Blog

December 18th, 2014

SocialMedia_Dec15_BSocial media has come to play a large part in the content marketing campaigns of many businesses. While creating a solid presence can be beneficial for businesses, owners often struggle to get their content shared. There are many reasons why, but here are four main ones that you should be aware of and what you can do about them.

1. The vast majority of people are hesitant to share content

According to a study conducted by Carnegie Mellon University and Facebook over a 17 day period, approximately 15.3 billion comments and posts were written but were then deleted and not posted on Facebook alone.

While the reasons will have been varied, the numbers highlight that the vast majority of users are sensitive to what they post on Facebook, and most most likely other networks as well. What does this mean for businesses? Well, you need to ensure that the content you are posting offers value to not only your audience, but their audience as well.

Think about when you have shared content on any network. You probably didn't do so 100% for yourself, but instead shared the content or created a post so your audience would interact with it, or possibly get something out of it. Think of this as the "hmm, that's interesting, other people will like it too, so I'll post it" mentality. By sharing content others enjoy or respond to you get the benefit of increased recognition.

If you can create content that gets people to think this way, there is an increased chance that they will share it.

2. Facebook users want to be seen in a positive light

According to a study carried out by INC. 80% of respondents share content because it shows that they are being a good friend to those they care about. People use social media to foster good relationships and connect with those they care about. And if somebody regards your posts as potentially able to tarnish their image on social media, they won't share it.

Businesses looking to capitalize on this need to try to create content and campaigns that help users better relate to one another. Combine this with the above example of creating interesting-to-share content and you will be more likely to see an increase in shares.

3. Content doesn't fit our salient identities

Because social media has become an extension of society, many experts apply common social science principles to it. The most commonly applied theory is of the five identities (relational, personal, social, superficial, and collective) that determine how people behave in a certain situation.

If you are posting content that doesn't fit with an an individual's current identity then it's not going to be shared. So, how can businesses capitalize on these changing identifies? One effective way is to get to know your main target audience; how they act and react to certain social cues, and then create content to fit with this behavior.

For example, if your target group for posts is parents, then using language and content that triggers parental instincts could increase shares as parents associate better with it.

You might want to widen your focus too and try developing content that capitalizes on different identities, tracking what works best.

4. Content doesn't mesh with a user's values and goals

The same INC. study found that after being a good friend, 63% of users surveyed noted that they were more likely to share content that reflected their goals, values, and dreams.

How can a business capitalize on this? The best way is to get to know your audience. Look at their posting and sharing habits and the type of content they share on a regular basis. This may change over time, but you will see patterns evolve for different groups. If you can develop and post content that reflects these main goals and values then you are more likely to see your content being shared. Try different approaches and keep in mind who you are developing content for.

If you are looking to learn more about social media, contact us today to see how our systems can help you integrate it with your business success.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
December 17th, 2014

Office365_Dec15_BCloud solutions have become an integral part of many businesses. If you are looking to implement a new cloud solution, one of the best places to start is with Microsoft's Office 365. This business-oriented platform has a lot to offer users, however, as with all other Microsoft products, there are a wealth of plans to select from. Here is an overview of the most common versions.

A brief look at Office 365

The easiest way to classify Office 365 is as a cloud-based version of Microsoft Office aimed at businesses. This subscription-based service offers businesses all the productivity software they need plus a solid platform for their communications. Think of Outlook combined with Lync (or Skype) and Office apps, all of which are accessible via your browser, or can be installed on your own servers.

Beyond this, there is a supporting layer called SharePoint that links all of these apps together, thereby giving you a central place to store all of your documents which can then be collaborated on using various Microsoft apps.

As noted above, Office 365 is subscription based. The business-oriented subscriptions are broken down into two main categories: Business and Enterprise subscriptions. Of course, there are other subscriptions for other categories like Education and Government, but we will focus this overview on the two main small to medium business categories.

Business subscriptions

There are three plans under the Business subscription category:
  • Office 365 Business Essentials - Comes with online versions of Office apps (Office Web Apps), Lync for business, online storage through OneDrive and a corporate email address. This plan is ideal for businesses who don't need full versions of Office apps. Plans cost USD 5 per user, per month on an annual commitment.
  • Office 365 Business - For businesses who need installable versions of Office along with cloud-storage through OneDrive. It does not come with hosted email or business communication tools like Lync. If you already have hosted email, and are just looking for Office apps, then this could be a good plan for you. Plans cost USD 8.25 per user, per month on an annual commitment.
  • Office 365 Business Premium - This subscription is for businesses who want the whole package. It combines all the elements of the above plans into a solution which is ideal for smaller businesses or even enterprises. If you are looking for a full solution, then this plan could be the best fit for your business. Plans cost USD 12.50 per user, per month on an annual commitment.
It is worth noting here that all three of these plans have a limit of 300 users per plan, giving you a maximum of 300 subscriptions.

