Blog

November 20th, 2014

Windows_Nov18_AOne of the biggest IT expenses for many small businesses is software. Some companies require thousands of dollars of software, which can quickly compound when you hire new employees. Businesses who have purchased Microsoft software may soon be receiving a letter from the tech giant asking for a systems audit. Here is a quick overview of this letter and what you should do if you receive one.

The Microsoft Software Asset Management Review

Earlier this year, Microsoft announced that they will be sending out over 30,000 letters to small businesses who have purchased Microsoft software licenses. These letters or emails are focused on checking that you have the right number of licenses for your systems.

This program actually has three audit elements, or emails, that are being sent out to businesses.

  1. Internal self-audit email - This is the most common letter businesses have been receiving. It asks them to verify that they are compliant with Microsoft's licenses, which is usually done by sending Microsoft the software keys for each license or product purchased. They then compare this to their records.
  2. Software Asset Management (SAM) Engagement - This is a voluntary process where Microsoft sends a Software Asset Management partner to your business to audit your systems and see if you are over or under licensed. For companies who do agree to this, the audit is paid for by Microsoft. The downside is, if you are found to be non-compliant, you will likely face a fairly large bill.
  3. Legal Contract Compliance (LCC) audit email - This audit can be enacted by Microsoft if you put off a SAM or self-audit for an extended period of time. Essentially, this is a legal audit that you must comply with. If you are found to be non-compliant under this audit, you could face stiff legal penalties.

What happens if I receive one of these emails?

Should you receive one of these emails you will be asked to carry out the audit by a set date. Most of the emails contain a spreadsheet that you will need to put your license information into. This can take time because you will likely need to physically check every machine using Microsoft software for relevant information.

Auditors who come to your business will ask you for network and server access and any other form of information they think they can ask for.

Should you be found to be non-compliant or under-licensed, you will likely then be presented with a bill for the extra licenses. If you happen to be highly under-licensed, this bill could be quite large.

What should I do if I am worried about this audit?

An audit like this could be time consuming, costly, and above all is frustrating for any business owner. What we recommend is working with us. We can help ensure that your business is using appropriate licenses and, should you face a request to do an audit, we can help you through the process.

So, contact us today to ensure that your business is compliant.

Published with permission from TechAdvisory.org. Source.

November 20th, 2014

AndroidPhone_Nov17_AFor many business owners with Android devices, Google's Calendar app is one of the most useful to have installed. With the update to Android 5.0, the company has also been updating their apps to make them not only look better, but more useful too. This has led to a new version of Calendar being launched with some great new features.

The idea behind the new Google Calendar

According to Google, the new Calendar app has been designed to truly help make lives easier. With the older version of Calendar, you have to take time to copy and paste information like location, phone numbers, and details into each event. This leads many users to simply skip adding important information when they create new events on their mobile devices.

With the latest version of Google Calendar, Google aims to make the creation of events and addition of information far easier. To do this, the new app has some useful features including:

Events pulled from Gmail

These days, when you book a flight or confirm a meeting, etc. you usually receive an email with a confirmation number and some contact information. In the new Calendar, events like this will be pulled automatically from Gmail emails and added to Calendar, along with relevant information.

For example, if you book a flight to attend a conference, you will see a new Calendar entry added with the flight information. Beyond this, events will be updated in real time, so if there is a delay with the event or you are sent an email update, Calendar will update this information on your calendar.

Assists

This new feature allows you to quickly and easily create group events. Now, when you create a new event and begin to type in information Calendar will make suggestions based on what you are typing.

For example, if you want to set a meeting with John at Starbucks around the corner you can start typing: 'Meet' and Google will come up with a list of suggested events. Tap Meeting from the drop-down menu and this will pop up in the text box. The drop-down menu changes to allow you to select more options, such as With. Tap this and enter the first letter of a name, and then select who to invite. The drop-down menu will change again and allow you to select a location by simply typing a few letters.

From the demo we have seen, this works quite well and definitely speeds up the creation of events.

Schedule View

This is a new view that has been designed to provide you with an in-depth view of the events you have scheduled. According to the Google blog, this view, "includes photos and maps of the places you’re going, cityscapes of travel destinations, and illustrations of everyday events like dinner, drinks, and yoga."

Essentially, this view makes it easier for you to see what is going on at a quick glance. Many mobile users find Schedule View particularly useful as they don't have to navigate their main calendar which can be tricky to read when you have a wealth of events planned.

