Information Technology News & Information

Is LinkedIn Feeling The Pressure From Competitors?

Communicate More Effectively With These New LinkedIn Messaging Features While Facebook and Instagram are the social networks of choice for the modern day mobile user, apps like LinkedIn haven’t lost their luster. The professional network is still the master of its class, and a growing number of users are turning to the app to keep up-to-date with their network more than ever before. LinkedIn Moves To A More Competitive Platform Whether as a simple courtesy to its users, or an attempt to become more appealing to those who’ve made a habit of bringing their professional life to social apps, LinkedIn has implemented some significant changes to their platform, all aimed at making the user experience more worthwhile. The company announced the changes in a recent blog post, making the case for why the professional network isn’t one to be ignored if instant communication is a big part of your business. From finding jobs to networking and communicating with teammates, LinkedIn boasts loads of potential, especially with these new features. Compose Longer Messages The ability to communicate freely and privately through social apps has become a necessity for many of today’s mobile users. Sometimes, you’ve got a lot to say, and scrolling back and forth as you’re typing to make sure you got it all out can be tedious. With this, LinkedIn has created an easier way to compose longer messages, implementing a larger message box for ease-of-use. There will be no more fishing for your cursor. Now, you’ll be able to fit everything you need to say, just as you need to say it, by stretching the message box to reveal more space. Share Attachments On The Go In today’s business landscape, work doesn’t stop once you leave the office. This is the reality for workers across all industries today. Between mobile workers and those who travel often for business, smartphones bear their fair share of the workload, and social networks would do well to keep this in mind when rolling out new features for users. To make the process of working remotely more convenient, LinkedIn now allows users to share attachments on the go. According to the company, the ability to share attachments was among the most frequently requested messaging features by LinkedIn users. To do it, just tap the attachment icon and choose from the approved file types, which include PDF, XLS, DOC, and PPT. This one change alone is sure to bring big potential for the app and users everywhere. Express Yourself With Emojis Conveying emotions through words isn’t always easy to achieve. Rather than spend the rest of your workdays dissecting messages and searching for undertones, you can now incorporate emojis into your messages. Use the emoji picker on your desktop to add emojis to your text. Just search by category, and let the emojis do all the talking. Start And Manage Group Messages There are loads of reasons why chatting on LinkedIn makes sense. You may be discussing work with a teammate, gathering info about an exciting new job opportunity, or collaborating with other professionals within your industry. Whatever the reason, instant communication is vital for many people, and the company has addressed this with the ability to start group messages. It’s now simpler for you to start conversations with people within your network. To do this, just tap the “+” button, which will prompt the suggestions of users to communicate within groups. These can include fellow co-workers from a recent or present company, old classmates, or people you’ve recently met. And if you need to remove someone from the chat, never fear. Simply tap the three dots on the top right corner of your group message and tap to remove people as you wish. Mention Others In Your Messages The tagging feature on Facebook and Instagram is a great way to stay connected with friends. LinkedIn has incorporated a similar feature, allowing users to mention other users in group messages or in one-on-one conversations to recommend others. Copy And Paste Images From The Web It may come as no surprise that many people opt for visuals over traditional text. The popularity of memes is a testament to this. Visuals are a part of everyday communication for countless users, and LinkedIn has recently come up with a game plan for that, too. Users are now able to copy images from the web, and even their phone, right within LinkedIn’s messaging platform. This makes communication easier and more fun than ever – a big plus for users and LinkedIn alike. Wrap Up Given LinkedIn’s emphasis on all things business and professional, it makes sense that the company would further strive to make its features reliable for just that. These new features are bound to attract a new wave of young professionals hoping to find new ways to use modern methods of communication to advance their careers and networks.

Information Technology News & Information

How Concerned Should I Be About An IoT Attack?

