (See Fig 1.), just like you do when your package delivery information or any travel reservations is presented in Outlook at the top in your Email Today.

https://www.microsoft.com/en-us/microsoft-365/blog/wp-content/uploads/sites/2/2018/04/000000_OutlookOnline_BillPay_surface_m2-1024x707.png

Fig 1. Summary Card inside Microsoft Outlook

Outlook will identify the bills you receive in your email. At the top, it will show you a summary, and automatically add a calendar event on the due date. Two days before the due date, you’ll receive an email reminder so you won’t forget to pay your bills on time.

Suggested meeting rooms and event locations—Adding a meeting or event location just got faster and easier inside Outlook. Similar to a virtual assistant Outlook will offer suggestions for your meeting location. Just start typing in the location field. Based on Bing, Outlook suggests options and then autocompletes your meeting location with the information you’ll need.

Outlook’s rich location feature adds the full address for public locations into your calendar event. Based on your current location, your destination address, and traffic updates a notification is sent when it is time to leave.

Also reserving a meeting room, from your mobile device continues getting more accessible and faster as Outlook learns your preferences. Let’s say you must find a conference room. Outlook will show you what your organization’s room availability is so that you can choose what option is best for your meeting, and it’s all done with just a tap.

Meeting RSVP tracking and forwarding—The key to time management is keeping track of events you’ve plan to attend, or organized. However, managing who is participating is more useful to you also. Inside Outlook, you can now see all tracked meeting responses and RSVPs. (See Fig 2.)

https://www.microsoft.com/en-us/microsoft-365/blog/wp-content/uploads/sites/2/2018/04/Image-2-Outlook_Calendar-RSVP-Tracking_Tablet_m2-1024x609.png

Fig 2. Person’s Name, who are attending, and their responses are shown for easy tracking.

But let’s say you have to plan a meeting, and you are required to keep complete control of the attendees on the list. Inside Outlook, you have a new option to prevent or allow your calendar invitation from being forwarded without your knowledge. Under Response Options, click New Meeting and then check or uncheck Allow Forwarding. (See Fig 3.)

https://www.microsoft.com/en-us/microsoft-365/blog/wp-content/uploads/sites/2/2018/04/Image-3-_Outlook_Calendar-No-forwarding-Megan_Tablet_m1-1024x609.png

Fig 3. The Response Options’ drop-down menu shows where to check or uncheck.

https://www.microsoft.com/en-us/microsoft-365/blog/wp-content/uploads/sites/2/2018/04/Image-4-Outlook_Calendar-No-forwarding-Lidia_Tablet_m1-1024x609.png

Fig 4. Below recipient’s photo is a message alerting them, they cannot forward this invitation.

Multiple time zones—Managing events, inside Outlook, across various times zones, is no longer complicated. Go ahead and define the start and end times, across all time zones, for your meetings and appointments. Set up that travel event from the departing time zone to when you arrive at your final destination, in another time zone. (See Fig 5.)

https://www.microsoft.com/en-us/microsoft-365/blog/wp-content/uploads/sites/2/2018/04/Image-5-Outlook_DualTimeZone_Macbook-Pro-15_m1-1024x614.png

Fig 5. On the main calendar grid, you can display multiple time zones in Outlook.

Simplified Ribbon— is adaptable and easily customizable. That single row of commands you rely on can be quickly and easily personalized. You can either pin the controls or remove them from the ribbon anytime. Should you want to go back to the classic, full-ribbon, just click back anytime. (See Fig 6.)

  • Simplified Ribbon is adaptive
  • Adjusts icon labels
  • Moves commands out of the way
  • Scales up or down to fit different window sizes
  • Accessible through new ellipses and menu drop down experiences.

https://gxcuf89792.i.lithium.com/t5/image/serverpage/image-id/44743i5D498FE0B9BA6688/image-size/large?v=1.0&px=999

Fig 6. Ribbon shows customized commands.