How do I get the latest Google Calendar?

As of the writing of this article, the app is available on the Google Play store for all Android devices running Android 4.1. You should be able to get the app by updating the existing Google Calendar app. If you don't have the app, you can find it by searching for Google Calendar from the Google Play Store app.

If you are interested in learning more about Android, contact us today to see how our systems and experts can benefit your business too.

Published with permission from TechAdvisory.org. Source.

November 19th, 2014

Windows_Nov17_AEarlier this year, the SSL (Secure Sockets Layer) bug Heartbleed caused quite a stir when it was discovered. While the majority of systems affected by this bug have been patched, and are now secure from it, news has recently broke of a similar bug affecting Microsoft Windows Servers. If you use Microsoft Servers in your office, this is something you need to be aware of.

The new security problem

On November 11, 2014 Microsoft released a patch for nearly all versions of Microsoft Server, along with patch notes that included the reason why the patch was released. In short, it was released to plug a security gap that the company calls Schannel Remote Code Execution Vulnerability.

This cryptically-named vulnerability essentially allows hackers remote code access by sending specific packets of data to a server. Data packets are made up of basic units of data communication combined in order to send data over a network.

Hackers can structure certain data into packets then breach a bug in Microsoft Server software, potentially allowing a hacker full remote access to that server and the ability to execute whatever code they so choose, including giving themselves full access to the systems and data hosted on your server.

This bug is particularly destructive because it affects the Schannel library on servers, which is responsible for encryption and authentication in Windows.

What versions of Windows server are affected by this bug?

This bug can potentially be found on nearly every version of Windows and Windows Server currently in use by companies, including:
  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows 8/8.1
  • Windows Server 2012/2012 R2
  • Windows RT/RT 8.1
In other words, pretty much any business using Windows and Windows Server is at risk.

What should we do?

While this appears to be a big issue, and in truth it is, Microsoft has noted that they are unaware of anyone actually exploiting this bug as of the writing of this article. The company has also released a patch - MS14-066 that is supposed to fix the problem.

Therefore, the best action you can take is to update all of your systems running Windows. While it primarily affects servers, this could become a widespread issue if systems are not updated. What we recommend is contacting us as soon as possible. We can help ensure that all of your systems are updated and protected from this bug.

If you would like to learn more about Windows and how you can keep your systems secure, please do call us today.

Published with permission from TechAdvisory.org. Source.

November 19th, 2014

SocialMedia_Nov17_AMany business owners looking to launch, or expand their social media presence, quickly find out that only interacting with one platform is not the best strategy. Instead, they branch out, join all the major platforms and quickly find that each is vastly different and can be a challenge to master. For those using Twitter, here are 10 best practices that can help you get the most out of it.

  1. Keep posts on the shorter side - This may seem ridiculous, after all there are only 140 characters allowed per tweet, but keeping tweets short allows users to add their own comments and ideas when they retweet. Try keeping your tweets below 100 characters.
  2. Twitter is not about promotion - Studies have proven that tweets that promote a company or product don't usually do as well as messages that are more conversational in nature. If you want to ensure maximum interaction, aim for a mixture of tweets that consists of about 80% conversational and 20% promotional.
  3. Know what time to tweet - Each market is different, so take the time to research tweeting habits. If you see that the majority of your target audience is active during after-work hours, then it would make sense to tweet when they are more likely to be online. Remember, many Twitter users are connecting via their mobile devices, so you are probably better off tweeting during lunch hours, as well as pre- and post-work.
  4. Know what days to tweet - Much like knowing what time to tweet, it is a good idea to also know which days are best to tweet in order to maximize engagement. For example, if you are trying to interact more with other businesses (B2B) then it is best to tweet on days when the companies are open and an owner or manager is more likely to be looking at business systems and social accounts. Customers, however, are usually more receptive to messages on days when they aren't working e.g., Saturday and Sunday.
  5. Use hashtags - Hashtags in Twitter allow for categorization and make tweets searchable. For example, if you use the hashtag #fresh in a tweet and then search for 'fresh' on Twitter, you should see similar posts using the same hashtag.
  6. Use hashtags sparingly - There is a common trend in social media to use hashtags for nearly every word. This makes posts difficult to read and usually leads to people not sharing or retweeting your content. Instead, try to work one to three hashtag, at most, into your tweets naturally.
  7. Realize Twitter moves fast - The average trend on Twitter lasts about one hour, to one day. So, if you see a trend developing or beginning, act quick to join the conversation. Posting after the trend has faded will usually lead to tweets being ignored.
  8. Don't act on every trend - Trends come and go so quickly on Twitter that it can be tempting to try to jump on each one, or as many as possible, in order to get your message out to as many people as possible. However, not every style and subject will be relevant to your business. By shoehorning content to fit trends you could come across as insincere and lose interest from followers.
  9. Watch who you follow - Following people is one of the quickest ways to grow your own follower base - usually because users will follow those who follow them. But, when it come to business, you want to be sure to follow users who are relevant. For example, follow your customers, strategic partners, and even competitors. Following Twitter users who aren't relevant to your business is not going to get your messages read by the right people.
  10. Keep an eye on Twitter - In order to effectively spot trends and see what your target market is saying, it is worthwhile to use a program like Tweetdeck, which allows you to see all tweets, track hashtags, topics, and more.
If you would like to learn more about using Twitter in your business, contact us today to see how our services and solutions can boost your social media presence.
Published with permission from TechAdvisory.org. Source.

