Technology

Productivity Apps Aren’t Just a Fad

Businesses need to maximize productivity any way they can. Some look to software to make this happen. When searching for productivity software, it may seem like you are looking at the same thing over and over again. While we admit that many productivity programs are similar, it’s important that you acquire the software that will give your team the tools it needs to succeed. Let’s take a look at how you can find the right productivity apps for your business’ needs.

Productivity in Software

Productivity software isn’t a flashy item. Every business needs certain apps to do business and most businesses need the same apps. There are a lot of options to choose from, and many of the options might seem pretty similar. What’s important is that you get the tools your business needs. 

Productivity software, which is generally made up of a word processor, a spreadsheet program, a presentation software, note-taking software, and other useful task management tools, isn’t much different from one to another. What is different—and makes a difference—is how the apps are deployed and how they are managed by the developer. It’s fair to say that you get what you pay for, and some productivity apps are just stronger than others. 

What Should You Look For?

When trying to sort out which productivity apps to use, you obviously will want to consult your budget and your needs. As we mentioned above, most word processors are going to do the job you’d expect out of a word processor, but with more innovative solutions, you will get more options that will help your overall productivity. That’s extremely important. Let’s take a look at some variables you should consider:

Reliability 

If your software isn’t reliable, it isn’t worth it, period. Reliability can be measured in several ways. Is it still being developed consistently so you know it isn’t a security risk? Does it have the options you need? Is it easy to use and won’t take a long time to get the hang of? Some apps will promise you benefits that you will never see, but what you can bank on is if the applications cause you a steady stream of problems, you’ve probably made a bad choice. 

Interoperability

If a lot of your team is working remotely on their own computers, you may find that not everyone is going to have the same OS, the same chipset, etc. You will need any productivity app that you choose to work on several different systems. This includes mobile devices. You may think you’re getting a great deal, but if a handful of your workers are working on macOS and the software isn’t compatible with it, you’re going to be kicking yourself. 

Accessibility

As many people continue to work remotely, or in some type of hybrid work system, having apps that work from anywhere is extremely important. Today, a lot of options are available as Software as a Service (SaaS) offerings to help businesses avoid the expense of setting up their own cloud server or remote access tools. Either way, you need to be able to get your remote workers the tools they need to be productive.

Collaboration Features

Speaking of productivity, a lot of businesses are asking their people to do more. We are in unprecedented times and business decisions have to be made down to the dollar. When the productivity software your business uses has collaboration features built-in, it can make a world of difference. Workers can work in the same file, share files, and consistently stay up to date on workflows. A lot of the productivity suites available will also come with some form of project management software. This is a good way to oversee your team’s progress on a project and work right alongside them in real-time. 

If you are looking for the latest software to boost productivity for your business, our technicians can help. Give us a call at 334-834-7660 for more information today. 

 

The Federal Communications Commission is Evaluating Mobile Broadband

Broadband Internet access is a critical consideration for today’s world, considering how much of daily life and business is now conducted online. Having said that, Internet access is still far from a given. In the United States, the Federal Communications Commission wants to work to fix this—but to do so, they need data. To help collect this data, the FCC wants you to install a speed test application on your smartphone.

The Importance of Broadband Access

Consider how prevalent the Internet is in everyday life right now: more and more is now handled online. This makes it challenging for many people in areas where broadband Internet connectivity is limited (or even nonexistent) to do very much at all—let alone shop, communicate, or as we tend to focus on, work remotely.

The past year or so has made the severity of this lack starkly apparent, with many people and businesses struggling under their current connectivity limitations. This is part of the reason that the FCC is reinvigorating an application that was originally launched back in 2013 and asking the public to install it on their mobile devices.

The FCC’s App

This application, fittingly called FCC Speed Test, will assist the FCC in evaluating which areas have the most prescient need of better Internet service quality, enabling them to more effectively fund the areas that need more help. Available on both Android and iOS, this app tests your mobile device’s upload and download speeds, as well as its latency, on either a Wi-Fi or cellular connection. By default, these tests take place once every 24 hours—although you can configure these tests to occur when it is most convenient, and how much data that can be consumed during these evaluations.

This app also allows you to test your connectivity speeds, plotting them out over time and by geographic location. In terms of privacy, the app collects a few different identifiers—location, IP address, operating system, device type, and ISP—but no personally identifiable details are recorded.

You’re also able to complain about your Internet speeds to the FCC directly, enabling them to collect even more actionable data.