This video made by Cisco does an incredible job of showing how the Internet of Things (IoT) based attacks are already a reality in the business environment. The Internet of Things is changing our culture. For us to see innovations in medical care, manufacturing, and utility services, we have to adjust to this new way of operating a business and ensure our networks remain safe from attacks. A new Gartner (the world’s leading research and advisory company) survey reveals that almost 20 percent of organizations have experienced one or more IoT-based attacks in just the last three years. Also, they are predicting that global spending on IoT security will reach $1.5 billion in 2018, a 28 percent increase from 2017. Who Needs to Defend Themselves from an IoT Attack? Finance Industry The rapid-paced world of finance has encompassed the digital revolution. Banks, investors, and financial institutions of all kinds track current market conditions and command precise, up to the minute data. Through IoT, the financial industry will link and grasp the buying performance of clients. IoT technologies will provide the financial market with real-time analytics to push a more significant revenue stream. The Risk Since the end goal for cyber-attacks is money, the finance industry is the apparent leading target for cyber villains. Financial institutions are a top target for ransomware attacks. Smart devices offer tremendous potential for finance with instant access to customer data, but IoT devices are a blind spot that exposes financial companies to easy unlawful access. Financial organizations are stringently regulated, and they have to meet an assortment of regulatory and compliance standards. For a company to provide satisfactory protection of IoT devices, businesses need full asset discovery for all their devices on all of their networks. They also need an ability to keep track of the behavior and monitor the connections made by those IoT devices. The Solution It’s crucial for financial institutions to have a service that gives them instant protection of IoT. Their devices must connect safely to the network, and they need a system that monitors the activity and exchanges of these devices. Being able to automatically identify erratic behavior or suspicious connections will ensure that the companies remain secure and compliant. Healthcare Gartner Research states that 25% of healthcare attacks will initiate from IoT devices by 2020. And over 70% of hospitals now report that security risks around connected medical devices are their biggest concern. The Risk With the arrival of the Internet of Things age, the healthcare industry has a new task: The Internet of Medical Things. MRI machines, x-ray machines, and heart monitors, just to name a few, are devices that can now be infiltrated threatening the vital care of a patient. The Solution Most of the current IoMT devices were not intended to have a high security-first position. They cannot support an agent to ensure their security. Healthcare organizations need an agentless resolution that can recognize the devices, their performance, and the networks to determine if a medical device has been compromised. They also need to be able to quickly disconnect the device from the network if it has been compromised. Manufacturing IoT has made the manufacturing world more efficient by providing access to vital data in real time. IoT sensors provide companies with the ability to monitor the temperature in food manufacturing, the performance of the production line, and track quantities of their product up to the minute. IoT improves the manufacturer’s production efficiency to cut costs and provide better quality. The Risk Manufacturing is a multifaceted progression that relies on numerous moving parts to keep running smoothly. When this progression slows or stops production, it will have a disastrous impact on profit and may cause long-lasting damage to the reputation of the product or brand. IoT streamlines manufacturing, however, since it is connected, it is also vulnerable to attack. Invaders can influence IoT devices to send bad data that affects quality or productivity, halt systems altogether, and stop productivity. Compromised IoT devices in the manufacturing sector allow hackers to gain access to the network and steal whatever data they want. The Solution What occurs in manufacturing settings is the reality that these smart devices and sensors were not originally designed with security in mind. Most of these devices are totally unmanaged when it comes to security. With no way to protect the IoT device directly, companies need a new approach to IoT security. Being able to monitor device behavior to detect when it is connecting to a hacker’s network is critical. Also, interacting with inappropriate devices or systems in order to identify suspicious or anomalous behavior will save the manufacturer from peril. Companies need a smart security solution that can see any IoT or unmanaged device, and respond automatically to ensure there are no interruptions of productivity. Summary The number of IoT attacks, and the damage that they have done, have both been gradually growing. IoT security requires businesses to be able to keep track of their device’s state, performance, vulnerability, history, and reputation. Visibility and monitoring can help companies detect potential attacks, but in order to prevent an attack, their security system must be able to control all wired and wireless connections in order to spontaneously block traffic or disconnect compromised devices. This IoT security solution must also be able to assimilate seamlessly with the company’s existing network hardware and software. As companies realize the very real dangers of an IoT attack, they must work together to design and create security solutions that protect their bottom line.

