Blog

November 5th, 2014

iPad_Nov03_BWhen Apple launches a new or updated product the company usually holds a press event where they announce the release in style. This was the case with the iPhone 6 and 6 Plus, but did you know that the company has quietly released new versions of the iPad Air and iPad mini? If you are looking for a new tablet, here is a brief overview of these latest Apple devices.

The iPad mini 3

First up is the third version of Apple's smaller iPad - the iPad mini 3. The immediately noticeable changes with this year's device is the home button. It now has the metal ring right around it which enables the Touch ID feature so that you can unlock your device using your fingerprint.

Touch ID also enables users to pay for items using the Apple Pay feature that has just been released. Sadly, for the iPad mini 3, this is limited only to in-app and iTunes purchases as there is no NFC chip in the device to enable it to work with in-store terminals.

Aside from a slightly changed exterior and the extra Apple Pay related features, the device is more or less exactly the same as the iPad mini 2. It still boasts a 7.9 inch retina display and the same A7 processor found in the mini 2.

The major difference is that you can purchase the mini 3 with 64 GB or 128 GB of storage, which is not available for the mini 2. Unfortunately, the price of the device starts at USD 100 more (USD 399 for the 16 GB version) than the mini 2, which costs USD 299 for the 16 GB version. In other words you are paying USD 100 for the fingerprint unlock and semi-functional Apple Pay.

At this time, Apple has noted they will continue to sell the mini 2, which for many businesses will remain the better deal largely because it is less expensive yet offers exactly the same hardware and size.

The iPad Air 2

As the name implies, the iPad Air 2 is the second version of the popular iPad Air which was introduced last year. As with the mini 3, the Air 2 has seen a slight change to the home button with the introduction of the Touch ID feature that allows users to unlock their devices using their fingerprint.

The new version also enables the Apple Pay feature so users can use their fingerprint to approve purchases. Sadly, there is no NFC chip in the device, so you won't be able to use the device to make purchases at stores.

Beyond this, there are a number of interesting changes that many business users will find useful including:

  • A faster processor - With what Apple calls the A8X processor, the iPad Air 2 is one of the fastest and most powerful tablets on the market. Users have already noted faster website loading times and better overall responsiveness, especially when running graphics intensive apps.
  • A thinner, more mobile body - Apple reduced thickness with the iPad Air 2, making it thinner than any other iPad. At 6.1 mm, you will be able to use the device all day without it feeling awkward in your hand.
  • A less reflective display - While the displays on the iPad have always been top of the line, there have been complaints in the past about how the glass on the device is a bit too reflective. With the Air 2, a less reflective display is being used which supposedly cuts glare down by as much as 56%. This means you will be able to see what is on the screen more easily in more locations and situations.
  • The Apple Sim - For users in certain countries like the US and UK, the cellular version of the iPad comes with what is called the Apple Sim. This sim card is universal in that it allows you to connect to the mobile network of your choice without having to switch cards. This also makes switching networks and plans much easier.
If you are considering picking up the iPad Air 2, the 16 GB Wi-Fi only version starts at USD 499. If you would like to learn more about how these devices can be used in your office, contact us today to learn more.
Published with permission from TechAdvisory.org. Source.

Topic iPad
November 5th, 2014

AndroidTablet_Nov03_BWith the upcoming release of Android 5.0 Lollipop, there will be a subsequent release of new tablets and devices running the operating system (OS). Many of these users are likely to be business users who need increased security. In an effort to ensure that the next version of Android is indeed more secure, Google has included a number of security updates and features.

1. Smart Lock

One of the first steps to ensuring that your Android device is secure is to put a lock code on the screen. Adding a pin code, or pattern code, to your device makes it more difficult for someone else to gain physical access. On the downside, constantly entering the code can be annoying, especially if you need access to your device on a regular basis.

In an earlier version of Android, the ability to use your face to unlock your device was introduced, but it hasn't really been all that popular. With Android 5.0, Google has introduced a feature called Smart Lock.