Enterprise subscriptions

These subscriptions are aimed more at larger organizations, or businesses who need more control over Office 365 and access to features like Business Intelligence, Enterprise Management apps, and even business portals. As with the Business subscription category, there are three main plans in the Enterprise subscription category:
  • Office 365 Enterprise E1 - Comes with online versions of Office apps (Office Web Apps), Lync for business, online storage through OneDrive, a corporate email address, and a corporate video portal. This plan is ideal for businesses who don't need full versions of Office apps. Plans cost USD 8 per user, per month on an annual commitment.
  • Office 365 Pro Plus - This plan is for businesses who need installable versions of Office along with more advanced apps like Access, and cloud-storage through OneDrive. It does not come with hosted email or business communication tools like Lync. If you already have hosted email, and are just looking for Office apps, then this could be a good plan for you. Plans cost USD 12 per user, per month on an annual commitment.
  • Office 365 Enterprise E3 - This subscription is ideal for companies who want absolutely all Office 365 has to offer. This includes all of the above, plus advanced business intelligence tools, compliance protection, enterprise management, and more. If you are looking for a full solution, then this plan could be a good match for your business. Plans cost USD 20 per user, per month on an annual commitment.
Businesses who subscribe to Enterprise plans can sign up for an unlimited number of subscriptions.

Which plan is best for my business?

This is a tough question to answer outright. What we recommend is contacting us. As experts in all things Microsoft, we can work with you to not only help you pick the plan that is best for your business, but ensure it is installed correctly. This can help further reduce costs and increase productivity.

Contact us today to learn more about how Office 365 can enhance your business.

Published with permission from TechAdvisory.org. Source.

December 16th, 2014

GoogleApps_Dec15_BThere is a good chance that when you work in your browser, you usually have a number of tabs constantly open in the same window. For example, you may have Gmail open, Google Drive, etc. If you close the window, you will no doubt need to open the tabs again and again, which can be frustrating. To make browser use easier, Chrome has created the Pin Tab feature.

What is Chrome's Pin Tab feature

When using Chrome's tabs, you will notice that tabs open from left to right. When you browse the Internet, you likely open the most used or important sites first, which means they will open to the left. The problem with this is we often have so many tabs open that it can be tricky to find or quickly navigate to the tabbed sites we use the most.

One way to solve this problem is by pinning these to the tab bar. When you do this, the tab will be pinned to the left-hand side and made smaller. This makes it easier to find your important tabs and keep these sites and tabs more organized.

How do I pin tabs?

If you would like to pin tabs:
  1. Open the site you would like to pin in a new tab.
  2. Right-click on the tab.
  3. Select Pin Tab.
This will shorten the tab to just the site's icon and move it to the far left of the tab bar. Pinning other tabs will also move them to the left, beside the other pinned tabs. Any new tabs will be opened to the right of pinned tabs.

It is important to note here that because the pinned tabs are smaller any live tabs, such as Gmail's unread message counter, or Facebook's chat reminder, will no longer be updated. For most tabs this is not an issue, but for tabs like Gmail you will have to physically click on the tab to check if you have any new emails.

How do I unpin or move tabs?

You can unpin tabs by right-clicking on the pinned tab and selecting Unpin Tab. You can also move the order of pinned tabs by clicking and holding on the pinned tab you would like to move and moving it left or right. As you do so, you will notice other tabs change order.

If you would like to close the pinned tab, either unpin it first and then press the X at the right-hand side of the tab, or right-click on the tab and select Close Tab.

Looking to learn more about using Chrome? Contact us today and we can show you how to enhance your business functions.

Published with permission from TechAdvisory.org. Source.

December 11th, 2014

VoIP_Dec11_BThe holiday season has begun and regardless of your location and industry, there is a good chance that you will see an increased call volume this month. In order to prepare, you should ensure that your VoIP system is ready for this call boost. To help, here are some useful tips that will make sure your VoIP systems are ready for anything.

Establish VoIP system monitoring

Before you know whether your systems are ready for an increased call volume, you should establish monitoring tools that allow you to keep track of call volumes and how the systems hosting your VoIP solution are faring. If you notice that a spike in call volume during peak hours leads to decreased call quality, or perhaps an increased load on systems, then it may be a good idea to invest in a new solution that can help carry this extra burden.