Information Technology News & Information

What Are the Top 10 Phishing Email Subject Lines from Q2 2018?

Hackers are constantly throwing in new and clever phishing attacks that threaten email users’ security.  KnowBe4, one of the top security attentiveness and simulated phishing platform contributors recently issued the top 10 phishing email subject lines from this year’s second quarter. Please note, the attacks used most often contain email subject lines that relate to a user’s passwords and security warnings. An estimated 1 out of 3 people will open a phishing email each day. This tricky way of gathering people’s personal and financial information is getting bigger, despite all the warnings from technology experts. What is Phishing? Phishing is a technique that hackers practice to steal personal information, like credit card info or login authorizations. The hacker replicates an existing login page from an online service such as Dropbox, Apple, Gmail or your financial institution. This made-up website holds a code that delivers all the personal data you submit directly to the hacker. To lure you to the bogus website, hackers send a believable email to you. Quite often, the email sent to you will ask you to log in to your bank account because your bank has exposed a transaction that you did not authorize. Hackers can make these emails look and sound real and their exploits have been very successful. They often use fear. The email will make it sound like you need to take action NOW! So without really checking, the victim clicks the bad link and continues to the bogus landing page where they give the cyber thief their log-in and password information. Why is Phishing a Concern? It is reported that consumers, businesses, and organizations will lose an estimated $9 billion in 2018 globally. With so much personal information tied to finances now shared online, hackers use phishing in order to illegally steal your money. The Anti-Phishing Working Group (APWG) latest quarterly release reported: Over 11,000 phishing domains were created in the last quarter alone. The number of phishing sites rose 46% over the previous quarter. The practice of using SSL certificates on phishing sites continues to rise to lure users into believing a site is legitimate. Is Phishing Just a Risk for Personal Users? Because they store a lot of files in the cloud, Phishing is also a risk for all kinds of companies:  Digital design companies, financial institutions, security companies, etc. According to hackmageddon.com, there were 868 reported company security breaches or cyber-attacks in 2017. What do Hackers need to be successful? There are generally three things hackers do to gain access to your information: Build an email account to send emails Buy a domain and set up a fake website Think of a tech company that is used often to mask itself as a legit website (Dropbox, Amazon, eBay, etc.) What Can I Do to Avoid Phishing? It has become increasingly difficult to guard yourself against phishing. As hard as Apple, Google, and other tech companies have worked to filter them out, hackers are always devising new ways to phish. However, here are some tips on spotting phishing emails: Try to avoid clicking on buttons and/or links in emails. Begin using password managers. A password manager aids the user in creating and retrieving complex passwords and storing the passwords in an encrypted database. Therefore, if hackers get one of your passwords, they can’t use it on any of your other accounts. Don’t put total faith in the green lock icon in your address bar. This only ensures that it is a private channel but does not inform you about who you’re communicating with. Allow 2FA (two-factor authentication). Two-factor verification is an extra layer of safekeeping otherwise known as “multi-factor authentication.” 2FA requires a password and username, and also something that only the user knows (mother’s maiden name) or has (passcode texted to another device, such as a cell phone). Be extra cautious if the browser plugin of your password manager doesn’t show your login credentials automatically. Be quick to report suspicious emails to your friends and colleagues. Organizations who make it easy for their employees to report attacks will see a significant decrease in cyber-attacks. The quicker an IT department can respond to a threat, it will minimize the threat potential damage inflicted on people. Ironically, the trend for most of these phishing emails are warnings about security alerts. Here are the top 10 from Q2: Password Check Required Immediately (15 percent). Security Alert (12 percent). Change of Password Required Immediately (11 percent). A Delivery Attempt was made (10 percent). Urgent press release to all employees (10 percent). De-activation of [[email]] in Process (10 percent). Revised Vacation & Sick Time Policy (9 percent). UPS Label Delivery, 1ZBE312TNY00015011 (9 percent). Staff Review 2017 (7 percent). Company Policies-Updates to our Fraternization Policy (7 percent).