Check out the FCC’s FAQ page about the application to learn more.

Hopefully, this resurgence in interest in accessible and equitable Internet access will prove fruitful, bringing the utility of the Internet’s full capabilities to more people and organizations. In the meantime, we’re here to help companies do as much as they can with the IT that is available right now. To find out what your technology could be helping you accomplish, reach out to Jackson Thornton Technologies at 334-834-7660. 

 

A Document Management System is the Modern Filing Cabinet

Do you realize how much paper you use each year? Do you realize how much paper you have stored in your office? Do you realize that none of that is necessary? Today, digital filing systems as a part of a document management strategy can keep you from wasting your business’ resources on paper, filing, and printing. Here’s how:

Introducing a Document Management System

What if a file cabinet could:

● Independently sort out and organize the files it contains

● Work with your other business solutions to put these files to their proper use, on a variety of devices

● Simplify collaborative processes

● Assist you in your business continuity preparations

● Pull the files you are looking for via a simple search interface

● Protect the files you have stored in it, while ensuring you remain compliant to industry-based regulations

● Enable secure access for your remote workers

All that is possible by integrating a Document Management System into your business’ IT infrastructure. Not only can you get all your documents from almost anywhere at any time, you can cut down the substantial costs associated with file storage and retrieval. 

A cloud-hosted DMS can cut document retrieval time and storage costs, dramatically. It’s also a massive benefit for those workers who need access to paper documents, but work outside of your business. Remote work is more prevalent today than ever before and giving your staff the ability to have anytime, anywhere access to any file they need can be very beneficial for your workers, your customers, and your bottom line. 

If you would like to learn more about how a comprehensive document management system can help your business cut costs and give you remote access to files that you could only access by going to your office before, call the IT experts at Jackson Thornton Technologies today at 334-834-7660.

 

The FCC is Taking Measures to Assist with Internet Connectivity

Whether you’re referring to an individual’s personal needs or their work-related responsibilities, the Internet has become an essential component to most processes. Unfortunately, financial limitations often make sufficient connectivity unattainable for many. This is why the Federal Communications Commission (FCC) stepped in last month to provide some assistance.

What the FCC Has Done

On Thursday, February 25th, the FCC unanimously voted to give low-income households a discount on broadband internet service as a $3.2 billion part of the $900 billion that Congress earmarked for coronavirus relief in December. With up to $50 available to these households (or $75 for those on tribal lands) each month and a one-time $100 discount on a computer or tablet, this program will hopefully assist people in staying safe as the pandemic drags on.

Considering that the average bill for stand-alone broadband service was calculated to be around $66 per month by the Wall Street Journal, it should come as no surprise that this is too much for many households to swing. Laying the numbers out like this makes it clear that the Internet is a costly investment, even in the best of times.

The list of eligible households covers those that are already receiving low-income Internet benefits or pandemic relief recipients, as well as those who are eligible for free and reduced school lunches, Medicaid, SNAP, and Pell Grant recipients, and anyone who found themselves unemployed by the pandemic.

Set to open up in a few short months, this program isn’t without its flaws. First of all, the $3.2 billion won’t last very long when you divide it up amongst 117 million households that meet the eligibility requirements. Once that $3.2 billion is gone, the program is slated to end.

Deeper Connectivity Issues

This program also does little to address another, arguably larger issue—the fact that millions of families don’t have any reliable means of accessing broadband at all. With so many now working and learning remotely, we’ll likely see some considerable impacts due to this coming to the surface.

While the Federal Communications Commission has estimated that 18 million people lack reliable enough connections to access the Internet from home, the method they used to measure would allow these figures to be inaccurately skewed.

The reason is this: these figures are based on ZIP code-based census blocks. In order to be counted as broadband-compatible, only a single household needs to have such Internet services available within the block. However, in sparsely-populated areas it isn’t uncommon for census blocks to stretch hundreds of square miles, indicating that this metric is far from effective. Hopefully, this discount will be the first step to a more accessible Internet service with more equity for all, as the need has never been more well-defined.

Here, we’ll turn it over to you: are these steps the start of effective change? 

 

Solid Data Recovery Strategies Can Get You Through Tough Situations

As most people know, data backup is important, and when things go wrong you’ll be glad your business has it. The thing is, it’s not enough to have a copy of your data when you need to restore it, you’ll also need a recovery strategy. This is because getting your data back working for you is arguably as important as any other part of the process. Today, we’ll take a look at data recovery strategies that will get your business back on track after a disaster.