“Coming Soon”— in Outlook for Windows, the Outlook team introduced a new feature called “Coming soon.” Coming Soon is about making it easier for all users, to discover and learn more about significant updates. With this feature, you just turn it on or off. When it’s on, you can see upcoming visuals that are coming to Outlook. Your overall core experience is now cleaner, simpler and more modern. (See Fig 7.)

https://i1.wp.com/www.archynety.com/wp-content/uploads/2018/09/Outlook-Microsoft-starts-with-the-implementation-of-its-simplified-custom-ribbon.png?w=770&ssl=1

The updated Outlook for Windows experience is more straightforward and more customizable. You will work faster and get back to the things that matter most, your free time and user experience. Outlook helps you connect, organize and get things done.

[1] New Calendar, Mail, and mobile Outlook features help you get things done

[2] Your favorite email app, Outlook mobile, adds new enterprise information protection and mobile management capabilities

Did you find this article informative? If you liked this one, check out our other content we think you’ll find interesting.

 

Cyber Express Interviewed: Protecting Your Kids From Identity Theft

Kids Safe Online

If you have a child, and they have a mobile phone, their chances of identity theft are at a remarkably higher risk of being stolen, than most adults. But thanks to the new United States federal law, the Economic Growth, Regulatory Relief, and Consumer Protection Act, and according to a WYTV interview with David Stanley, Cyber Express manager, your loved one’s identity, just got a lot harder to steal.

Kids Safe Online

(WYTV) Keeping Kids Safe: Protecting your kids from identity theft

Children are favorite targets for data thieves, and it’s a crime that can go undetected for years. As parents, we often, unknowingly help hackers snatch our kid’s information all from a simple post.

But, a new law is allowing parents to check and freeze their kids’ credit with the three major agencies for free. And it’s all thanks to a new federal law called The Economic Growth, Regulatory Relief, and Consumer Protection Act, which began September 21, 2018.

If you haven’t thought about checking your children’s credit lately, WYTV reporter Lindsey Watson talked to cyber experts about why you may want to reconsider.

It’s an alarming statistic according to Experian. One in four kid’s identities gets stolen before they become an adult. But what makes children such easy targets for data thieves? Parents are often helping hackers snatch their information all with a simple post on social media.

“They’re trying to gain as much information about the person, you know birth dates, name, date, and then they can kinda go back and figure it all out, and put it all together. It’s kinda what they do right now, they SOCIAL hack you,” said David Stanley, Cyber Express manager.

Stanley refers to it as Social Hacking. “It boils down to if you put out your kid’s name, how old he is, or her,” Stanley said. While Stanley says they haven’t seen a child’s identity stolen yet, it’s something parents need to be aware of before it’s too late.

“We can go forward with you, hand-and-hand and figure it out together. Hopefully, your son or daughter isn’t a victim, and if they are let’s figure it out, make sure that everything is fine, get everybody on an even keel and start over,” he said.

7 Cyber Express Child Identification Protection Checklist

In our very connected world, our children do not comprehend that there are individuals out there ready to take advantage of their innocence. Along with the above interview, we’ve put together a quick and easy checklist, that gives you seven more ways you can protect your children’s identity when they can’t.

  1. Always remain cautious about what you disclose – More and more doctor’s offices, store rewards clubs, and schools are having us fill out electronic forms for our children. But it’s becoming too easy to accidentally give out our kid’s information, such as social security numbers, which if stolen, could take years to repair their credit.
  2. Monitor what the school gives to third-party vendors – Whether you realize it or not, schools do release children’s information to their vendors. Five pieces of information commonly published are photos, home addresses, phone numbers, email addresses, and dates of birth. Contact your child’s school to learn if they have an opt-out process.
  3. Be on the lookout for what your child gives away – With social media, online forums, and gaming groups, our children are too eager to say just about anything, to stay connected or keep up with the latest online trends. Unfortunately, identity thieves know just the right words to say, getting your loved one to share personal information.
  4. Monitor your child’s finances monthly – Does your child have a bank account? College savings account? Or a trust fund? Once a month you get these account’s statements. Review them for any unusual activity, plus check with each financial institute, handling their accounts, and sign-up for mobile alerts.
  5. Watch for warning signs you would not expect – Should you receive a pre-approved credit card offer, with your underaged child’s name on the envelope, that’s typically not a computer glitch. If you are getting bills or collection notices addressed to your child, that’s not a coincidence. Should you get, in the mail, notice from the IRS your little one owes back taxes, their ID got stolen.
  6. Investigate to know if your children have a credit history you’re not aware of – Quite often, after some digging, an unsuspecting parent discovers, their child does indeed have a credit history. What is hard to believe is how that happened; when their minor child has never worked.
  7. Credit History examination steps to take are easy:
    1. Call the three major credit reporting agencies and ask for a manual search of files or records associated with 1) your child’s social security number only and 2) your child’s name and social security number tied together.
    2. You’ll be asked to provide copies of their social security number and birth certificate.
    3. Consider having a credit freeze placed on your child’s account.
    4. Numbers or email to get in touch: Equifax: 800-525-6285 / Experian: 888-397-3742 / TransUnion: childidtheft@transunion.com