Topic Social Media
November 14th, 2014

VoIP_Nov10_AFor a number of years now, there has been a trend that has seen many families and households ditching traditional landline phones strictly to use mobile devices only. Many business owners are also wondering if this is the way to go in the corporate environment too? One alternative solution many are looking at is VoIP.

Why a fully mobile system is tempting

Mobile systems and devices can be tempting for many business owners largely because they offer decreased costs and better overall calling features, not to mention business-centric apps that allow you and your employees to be more mobile.

This, combined with the fact that many employees are increasingly adopting mobile devices, means that it is certainly tempting to make the switch away from traditional landline systems. However, this might not necessarily be the best idea for your business.

Why you shouldn't switch to a full mobile system just yet

As part of a business, you and your employees likely rely heavily on your phone system and the various features it offers. Within many businesses, the phone system - VoIP or landline - is the backbone of a larger, more unified communications system.

You need these to work flawlessly and seamlessly together so that you are reachable when your clients need to contact you, with minimal downtime and dropped calls. While mobile devices and networks do offer generally large percentages of uptime and reliability, there are still issues with dropped calls and less-than-clear communications. This can pose a real issue for employees who rely on phones.

Beyond this, it can be tricky to manage mobile devices in the company, as these devices are quickly becoming prime targets for thieves and hackers. This means an increased security risk for your company, especially if you don't have systems in place to efficiently manage these devices. Ultimately, a full mobile system integrated at this time could lead to increased costs, if not set up and handled in the right way, despite the perceived lower costs initially.

Mobile still has a place however

As we said above, mobile systems can help businesses enhance the overall effectiveness of office communications especially when combined with existing phone systems like landlines or VoIP. Firstly, they offer employees who are working remotely, or away from the office, a quick and easy way to check in without having to invest in potentially costly phone systems. This is especially true because of the number of communication apps that can be installed.

Secondly, they really do enable teams to be more mobile within the office. For example, if you have employees talking with customers, they can quickly check the status of a product or service on a mobile device instead of having to find a phone and call someone.

Essentially, in a few years, mobile systems will be powerful and reliable enough to fully replace existing systems, but for now, it is best to stick with VoIP or landlines in the office with mobile devices playing more of a support role.

If you are looking to learn more about communication systems in your office, contact us today to see how our services can help.

Published with permission from TechAdvisory.org. Source.

Topic VoIP General
November 13th, 2014

Security_Nov10_AIs your business secure from the latest malware and security threats? The truth of the matter is that there is always a chance that your business and systems can be attacked and breached by a variety of security threats. One of the more common threats of last year was a nasty piece of ransomware called Cryptolocker. While the first version has largely been dealt with, there is news that a new version of this - called CryptoWall - which has surfaced.

What is Crypto malware?

Crypto malware is a type of trojan horse that when installed onto computers or devices, holds the data and system hostage. This is done by locking valuable or important files with a strong encryption. You then see a pop-up open informing you that you have a set amount of time to pay for a key which will unlock the encryption. If you don't pay before the deadline, your files are deleted.

When this malware surfaced last year, many users were understandably more than a little worried and took strong precautions to ensure they did not get infected. Despite these efforts, it really didn't go away until earlier this year, when security experts introduced a number of online portals that can un-encrypt files affected by Cryptolocker, essentially neutralizing the threat, until now that is. A recently updated version is threatening users once again.