This feature uses either NFC, Bluetooth, or your face to unlock your device. Essentially, you pair your device with another device and when it is in range it will automatically unlock. For example, you can pair your computer with your phone via bluetooth. When your phone is near your computer, it unlocks and allows you access without having to enter the pin. If you prefer to use your face to unlock your device, this feature has now been improved and moved to be part of Smart Lock.

2. Automatic encryption from first boot

As businesses continue to integrate tablets and other devices, the amount of data stored on these devices increases. As a result, you eventually end up with important data on your device that you need to keep secure. One of the best ways to do this is to encrypt your device.

On older versions of Android, device security was fairly complicated when not automatic. Now, any device running Android 5.0 is automatically encrypted when the device is started up for the first time.

This encryption will ensure that the data on the device is secure from the start, something which many business users will likely find quite useful.

3. SELinux

SELinux, or Security Enhanced Linux, is a security model implemented in Android last year which is configured to help minimize security threats. All developers must include SELinux enforced security on their apps. What this has done is increased the overall security of apps installed on devices and reduced the number of vulnerabilities that could compromise device security.

For most users, the updated requirements and measures introduced by Android Lollipop will lead to increased overall device security from the apps through to other features.

If you are looking to learn more about the latest Android release features get in touch with us today.

Published with permission from TechAdvisory.org. Source.

November 4th, 2014

Office365_Nov03_BFor businesses looking to integrate Office 365, there are a number of plans available. Some offer full versions of Office 2013, while others include just Office Web Apps (OWA) - browser-based versions of Office. Because of the different plans available, it can be slightly confusing to figure out which one to go with. Here are five questions to help you decide.

1. Am I comfortable doing all, or most of my work in a browser?

Because Office Web Apps is browser-based, you will be spending a fair amount of time in your browser. Many of those who have switched to OWA have found that it takes time to get used to working with the system. Because of the way many of us work, you will start to see multiple windows and tabs open with different documents which could lead to increased confusion and more time finding the tab and window you need.

What's more, you will need to ensure that all browsers on all computers in your company are kept up-to-date if you want to use OWA. For example, older versions of Internet Explorer may not support OWA. This means you will need to spend time ensuring that everyone within the business is updating when necessary.

To get around this, you can work with a company like us who can ensure that browser activity is not only secure, but also up-to-date, which basically guarantees OWA will work when you need it to.

If, however, you are not comfortable using your browser for everything, then it may be a good idea to go for an Office 365 plan that includes the full version of Office 2013.

2. Am I going to collaborate on files with users both in and outside of the organization?

Many business tasks are real team efforts, where users need to collaborate on documents. While this is possibly with any Office program, one of the biggest weaknesses of traditional Office installs is version control.

If you have shared one document with a number of different users you will quickly find that the changes they make and send back to you are likely going to need to be manually added back into the original document. This takes time and can lead to confusion, errors, and a lack of productivity.

With OWA, any document you create is stored on your OneDrive account and can be easily shared with other users. When the document is opened, all changes are made directly to the main document in real time. This means each user can see the changes show up as they are being made, which increases the effectiveness of collaboration.

Of course, this is possible with almost all Office 365 plans - especially if you also integrate SharePoint, but OWA offers by far the easiest solution to collaboration. So, if you collaborate a lot, then OWA may be a better version of Office to use. That being said, if you just need a few people to edit documents or offer comments, then Office 365 plans with Office 2013 will usually be the better option.

3. Will I need to format documents, or need advanced features?

The Web-based versions of Office offer many of the key features found in the desktop versions. However, some advanced features, like in-dept formatting, adding charts, etc. are not currently available with OWA.

While many users find OWA is enough to meet their day-to-day document production needs, those who use the advanced features of each Office app will be better off with Office 365 plans that offer full installs of Office 2013.

4. Will I need more Office apps than just the core five?

Currently, OWA apps available to users are: Word, Excel, PowerPoint, OneNote, and Lync. These five major apps cover the majority of document production needs for most users, however, if you require other Office apps, like Access, or Publisher, that aren't included in OWA, then you will be better off going with an Office 365 plan that offers Office 2013.