Defining “Disaster”

The “disaster” could be any type of event where your business loses data. It doesn’t have to be a total ruiner like a fire or flood. It can be something as benign as someone deleting a file or it could be something as serious as a full-network ransomware attack. There are many different scenarios where you can lose data and if your business isn’t ready for one, it will be the one that will cause major issues when it happens. Let’s go through some of the considerations you will have to make when strategizing your data recovery platform and how recovery impacts businesses.

SMBs and Data Loss

Small and medium-sized businesses (SMBs) are the ones that are primarily hurt by data loss. Larger organizations usually have the capital to invest in a full-scale business continuity platform. If an SMB deals with data loss, it becomes extremely important that they can get that data back quickly and keep their business running effectively. 60 percent of SMBs that have a dramatic data loss incident shut their doors within six months, making it essential to have a strong strategy. 

Here are some tips to create yours:

The 3-2-1 Rule

The 3-2-1 rule is a policy that builds stable redundancy of a company’s data and computing assets. The organization effectively keeps three separate copies of data. Two of these copies are kept onsite with one copy stored offsite. We suggest using the cloud to store your offsite storage. Our backup and disaster recovery (BDR) service allows for companies like yours to follow the 3-2-1 rule and keep your data ready for recovery. 

Rapid Recovery

If you have a backup plan in place, but don’t have a strategy to recover it fast, it’s not doing your company any good. To maintain continuity, you will need your business’ data. The BDR can help you manage your backup and recovery processes to ensure that you can get back up and running fast if you deal with some data loss. 

Testing Backups

The best way to ensure that your backups are working correctly is to consistently test them. No situation could be more frustrating than having a backup solution in place only to find out that it wasn’t working properly when you need it. Test your backups consistently. 

Leave Recovery to the Experts

With so much depending on your business’ data, having a solid backup and recovery strategy in place is extremely important. For more information about our BDR service and how our professional technicians can help you come up with a plan to ensure your data is secure regardless of the situation, call us today at 334-834-7660.

 

How to Compose Emails More Quickly with Gmail Templates

With so much time being spent in email, and Gmail holding a 33.7 percent market share, it should come as no surprise that many businesses wouldn’t mind it if a little less time were spent in Gmail if possible. As it happens, one of the most frustrating expenditures of your time—rewriting similar emails repeatedly—can be eliminated by creating Gmail templates.

Gmail Templates in a Nutshell

Gmail templates are a built-in capability that enables a user to compose a boilerplate email to draw upon and edit as required, greatly reducing the time needed to prepare certain messages. As a result, your team members can be much more efficient in their use of Gmail.

Using Gmail Templates

The first step is to enable templates in the first place. Go to Settings > See All Settings > Advanced > Templates and make sure that it is set to Enable. Save Changes once you’ve done so, and you’ll be able to start building your own library of email boilerplate to use in all appropriate correspondence.

Creating Gmail Templates, and Selecting Which to Use

Once your templates are enabled, you’re ready to build some and put them to use:

● Start a new message and create your template as you want it.

● In the message, access the three-dot menu to find Templates.

● This option will open a sub-menu, where you’ll find the options to Save draft as a template, along with the templates you’ve already saved and the option to Delete template.

● From there, you can create a new template or revise the one you’ve already created.

Hopefully, this will be useful to you moving forward. For more tips, keep checking back here!

 

Destigmatizing Some Popular IT Buzzwords

Nothing will annoy tech-savvy people more than listening to someone that basically doesn't know what they are talking about, but uses technology jargon to seem like they do. It’s pretty confusing for the non-technical too. This annoyance is largely due to the gap between using words and understanding complex and detailed technology processes. So, while there is some respect given to people who work to understand the terminology, most of the time, it’s just too much.

Today, we thought we would identify some phrases that we hear from people all the time either in improper context or simply just as an attempt to relate with us, and what they really mean. 

“Disruptive Technologies”

What it means: Any technology that undermines the effectiveness of the existing technology used in any scenario.

How it is used: Any new technology.

The fact of the matter is that any truly disruptive technology, will sufficiently disrupt the market in which it is prevalent. it’s not just a new technology that disrupts people’s view of technology. When it is used improperly, it suggests that the technology just appeared and took over what was a static existence beforehand.

