Intake 2

The last day of the CompTIA Security + course with our intake 2 students at McBride career group in Edmonton. They have now completed their technical training part of the program and only have a few more weeks to go to complete their job search phase. All of them have work terms arranged and are eager to get into the IT field. Wishing each and every one the very best success.

The pictures show a group photo below and the 5 top achievers on the left. These amazing students did not miss a single day during the entire program. Here they are with their prizes.

Windows super admin

GodMode is a special folder in Windows that gives you quick access to over 200 tools and settings that are normally tucked away in the Control Panel and other windows and menus. This Mode is most helpful for advanced Windows users that work in IT, or any advanced Windows enthusiasts.

Most customers, will not see a use for having this Mode enabled on their Windows 10 systems. It’s like having your developer settings enabled on your smartphone. If you want to try it out, though, here’s how to enter God Mode in Windows 10.

How to enter God Mode in Windows 10

  1. Make sure your Microsoft system account has administrator privileges.
  2. Right-click on the Windows 10 desktop and “Create a new folder.”
  3. Right-click the the new folder and rename the folder: “GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}” press enter and you’re all set!
  4. Manage to your hearts content!

Customer Relationship Management

A CRM can transform your business or become your worst nightmare.

Customer service good or bad can affect your business in many ways. Small mistakes can lead to major issues down the line that could be construed as bad customer service leading to one or more of the following conditions.

  1. Damage your company’s reputation
  2. Stops leads or opportunities from converting to business
  3. Customer lifetime value drops
  4. Great employees leave
  5. And a downward spiral begins.

Situations that are usually unacceptable to a business are long wait times, poor attention to detail, lack of experience or product knowledge and unprofessional or impersonal actions by staff members that could be caused by the CRM.

Businesses that are guilty of these unacceptable customer situations above usually have a difficult time overcoming the loss of customer confidence and could lead to the total businesses collapse. The good news is that with the correct staff most customer related issues can be overcome if the corrective action is taken speedily and effectively.

Many organizations falsely believe that by adding a Customer Relationship Management (CRM) to the mix will resolve all of their bad customer relationship issues. This is a gross misunderstanding of the actual issues that caused the bad customer service in the first place, people.

A CRM is there to help good staff keep track of their actions and transaction with your customers. It is important to have a CRM that is accurate and up to date at all times. With incorrect policies a CRM will become a company’s biggest nightmare. Quotes, orders and invoices all rely on the accuracy of the customers information stored in the CRM, the policy should include a customer creation and update procedures with staff training at the top of the list. Creating duplicate accounts due to using different naming schemes, assigning contacts to the incorrect accounts are just two of the most common issues. These are introduced by untrained or dishonest staff with no repercussions for sloppy work.

Migrating Data from old legacy or merging data from two or more companies to a new CRM system always opens the door for introducing errors. Before handing over a new CRM to the sales and marketing departments one has to ensure that the data is accurate and complete, has no duplicate companies or organizations, no duplicate contacts and must have a complete management capability preventing staff from recreating duplicates. Your migration should have verified that all physical, mailing and email addresses are correct. That all related contacts either relationships within household, businesses or networks are accurate. Employee, agents or brokers, suppliers and their assets, and any channel partner data that helps your organization understand the target market and serve your customers to the best of your abilities needs to be verified before use. Remember that getting this data accurate does not happen by chance, it requires a project with meticulous planning and budgeting. If you skimp on this part of your CRM project, your have a high probability of failure. Its not the fault of the staff that use the data but the migration team that does not verify the data that are to blame. It does not matter how much you pay for the use of the CRM or how good it is on paper but a second-rate CRM with accurate data is far better that the costliest or the very best one with inconsistent and incorrect data.

Clean up your data as soon as possible or suffer the consequences of frustrated and disgruntled customers and staff. You could lose both in a very short time.

open source product

A CRM is a complex tool and requires a lot of setup, choose your CRM based on your requirements and not on what it could do for you. Many aspects of a CRM are based on automation freeing up your staff to better utilize their time with more important customer relations task. Please remember a CRM does not sell products for you, sales people do this based on relationships and bonds that are formed between your customers and your staff. Support your sales staff in any way possible. The collaboration processes of this tool should have great rewards as people share common information and data.

Never forget to lay down some rules, your CRM can only be effective if your company allows it to be. No CRM can function if it is being misused by your staff, either intentionally or unintentionally. Creating some rules and making sure that your workforce has been properly trained will alleviate some issues and have a smoother transition to and a better acceptance of your CRM.

Building Revenue on Relationships

We have all heard the term CLV or Customer Lifetime Value and how important this is to a successful business relationship. A customer strategy should be built on a culture of your customers success and tracking their satisfaction. Some key factors to take into account when dealing with CLV are:

  • Good communications, not too little and not too much as too much is construed as spam
  • Being sensitive to a person’s emotions and needs
  • Any issues and pain points should be noted and addressed
  • Always remember that these points may be multifaceted or layered
  • Knowing where your customer is at this point will help with any business transactions.