5. Will I be constantly connected to the Internet?

In order to get the most out of OWA you will need to have a strong and constant Internet connection. While you can create documents offline, you will need to connect in order to save and update them. If you spend a lot of time out of the office, this may be a real inconvenience, especially if you often struggle to find a solid Internet connection.

What we recommend is talking to an Office 365 vendor like us. We can explain the different Office 365 plans in depth and how you can integrate them into your office. Contact us today to learn more.

Published with permission from TechAdvisory.org. Source.

November 4th, 2014

GoogleApps_Nov03_BIf you use cloud-based systems in your office there is likely a good chance that you have worried about the security of these systems at least once before. Many companies, in an effort to make their cloud services more secure, have implemented two-step verification. Google is one such company and in an effort to enhance security, they have enabled a new two-step verification method which is carried out via a USB key.

Google and two-step verification

In order to further secure your Google account, beyond a difficult-to-guess password, your main option is two-step verification. The way this works for Google accounts is you need to provide a cellphone number for your account. When you try to log in you are either called or sent an SMS with a code to enter. Alternatively, you can download the Google Code generator which generates a code which you then need to enter when logging into your accounts.

While this works well when you have your mobile device with you, or when you are near the phone number linked to your account, it doesn't work so well when you aren't. In order to make things a little easier, Google has introduced a new two-step verification method that utilizes a special kind of USB key.

Two-step verification via USB key

Take a look around your desk, chances are high that you probably have a USB key or USB storage device within easy reach. While it would be cool to be able to use one of these to log into your account, you can't use just any USB key. Instead, you need to use one that is FIDO Universal 2nd Factor (U2F) compliant.

If you have one of these keys, once configured, you can stick it into one of your computer's USB ports and press a button. The coding on the stick will then talk to Google servers, sending cryptographic code back and forth, thereby unlocking your account.

This guarantees two things: Firstly, that you are logging in using two-factor verification and are therefore you; and secondly, that the Google site you are logging into is actually Google and not a malicious or fake site. Essentially, this further increases your overall account security.

A few caveats

While these security measures are a good idea in practice, there are a few caveats regarding this authentication method:
  1. You have to buy your own key, which costs anywhere from USD 15 and up.
  2. It will only work with Google Chrome and Chrome OS. This means that if you are trying to log into your account on another browser, or a mobile device, it won't work.
If you are worried about account security, then using a USB key like this could be a good idea, and if you are looking to learn more about implementing this method and ensuring all of your accounts are secure, contact us today.
Published with permission from TechAdvisory.org. Source.

October 31st, 2014

Security_Oct27_BAs businesses continue to implement more and more Internet-based systems, there is always the risk that systems could be breached and security compromised. If you conduct business online, there are a number of measures you can take to ensure that your activities and your company's vital information are secure. Here are five.

1. Use two-factor authentication whenever possible

Two-factor authentication, or two-step authentication as it is also known, is the idea of using two pieces of information to log into accounts: Your usual password and a code that is usually sent to a mobile device or generated by a code generator.

By utilizing this safety feature, you can further increase the security of your accounts, largely because the chances of someone getting their hands on both the generated code and your password are slim.

Some sites don't use a code and instead ask a question that needs to be answered every time you log in. If this is the case, make the question something that is difficult for a hacker to guess. For example, use your address from 10 years ago instead of your current address.

2. Audit who has access to what data

Between all of your online accounts and social media profiles you will likely be surprised at just how much information about you can be found online. There are a multitude of scare stories online, where someone has had their accounts hacked and identity stolen, largely because they had left pertinent information online without even thinking about it.

It is a good idea to audit what information you have online. This includes looking at the contact and personal information you have on social media profiles, account information, etc. Ideally, if it is not necessary information, then it shouldn't be shared. As for social media profiles, make sure only the absolute basic personal information is online and limit who can see this information.

3. Watch what is posted on social media

Because of the nature of social media, we often feel the need to share our whole lives online. This can often lead to oversharing, and even sometimes oversharing of personal information. There are stories online of thieves monitoring social media for businesses posting about how they are going to be closed for a holiday, with all staff gone. Once a thief finds this information, they then break into the business without worrying about people being there.