Cryptolocker 2.0, aka. CryptoWall

Possibly because of efforts by security firms to neutralize the Cryptolocker threat, the various developers of the malware have come back with an improved version, CryptoWall and it is a threat that all businesses should be aware of.

With CryptoWall, the transmission and infection methods remain the same as they did with the first version: It is most commonly found in zipped folders and PDF files sent over email. Most emails with the malware are disguised as invoices, bills, complaints, and other business messages that we are likely to open.

The developers did however make some "improvements" to the malware that make it more difficult to deal with for most users. These changes include:

  • Unique IDs are used for payment: These are addresses used to verify that the payment is unique and from one person only. If the address is used by another user, payment will now be rejected. This is different from the first version where one person who paid could share the unlock code with other infected users.
  • CryptoWall can securely delete files: In the older version of this threat, files were deleted if the ransom wasn't paid, but they could be recovered easily. In the new version the encryption has increased security which ensures the file is deleted. This leaves you with either the option of paying the ransom or retrieving the file from a backup.
  • Payment servers can't be blocked: With CryptoLocker, when authorities and security experts found the addresses of the servers that accepted payments they were able to add these to blacklists, thus ensuring no traffic would come from, or go to, these servers again. Essentially, this made it impossible for the malware to actually work. Now, it has been found that the developers are using their own servers and gateways which essentially makes them much, much more difficult to find and ban.

How do I prevent my systems and devices from being infected?

Unlike other viruses and malware, CryptoWall doesn't go after passwords or account names, so the usual changing of your passwords won't really help. The best ways to prevent this from getting onto your systems is:
  • Don't open any suspicious attachments - Look at each and every email attachment that comes into your inbox. If you spot anything that looks odd, such as say a spelling mistake in the name, or a long string of characters together, then it is best to avoid opening it.
  • Don't open emails from unknown sources - Be extra careful about emails from unknown sources, especially ones that say they provide business oriented information e.g., bank statements from banks you don't have an account with or bills from a utilities company you don't use. Chances are high that they contain some form of malware.
Should your files be attacked and encrypted by this malware, then the first thing you should do is to contact us. We can work with you to help find a solution that will not end up in you having to pay the ransom to recover your files.

If you are looking to learn more about CryptoWall malware and how to boost your security and protect your data and systems, then we could you your first line of tech defence.

Published with permission from TechAdvisory.org. Source.

Topic Security
November 12th, 2014

Productivity_Nov10_AAs a business owner or manager there is a good chance that a fair number of the emails you send out to your employees are with the purpose that they then send a message to a third party on your behalf. When drafting this message however, there may be some back and forth before it is actually sent out. This can drain productivity, but can easily be avoided by including a pre-draft in the original email.

What exactly is a pre-draft?

The idea behind pre-drafting an email message is that it helps to reduce the amount of back and forth between two parties when one of the parties is contacting a third party. If you have ever had an employee draft a message that came from you then you are likely well aware of the number of emails that can go back and forth before the email actually goes out.

Essentially a pre-draft is a message included in the original message that is to be sent along to a third party. When you include a draft message, the person who will be sending the message can then just cut and paste the content, personalize it, maybe tweak a sentence here or there, and then send it along.

How do I create one?

If you are currently working on an email message that will be sent by another employee on your behalf, try to come up with the outline and basic message yourself. It's best to clearly mark this message in the original email by using a flag like: "Message to send", and changing the actual message to another font or color.

Because most of these messages will be personalized, include placeholder text where your staff member can personalize the message. For example, To . This not only makes it easier to spot areas that need to be personalized, it also means messages can be sent out quickly and easily.

When is this useful?

To be honest, pre-drafting won't work for every type of email you send. But, there are some situations when this comes in handy, including:
  • When you are asked to provide a testimonial on a service. You can write a basic testimonial with areas for customization.
  • When you need to send follow up emails connected to a recently sent email campaign or message. You can draft a basic follow up message that can then be customized as your employees see fit.
  • When you want to post something on numerous social media sites. You can simply write the post once, then provide spots to customize based on the network.
  • Introductions and references. If you have been asked to provide a reference or an introduction, then draft a standard message which can then be changed as needed.
If you mark these emails as a pre-draft, or place them in a pre-draft folder, they can then be quickly found and modified in the future.