Today, we hear the phrase “disruptive technology” far too much, and almost always out of context. Innovation takes time, and most technologies evolve to become the useful tech we use each day. Calling something disruptive when it has been in the pipeline for some time is incorrect.  

“Digital Transformation”

What is intended: When an analog system is transitioned into a digital system.

How it is used: Adding more IT.

One of the most overutilized terms we hear is “digital transformation”. This is because a true digital transformation happens when moving from an antiquated analog system to a digital one. Unnecessary upgrades to digital systems, isn't a digital transformation. A lot of the time, it’s just a waste of organizational resources. 

Technology is a tool, not the rule. Be sure that you have a specific strategy before transitioning any of your internal processes to digital. That way you can avoid the shortcomings that many businesses see when hastily—or unnecessarily—implementing new IT.

“5G”

What is intended: The fifth generation of wireless that brings impressive gigabit data speeds and extremely low latency.

How it is used: The technology that is going to save the world. 

“5G” is the buzziest of buzzwords. That’s because it is legitimately exciting. However, many people are taking the features and benefits of 5G way too far. In fact, a lot of the wireless carriers that are claiming 5G connectivity, don’t let potential customers in on the secret that 5G is only available in a very limited number of places. It’s actually just being used to boost their phone sales. Marketing a technology that you won’t have access to in the life of the device you are about to buy may seem shady, but that’s where we are. 

5G is also already a term related to the 5 GHz wireless band on modern Wi-Fi router. The 5 GHz on a router tends to have a faster speed, but a smaller coverage area, and has a harder time passing through walls in your home or office. Older devices might not support connecting to a 5 GHz wireless router, but for those that do, that faster speed can make a big difference.

“Machine Learning”

What is intended: A form of artificial intelligence that is able to compute huge data sets and handle them efficiently.

How it is used: A tool uses basic automation to complete a predefined task.

Automation is the future of many businesses, and your business should be looking for ways to automate some of your tasks, but many places people use the term “machine learning’ to describe any algorithmic approach to automation. This isn’t true. 

Machine learning is a feature that effectively allows the software to adjust to the input provided to get a more direct and positive outcome for whomever is using the tool. Essentially, the more data a system deals with, the more the software will adjust processes to adapt. It’s an exciting technology that is often confused with basic automation.

“Business Intelligence”

What is intended: Software that measures certain data through company-defined metrics to help improve operational stability and profitability.

How it is used: A tool to help predict what is going to happen with your business.

First of all, business intelligence is super useful. It not only uses the data your business creates to help you create more efficiency, it also provides insight into your business that simply isn’t possible without it. That said, it is not going to work to predict success for your business. Like any technology, it is a tool, and anyone that views it as anything other than that is going to be left with some degree of disappointment. 

Business intelligence can give you a great deal of insight into how your business functions, what works and what hasn’t in the past, who you should be marketing to, etc. In no way, however, is it able to predict what will happen in the future. 

Don’t Let Business Technology Be Something That It Is Not

Your business uses IT to make your business better, but no piece of technology is going to change your fortunes if you don’t understand the limitations that the technology you use has. If you would like more information about how technology can fit into your business instead of having your business fit around your technology, give the IT experts at Jackson Thornton Technologies a call today at 334-834-7660.

 

 

Blockchain Technology is Advancing Health Technology

Healthcare is a hot-button issue regardless of where you live. As a result you’d think that the industry would be one of the first to implement new information technology. Unfortunately, the healthcare industry has sometimes lagged behind other industries on the deployment of new IT tools. One technology that is being used in the development of new IT tools for healthcare is blockchain. Let’s discuss how blockchain technology is being utilized and how it can change the face of patient care going forward.

The Decentralization of Electronic Protected Health Information

Healthcare data is one of the most private sets of information out there. Known colloquially as electronic protected health information (ePHI), it covers patient data, information shared with insurers, and any other data that has to do with an individual’s health record. Unfortunately, many of the same processes that have been used for decades remain, even with major advances in technology and mandates handed down directly from governments. The lack of innovation is mostly a result of a reluctance by healthcare providers to invest in the technology and risk inefficiencies caused by the implementation of new technology. 

As tools get smarter, however, healtccare administrators have started to acknowledge just how much value this technology can have for their organizations’ patients. Blockchain is one technology that is on the precipice of changing healthcare forever. It is beginning to be integrated into record-keeping solutions that will give people more control over their health data, and provide the kind of privacy that should be required when dealing with their sensitive information. 