Because this is the holiday season, and your staff and even IT providers may be away on leave, a monitoring solution can be helpful in predicting when issues may arise. You and your IT team can then help prepare for an increase in call volume and any problems that may crop up when they are away from work. This ensures that your systems won't go down when you need them most.

Check your VoIP equipment

Sometimes, problems with VoIP don't have anything to do with your service provider or even the underlying servers that host the solution, but the physical VoIP lines and phones themselves. One common issue with VoIP is that if equipment is too close to other VoIP equipment, you may see a degradation in call quality.

Therefore, you should take care to ask your employees if they have noticed lower call quality lately, especially if two VoIP devices are close to one another. If there have been issues, moving them further apart should clear this up.

Beyond this, take the time to inspect all cables and connections to ensure they are in good condition and able to deal with the increased wear and tear the holiday season can bring. If equipment is looking a little past it, now may be the time to look for new devices and solutions that can help boost your communications.

Set data priorities on your router

Most modern business routers have an important feature called QoS, or Quality of Service. This allows users to set bandwidth limits for different activities and even create priority lists. Because you will likely be getting more calls during the holiday season, it is a good idea to ensure that the extra bandwidth will be there when you need it.

Because your router is also in charge of assigning bandwidth to your VoIP solution, using the QoS feature is a good way to ensure that calls are receiving the bandwidth they need to remain clear. Take a look at the way data and bandwidth is being used in your network and set limits on non-essential activities that may be using higher amounts. For example, it may be a good idea to reduce the bandwidth assigned to streaming services and apply the extra percentage to your VoIP solution.

Work with an IT partner

These tweaks and updates can be time consuming and a bit of a chore to carry out, especially if you are not a tech expert. What we recommend is contacting us, so our VoIP experts can work with you to ensure your network is configured for the higher call volume, equipment is working, and servers are ready. We can even offer suggestions on better systems that can improve communications while reducing costs. Be prepared for the holiday season, contact us today.
Published with permission from TechAdvisory.org. Source.

Topic VoIP General
December 10th, 2014

iPhone_Dec08_BThe iPhone has become an essential tool for small to medium business owners. While there are a ton of useful features and apps that make business and communication easier, there needs to come a time when we simply take a break from all the calls and notifications. That's where the Do Not Disturb feature comes in, which runs on all iOS 8 devices.

What is Do Not Disturb?

Do Not Disturb is a handy iOS 8 feature that when enabled, silences all notifications, calls, and alerts that you usually get coming through when the device is locked. You can either turn it on and off manually, or schedule a time for when it is to be activated. If your device is unlocked, e.g., you are using it, notifications will usually still trigger.

Turning Do Not Disturb on

To turn this feature on simply:
  1. Slide up from any screen on the device to open the Control Center.
  2. Tap on the crescent moon icon at the top of the Control Center.
This will turn on the Do Not Disturb feature. You should see a crescent moon icon appear in the menu bar at the top of your device's screen indicating the feature is activated. To turn it off, open the Control Center and tap the crescent moon icon again so that it disappears from your screen.

Setting a Do Not Disturb schedule

If you would like to schedule a time where your device automatically puts itself into Do Not Disturb mode, simply:
  1. Open the Settings app on your iPhone.
  2. Tap on Do Not Disturb.
  3. Slide the radio beside Scheduled to On (green).
  4. Set a time to enable this feature.
As with the manual triggering of this feature, you will see a crescent moon icon in the top menu bar of your device when it is active.

Changing feature settings

If you tap on Settings and then select Do Not Disturb you will also be able to tinker with the settings related to this feature. The options you will see include:
  • Manual - Allows this feature to be manually enacted via the Control Center.
  • Scheduled - Schedule a time when this feature will be automatically enacted.
  • Allow Calls From - Pick which contacts to allow calls and notifications from so that these sound even when Do Not Disturb is active.
  • Repeated Calls - Set whether multiple calls in a short amount of time will ring when the feature is active. If enabled, two calls from the same person in less than three minutes will cause the device to ring.
If you would like to learn more about using the iPhone for business, please contact us today to see what difference we can bring to your business.
Published with permission from TechAdvisory.org. Source.

Topic iPhone
December 9th, 2014

GoogleApps_Dec08_BA growing number of businesses around the world have come to rely on Gmail as their main email platform. Simple to use, always up-to-date, and accessible from anywhere, it has a lot to offer users. Use it for a while and you will notice that messages and responses based on one message will be threaded together into one long message. Here is an overview of how this works in Gmail, and how you can change this behavior.