If you are going to share information online, be sure to limit the potentially sensitive information that you post, especially if the content is shared with the public.

4. Change your passwords regularly

It seems like almost every week news breaks of a password or account information breach. What this translates to is the fact that your accounts are always facing a potential risk. Therefore, you should make it a habit to change your passwords on a regular basis.

Most experts recommend at least once every three months, but if there is a breach where your account information may have been leaked then naturally change your passwords straightaway.

To ensure maximum security, you should use a different password for each account, and keep these as separate as possible.

5. Work with an IT partner who can offer enhanced Internet security

Ensuring that your business is secure online can be an on-going battle that you will likely not win easily. One of the best steps to take is to work with an IT partner like us. We offer a variety of Internet security solutions that can help stop malware intrusions before they infect your systems, block access to potentially harmful sites, and even scan Internet-based email solutions. In other words, we can help improve your overall online security.

If you are looking to learn more about how we can help your business be secure online, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
October 29th, 2014

BCP_Oct27_BBusiness continuity plans are an important part of any business, especially if owners and managers want to see a business through any disaster. In order to have an effective plan, it is important that businesses integrates technology that can support a plan. The fact is though that this technology will eventually need to be replaced. Here are five tips that can help you determine whether you need to upgrade to a new system, or replace existing ones.

1. New technology and systems offer increased resilience

When it comes to continuity and the systems supporting it, businesses need to ensure that they are resilient. This means implementing hardened systems that will remain working in adverse environments; systems like UPS (uninterruptible power supplies), etc., so that should a disaster occur services will still be available.

Beyond this, it is a good idea to implement systems that can be switched from one location to another quickly and easily. A good example of this is implementing cloud storage and backup which can be recovered to other systems with minimal fuss.

Technology that increases the resilience of your systems and continuity plans is worth implementing.

2. Enhanced data protection and availability

During and after a disaster, it is vital that businesses have access to their data. If your data is not protected in an efficient manner, or easily accessible once it has been backed up, you could see a decrease in business effectiveness and delays in fully recovering.

Technology or systems that enhance data protection and availability over your existing systems are worth including in an upgrade, so that you can benefit from data being available when you need it most.

3. Systems offering increased communication

Communication during and after a disaster is crucially important if your business is to survive and recover full operations. When a company faces disaster, communication networks need to be strong and available at any time. So, if you can find systems that enhance the ease and effectiveness of your communications then these could be worthwhile upgrading to.

4. New technology is available to simplify plan development and auditing

If you have developed a continuity plan in the past, you know that it can be a time consuming task. While essential, many business owners do not have the necessary time to commit to this. This is where systems and technology can help.

A system that makes the auditing and development of plans easier may be worth including in an update.

5. Technology that decreases costs

With businesses operating on narrower margins, many business owners want systems to keep costs low or at the very least ensure costs don't rise. If the systems you are looking at have been proven to reduce operating costs, then it may be a good idea to consider them.

It is important however to not integrate technology simply to save money. You should aim for solutions that are affordable, but that will also offer these worthwhile benefits and more.

We recommend talking to us to find out how we can help you find the services and technology your business needs to ensure your business continuity is not only working but will also deliver when you need it.

Published with permission from TechAdvisory.org. Source.

October 29th, 2014

OSX_Oct27_BIn mid-October, Apple launched their much-awaited update to their popular desktop operating system, OS X. This new version, named Yosemite after one of the most beautiful National Parks in the US, brings about a number of new changes and features that business users can benefit from. Here is an overview of the most useful developments.

Upgrading to Yosemite

The good news about Yosemite is that Apple has made this a free upgrade for users with compatible Macs. You can get it by going to the Apple Store on your Mac, and logging in using your Apple account. For businesses, we strongly recommend contacting us before you do this as we can help back up your systems and install the update so that your systems will work perfectly.

A new look for OS X

Last year Apple released a drastic redesign of their popular mobile operating system - iOS. This redesign brought about a modern look to the system with translucent menus and a clean, semi-transparent design. Apple has brought this style of design to Yosemite.