Apple iOS 12: Top Features You Need to Know About

ios12 features

Apple iOS 12 has so many different new features available it’s almost overwhelming. From better password management options to the introduction of the Memoji, users will appreciate some of these more than others. This article will highlight some of the most interesting and useful features and improvements, starting with one everyone can agree is probably overdue: better performance and battery life.

Performance and Battery Life

With iOS 12, all iPhone models since the 5S will see significant improvements in performance – including longer battery life and speed boosts. This is due to several improvements and changes that, combined, enable your phone to last longer and run faster. You can also access much more detailed information on your battery life and performance, even comparing its current performance to what it was capable of when it was brand new.

Password Management Methods

Apple’s iOS 12 allows you to use third-party password management apps instead of, or in addition to, its own password management method (iCloud keychain). This also includes autofill support for these third-party password managers. In addition, iOS 12 will fill in any six-digit codes you receive through SMS for two-factor authentication. To better support online security and privacy, iOS 12 will remind you if you are reusing a password when setting up a new password. It can also create a very powerful password for you and store it on your iCloud keychain.

Secure Emergency Location Data

Another awesome feature in iOS 12 is that it will provide secure location data to first responders if you call 911. This feature makes use of a new Apple technology called HELO that can estimate your location based on a variety of parameters, including GPS, Wi-Fi access points, and cell towers. This will make it much easier for iPhone users to be quickly located by first responders in case of an emergency.

More Emojis, Animojis, and Memojis

For those of you who love to express yourself with emojis, good news: 70 new emojis are being added. And not only that, but Apple is working on more inclusive disability-themed emojis that will be released next year. To access all these new emojis, you’ll need to update to iOS 12.1 when it is released. Apple has also added more Animojis in iOS 12. Now you can access a T. rex, tiger, ghost, and koala, in addition to those that were already available. For those not content with Animojis, Apple has introduced Memojis. These are basically augmented reality characters that you can customize to look like you.

Better Maps

With iOS 12, the Maps app has been redesigned to provide more detail. This includes more public landmarks, more greenery, and the ability to see the layout of stores in malls. Currently, this only applies to the San Francisco Bay region, but it will be added to maps for the entire United States over the next year and a half.

Group Facetime

Group Facetime, now integrated into iMessage, will allow you to simultaneously FaceTime chat with up to 32 people. These calls are very easy to set up via the group chat window in iMessage, and are available through the iPad, iPhone, and the Mac.

Screen Time Report

Have you ever wondered exactly how much time you spend on your Apple devices? Or what apps you really use the most? Well, iOS 12 has added a weekly activity summary that provides plenty of detail. The new App Limits feature does just what it says: it will provide you notifications reminding you of when you are nearing or have reached any limits you set. And for those with children or teenagers, the Downtime feature allows you to control their usage, setting specific limits for apps or even unplug their access completely.

Greatly Improved QR Reader

iOS 12 users will have a much easier time reading QR codes. In the past, a stand-alone app was needed to read QR codes. Now, once you turn on the QR code feature in the settings for your camera, you’ll be able to read QR codes using your Camera app. iOS 12 will highlight the code for you so you will know it has been detected, and you can add a tile to more easily launch QR reader capabilities.