What is email threading?

When email was first created, email platforms treated each message that was sent or delivered as a separate message, even if it was a reply to a previous message. Over time, email became less about individual messages and more about conversations. Look at your emails and chances are that many individual emails are really about one core message or connected to one main conversation.

If you use Gmail, this conversation, based on an original message, is threaded together. This means that you have one conversation (the main email) with many messages going back and forth. Receive a new message and it is added to the conversation at the top of the thread. If you want to see older messages you simply scroll down the thread once it is open.

While this is a great way to display messages, in a compact way that cuts down on the number of emails in your Inbox, longer threads can become unruly, making it more difficult to actually find a specific message because it is in the midst of a thread. Beyond this, some users prefer to have non-threaded messages, with all messages listed separately.

How to unthread your emails

To unthread your emails simply:
  1. Log into your Google account and open Gmail.
  2. Press the cog in the top-right of the screen.
  3. Select Settings from the drop-down menu.
  4. Scroll down to Conversation View.
  5. Tick Conversation view so that it is off.
  6. Press Save Changes at the bottom of the screen.

What will happen when you do this

Once you press Save Changes you should be taken back to your inbox and you will notice a few changes. Firstly the number of emails in your Inbox will be higher, and secondly, messages that were threaded will now be added individually, based on when they arrived into your Inbox. If you are looking for these messages, you will need to either scroll through your Inbox or search for them using keywords and other search operators.

It should also be noted that when you reply to emails, a new message will be sent to both your sent folder and main Inbox, but the replies will not show up in the body of the message you replied to.

If you are looking to learn more about using Gmail in your office, contact us today to see how we can help employ the right tech tools to enhance your business efficiency.

Published with permission from TechAdvisory.org. Source.

December 9th, 2014

Facebook_Dec08_BSocial networks have become a large part of modern communications and it is not uncommon for users to log onto sites on a daily basis. Networks like Facebook are so popular that some business owners and managers are concerned about how much valuable work time is spent on the site. In response, the social media giant is aiming to turn around this negative feeling from employers with a new social network aimed at businesses and potentially called Facebook at Work.

What is Facebook at Work?

In late November, Facebook announced that they are developing a new social network which may be called Facebook at Work. As you can guess by the clue in the title, this is going to be a business-oriented venture that will bring the popular social network, or elements of it, to the workplace.

For many businesses, this popular social network is not really a part of every business operation. Sure, marketing and sales may use this platform, and others, as a way to reach out and connect with customers, but few organizations are known to use Facebook internally as a communication and social network for employees.

Those who do use the network in the office often use their personal accounts and have noted that they would like an easy way to separate work from personal life, while still remaining on the network. Many businesses would also prefer that employees didn't bring their personal lives and Facebook accounts to the office because this can lead to breaches in privacy and even important data being compromised, especially if a personal account is hacked.

The best way to think of this new platform is that it is Facebook strictly for work. While it is still in the development stages, some interesting details have emerged. There is no official name for the network, thus far, but sources at Facebook have noted that the codename for the product is Facebook@Work.

What Facebook@Work will look like

From what we can tell, the network will look and work much the same as the existing version of Facebook. Users will be able to create profiles, join groups, post on each other's News Feeds, and even send messages using the popular Facebook Messenger. Where it will differ is that it will have collaborative tools that allow users to share and work on the same documents.

This network will be completely separate from the personal Facebook site, with users having a different password and username. Information between a personal and work account will not be shared either. This should make the network more secure, or at least minimize the use of personal accounts for work-related tasks.

What we don't know

We do know that Facebook@Work, or Facebook at Work, is currently being developed by a London-based branch of Facebook who seem to be also acting as the main testers. However, we are unsure at this time if the network is being developed strictly as an internal network, which will be used only within a company, or if it will be more like LinkedIn, where it will allow you to connect with similar professionals.

Interestingly enough, Facebook has been using its own network and various groups as a major part of their own internal communication tools amongst departments. For example, when an employee joins a new department they are added to a secure group and group chat where updates are posted, questions are asked, and work is supposedly assigned and agreed upon. It could be that the company is developing something along these lines for external release too.

We don't know exactly when this network will be introduced, but you can be sure that it will be debuted sometime in 2015, possibly with a rollout in the next year. If your business uses social platforms, or is looking to integrate social media in the near future, this business-oriented social media platform could be worth keeping your eyes on.