Blockchain is an immutable and encrypted ledger technology that provides some of the following benefits:

● Information is decentralized - The data on a blockchain is not owned by a healthcare organization, but is more of a ledger of an individual’s health profile. 

● Data on the blockchain is encrypted - The data is secured and cannot be altered. If situations change with a patient, another node is created amending previous information, it isn’t changed.

● The blockchain itself is reliable - Once information is entered as a part of blockchain, it is on the chain in perpetuity. Any changes need to be created in a new block. Any piece of information about an individual’s health can be identified by looking back over the blockchain.

● The blockchain improves transparency - Providing patients the ability to track their own health information, rather than relying on insurers or providers to coordinate information if there are questions about it, can give people control over their ePHI and quickly work to provide doctors and nurses useful information they’ll need to provide the best care possible.

The technology that blockchain is most identified with is called an Electronic Health Record (EHR) or Electronic Medical Record (EMR). By integrating blockchain technology into these systems, individuals will have more control over their health information. As it stands, healthcare organizations and insurance companies have a monopoly over this information, leaving the patient relatively in the dark about the management of their own individual care. It’s not overstating one iota to consider blockchain technology a major step forward in healthcare reporting. 

Integrating blockchain also incentivizes healthcare organizations to provide better care, as there would be a great deal more transparency. Some other benefits of blockchain in healthcare include:

● Blockchain nodes cannot be altered, and the chain is traceable. Patients will be able to send records to who they choose without the fear of corruption or mishandling. 

● Blockchain’s encryption will keep all nodes (and information held within) secure until it is shared with the healthcare provider or insurer.

● Blockchain can incentivize healthy behavior as insurers and providers can set up benchmarks that patients could meet.

● Blockchain integration could lower healthcare and prescription costs as it would allow and incentivize the tracking of prescribed drugs, lowering supply chain costs.  

What do you think? Would you like to have more control over your health records, and your ability to secure and share that information with your doctors and healthcare providers? Do you think that your healthcare provider does enough to keep your health information secure? 

Are Apple Devices Immune to Threats? Don’t Bet On It

For a very long time, Apple has been requested to share a workaround for their platform security with law enforcement, which the company has refused outright. Their argument has been that doing so would inherently undermine their lauded security. Well, the feds have given up asking, because they went ahead and developed a workaround themselves… and in doing so, have revealed that iOS isn’t quite as secure as it was purported to be.

Let’s discuss this means for your business’ security.

The Discovery

In mid-January, a team of cryptography researchers published a report that detailed their findings after closely examining the security measures that were implemented in modern mobile devices. Their study, entitled Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions, sought to determine three things:

1. What security measures are currently in place to help deter unauthorized access to user data

2. How unauthorized access is obtained on modern devices

3. How mobile security can be improved to prevent unauthorized access moving forward

After an in-depth analysis of both platforms, the results were clear, but could still surprise a loyalist to Apple and their reputation for untouchable security. While both operating systems performed admirably, neither Android nor iOS had extensive enough security preparations—enabling anyone who had the right equipment, so to say, to access the operating systems.

While the report did state that the researchers were able to “find a powerful and compelling set of security and privacy controls, backed and empowered by strong encryption” in iOS, these tools simply were not used consistently enough to sufficiently secure these devices.

Android’s issue laid more in the diversity of phones and manufacturers that Android can be found in, with lacking communications between Google and phone developers, slowly implemented updates, and differences in software architecture leading to inconsistencies in the platform’s security and privacy controls. Both platforms share a weakness where their data is synchronized with cloud services.

Mind you, these are all vulnerabilities in the physical device and its software infrastructure itself. In the rest of the report, the researchers detailed the specific vulnerabilities that each platform presents.

Apple-Specific Weaknesses

Apple enables users to securely store their data in its iCloud cloud solution, but according to these researchers, that’s not all the data that Apple takes possession of. When the service is initially activated, a ton of other user data is sent to Apple, where it is remotely accessible by lawbreakers and law enforcement alike (although one of these parties would need a subpoena for it).

Adding to the security concerns, the defenses that Apple had included in their devices against unauthorized use even seem to be less effective than originally thought. Based on analysis of available evidence, the research team hypothesizes that a tool has existed since 2018 that enables an attacker to bypass these protections and effectively guess a user’s passcode.