When you first start up Yosemite you will notice that bars like the launch bar at the bottom are translucent. Many icons have also been updated with clean and consistent design and menus have been somewhat flattened, making them easier to read.

Overall, the new look makes systems running this version of OS X easier to look at, while modernizing them and bringing them more in line with other Apple systems.

Enhanced continuity between devices

Apple has noted before that they are striving to bring their desktop OS and mobile OS closer together, eventually reaching a point where they are more or less one and the same. With Yosemite, they make a big jump forward by introducing a number of mobile and desktop features. One of the most useful being Handoff which allows users to start a task on their iPad or iPhone and continue this on their laptop, or vice versa.

Instant Hotspot is another feature that allows users to instantly share their iPhone's data connection with their desktop - no need to enter a password as the system uses iCloud to ensure that the connection is secure.

If you have an iPhone that is running iOS 8 and a laptop or desktop with Yosemite installed, and connected to the same Wi-Fi network, you will be able to answer calls to your iPhone from your computer, or even send and answer text messages via the Messages app on any device.

Improved AirDrop

AirDrop is a feature that Apple has been trying to get working properly for a number of years now. When it works, it works really well, but with the last update to iOS 7 and OS X Mavericks, it simply didn't work when you needed to transfer files from your phone to your computer.

Yosemite fixes this, as this version of AirDrop now has the same protocols as the mobile versions, so you can swap files between devices on the same Wi-Fi network.

Notifications Center

This feature has been updated to make it much more useful, mainly due to the introduction of the Today view. Similar to the view introduced in iOS 8, this shows you, at a quick glance, useful information for the day. By default you can see your calendar, stocks, weather, etc.

There is also support for widgets. Because Apple has enabled this, software developers can now create widgets that can be placed in the Today view of the Notifications Center. This is similar to the new feature that was introduced with iOS 8, and can be accessed by swiping four fingers from the left of the track-pad to the right on your laptop, or pressing the bulleted icon at the top-left of your menu bar.

Improved Spotlight

While Spotlight has long been a feature of OS X, it has been updated in Yosemite. Now, instead of just searching for files on your computer it can also search for applications. You can also use it to search the Web, so when you enter a term you see results from pages like Wikipedia, the Apple Store, iTunes, and more.

As in other versions of OS X, you can access Spotlight by hitting Command + Spacebar. You then see a search bar pop up in the middle of your screen. Simply type what you are looking for and a window will drop down with results.

These are just a few of the new features that business users will benefit from when they upgrade to Yosemite. If you would like to learn more, please contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Apple Mac OS
October 28th, 2014

Web_Oct27_BWhen looking at cloud solutions, or deciding which cloud service to integrate into business operations, you will often come across a wide variety of terms that can be confusing. This is especially true when talking to some IT experts. To help make things easier, here are some simple definitions for 10 commonly used cloud terms.

1. Cloud app

A cloud app, or cloud application, is any application that is supported by a cloud service, or is accessed over the Internet. The key difference from other apps is that the vast majority of cloud apps are not installed on a device, rather they are accessed via a Web browser.

Some mobile apps are cloud-based, whereby an app is installed on the device and allows you to access data that is stored in the cloud.

2. Cloud burst

Cloud burst is a term used to reference a specific setup that many companies employ. Essentially, this is the idea of implementing a private cloud solution that provides for most usage requirements. When demand exceeds capacity, the company can integrate a public solution to cover the excess demand thereby "bursting" into another cloud.

A good example of this is when a company uses a private cloud solution to store data. When the threshold for maximum data storage is reached, they can implement a public cloud solution to increase overall storage. All essential information stays in a private cloud, while non-essential information is moved to the public cloud.

3. Cloud

The cloud is any service or solution that is delivered to a user via their Internet or network connection. To many, this term has come to be associated with the Internet.

4. Cloud management

Cloud management is often used to refer to a set of software or administrative panels that are specifically designed to allow business managers, owners, and IT teams to monitor and manage their cloud-based solutions. This often includes data, applications, and cloud services.