Stay tuned as we will be covering this further in the future. Meanwhile, if you have any questions about how best to utilize Facebook in the office please contact us today.

Published with permission from TechAdvisory.org. Source.

December 3rd, 2014

iPad_Dec2_BThis year, as in recent years, one of the hottest gifts for the holiday season is the iPad. If you receive a brand new iPad for the first time then that is truly an awesome present, but you may already have one. If you do, then you may not be able to install apps on your new device at first because your iTunes account already has other devices linked to it. This means you will need to deauthorize a device before you authorize your new one, and here's how you can do that.

First, understand what authorizing your device is

When people and Apple experts talk about "authorizing your device", what they really mean is linking it with iTunes and the account you use for this on your computer. Once you do this, you can download already-purchased media and apps onto a new device without having to pay for the content again.

The way iTunes works is that there is usually a limit on how many devices you can download apps and media onto at the same time. Any purchases can be installed on 10 devices or five computers via iTunes at the same time. If, for example, you have an existing iPad for which you have already purchased apps via iTunes, and you receive a new device, you will need to authorize the existing iPad before you are able to download apps onto this new one.

If you have more than 10 devices or five computers authorized and want to add another, you will need to first deauthorize one device. Similarly, if you are giving an iPad away, it is a good idea to make sure it is deauthorized before you give it away or the new user may have access to your iTunes account.

Second, how do you deauthorize an existing device?

This process is actually fairly easy, but you will need to do it from the PC or Mac you use to sync your iPad with iTunes. To do this:
  1. Launch iTunes on a computer that it is installed on and log into the account you use to purchase apps for your devices.
  2. Click on your name. This is located at the top-right of the window. If you see Sign In, click that and log into the account you use on your iPad.
  3. Select Account info from the drop-down menu.
  4. Enter the password for your account.
  5. Scroll down and click on Manage Devices which is under iTunes in the Cloud.
  6. Click Remove beside the device you would like to deauthorize.
  7. Press Done.
When you do this, the apps you've paid for should either be deleted automatically from the device, or become inaccessible the next time the device syncs with iCloud (which is responsible for linking devices in iTunes).

How do you authorize your new device?

If you receive a new device this holiday season, authorizing it is as simple as logging into your Apple account using the username and password you have used in the past to purchase apps and media.

Once this is done, go into the App Store on your new device, log in, if you haven't already done so, and tap on Purchased. You should be taken to a list of all apps and media that you have purchased and which are still available on the App Store. Tapping on any of the apps and then hitting Download will install the selected app on your new device. If you are above the limit of devices on your account, you will see an error message telling you there are too many devices with the app installed. You will then need to deauthorize an older device before proceeding.

If you would like to learn more about your new iPad, or how Apple products can be used in your business, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic iPad
December 3rd, 2014

Security_Dec01_BWhile there are many different types of malware out there, the good news is that with many threats we know where they come from and their purpose. Recently, news broke of a new form of malware called Regin that is causing quite a stir in the security community, largely because it's tough to deal with and not much is actually known about it. This has naturally caused some security concerns for businesses, but what threat does this malware really pose for companies?

What exactly is Regin?

What is most interesting about Regin is that a number of security experts seem to not really fully understand it. They know that it exists, they know it is complex, and they know it is one of the most advanced pieces of malware ever created. But, they don't know what exactly it does, or where it comes from.

What we do know is that Internet security firm Symantec is credited with first bringing Regin to public attention, and that it has been around since at least 2008. So far, the company has said it is similar to the Stuxnet virus that was supposedly developed in (or by) the US and used to attack and subvert the Iranian nuclear program.

Regin is known to infect Windows-based computers and at its core is a backdoor trojan style of infection. From detected infections it is looks like the purpose of the malware is not to steal information but to gather intelligence and facilitate other types of attacks.

What makes this malware so powerful and disturbing is that it is much more advanced than other infections. Using various encryption methods it can hide itself extremely well, making it difficult to detect. It can also communicate with the hacker who deployed it in a number of different ways, thus making it a challenge to block or stop. As a result, it is far from easy to actually figure out what exactly this malware is doing and why.

Who has been infected?

According to various security experts we have been able to compile a list of companies and organizations that have been targeted to date. These include:
  • Telecommunications companies
  • Government institutions
  • Financial companies
  • Research companies
  • Individuals and companies involved in crypto-graphical and mathematical research
At the time of this article, no known attacks have been carried out against companies in the US, Canada, or the UK. The main countries targeted so far have been Russia and Saudi Arabia, along with a smaller number of infections in Malaysia, Indonesia, Ireland, and Iran. A total of 10-15 countries have been targeted since the malware was first discovered in 2008.