New Developments for Notifications

On iOS 12, you can now decide which apps will deliver silent notifications to your phone (e.g., no sounds, no vibrations), and Siri can advise you on which apps you don’t use often and thus should turn off notifications for. Notifications can also be grouped by app, topic, and even thread. You can also enact a Do Not Disturb feature that will hide your notifications until you turn it off, and you can set it up to automatically turn off when a certain event ends or at a particular time.

Conclusion

No matter how much you use Apple devices, you’ll find some features and improvements in iOS 12 that will make your user experience much more productive and fun. And remember that this was just a sampling of what is now available! There’s a lot more so be sure and check it out.

How Is Using Artificial Intelligence Transforming the Legal Profession?

AI in Legal Profession

Recently considered outside the realm of possibility, artificial intelligence (AI) has become more commonplace in modern businesses. As technology evolves, applications and tools with these capabilities will continue to transform various industries, including the legal profession.

AI in Legal Profession

Although it may sound like science-fiction, many people are currently using AI and are not even aware of doing so. Artificial intelligence is any technology that enables a device to adapt and learn to perform similarly to how a human would. Examples include Allegra and Siri. To summarize, it collects information and uses algorithms and trends to solve problems quickly and accurately. The field of law is now integrating this technology into their everyday use.

How Is AI Being Used in the Legal Field?

There are several ways that it is already being used in the legal profession to supplement what attorneys and support staff-members do. For example, AI is able to help analyze contracts in bulk and individually, as well. A few of the popular software companies that offer AI for this purpose include the following:

This allows partners to use their time and efforts on more advanced activities that require their specialized knowledge. Examples would be negotiating deals, advising clients, and arguing a case in court.

Three aspects that AI is expertly handling in the legal profession are descriptive analytics, predictive analytics, and prescriptive analytics.

What Is Descriptive Analytics?

Descriptive analytics (DSA) uses technology to mine large amounts of legal data, identify legal trends, and analyze behaviors that it then turns into workable insights. Advanced data visualization (an aspect of DSA) helps people identify insights, patterns, and trends that would be difficult to find with human-conducted text review alone. It turns complicated data into easy to understand charts and graphs. Additionally, it highlights factual information to cultivate strategies, assess possible case outcomes, and estimate case values and litigation costs.

What Is Predictive Analytics?

Predictive analytics (PA) uses data to provide insights into potential futures. There are several ways this can be beneficial. It allows law firms to gain a deeper understanding of how judges and juries might behave. By examining the profiles of judges, as well as their previous behavior in court, it is possible to predict how they might rule in specific cases. For example, the legal-tech startup, Judge Analytics, developed a platform that provides information on every judge in the U.S. This allows attorneys to develop the best strategies for their clients.

Additionally, clients often ask their counsel to predict the future. They ask questions like “Should I settle?” or “If we go to trial, will I win?”. With access to years of trial data and this type of AI, lawyers are better able to answer these types of questions.

What Is Prescriptive Analytics?

Prescriptive analytics (PSA) continually tracks outcomes of real-life decisions and incorporates them to sharpen its recommendations and offer actual advice. Intuitive interfaces and pervasive data collection is required to lower barriers to these powerful methods. Since they require ongoing access to evolving data to build and refine the results, they are constantly updating. As machine learning, natural language processing, and analytics technologies evolve, the dependence of law firms will continue to grow.

How Might AI Be Used in Law Offices of the Future?

As the future unfolds, the law school and overall lawyer training approach and curriculum will need to be changed. Legal education will become more all-inclusive. It will begin to emulate a business school education. Case studies, and active networking, and leadership training will likely be included. Although some schools have already included technology in their legal curriculum, a greater number of law students should become tech literate. Eventually—and ultimately—their ability to utilize legal software to analyze information may be just as important as their knowledge and understanding of the law.

In fact, it is anticipated that 100,000 legal roles will be automated by 2036. According to Legal Technology, law firms will reach a “tipping point” by 2020. It is now time for them to commit to becoming AI-ready. They should set aside the fear of the unknown and start developing an understanding of and capability for using technology. It is likely that innovation is the key to maintaining the legal profession’s relevance in this time of transformation.