These tools are of strategic importance because they help to ensure that your cloud resources are functioning optimally and that users are able to interact with them properly. They also allow you to audit who has access to what and even add new accounts when needed.

5. Cloud provisioning

Cloud provisioning is the actual deployment of a cloud strategy. This often includes the selection of solutions and then which data and solutions will reside on either public or private clouds. Services are then deployed and data is migrated, usually with the help of an IT partner.

During the provisioning process, IT partners will also take the time to develop processes regarding how you will interface with the cloud solutions you will be implementing and set who has access to solutions.

6. Cloud storming

Cloud storming is the act of connecting multiple cloud services into a useable platform for your business. Some companies also use this term to refer to the idea of brainstorming about the cloud and how to use, or implement, it in daily operations.

A good example of cloud storming is where a company implements a cloud-based CRM solution from one provider, a cloud-based productivity suite, and cloud-based email at roughly the same time in order to better support operations while reducing operating costs.

8. Public cloud

Public cloud services and solutions are just that: public. They are available for any person or company to purchase or subscribe to and implement. With these services, all data or apps are hosted outside of the company and accessed over the usual Internet connections.

Public cloud services are usually the most common type of cloud implemented by companies who are first moving over to the cloud.

8. Private cloud

A private cloud is any cloud solution that is hosted by a company's own resources. This could be on servers kept on-site, or rented servers that are then configured so that the solution is only available to the company, not the public.

While mainly large companies will employ private clouds, smaller companies looking for a niche cloud solution are starting to implement these as well.

9. Hybrid cloud

A hybrid cloud is a solution implemented by companies that has elements of both public and private cloud solutions. Essential data or business processes are hosted or delivered by a company's own cloud service, while less essential services are delivered by public clouds.

Many larger companies employ this model of cloud computing for data storage as it allows them greater control over where their data is being stored, while ensuring that essential or highly regulated data can be stored in a secure manner; managed by the company.

10. Cloud portability

This is the level at which data maintained or stored in one cloud service can be moved to another. It is also used by experts when moving whole systems, such as apps, from one provider to another. If the overall portability is low, then it will be difficult for the user to move either apps or data from that provider.

Another similar term used by experts is 'Vendor lock-in', which is used to describe a dependency on a certain cloud provider and the general difficulty of moving away from this provider due to lack of other solutions or mechanisms that enable transfer. For many companies, it is a good idea to look for a provider that won't lock you into their cloud, or at the very least offers some portability options.

If you want to know more about how the cloud can benefit your business then connect with us today.

Published with permission from TechAdvisory.org. Source.

Topic Web
October 28th, 2014

GoogleApps_Oct27_BGoogle offers small to medium businesses some incredibly useful apps that can help increase productivity and more. With Google Sheets, users can create and maintain spreadsheets, but one function has been missing in recent past versions: Spell Check. Did you know that with the most recent version of Google Sheets Spell Check has been brought back?

Spell Check in Google Sheets

When Google introduced their new version of Google Sheets they brought back a much requested feature - Spell Check. In Google Sheets, Spell Check works much the same as it does in other apps like Docs; you can select whether to check the entire sheet, worksheets, columns, and even individual cells.

In order for this feature to work best you need to ensure that the spreadsheets you are using are created using the new version of Google Sheets. You can check this by looking for a green checkmark on the lower-right of the file you would like to check for spelling.

This checkmark indicates that the sheet is running the latest version of Google Sheets. You can then run Spell Check on the whole sheet by:

  1. Opening the sheet you would like to check for spelling.
  2. Clicking Tools followed by Spelling.
The Spell Check should highlight any errors, along with replacement suggestions. If there are errors you should see a drop-down window open with options to:
  • Change - Will change the error to the selected word.
  • Ignore - Will ignore the error.
  • Add to dictionary - Will add the word that is highlighted to the dictionary.
If you would like to check either a column, row, or number of cells, you can do so by selecting this area first and then pressing Tools followed by Spelling. Interestingly enough, this feature is also available in sheets that were created in the older version of Google Sheets and then updated to the new version.