Information Technology News & Information

Windows 10 Enterprise Is Microsoft’s Most Secure Operating System Ever

Is Windows 10 Enterprise Right For Your Business? With the threats of cyber-attack at an all-time high, there’s no better time to reexamine your company’s operating system to see whether or not it offers the level of protection you, your company, and your clients deserve. Windows 10 Enterprise ranks high among today’s most popular operating systems for large companies and it’s worth the expense. This operating system is beneficial to large businesses for a variety of reasons. It features intelligent security, simplified updates, flexible management, and enhanced productivity. There are a number of other solid benefits to using Windows 10 Enterprise. One of the main things that users notice about this operating system is that it makes up for what was lacking in Windows 8. The developers added many of the same familiar features that made Windows 7 so popular. But Windows 10 Enterprise has much better security and an optimized interface for greater mobility within the workplace. All of this combined makes a strong case for why large organizations ought to consider Windows 10. It can breathe new life into your workflow and enable stronger productivity. Enhanced Security In terms of security, Windows 10 Enterprise is a viable option for businesses of all sizes, but particularly useful for large businesses. Windows 10 Enterprise’s Advanced Threat Protection, or ATP, has proven well worth its weight for peace of mind. In fact, the operating system was virtually unaffected during WannaCry, the largest global ransomware attack to date. Its solid performance under this type of intrusion is a testament to its capabilities to keep businesses protected.  For this reason, large businesses with much at stake would do well to examine Windows 10 as an option, especially if they’ve been impacted by large-scale global attacks like WannaCry in the past. Device Guard, Windows Hello, and Microsoft Passport are just a few added security features to help users maintain privacy. Device Guard Device Guard isn’t just one feature, rather a set of three features that work cohesively to protect your system and eliminate any untrusted code from infiltrating a Windows 10 system. These features include Configurable Code Integrity (CCI), VSM Protected Code Integrity, and Platform and UEFI Secure Boot. CCI is responsible for ensuring that only trusted code runs from the bootloader onward, while VSM moves KMCI and HVCI into VSM to protect them from attack. Finally, the last feature, Platform, and UEFI Secure Boot work to ensure that boot binaries and UEFI firmware are accounted for and haven’t been compromised. Windows Hello For Business Strong two-factor authentication is vital for robust IT security. Windows Hello for Business ensures a tough line of defense on PCs and mobile devices by going one step further. This new type of authentication boasts a unique type of user credentials associated with a device. It utilizes a biometric or PIN feature for better security, and even allows users to authenticate to an Active Directory or Azure Active Directory account. Flexible Management An improved interface is another big benefit of Windows 10. The ability to switch back and forth between different virtual desktops has been something Mac users have enjoyed for years now, and with Windows 10, the feature is now a reality for Microsoft users too. What’s more, the feature is simple to use, requiring just a tap of the task-switching icon. In addition to enhanced security, Windows 10 Enterprise brings improved compatibility by way of the Microsoft Edge browser. From improved battery usage to new capabilities like reading mood and webpage markup, Edge is intended to make browsing easier and more efficient than before. Windows 10 Enterprise also offers simplified updates with unique tools that help streamline deployment. IT employees wear many hats, and there isn’t always enough time in the workday to dedicate to repetitive tasks. Windows Autopilot allows for easy, seamless setup and deployment, meaning you can take a new device out of the box and have it fully configured and managed from the cloud, all with minimal effort from the IT department. Insight into your organization’s IT health and overall efficiency is imperative for sustained growth. With Windows 10, IT managers can ensure employee compliance, a more effective user experience, and smooth upgrades. Elevated Productivity Windows 10 offers a world of opportunity for software for tasks both large and small. There is a whole selection of apps that can be full-screen or windowed. The new range of apps includes more powerful media and productivity apps, new photos, music, videos, mail, maps, and calendars. If your business thrives on creativity, you’ll find a good range of new tools to take advantage of, including Windows Ink, 3D in Windows 10, and OneNote. OneNote offers a single place for notes and ideas, while 3D in Windows 10 allows users to add a new dimension and elevate their design work. And in a further effort for simplicity and familiarity, Windows 10 apps are designed to sync across a variety of iOS and Android devices for easy navigating between phone and PC. Furthermore, Nearby Sharing in Microsoft Edge, OneNote, File Explorer and other apps enable users to quickly and easily transmit files and web pages to nearby PC users with the click of a button. Wrap Up Overall, it has become clear that Windows 10 and Windows 10 Enterprise carry a wide range of benefits for large businesses. If you feel that your organization could use some improvement in the areas of productivity, IT security, and a better user experience, then a switch to Microsoft 10 may be long overdue.