In Conclusion

With its ability to automate monotonous and time-consuming work like contract or document review and research, AI can easily improve an office’s accuracy and efficiency. It can follow trends and make predictions over immense amounts of information that would be difficult for mortal minds to manage. Although it will not replace attorneys, finding the right combination of analytic tools will vastly alter the way they perform and deliver their services. Taking advantage of the technology available provides a competitive edge over more traditional firms. Choosing to do so may be the most important decision the leaders of legal departments will make in the near future.

Another Uber Data Breach – It’s Never The Crime, It’s The Cover-up

Uber Data Breach

In 2016, Uber suffered a data breach that exposed the personal information (names, email addresses, and phone numbers) of 57 million users. In the same breach, some 600,000 driver’s license numbers of Uber drivers were exposed.

Uber Data Breach

So, What Was The Response?

The Federal government and state governments have laws protecting data privacy. Most of them require rapid reporting of data breaches to both the governments and the individuals whose data was exposed. Instead of following the laws, Uber decided to bury the bodies. With a careless indifference toward the rules and regulations that Uber has shown previously, the company got caught in a most unusual manner this time.

In this data breach, hackers first proved to Uber that they had stolen their data, then they demanded $100,000 not to reveal it. That’s a new twist for cyber-thieves.

How Did The Hackers Get The Data?

GitHub is a site where programmers and systems architects publish code and other information, both to store it privately and to show it off to others. The hackers got into the private side of Github and obtained user credentials of the Uber development team. Once they had those, they had free run of Uber’s systems.

What Did Uber Do?

Rather than reporting the breach as required, Uber’s Chief of Security paid the bounty of $100,000, got the hackers to sign a non-disclosure agreement, and disguised the $100,000 payout as a bug bounty on Uber’s internal records. The affected individuals were not contacted. The whole incident was covered up (hopefully).

Uber was already under investigation by the Federal Trade Commission (FTC) for failure to protect consumer information. In the course of that investigation, the 2016 hack was uncovered. The first settlement where Uber confessed to failing to protect customer and driver information was dated August 2017.

Then in November, Uber’s new CEO disclosed the massive breach. At that time, Uber had agreed to pay reparations to exposed individuals and various states to the tune of $148 million. One state attorney general called Uber’s behavior “Just inexcusable.”

Uber agreed to follow relevant laws in the future and hired outside counsel and an outside data firm to assess its security practices and safety measures. The results of those efforts have not been disclosed.

It was also learned that Uber paid the hackers to delete their copy of the data. That potentially violates a law that forbids companies from destroying any evidence in cases of cybercrime. Uber eventually fired their chief of security and several others.

It is the nature of the beast that Uber could not, in fact, confirm that the hackers had deleted every copy of the data. They could have, for example, made another copy and sold it on the Dark Web. Cyber Thieves are not known for their honesty. So, Uber’s efforts to conceal the breach and repair the damages may have been overshadowed from the start.

What Are The Lessons We Can All Learn From This?

Ever since the resignation of Richard Nixon in 1974, the phrase, “It’s not the crime, it’s the cover-up” has been well-known and understood.

The home décor and cooking guru Martha Stewart was convicted and imprisoned, not for a stock transaction that was, in fact, legal, but for lying to the FBI about it. Aside from their general legal and public relations futility, cover-ups usually do not succeed. Somebody leaks, or (as happened in this case), law enforcement stumbles across the cover-up while investigating something else.

When an incident like this happens, companies need to proceed on the assumption that the cover-up will be, at best, a temporary patch on a continuing problem.

What else can be learned from this?

Another lesson is that things that are supposed to remain private may not. The hackers were able to penetrate a supposedly private area of Github. In addition, the database they stole was on a third-party server, not one directly managed by Uber.

Even though the credentials stolen from GitHub were valid for the third-party server, had something like two-factor authentication been in place, the hackers would not have been able to access the server even though they had the proper credentials. There is more than enough blame to go around here. And, of course, the data on the third-party server was not encrypted.

Funding Hackers Is Not A Good Idea

In addition to everything else that was wrong in Uber’s response, the company wound up, in effect, rewarding the hackers with additional funding, enabling them to hack even more victims. Cybersecurity experts agree that funding hackers, no matter how desperate the situation seems, is never a good idea.