Looking to learn more about increasing productivity in your business? Contact us today to see how our systems can help.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
November 12th, 2014

BusinessValue_Nov10_ACommunication is a vital part of business. While customers certainly appreciate digital systems like email and chat, there are times when simply talking to someone is preferable. Because of this, and the fact that many businesses will always have customers who prefer to talk, most businesses do need a phone system. The question is: How do you find the right one for your business?

1. Know the types of systems out there

Phone systems, as with many other types of technology, have evolved and changed drastically from the traditional phones that we are all familiar with. As a result, it pays to be aware of the four main types of phone systems available for small to medium businesses:
  • Key systems - These systems are commonly found in many older small businesses as they were designed for up to 40 users. Typically, a Key system offers businesses basic features like hold, line switching, line management, etc.
  • PBX - Private Branch Exchange, is private phone networking technology that enables businesses to manage up to hundreds of phone lines and numbers. PBX is usually employed by larger businesses who need multiple phone lines and the ability to network offices together.
  • Hosted PBX - These are PBX systems that are managed and hosted by a provider. The system itself is usually housed offsite, which means less up-front investment for the company.
  • Centrex - These are specific business features and packages developed for your business by a major telecommunications provider which are usually added onto your monthly phone bill.
Generally speaking, these four types of phone systems are available in two ways:
  1. Analog - Traditional landline phone systems offered by phone companies, commonly referred to as PSTN (Public Switched Telephone Network). Analog is familiar to many business owners as it uses existing lines strung by telephone companies.
  2. Digital - Newer phone systems that use network connections to transmit voice communication. The most common of these systems is VoIP (Voice over Internet Protocol).
While there are four main systems, the increasingly popular adoption of digital systems like VoIP has led to Key and PBX systems essentially merging together into one platform. Some providers however do offer scaled down versions of PBX over network connections that they refer to as Key systems.

2. Consider these four questions

As you are looking for a new system? If so, it might be a good idea to ask yourself the following questions:
  1. How many lines and phones will I need? This will likely be one of the first questions a vendor will ask when you start looking for a new system. Take some time to think how many phone lines you will need. For example, will you need one for every employee? Or will a line for every major office or department be enough? You will quickly find that some teams won't need lines at all, while others will need one for every person.
  2. How much do I want to manage this system? If you want to have complete control over every line, the supporting systems, and the hardware itself, then going for a hosted solution may not be the best of ideas. On the other hand, if you are looking for a solution that is simple to manage for you, then hosted or managed solutions might be the answer.
  3. How fast will my business grow? If you are expanding quickly, then you will need a system that can develop with you. Many landline systems require technicians to install new lines which can take time, so businesses that are growing quickly may benefit more from digital systems.
  4. What other equipment will I be using? This is important to know before you talk to vendors because some systems may not work well with existing technology, or other systems you may be using. If you make a list, vendors can then help you quickly find a system that is compatible with your other equipment.

3. Ask your users what features they need

Before looking for a new phone system, you should ask the people who will be using the system what features they need in order to do their jobs to the best of their ability. Some teams may need wireless devices in order to better talk to customers, while others might find video conferencing worthwhile; others still may need a more unified communications platform, including text and instant messages.

The key here is to develop a list of features that your business will need before looking for a new phone system. This will make it easier to find one that fits your needs.

4. Work with your IT partner

We can work with you to help you find the best solution for your business; be it managed, digital, or analogue. If you are looking for a new phone system, contact us today to learn more about our solutions and how we can help.
Published with permission from TechAdvisory.org. Source.

November 6th, 2014

BusinessValue_Nov03_AIT is in a near constant state of evolution, largely because of the sheer number of technology-based systems and products released on a weekly basis. This fast-paced development has led to the creation of three major IT areas. It is essential that companies invest in these three areas if they want their business to succeed.

1. Commodity-oriented IT

IT is made up of systems that support day-to-day operations, so it is essential that you invest in this area because it is what supports your core business practices. Without proper investment, your employees may not be able to carry out their tasks adequately. Commodity IT is essential but it does not bring increased value to your company. Sure, implementing a new email system could save money but it does not directly lead to increased profits.

One of the best ways businesses can get the most out of commodity IT is to first identify which systems the business relies on. From here, you can look to see if improvements can be made that will reduce overall expenses and increase productivity. Regardless of what you do with commodity IT, all changes and improvements should be operations-oriented; making jobs easier.

2. Business value focused IT

Business value IT involves any system that supports key operations and processes that drive overall business value. Essentially, these systems are not only essential, but they allow businesses and customers to do what they need to do. A good example of business value IT for companies with online stores is the technology that supports the store. Without it, customers would not be able to make purchases from the company.