Information Technology News & Information

What Is a VPN, How Does It Work and Why Should I Use It?

Does it make you nervous when you consider how much of your personal information is essentially spread all over the internet? In spite of antivirus programs and firewalls, all data is somewhat at risk on the web. One of the most proven techniques to ensure your data is safe is to use a virtual private network (VPN), which will give you back control over how you’re identified online. With the constant news of data breaches, most of us are tired of hearing that our personal information was lost yet again by a large credit reporting agency or some retailer. VPN Explained A VPN constructs a virtual encrypted tunnel that runs between you and a remote server controlled by a VPN service. All outside internet traffic is transmitted through this passageway, so your data is not spied upon as you put it out there on the internet. Also, your computer looks as if it has the IP address of the VPN server, so your identity is hidden. When you put your data out to the VPN server, it exits back out to the public internet. If the site you’re visiting has HTTPS to keep the connection safe, you are still secure. But even if it was intercepted by a third party, it’s challenging for the outside party to trace the data back to you, since it appears to be coming from a VPN server. VPN in Real Life Let’s look at an all too familiar scenario to understand the value of a VPN in your everyday life. When using a public Wi-Fi network at a popular spot, such as coffee shop or airport, you typically connect without giving it much thought. But unbeknownst to you, there may be people watching the traffic on that network. Can you be sure the Wi-Fi network that gave you quick access is secure, or could it be operated by a hacker who is after your personal data? While you are busy taking care of your business waiting on a plane or a meeting, your banking and credit card information, and all your private data could be delivered to the hacker on a silver platter. It is extremely tough to tell whether or not a Wi-Fi network is what it appears to be. You could be at a coffee shop called Java Joe’s, and you link to a public Wi-Fi network that says JavaJoes. But that doesn’t mean the server you are on is really owned by that coffee shop. A hacker can put out their own server with similar wording to the coffee shop’s server, and sometimes it even has a better signal. Now, if you connect to that same public Wi-Fi network using a VPN, you can be sure no thief will be able to steal your data. If there are hackers seeking for would-be victims, they can’t touch your computer. VPN and the Government We all would like to think that the government is on our side. Perhaps some of its agencies are only online snooping for terrorists and Wall Street insiders. Unfortunately, news of the Snowden leaks and Russian online infiltration have shown us that a government’s surveillance capability is massive in scope. The NSA (National Security Agency) has the ability to intercept and explore almost every communication that is being sent out on the web. When using a VPN, you can have the peace of mind knowing that your encrypted information is less directly traceable back to you. The Federal Communications Commission has recently turned back Obama-era rules that were made to protect net neutrality, and this opened the door for internet service providers (ISPs) to make money off your data. Now they are able to gather huge amounts of information about you, and then use it to tailor advertising. Often, these companies sell your data to other companies. Your ISP is basically your gateway to the entirety of the internet. Most of us have limited home ISP choices, and some only have one ISP that provides wired internet access. Now that ISPs are allowed to sell data from consumers, it makes us easy targets. Do you ever wonder why your Google search for a product, and then that product shows up in advertisements on every page you go to for the next few days? Your ISP could be sharing your data and profiting off your personal searches. The Unique Protection of a VPN When the internet was first becoming popular, there wasn’t a demand for security or privacy. In the beginning, shared computers at research institutions made computing power very limited. The use of encryption would have made things extremely problematic. Today, the average user has multiple devices connected to the web. It is up to individual users to protect themselves. Antivirus apps and password managers are a key factor in keeping you secure online, but a VPN is a uniquely powerful tool that will keep you safe in today’s connected world.  