Your CRM should be the tool used by your workforce to track the amount of communications, emotions or needs and their pain points.

Do factor in the 80/20 rule, also known as the Pareto Principle, that is attributed to the Italian economist, Vilfredo Pareto. Applying this principal to your business and your CRM configurations, helps keeping track of the 80% of your company sales that come from only 20% of your customers. These 20% are your core customers and need to be your top priority for accuracy when updating or configurating a new a CRM.

A business analyst should be consulted to assist with the elicitation of requirements before, during and after a migration is considered. The stakeholders that will be using it as their sales tool, the templates used in the sales processes, invoices used in the close process, and pricing with a structured discount need to be considered and consistent throughout the elicitation process. As I have said before, a CRM is only as good as its first implementation, so make sure that it is done correctly before any access is given to the stakeholders.

Good luck

TestOut

TestOut

  • Hands-On Lab Simulations
  • Comprehensive Learning Material (Videos, Demos, Text Lessons, Quizzes)
  • Full Length CompTIA A+ Practice Exams

Try TestOut FREE for 7 Days  +  Enter code “GoCertify” to save 75% on training each month.



Microsoft Azure

Your vision. Your cloud.

Turn your ideas into solutions faster using a trusted cloud that is designed for you.
Azure. Cloud for all.
Start free

See some of the Microsoft announcements … Read more

See the Azure Developers guide.

 

 

Productive
Azure has more than 100 services with great end-to-end tools to make you successful.
Learn More
Hybrid
Develop and deploy where you want, with the only consistent hybrid cloud on the market. Extend Azure on-premises with Azure Stack.
Learn More
Intelligent
Create intelligent apps using powerful data and AI services.
Learn More
Trusted
Join Startup’s, governments, and 95% of Fortune 500 businesses who run on the Microsoft Cloud today.
Learn More

Windows Defender

Windows Defender Offline has a powerful offline scanning tool that runs from a trusted environment, without starting your operating system. This topic describes how to use Windows Defender Offline in Windows 10, Windows 8.1, and Windows 7.

When should I use Windows Defender Offline?

Run Windows Defender Offline if:

  • Windows Security (named Windows Defender Security Center in previous versions of Windows) detects rootkits or other highly persistent malware on your PC and alerts you to use Windows Defender Offline. You might see a message stating that malware was found on your device, or receive a message in Windows Security notifying you that additional cleaning is required.
  • You suspect your PC might have malware that’s hiding on it, but your security software doesn’t detect anything. In this situation, you can start a Windows Defender Offline scan from Windows Security settings. Here’s how:
  1. Select Start , and then select Settings  > Update & Security  > Windows Security  > Virus & threat protection .
  2. On the Virus & threat protection screen, do one of the following:
    • In an up-to-date version of Windows 10: Under Current threats, select Scan options.
    • In previous versions of Windows: Under Threat history, select Run a new advanced scan.
  3. Select Windows Defender Offline scan, and then select Scan now.
Windows Defender Offline start scan

You’ll be prompted that you’re about to be signed out of Windows. After you are, your PC should restart. Windows Defender Offline will load and perform a quick scan of your PC in the recovery environment. When the scan has finished (after about 15 minutes), your PC will automatically restart to Windows. Notes

  • Before you use Windows Defender Offline, make sure you save any open files and close all apps and programs.
  • You typically need administrator rights on the PC on which you plan to run Windows Defender Offline.
  • If you experience a Stop error on a blue screen when you run the offline scan, force a restart and try running a Windows Defender Offline scan again. If the blue-screen error happens again, contact Microsoft Support.

Where can I find scan results?

To see the Windows Defender Offline scan results:

  1. Select Start , and then select Settings  > Update & Security  > Windows Security  > Virus & threat protection .
  2. On the Virus & threat protection screen, do one of the following:
    • In an up-to-date version of Windows 10: Under Current threats, select Scan options, and then select Threat history.
    • In previous versions of Windows: Select Threat history.

Windows Clipboard

Clipboard history gets a new look (Build 18305)

Have you already tried using clipboard history? If enabled, it allows you to save multiple clipboard items to use later. Introduced during RS5 development, we’ve been getting great feedback from everyone on this experience, and one of the things we heard most is that the UI wasn’t compact enough – a large space was used for each entry even if it was just a small text fragment. We originally opted to show bigger entries so there was space to show an image preview nicely, but when we looked at our data, we found 90% of items in the clipboard history were text. Based on that and your feedback, we now optimizing the design for text snippets – shrinking the height of each entry and thus giving you access to more entries without needing to scroll the view. Hope you like the change we made! Copy some text and press Windows logo key + V to check out the updated design.