Uber’s response here can be compared to the similar reactions of Experian, a credit reporting agency, to a hack of its database that exposed the data of several hundred million users. First, it concealed the breach, then it denied it every happened, then Experian confessed that it did happen. Finally, they tried to monetize the breach by creating and advertising several “security” products to consumers.

Every move was deceptive and demonstrated just how little Experian cared about the privacy of its users. The lesson from Uber and Experian for the general business community is simple: “Don’t handle breaches the way we handled ours.”

6 Reasons Why Companies Are Moving Away from BYOD

BYOD Policies

Last year, Markets and Markets Research released a report that revealed that 50% of companies were considering the use of BYOD (bring your own device) policies. IT departments were tasked with developing a policy that allowed employees to use their personal devices without endangering the security, but things seem to have changed. More and more companies are moving toward company-owned devices – but why?

BYOD Policies

Costs

Most people think it would be cheaper for a company to have employees bring their own devices, but there are some hidden costs involved. One, of course, is the loss of productivity which we’ll discuss more in a moment. Given that BYOD devices can raise the probability of an organization suffering a cyber attack, there are also costs that can be traced directly to the fallout of a data breach. The potential cost of a data breach can easily be calculated using a tool like this one from IBM.

Productivity Issues

When employees bring their own smartphones, tablets, and other devices to work, those devices are going to be a distraction. The temptation for employees to check out social media sites such as Facebook and Instagram or to play games on their phone during working hours are even worse if they are already using their personal device for work-related tasks. While being forced to use a company-owned device isn’t going to eliminate this problem, it will at least reduce the temptation to waste company time. It will also discourage the use of electronic devices to access inappropriate material while at work.

Bad Habits

Employees who are accustomed to using their own phone to access company email are, by force of habit, going to be less likely to be cautious about opening phishing emails or files that could contain malware. If an employee isn’t in the habit of carefully checking out emails before they open them for their personal email on their device, they aren’t suddenly going to become careful about company email they open on the same device. Employees are likely to be more careful with a company-owned device, in part because they don’t want to be blamed for putting the company at risk.

Remote Wiping of Personal Devices

If a device is stolen, there is an extremely high probability that sensitive data will be on that device. One solution that many IT departments depend on for dealing with device theft or breach is a remote wipe. While this is an excellent idea for devices that belong to the company, employees will not like the threat of having their personal device remotely wiped without warning. The loss of personal information such as contacts, pictures, and messages could not only anger the employee involved but lead to potential lawsuits.

Too Much Reliance on Non-IT Employees

When employees are allowed to use their own devices, there is a major shift in responsibility. In most cases, it is simply not possible for IT to ensure that every employee device has the right security measures in place and that they are updated on a regular basis. When employees fail to do this and a breach happens, IT will most likely receive the blame. IT should not be held accountable for risks they cannot reasonably control. Company devices in the hands of those who truly understand cyber dangers are safer as long as they have access to the tools needed to minimize cyber risks.

Cybersecurity Threats

In 2016, researchers discovered that 56% of respondents felt that BYOD was one of the biggest threats to endpoint security for their organization. Another study indicated that 20% of organizations had experienced a breach related to BYOD, which doesn’t bode well for its continued use. One of the major reasons behind companies moving away from BYOD policies is undoubtedly the threat of ccyber attacks A company may have the most bullet-proof BYOD policy possible, but if it cannot be enforced or if employees can find ways to work around compliance, then those BYOD devices become a major threat.

Conclusion

There are pros and cons to both the BYOD approach and the company-owned device approach. Quite a few companies are easing off on their BYOD policies, implementing partial BYOD or eliminating it completely. Reasons behind this change include:

  • Costs
  • Employee productivity issues
  • Employee bad habits
  • Physical theft of devices
  • Reliance on non-IT personnel to avoid security threats
  • Increases in cyber threats as more employee-owned devices are put into use

Add all of these issues to the fact that employees may be annoyed at having to supply their own equipment for work and it is easy to see why many organizations have realized that BYOD is not a good fit for them. Whether the widespread implementation of BYOD continues to grow as predicted remains to be seen.

Digital Transformation: Is Your Business Ready?