Information Technology News & Information

Using Yammer With Office 365

Social media has become an integral part of everyday life for many people. From Facebook, to Instagram and Snapchat, a growing number of internet users are embracing the power of instant connection. And while this is par for the course for social life, social media can be useful in the business world, too. By the year 2025, it’s expected that over 70% of the workforce will be people from the millennial generation. And millennials are very keen on connecting via social media and meeting apps. They have embraced technology much better than other generations. This means that more businesses should be exploring methods of communication that make the most of the digital world in which we live. Yammer is one of the most well-known social media apps for business platforms, and it’s already working for companies who’ve adopted Office 365. Microsoft has done a great job to ensure its capabilities are primed for the business world, and with Yammer, the potential for team environments is greater than ever before. There are plenty of benefits to integrating Yammer into your business operations. With the ability to create groups, you have access to instant communication among team members. This makes for a single point of communication that can be used for reference, unlike emails. Not only is Yammer valuable in bringing together teammates, but it’s also got potential to give management an inside look at what employees care about. They can readily explore how team members are using Yammer to enhance productivity and teamwork. Communicate Efficiently With Yammer Groups Yammer’s goal is simple: Make communication more effective. In order to achieve this, it’s important for users to familiarize themselves with the wide range of tools at their disposal. If you’re already using Microsoft Office 365, then simply download Yammer to get started. Yammer groups are a place to share information about projects, ask questions, and communicate openly with your team or department. Join a group by using the search box to check and see if there may be established groups you’re interested in joining. Create your own group by clicking “create group.” Once you create a group, you can post an update or announcement, conduct a poll or upload files to share with others. One example of a useful group would be an HR Benefits group. This type of company-wide group can be used to ask questions and start conversations about the types of benefits available. Groups are valuable in that they serve as a stored space where people can comment and ask questions with the confidence they will be answered. Too often, emails end up lost or deleted. Yammer Groups are a way to keep important files out in the open, in a centralized location where they’re easily accessible. Much like Facebook, Yammer allows for a personalized feed to keep you informed about things that matter. You can follow your colleagues by searching for them in the search box. Once you are following another user, you can view their posts in your Following feed. This feature is particularly valuable for large companies with many departments. Following users within your department can make it easier to keep privy of the developments that pertain to you. Effective Integration One of the most impressive aspects of Yammer is its capability for integration. Not only can it be used to share live links to documents among a group of teammates, but it also allows users to work within these same files and view each others changes as they happen. Yammer has the ability to link into a Skype call if needed, and it can also link directly to your Office 365 Calendar or Planner. Organization is made much simpler with Yammer in tow. Mobile App Accessibility Long gone are the days of clocking in from 8 to 5. For many, the modern day work experience means constant availability. With an ever-increasing number of remote workers joining the workforce, it’s important that communication be accessible even beyond the office. And with Yammer’s mobile app, users can stay connected with teams wherever they go. Users can download the Yammer app and gain access to the same communication tools they’d find in their desktop at the office. Yammer’s integration with Office 365 also means instant updates. With Yammer updated in line with the rest of Office 365’s apps, this means it will always be current as far as collaboration and efficiency go. How Can Management Use Yammer? Communication platforms like Yammer are useful for back and forth conversations and project sharing among teammates. But management can also benefit from this type of open-ended communication. They can use Yammer to evaluate company culture and make improvements by determining what type of content employees are searching for. This also applies to which threads are the most popular, and whether Yammer is effective at delivering the necessary information to the appropriate parties. Wrap Up Tools like Yammer have the potential to change the game for companies seeking more effective ways to communicate. Microsoft Office 365 has done the professional world a great service by realizing the power of Yammer to make an imprint in the business world. If your organization is hoping to improve communication and organization, consider subscribing to Office 365 to utilize this exciting range of tools.    