Is this a big deal for my company?

Just because your company is operating in a country that hasn't been affected thus far, doesn't mean that you aren't at risk of being attacked by this malware in the future. If you operate in any of the industries or sectors listed above, you could still be at risk, especially if you do business with clients in infected regions.

For now, however, it appears that Regin is only infecting larger government bodies and large companies outside of North America and much of Europe, so the chances of you being infected are relatively low. Although as with any threat, this can change at any moment.

What we recommend is that you ensure your antivirus and antimalware solutions are kept up to date and always switched on. You can rest assured that eventually experts will learn more and block this malware from infecting systems. Beyond this, working with an IT partner, like us, who can ensure that your valuable data and systems are secure, is also be a good idea. The same goes with watching what you download and any emails you open. If you don't know or trust the source, don't download any program, open an attachment, or read an email connected to it.

Looking to learn more about the security of your systems? Contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
December 3rd, 2014

AndroidTab_Dec01_BWith the festive season just round the corner, many of us are looking for the right gifts to give. Android tablets will undoubtedly be a popular present this year, as they have been in recent years. The question is: How do you find the right tablet to give as a gift? Here are some factors to consider when you set out to find the best device.

Consider your budget

The great thing about Android is that there are tablets available for a wide budget range; from the ridiculously affordable, yet highly praised, Amazon Fire HD 6 (USD 99 on Amazon.com), to the top-of-the-line Samsung Galaxy Tab S (USD 350-400 in stores). You firstly need to set your budget.

Look at reviews online

There are a ton of websites dedicated to reviewing tablets and other mobile devices. Take for example the well known Engadget, or Trusted Reviews. Sites like these generally give a good overview of the new and most popular devices out there. Pay close attention to the criteria used though, as some review sites tend to only look at basics such as battery life and design, without going too deep into the actual usability.

It is also important to look at actual user reviews. The best place for this is Amazon.com, as almost all reviews of devices on the site are submitted by users. While some reviews may be overly positive or negative without actually revealing reasons, generally speaking they provide an accurate real-life picture.

What will the tablet will be used for?

Many tablets offer special features and functions aimed at different types of users. For example, some offer increased security and encryption that is ideal for the business user, while others may offer features such as pen support which turns the tablet into a drawing pad. If the recipient is likely to be using the tablet for work, then your search should focus on specific, business-oriented devices.

Who will be using the tablet?

Tablets running Android 4.4 (KitKat) and Android 5.0 have the ability to establish different profiles for different users. So, if you know that the tablet will be used by a variety of people then it would be best to purchase a tablet incorporating either of these versions.

If you know that children will be using the tablet, there are a number of apps with features that set the tablet up for children. For example, some will block the Google Play store, and any apps that are deemed unsuitable for children. It might be a big help if you install this beforehand.

What is the technical ability of the user?

It's true that almost every tablet is designed to make it simple to pick up and figure out. But some tablets are aimed more at specific users than others. Take for example Google's Nexus line, which is aimed at users who want a simple tablet experience and the most up-to-date software. Users with more tech experience generally find the Nexus line more preferable.

Other tablets come with super simple setups and many popular apps pre-installed, which could make them more suited to users who may not know much about Android, or simply just want to pick up their tablet and go.

Look at durability and features

As with most tech-related purchases, you generally get what you pay for. So, if you want a tablet with top-of-the-line features like a great display, fast processing speeds, and LTE/Data connections, you are likely going to have to pay more.

A good starting point is to look at the questions you answered above about who will be using the device and what they will be using it for, then look for a tablet with features that support or enable this and that has positive reviews. While it may be tempting to stick with brand new tablets only, be sure to look at those released in the past year to year and a half as well. For example, the terrific Nexus 7 tablet (2013 version) is still a great option for many users, not to mention the fact that it is available at an affordable price. Manufacturers like Samsung also have a number of great tablets available with a wide variety of features.

Almost above all else, the overall durability of the device is important. If you purchase a tablet with flimsy construction, there is a good chance it will soon break or fall apart easily. Again, online reviews often focus on the build quality, so these could be a good starting point. Also going to the store and physically trying the devices out could go a long way in helping you pick the best one.

If you are struggling to find the perfect tech gift or Android tablet this holiday season, contact us today to see how our experts can help you find what you need.

Published with permission from TechAdvisory.org. Source.