With this form of IT you want to invest in systems that increase the value you offer customers and employees, while increasing your bottom line.

3. New opportunity IT

New technology and systems can help give your business a competitive advantage when properly integrated, while increasing overall business value. A good example of this is leveraging a new social media platform to help gain customer insights, or implementing technology that allows your business to capture and analyze data quickly and easily.

Companies able to incorporate new technology will often find that they have somewhat of a first mover advantage, and if leveraged correctly you could see increased profits and customer retention.

Get a good IT strategy

The vast majority of companies choose to focus a large percentage of their IT budgets on commodity IT. What this results in is a focus on simply maintaining existing IT systems, without actually investing in new systems. Ideally, you want to minimize your technology upkeep expenses, and invest more in discovering new technology and systems.

How do you do this? That's where a company like us comes in. As your IT partner, we can help ensure that your systems are managed effectively, costs are minimized, and we can even go so far as to help you find and implement new systems. Contact us today to see how our solutions can help maximize your IT investments.

Published with permission from TechAdvisory.org. Source.

November 5th, 2014

iPad_Nov03_AWhen it comes to releasing new products, Apple usually holds a massive press event where developers talk about the device and then unveil it to a generally enthusiastic crowd. This happened with the release of the iPhone 6 and 6 Plus, but in mid-October the company quietly introduced two new versions of the iPad. If you, like many others, missed this release, here is an overview of the latest two versions of the iPad.

The iPad mini 3

First up is the third version of Apple's smaller iPad - the iPad mini 3. The immediately noticeable changes with this year's device is the home button. It now has the metal ring right around it which enables the Touch ID feature so that you can unlock your device using your fingerprint.

Touch ID also enables users to pay for items using the Apple Pay feature that has just been released. Sadly, for the iPad mini 3, this is limited only to in-app and iTunes purchases as there is no NFC chip in the device to enable it to work with in-store terminals.

Aside from a slightly changed exterior and the extra Apple Pay related features, the device is more or less exactly the same as the iPad mini 2. It still boasts a 7.9 inch retina display and the same A7 processor found in the mini 2.

The major difference is that you can purchase the mini 3 with 64 GB or 128 GB of storage, which is not available for the mini 2. Unfortunately, the price of the device starts at USD 100 more (USD 399 for the 16 GB version) than the mini 2, which costs USD 299 for the 16 GB version. In other words you are paying USD 100 for the fingerprint unlock and semi-functional Apple Pay.

At this time, Apple has noted they will continue to sell the mini 2, which for many businesses will remain the better deal largely because it is less expensive yet offers exactly the same hardware and size.

The iPad Air 2

As the name implies, the iPad Air 2 is the second version of the popular iPad Air which was introduced last year. As with the mini 3, the Air 2 has seen a slight change to the home button with the introduction of the Touch ID feature that allows users to unlock their devices using their fingerprint.

The new version also enables the Apple Pay feature so users can use their fingerprint to approve purchases. Sadly, there is no NFC chip in the device, so you won't be able to use the device to make purchases at stores.

Beyond this, there are a number of interesting changes that many business users will find useful including:

  • A faster processor - With what Apple calls the A8X processor, the iPad Air 2 is one of the fastest and most powerful tablets on the market. Users have already noted faster website loading times and better overall responsiveness, especially when running graphics intensive apps.
  • A thinner, more mobile body - Apple reduced thickness with the iPad Air 2, making it thinner than any other iPad. At 6.1 mm, you will be able to use the device all day without it feeling awkward in your hand.
  • A less reflective display - While the displays on the iPad have always been top of the line, there have been complaints in the past about how the glass on the device is a bit too reflective. With the Air 2, a less reflective display is being used which supposedly cuts glare down by as much as 56%. This means you will be able to see what is on the screen more easily in more locations and situations.
  • The Apple Sim - For users in certain countries like the US and UK, the cellular version of the iPad comes with what is called the Apple Sim. This sim card is universal in that it allows you to connect to the mobile network of your choice without having to switch cards. This also makes switching networks and plans much easier.
If you are considering picking up the iPad Air 2, the 16 GB Wi-Fi only version starts at USD 499. If you would like to learn more about how these devices can be used in your office, contact us today to learn more.
Published with permission from TechAdvisory.org. Source.

Topic iPad