A keyboard shortcut is a seemingly basic concept. It is a combination of keystrokes that shortens a task, such as opening up a browser or saving a document. Surprisingly, a lot of people don’t take advantage of these simple time-savers.
Plenty of programs, such as Microsoft Office and most web browsers, have built-in keyboard shortcuts. These shortcuts can shorten and simplify tasks such as:
- Opening up a new browser window
- Searching for a document
- Saving a document
- Attaching a document to an email
While these tasks aren’t too time-consuming when performed with a mouse, the combined time you could possibly save by using keyboard shortcuts is fairly substantial.
If you find yourself performing a lot of repetitive tasks, knowing their shortcuts could certainly be worth the effort. If there isn’t already a built-in shortcut for that task, creating your own shortcuts can be rather easy, depending on the program.
For tips on how to create your own keyboard shortcuts, check out these articles on:
Project and portfolio management solutions, also called PPM solutions, are a big trend in business right now, and it’s clear why. The tools included in PPM software, like scheduling, budget management and collaboration tools, make it easier for business to reach their goals more effectively.
Are PPM solutions limited to big businesses?
There are many varieties of PPM solutions available today, so there is really an option for virtually every sized business. These programs are particularly useful for small businesses looking to get more organized with their projects.
How can I utilize the software?
PPM programs such as Basecamp allow you to generate and share tasks lists and project schedules and give you and your coworkers an overview of what the project is and each task involved.
Because PPM software allows you to focused project information and can be viewed by everyone, it’s easier for a team to troubleshoot problems with a project before it gets started; if there is a miscommunication somewhere, someone is likely to find it more quickly through these collaborative programs.
Once a project has started, PPM software is a great way to make sure that all of your employees are on the same page and on track when working on collaborative projects. And since they are centralized, they can keep a detailed record of all communications during the project.
Overall, PPM solutions can really boost a small business’ effectiveness since they streamline otherwise complex projects and make them easier to manage. If you are interested in learning more about PPM software and want to see how to use it for your business, click here.
Lately, there has been plenty of talk about an “SMS of death”. The fact is, this supposedly deadly text isn’t actually a problem for most phones. Read on to see who may be in danger and how to protect yourself.
How can this impact me?
Unlike most viruses that threaten cell phones, this attack targets “feature phones” rather than smartphones. Feature phones are more basic cell phones that have one specific feature that distinguishes them, such as an MP3 player or web browsing capabilities.
Because feature phones rather than smartphones are at risk for this virus attack, most phones used for business purposes are out of danger. In order for the attack to be effective, the hacker must know the make and model of the phone, otherwise the text would simply be read as spam.
Possible indicators of an attack include:
- The phone can shut down without warning
- Some phones may then be rendered useless and the SIM card must be placed in another phone to be functional
Luckily, due to the nature of the ”SMS of death” hack, it will be almost impossible for hackers to insert their own code into the phone and steal any data. Those kinds of attacks are typically reserved for more high-tech smartphones.
How can I protect myself?
These SMS attacks are avoidable simply by updating security software, something that most people with basic feature phones don’t do. Updates generally need to be purchased because most feature phones don’t come with USB cables to update security software.
For more information on this “SMS of death” and how to keep your phone safe, check out this IT World article.
This year’s Consumer Electronics Show showcased many great ideas and devices that will influence businesses of all sizes. Now that the show is over, let’s reflect on three of the top products that could have an influence on small businesses in 2011.
This portable presenter connects to any standard projector and permits you to run PowerPoint wirelessly from your BlackBerry. This eliminates the need for a laptop, which is great for one-day trips. It also eliminates the common difficulties that come with hooking up a laptop to an unfamiliar projector.
Splashtop Remote app for Android
The Splashtop Remote program first popped up on the iPad and is now available for use on Android devices. This app allows you to log in to your home or office computer and perform many crucial functions such as:
- Maneuver around the desktop
- Use programs and applications based on your computer
- Watch videos
- Access documents, images and videos that are stored on your computer
This application is especially helpful for people who do a lot of work on the go. The Splashtop Remote app currently works on Android 2.2 and up.
For more information on the app, check out the Splashtop website.
PlasticLogic QUE proReader
Called a “wireless briefcase” by PlasticLogic’s CEO, the QUE proReader is much more than just an eReader, as it was initially intended to be. The QUE proReader:
- Syncs with Microsoft Exchange
- Allows for “print-to-device” technology
- Reads PDFs and Microsoft Office documents
- Lets BlackBerry users transfer information from their phones
- Already has deals in place with all of the top business periodical
The QUE ranges in price from $650 to $800, making it a little steep for some small businesses, but with all of the features it offers, it will likely prove itself to be worth the money.
These are just three of the many great products that were showcased at this year’s Consumer Electronics Show, but they are bound to be some of the most beneficial to small businesses. For more information on devices and services that were popular at this year’s CES, check out the Consumer Electronics Show’s “Trends” page.
Accidentally deleting essential files is a common mistake and can cause you quite a bit of trouble. The good news is that if you catch the mistake quickly enough, the file will most likely still be on your computer and in one piece. Keep reading for tips on how to undelete files before they’re gone for good.
Before you panic:
• Check to see if you mistakenly saved the file to a different location. People commonly save files to their Downloads or other folders without realizing it, so do a search of all your documents before presuming that it’s gone.
• Check out recovered files. Often, if you close a program or your computer shuts down without warning, there is a recovered files folder that saves whatever you were working on. Search your system for those files before losing hope.
• Search your email. If you emailed a copy of the file to someone, it may still be in your Sent Messages folder. Checking here first can save you a lot of time and stress.
• Check your Recycle Bin, as this is where many files hang out until they are entirely erased.
When those don’t work
There are some times when these tricks simply won’t be able to recover the files you need. If this happens, your best bet is to contact your IT services provider for help.
Losing files can be scary. Fortunately, they’re often not completely lost. These tips are straightforward and easy to follow – and when they don’t work, your IT services provider is usually just a phone call away.
McAfee, one of the world’s biggest computer security organizations, has just unveiled its predictions for cyber attack targets in 2011 and the report features several platforms that are quite common. On the list are both the Android and iPhone along with several other programs and devices.
McAfee believes that URL-shortening programs like goo.gl will be used for spamming and spreading malicious content. These services are used by many people to share links over social media sites so they are well suited for cyber criminals spreading malicious material. McAfee recently released its own URL shortener, McAf.ee, that strives to make URL shortening more secure.
A second likely target for cyber criminals will be geolocation services such as Foursquare and Facebook Places, since they show personal information like the user’s location and what applications they’re using and allow for a more targeted attack.
Mobile devices are expected to be a serious target for cyber criminals as more people are doing business on their smartphones. Many people do not take the proper steps to make sure that their smartphones are secure enough for business use, so the devices are particularly vulnerable. For tips on securing your smartphone, check out this article.
The other targets, as outlined by McAfee, are Apple products and Google TV as well as a rise in politically-motivated attacks a la Wikileaks.
For more information on these threats, read this article on Tech Crunch. Also, go towww.mcafee.com for information on the latest threats and advice on keeping your devices secure.