telanova Blog

telanova: the outsourced IT team that feels like your own

Providing advice, consultancy, helpdesk, monitoring and maintenance, updates, upgrades, security: all the things your in-house team would do, but better and at a fraction of the cost and hassle.

We will never give up

You might think that all IT companies are the same but at Telanova we will help your business gain back the time you have lost because of IT issues.

We recently won a new client who had a very serious issue. Every day, every hour on the hour for 15 minutes their whole system would come to a grinding halt. Employees couldn’t send emails, take calls or do their job! Basically, the employees were only able to work for 75% of the day. Their previous IT provider had given up trying to fix this issue.

We ran extensive diagnostics to discover that their anti-virus was causing their server to become non-responsive! We rectified the issue allowing their employees to work 100% of the day.

If you would like to talk to us about how we can help your business please get in touch.

Human integration with technology and systems.

Connecting all the time

Andrés Lucero of Aalto University, Helsinki, Finland recently published ( arXiv:1804.04833 [cs.HC] ) his autoethnography about his period of times in his life that he has voluntarily lived without a mobile phone. Since 1999 he spent two separate periods (2002-2008 and 2014-2017) without a phone. Both related to when he was working in academia and cycling to work. Interesting points to note were that even during these periods he had access to wifi enabled tablets, but the need for authentication codes and secure communications were the key areas that were affected by not having a mobile phone. Additionally in Finland at the age of 7 children receive their first mobile phone and house keys so that they can travel to school on their own.

With two factor authentication heavily reliant on mobile phones either for SMS/text codes or smart phone apps with authentication code production, it becomes more and more difficult to imagine the operation of today’s work environment without a phone. In one situation the service he was trying to use reluctantly ended up emailing the security details to an email address that they weren’t able to verify.

Moving back in to the connected world and embracing all forms of device, including wearable, Andrés Lucero also had to learn how to cope with synchronous and asynchronous forms of communication such as Whatsapp, where in a group things are said and discussed through the night which aren’t for people sleeping to respond to until they want to.

The paper makes for an interesting study, and demonstrates a number of situations where normal life is eased by the power of live connection. Eg. location and travelling directions, location based entertainment and two factor authentication services. The paper also shows how remaining in control of technology can help maintain control of stressors.

For security all businesses should be using two factor authentication where they can, and with smart phones being one of the most popular methods the need for all employees having access becomes apparent. However there are alternatives, if you’d like to discuss please contact us below.

#telanovaReporter

The length of your tweet may be affecting your impact

Length of your tweet

New research ( arXiv:1804.02318 [cs.SI] ) into Twitter messaging has been carried out by Kristina Gligoric of EPFL, Ashton Anderson or University of Toronto, and Robert West of EPFL. Specifically they researched the differences in reactions of the public to tweets since Twitter expanded it’s character limit from 140 to 280 characters.

They analysed the retweets and favourites of almost 6 million tweets from before and after the change by Twitter. They excluded multi page tweets that were more common before the change and also did some analysis of the change of forms of words such as I’m to I am , and as might be expected after the shift there are less shortened wordings.

For most businesses and influencers though the key question is should they keep their tweets in the 140 character traditional style or start expanding their text to create lengthier prose.

After analysing almost 6 million tweets before and after the change, there was a clear answer. The longer the tweet the more successful on average it was, as captured by the number of retweets and favourites. Looking more deeply it was also noted that tweets that were constrained, ie. missed a word or shortened a word to fit the constraint tended to also be more successful. Though no conclusion was defined, the constrained tweets may have been of improved quality and hence why they were more successful, however further research is needed to confirm if the quality was higher in constrained tweets.

Next time you are looking to tweet the news of your latest development, ensure that you use the 280 characters, included some good quality information and make people want to get involved in the tweet.

#telanovaReporter

2018's Emerging Technologies - VR

If you blink, you might just miss them.

In the day and age of digital technology, it's hard to keep track of whats new and whats old. Here's a handy list of new and fast growing trends in the technology industry that you, as a consumer or a business, might benefit from.

Immersive technologies

By far one of the most exciting technologies that is steadily becoming available to consumers over time. Mostly designed and dreamt upon for the uses of gaming, modern Virtual & Augmented Reality has rapidly found more and more uses where the technology can be effectively utilised outside of the video game industry.

KFC were recently in the headlines for incorporating VR as part of their employee induction. Trainees would enter a virtual KFC kitchen, allowing them to learn health and safety, risks and methods without the associated risks of a real kitchen.

Skip Razzio, a clinical psychologist, has begun using VR to treat patients with psychological conditions such as PTSD, re-creating the emotions and feelings of war and helping them overcome them, or Autism, by helping people with the disability learn social skills and how to interact with people better.

The VR industry so far has seen nothing but an exponential curve in growth, from a $129m valued market in 2015, to a predicted $2.9b valued market in 2018. However, the main stunt to further growth is consumer availability. VR products, on a whole, are expensive. Whilst overtime these technologies will become cheaper due to increased competition, there are still only 2 main players in the market: Oculus and Vive.

Until this changes, VR will remain out of the hands of the average consumer and thus a danger to its future growth. Despite this, a future as pictured in the movie 'Ready Player One' is all too real.

Can you guess the next emerging technology of 2018? Find out next week!

7 questions to ask yourself as a business owner after 150 million individuals have their data leaked

150 million individuals have their data leaked by a Fitness App. Data leaks are a common issue that continues to go on and on. Each time more and more money and time is lost by people, companies, and governments in fixing, patching, strengthening and understanding why it went wrong this time.

Let’s look at the positives on the latest data breach

  • The data breach was reported to all users within 4 days of the hack being discovered, and that was only a month after they believe it occurred
  • The passwords were all stored using encryption, although some the encryption was a lower level than it could have been.
  • Only usernames emails and encrypted passwords were exposed, no personal information such as date of birth, credit cards, height or weight

As yet the Under Armour (who own the MyFitnessPal app) have yet to confirm the cause, although speculation is that it was due to user clicking an infected email attachment. User training on security is becoming more and more important, if you don’t have a training program for your team that is run at least annually you are putting your customers at risk. As firewalls and antivirus and spam detectors have become more and more robust, the hackers are also adapting with more and more elegant and creative ways to get the link to the user.

Things to think about as a business

  • If you allow any (and we mean any) employee to connect their own device to your wifi, is that wifi separate from the corporate network ?
  • If you have any corporate mobile devices, are you monitoring the patch, firewall and antivirus status of the devices, what access to other physical ports are allowed?
  • What intelligent devices do you have on your network that are connecting and talking with the outside world, are they on a separate network ?
  • Are there any physical network cabling / ports in public places, are they disconnected or protected ?
  • How are you monitoring the training of staff on their security awareness, is cybersecurity awareness part of a new starters induction ?
  • Consider unwanted people that might enter the building, are staff aware of which doors should be kept closed ?
  • How would you detect a data breach ?

If you don’t have the answer to these 7 questions our security consultancy services are available to assist.

#telanovaReporter

Email Facebook Google LinkedIn Twitter

We use cookies to provide you with the best possible experience in your interactions on our website

You agree to our use of cookies on your device by continuing to use our website

I understand