Information Technology News & Information

Check Spelling With Microsoft PowerPoint 2016

If you’ve ever attended a high-level education course or business meeting, chances are you’ve come across the PowerPoint presentation. Microsoft’s PowerPoint program has been helping students and professionals organize their thoughts and ideas for decades. From class presentations to complex business proposals, Microsoft PowerPoint 2016 holds a wide range of benefits for users. Familiarizing yourself with the program’s many features can help you create engaging and error-free presentations every single time. How To Spell Check Your PowerPoint Presentations It’s important to make a good impression on your audience when using PowerPoint. This includes proper spelling and grammar throughout the entirety of your presentation. Misspelled words and grammar errors can make for an embarrassing moment in front of classmates or colleagues. This is why it’s important to learn to utilize PowerPoint’s wide range of tools. Knowing when and how to check the spelling within your PowerPoint proves you’ve gone the extra mile to produce a professional presentation that helps your audience clearly understand your talking points. There are several things you can do to improve the overall user experience. Here are a few steps to follow to spell check your PowerPoint presentation. Run A Spell Check PowerPoint automatically checks spelling for its users. As you type, you might find some words underlined in red. This can happen quite often in the first draft of your presentation, so don’t panic. While PowerPoint will draw attention to your errors automatically, if you’d rather wait until after you’re done with your presentation to spell check, you have that option, as well. PowerPoint’s Spelling and Grammar tool was designed to help users create error-free presentations. Once you notice an error, simply right-click on the word to reveal an option for correction. You can also choose the “Add to Dictionary” option, which will avoid PowerPoint flagging the word for the remainder of the presentation. If you are ready to spell check your entire presentation after you’re finished, click the “Review” tab and then click “Spelling.” PowerPoint will move through each error, offering you options to edit, until you have reviewed them all. PowerPoint will provide alternative options for every error. You may choose one of these suggestions, then click “change” to correct the spelling error. If there are no suggestions provided, or none that make sense for your presentation, you’ll be able to manually type in the word’s correct spelling. You can repeat this process for each error you encounter as you navigate your presentation. Once the last error has been corrected, you’ll see a dialog box that will confirm your presentation’s spell check is now complete. Contrary to popular belief, PowerPoint’s Spelling and Grammar tool isn’t flawless. For words like proper nouns and people’s names, the system may still detect an error even if there isn’t one. You can easily ignore spelling suggestions if they don’t apply. Just click “Ignore” to skip a word without changing it. You can also ignore all by clicking “Ignore All”. This will not only skip the word without changing it, but will also skip over other uses of the word for the remainder of the presentation. Modify Your Proofing Options Microsoft PowerPoint allows users to modify and customize proofing options to allow more control over the process. For instance, you have the option of customizing the way PowerPoint notifies you of spelling errors. The grammar check also carries the option of helping you correct contextual spelling errors, further simplifying the process as you type. To modify these proofing options, access Backstage view by clicking the File tab, then select the Proofing option to customize as needed. Find And Replace Words Finding and replacing certain words is easy with Microsoft PowerPoint. Doing this can help you save time as you work on your presentation. For Mac users, simply locate the “Search in PowerPoint” box in the upper-right corner of your screen, then click the arrow right next to it. This will provide the option to “Replace” text. In the “Find What” box, type in the word you’d like to locate, then type in the word you’d like to use instead, inside the “Replace With” box. You can click “Find Next” to locate the next occurrence of the word, or simply click “Replace All” to replace all occurrences. Present In Different Languages Microsoft Office, above all, is intended to make work more efficient for its users. PowerPoint for instance, allows users to type in different languages, such as Chinese or Arabic. To type your presentation in one of these non-Latin based languages, you first must change your keyboard layout. If you’re unable to locate your desired language through Office, you may need to add it manually or download a Language Accessory Pack. These packs can add extra display and/or proofing tools to help you create a highly professional PowerPoint presentation. Microsoft PowerPoint 2016 is one of many tools within the Office Suite designed to make business better for users. Utilizing these tools to their fullest can potential can help businesses achieve their goals more efficiently than ever before.  