Looking to learn more about Google Sheets, or other Google Apps? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

October 24th, 2014

AndroidPhone_Oct20_BGoogle's Nexus line of devices promises users a pure Android experience. This means that the operating system is exactly as Google designed it to be, unlike many other Android devices where manufacturers add their own layout and design. In mid October, Google announced not one, but three new Nexus devices that set a new benchmark for what Android can really be.

Android L becomes Android 5.0 - Lollipop

While Google announced Android L earlier this year, little was said about what the full name of the next version of Android would be. The company finally laid speculation to rest with the announcement that the next version of Android will be 5.0 - Lollipop.

This is the first major update to the Android platform pretty much since Android 4.0 was released back in 2011. While the different versions of 4.0 introduced useful features and changes, the overall look of the system has largely remained the same. Android 5.0 will change this, with what is called Material Design, which brings a universal look (user interface) to apps across all devices.

Beyond a new look, 5.0 will introduce a new operating environment and coding that allows apps to run faster and more efficiently on existing hardware. Support for faster and more powerful processors is also being included so over the next few years you can expect to see phones and tablets become even more powerful.

To begin with, Android 5.0 will be available on the newly announced Nexus devices, along with older Nexus devices (7, 7 (2012), 5 and 4), some Motorola devices, and all Google Play Edition devices. The company has not set an official release date for this update, but you can probably expect it sometime in mid-November. Other devices will have to wait until the manufacturers can adopt this version of Android to their systems.

The Nexus 6

Like most other popular devices, there have been solid rumors about the Nexus 6 all over the Internet. True to these ruminations, the 6 will be made by Motorola and will be a large phone - 6 inches in fact. Here is a brief rundown of the important specs for business users:
  • Screen size - The display is 5.96 inches diagonally, with the total size being 6 inches from top-left to bottom-right.
  • Battery - The battery is 3220 mAh, which should be more than enough to see you through a day. Motorola has also included their fast-charging technology which can produce six hours of use from a 15 minute charge.
  • Processor and RAM - The processor is a top of the line Snapdragon 805 quad core 2.7 GHz. There is also 3 GB of RAM, which means there is more than enough processing power to run everything you need.
  • Memory - The device is available with either 32 GB or 64 GB of storage.
  • Price and availability - Unlike previous Nexus devices, this phone starts at USD 650 for the 32 GB version, while the 64 GB version costs USD 700. Pre orders for this device start on the Google Play store on October 29 with the device being released in mid-November of this year.

The Nexus 9

The Nexus 9 is the newest tablet in the Nexus line. Made by HTC, it looks to have been designed to compete directly with the iPad Air. Here is a brief rundown of its tech specifications:
  • Screen size - The display on this device is 8.9 inches diagonally, with the total size being 9 inches from top-left to bottom-right.
  • Battery - The battery is a 6700 mAh, which should be more than enough to see you through a couple of days of use.
  • Processor and RAM - There is a high-quality processor running at 2.3 GHz. There is also 2 GB of RAM, which means there is more than enough processing power.
  • Memory - The device is available with either 32 GB or 64 GB of storage.
  • Price and availability - This tablet starts at USD 400 for the 32 GB version. There is also be a keyboard case, which looks similar to those purchased for Microsoft's Surface. The device is available to pre order from the Google Play store on October 17, with a release date of November 3 of this year.

The Nexus Player

This new Nexus device is the next step in the evolution of the Chromecast, or Google's device-to-TV broadcasting device. Like similar solutions, it allows users to stream content from their devices, or stations like Netflix, onto their TV or HDMI monitors. While at first glance this may not be the most useful device for businesses, there is one feature that could prove popular: You will have the ability to broadcast what's on your device's screen on your television screen.

This includes Chrome tabs, so if you use cloud-based software like Google Apps you can technically use this to stream presentations or to collaboratively work on documents in a meeting format.

Coming in at USD 99 per set, this could be an affordable solution for companies who don't want to invest in a projector, or who already have a television screen in their office. The system went up for pre order on the Google Play store on October 17.

If you would like to learn more about Google's Nexus devices contact us today and we can help you make the right tech decisions for your business.

Published with permission from TechAdvisory.org. Source.