Android-Specific Weaknesses

Android presented some serious problems in its local data protection measures. One glaring example can be found in Android’s equivalent of Apple’s Complete Protection encryption (which removes decryption keys from the device’s memory after it is locked). The big difference between Apple’s solution and Android’s solution is that Apple’s solution exists, whereas Android retains these keys—making them easily capturable.

Hence, why the Federal Bureau of Investigation can access either platform without assistance.

What Does All This Mean?

Frankly, while these discoveries are unwelcome, they aren’t all that surprising.

It is never wise to assume that data is inherently safe, just because it happens to be stored on a particular brand of device. There is no such thing as impenetrable security, so you need to do everything you can to make sure the data that your business possesses—that your users might have access to from their devices—remains protected.

This means that you should implement every tool available to reinforce security around the devices your employees access work documents and resources with. This implementation should involve all company-owned devices, as well as those belonging to your employees that are used in a Bring Your Own Device strategy. The capability to remote wipe a device of sensitive data is not something to take lightly.

Of course, you also need to reinforce the importance of an employee keeping track of their device in the first place. While losing a mobile device is obviously a bad thing on principle alone, losing one with access to sensitive data is worse.

Jackson Thornton Technologies is here to help you see to your devices and the proper management of such. To find out more about what we can do, reach out to our team at 334-834-7660.

 

 

Improving Society Through Technology

Ask someone what they think social media has done for society, and you will likely hear a series of complaints about how it is the driving force behind the most divisive period in human history. While their perspective is interesting, it is also wrong. Today, we thought we would take a look at how some of today’s most controversial technologies are working to improve society. 

Social Media

If there is one hot-button issue surrounding technology, it would be about social media. Once viewed as the next great technology that will connect all humankind, it is now largely looked upon as big tech that is trying to mine your profile for data, intercept your communications, and even fuel insurrections. All of this is true, by the way; but for every negative situation social media has put society in, it has delivered dozens of positive ones. Not only has it connected people in ways that weren’t possible before, it also expands the ability for people to learn, to work, and to involve themselves in society. In fact, social media has done more to civilize the world than it does to rip it apart. 

Businesses of all types have been able to grow their organizations through the engagement made possible through social media. News and current events are delivered within seconds of an event. Millions of opinions are shared, conversations are had, and resolutions are found faster than ever possible. Social media has been behind the rise and fall of world leaders, the push to combat climate change, and many more political and social issues. 

In the future, social media will expand, with more and more people utilizing services offered by SM companies. Educational opportunities will continue to increase. Social media will continue to be some of the most important marketing platforms available to businesses. Social media will likely become mobile commercial hubs that provide opportunities for businesses to expand further by using free services that can be accessed anywhere at any time. 

Sure, social media has its cons, but the pros outweigh them by a wide margin. 

Infrastructure

For decades technology has been making transportation safer, but humankind is on the precipice of a giant shift in the way that technology is accessed. Not only are we only years away from widespread use of autonomous vehicles, there is technology being developed, led by billions of Internet-connected devices to make our cities and villages more efficient and more effective at sustaining an improved quality of life.

Infrastructure is the backbone of any society, and today's infrastructure is being developed with the Internet of Things. This means that public works, which largely depend on continual maintenance and human assessment, will be built with AI-fueled systems. Public water, traffic, electricity, Internet-delivery, will all be automated to build buildings, streets, and whole cities that are smarter and much more efficient.

A society where human error and corruption is marginalized will only be better for the people who live in it. 

Mobile Communication

Communication technology has been evolving for centuries. Today, with a global pandemic forcing our hands, we’ve established new baselines for communication. Not only is a vast majority of communication conducted with the use of mobile devices (a notion that seemed unlikely only three short decades ago), but today with the use of video conferencing technology, we can be about anywhere in the civilized world and see who we’re talking to regardless of their position to us. The technology we use today is right out of 2001: A Space Odyssey

It doesn’t end there. Today’s businesses use this technology to move faster, do more, and extend their authority past the confines of their brick and mortar office. Each year, new companies and old innovate on the powerful communications technology that is available to them. Today, companies don’t need a relationship with a telephone company, they can utilize Internet-based VoIP technology. 

As communications continue to improve, society will continue to get more civilized. 

Technology is the foundation of many of today’s strategies. You see it in business, in personal relationships, and in the way that people run their lives. What are your thoughts about technology? Do you think that technology has helped society? Do you think that there will need to be regulation to ensure that the power of technology isn’t corrupted by humans?