Excel 2016

MS Excel DLM

Excel Course Overview
Students who attend these courses will gain the knowledge, and skills with a confidence to create, format, enhance and print spreadsheets.

What You’ll Learn

Upon successful completion of this course, you will be able to create and develop Excel worksheets and workbooks in order to work with and analyze the data that is critical to the success of your organization. You will:

  • Get started with Microsoft Office Excel.
  • Perform calculations.
  • Modify a worksheet.
  • Format a worksheet.
  • Print workbooks.
  • Manage workbooks.

Enterprise security

Enterprise Security

Security process

Security wheel

Enterprise security is not always a top priority or even on the mind of employees, but it should be. Educated employee’s are the first line of defense against security breaches. In large multinational companies their best defence strategy is to partner with their employees, prepare them with knowledge and empower them to live a secure lifestyle both at work and at home. The graphic shows some tips on how to keep our employees informed about good practices in security measures.

  • The best way to protect against vulnerabilities at the enterprise level is to start by defining a plan that ensures security Education and Awareness is integrated into the business operational lifecycle as soon as possible.
  • To ensure key security messages arrive effectively, think about how best to share these messages. For security-related alerts that require employee action you might consider an email as the appropriate method. For general awareness and reminders, digital signage around buildings and/or informal meetings may work better. One thing to bear in mind, have consistent branding around every communication.
  • Informing employees of any new security policies or initiatives can help keep your security top of their mind. Have a clear objective of what you want your employees to learn and present the information in a way that is meaningful and memorable.
  • Start an incentive program where employees that participate in your campaigns get recognized for their efforts. The more fun you have around security awareness and education, the more employees will automatically tune in to the topic.
  • Cyber attacks will never stop targeting employees, so foster a workplace environment where employees feel comfortable sharing potential vulnerabilities they encounter without fear of reprisals.
  • Empowering your employees to take charge of enterprise security within their own space lets them “practice security” on a daily basis, eventually becoming second nature to them.
  • Add in a couple of worthwhile incentives, and you can have an army of security champions. Champions are a companies voices that help to influence employees and drive security awareness throughout the organization.
  • Always measure your success or failures and learn from the results to see if the employees gained anything from your communications plan. Create feedback through social channels like the companies intranet portal any other channels that work. Using surveys to evaluate the success is just one way to achieve these results.
  • Publish industry trends helps employees stay up to date with the latest attacks and can mitigate them. Employees need to know that not all organizations fall into the same category and what works in one organization may not work in another.
  • Encouraging employees to share their experiences, stories and insights with family and friends will help create public awareness,  thus helping to enable a more secure environment for everyone.

Remember that a Happy Employee is a valuable asset to any organization.

MsProject

MS Project: Linking Tasks 

How do task links affect the schedule?


Task links (dependencies) show the relationship in time of one task to another. Linking tasks creates task dependencies. The long chain of tasks determines the entire length and end of a project. You have both Predecessors and Successors, ones that a task relies on and those task that rely on the current one.
Project management tip As you link tasks in a project, a path of links is set up. This path determines the end of your project. Some paths that you create are paths and some are the critical paths. A critical path is that path that when any task is delayed this will make the total project late.

Link type                    Description
Finish-to-start (FS) 
The dependent task (B) cannot begin until the task that it depends on (A) is complete.
For example, if you have two tasks, “Dig foundation” and “Pour concrete,” the “Pour concrete” task cannot begin until the “Dig foundation” task is completed.
When you link tasks in Project, the default link type is finish-to-start.
This link type is the default type. If you don’t specify a link type, the Finish-to-start relationship is assumed.

Start-to-start (SS)
The dependent task (B) cannot begin until the task that it depends on (A) begins.
The dependent task can start at any time after the task that it depends on begins. The SS link type does not require that both tasks begin at the same time.
For example, if you have two tasks, “Pour concrete” and “Level concrete,” the “Level concrete” task cannot begin until the “Pour concrete” task begins.

Finish-to-finish (FF)
The dependent task (B) cannot be completed until the task that it depends on (A) is completed.
The dependent task can be completed at any time after the task that it depends on is completed. The FF link type does not require that both tasks be completed at the same time.
For example, if you have two tasks, “Add wiring” and “add plumbing,” both must be completed at the same time before any inspection can be done.

Start-to-finish (SF)
The dependent task (B) cannot be completed until the task that it depends on (A) begins.
The dependent task can be completed at any time after the task that it depends on begins. The SF link type does not require that the dependent task be completed concurrent with the beginning of the task on which it depends.
This link type is rarely used in project management. An example would be roofing a home, and the two tasks: add roofing, supervise the work. In this case, the roofing can start, but the supervisor needs to show up at some point before the end of the roofing.