Digital Transformation

“Digital transformation” is a term likely circulating around IT departments everywhere. The vast majority of businesses today, no matter how big or small, will likely need to further digitalize their operations in order to keep up with competitive markets and an ever-growing list of digital trends.

Digital Transformation

There are endless components associated with digital transformation. Late last year, tech company MuleSoft conducted their annual Connectivity benchmark for 2018, which surveyed more than 600 ITDM across a variety of industries. The results shed light on the importance of digital transformation, the issues that stand in the way of these transformations, and what ITDMs (Information Technology Decision Makers) believe to be the future of IT.

According to the survey, the stakes are high. The vast majority of ITDMs surveyed admitted their business’s revenue would be negatively impacted if digital transformation didn’t take place, and soon. Companies simply can’t afford to let their IT operations fall to the wayside.

Digitalizing your business operations is no easy task. Creating an online portal or creating new online processes doesn’t mean you’ve digitalized. You’ve got to have clear goals before you begin this undertaking. More often than not, the top goal of businesses is to streamline their operations to run more efficiently.

Analyzing The Data

The vast majority of ITDMs understand the importance of upgrading their digital enterprises, with only 3% of organizations surveyed revealing they had no intentions of a digital revamp. In fact, approximately three quarters (74%) of those surveyed said they were currently undergoing digital transformation initiatives. Another 23% revealed plans to do so over the next three years.

Establishing Clear Goals

Digital transformations are futile without an end goal. Therefore, in order for ITDM to effectively transform their digital operations, they need to know both what is at stake, and in which ways they’d like a revamp to serve the organization.

Of ITDMs surveyed, more than 83% cited increasing IT’s operational efficiency among their top priorities. Other areas of high importance include improving business efficiency, and introducing new products and faster services. Digital transformations can help enhance a number of aspects of your company, rendering them vital in today’s business landscape.

The MuleSoft survey revealed that ITDMs intend to focus on a few specific initiatives to achieve their IT goals. These include modernizing their legacy apps, integrating SaS apps and investing in mobile apps. Other areas of focus include migrating apps to the cloud and establishing an e-commerce platform.

Enhancing The Customer Experience

One other major goal for businesses undergoing digital transformation is to improve the customer experience. This means improving the customer experience by connecting customer-facing systems. The vast majority, 92% of ITDMs, revealed that forging a connected experience for both customers and employees is a priority for their respective organizations. As of December 2017, only 39% of those surveyed revealed their organizations offered a completely connected user experience. These figures are in line with a previous MuleSoft survey, which found that over half of consumers believe they are receiving a disconnected experience when dealing with businesses like retailers, banks, insurers, and other public services.

Common Roadblocks

IT departments face a number of issues that hinder the potential for successful digital transformation. In addition to time constraints, there are other factors at play, such as misalignment between business and IT, problems within legacy infrastructure and systems, and a lack of resources and budget.

For today’s businesses, there is often a disconnect between what IT professionals must do, versus what their departments can realistically handle. While it’s commonly the responsibility of IT to implement development projects and focus on innovation, much of their workload involves helping the business run. In fact, the survey data shows that 63% of IT departments’ time is spent on business operations, rather than exploring new ways to drive profits through technology.

Integration Issues

Of all the roadblocks between IT departments and their goals, integration seems to be the largest barrier. Nearly 90% of ITDMs revealed challenges with integration, with 81% saying point-to-point integration creates the biggest headaches. Not only is this an issue for efficiency, but it presents financial repercussions, with organizations spending almost one-quarter of their yearly IT budgets on integration.

The Benefits Of APIs

It’s common knowledge in the IT circle that APIs make life easier for developers. They’re also critical for success in today’s digital landscape. Not only do APIs expand a business’s capabilities, but they also make it easier for employees to consume data in a simple, standardized way. According to MuleSoft’s Connectivity survey, organizations have both increased IT-self service and decreased their operational costs by leveraging APIs. And the results can be seen in revenue, as well. More than 35% of ITDMs surveyed through the Connectivity survey revealed that more than one-fourth of their revenue was the result of APIs.

Digital transformations are a fact of life for many businesses today, and if they’re not yet, they soon will be. From managing operations to improving customer and employee experiences, digital transformations are just one-way businesses are further embracing the power of the internet age.