Information Technology News & Information

The Intelligent New (and Awesome) Data Types Supported by Microsoft Excel

To date, Excel and similar apps deal primarily with text and numbers as data types. However, that tradition is about to be a thing of the past as Microsoft is adding two new data types to Excel. These data types allow cells to contain rich, intelligent data that can better represent more real-world data types.  Limitations and Possibilities Suppose you are putting together a spreadsheet that will plot the relationship between a company’s sales and population in South America. The sales data is easy enough to find, but tracking down the latest population for each South American country might be a bit time consuming and error-prone. At the last minute, someone asks for data that shows sales related to the size of the country, which means another session of hunting down the right information. What if you could have all that information for a country — population, square miles, map, gross national product, average minimum wage and more – all contained in a single cell within your worksheet? Believe it or not, those days are not too far away. Excel’s New Intelligent Data Types There are two new intelligent data types available in Excel: Geography and Stocks. That means that cells in your Excel workbook are no longer limited to holding flat information like text, numbers, or dates. Cells can now house an incredible amount of information related to geography and stocks. Not only can you access this information easily, you can even work with it when you are offline. Both of these data types can be found under the Data tab in Excel, and converting existing data to either of these types is very simple. Working with the New Geography Data Type Let’s suppose we have a worksheet that contains a single-column table. The table contains strings that represent countries. To convert this data to the new Geography data type, highlight the country names, then go to the Data tab and click on Geography. This takes care of the conversion. You’ll notice that an icon appears in the cells next to each country name. It resembles a map that has been unfolded. If you click on that icon, you’ll see a data card that contains tons of information about that country. Now that cell is no longer just a string of characters, but a rich data type with much deeper meaning. All of the data from the data card is actually contained in that cell, and you don’t need an internet connection to access that data. You will notice that a widget appears to the right at the top of the table. If you click on it, it offers to add another column. You can select from a list of available fields based on the data contained in the card you just looked at. Stock Data Type The Stock Data type works in a similar manner to the Geography data type but provides access to data involving stocks. Let’s say you have a table with a single column that contains some company names and some ticker names. You highlight that data, then go to the Data tab and select Stocks. That converts the string data into the new Stock data type, and all the names are switched to company names. You’ll notice that an icon appears by each company name, allowing you to access the data card for that company. Stock data changes quickly, unlike the Geography data. Because of the dynamic nature of Stock data, the data is refreshable. Some of it is available in almost real-time, while other data will be delayed. If you want to do calculations with cells that contain either the Geography or Stock data type, type in a formula referencing the cell number and then use the . (dot operator) to select the correct member of that geography object. Anything you can do with normal data, you can do with these new data types. Intelligent Data Types The Microsoft Knowledge Graph, the intelligent service that also powers Bing, is what provides the data. When someone points out that the Stock and Geography data types are intelligent, that means far more than fixing typos or spelling errors. For example, these intelligent data types can interpret data requests in context. It may ask for more specifics if you enter a city name and convert it to the Geography data type because it wants to make sure what city you mean. However, if a city is listed with other city names in a particular geographical region, then Excel will select a city in that particular region (context). Accessing It Not all Excel 365 users can access these new AI data types just yet. According to Microsoft, “The new data types are being released as preview to Office 365 subscribers enrolled in the Office Insiders program, in the English language only, starting in April 2018. “ However, it will eventually be rolled out for all Office 365 users. And other AI data types will also be added to Microsoft Excel’s repertoire. These developments mean that in Excel you can do even more, even faster.