Are Microsoft’s New Artificial Intelligence and Mixed Reality Applications Redefining Business?

Are Microsoft’s New Artificial Intelligence and Mixed Reality Applications Redefining Business?

From its inception, Microsoft has been defining and redefining business. According to History, Microsoft was founded by Bill Gates and Paul Allen in April of 1975. The company introduced the Windows operating system in 1985. In 1995, it released its web-browser, Internet Explorer. Prior to the Microsoft Ignite 2018 conference for IT developers and professionals, the company announced the expansion of its Dynamics 365 portfolio.

According to Microsoft, the original Dynamics 365 is a “collection of intelligent business applications.” It included a line of customer relationship management (CRM) applications, which were later referred to as a customer engagement plan. It also has an enterprise resource planning (ERP) capability, which is basically a finance and business line.
Dynamics 365 is available in two editions. One is designed for small to medium-sized offices and businesses. The other is more appropriate for medium to large-sized law practices.
What Are the New Additions to Dynamics 365?
Dynamics 365 already offered assistance with accounting and financial management, customer service, field service, operations, and sales, etc. These applications work together seamlessly. Now, however, they can be combined with the following artificial intelligence and mixed reality additions.

Dynamics 365 AI for Customer Service
Dynamics 365 AI for Market Insights
Dynamics 365 AI for Sales
Dynamics 365 Layout
Dynamics 365 Remote Assist

The Dynamics 365 Layout and Dynamics 365 Remote Assist are both mixed reality applications. They are not only new, but they are also the first of their kind. The company refers to them as “a whole new kind of business application.”
What Is Artificial Intelligence?
Artificial intelligence (AI) is essentially machines that have to use intelligence, such as when computing or analyzing, to perform tasks a human would normally carry out. They also collect data in order to adapt and learn how to do things better. Based on algorithms, statistics, and trends, AI is used to solve problems faster and more accurately than the average person would.
Common, contemporary examples of AI include the following abilities:

Alexa by Amazon
Facial recognition on smartphones
John Paul—the luxury concierge company
Netflix’s predictive user-preferences feature
Pandora’s ability to pick user preferences based on 400 musical characteristics
Siri by Apple
Tesla’s self-driving feature

This is merely a handful of the many ways that people use AI on a daily basis. Oftentimes, they are completely unaware.
How Are the New Additions to Dynamics 365 Using AI?
Dynamics 365 AI for Customer Service provides firms with Virtual Agents to do some of the typical day-to-day interactions with clients. It also helps collect automated insights from clients to improve future services.
Dynamics 365 AI for Market Insights uses the actionable web and social insights to improve relationships with clients. It detects trends in marketing and social media to assist legal SEO teams to engage in meaningful actions and respond to current dynamics.
Dynamics 365 AI for Sales is used to improve an office’s bottom line by helping associates focus on high-priority endeavors. It provides detailed analysis and answers to frequently asked questions regarding outreach and income.
What Is Meant by Mixed Reality?
Considered the evolution in computer, environment, and human interaction, mixed reality blends the digital world with the physical one. With advances in computer vision, display technology, graphical processing power, and input systems, both holographic and immersive devices are possible.
Holographic devices are those with the ability to virtually place digital content into the real world like it were actually there. Immersive devices, however, are characterized by the ability to create a sense of “reality.” They replace the physical world with a completely digital experience.
How Are the New Additions to Dynamics 365 Using MR?
The two additions to Dynamics 365 that use mixed reality are the Layout and Remote Assist applications. Both are made possible with the use of Microsoft’s HoloLens. This wearable device allows people to interact with content by using gestures, vocal commands, and even their gaze. It provides the immersive experience required for Layout and Remote Assist.
The Dynamics 365 Layout allows users to visualize or even walk through physical space layouts in real-world scale. Potentially, this would be beneficial during a courtroom situation to provide jurors with an accurate depiction of a crime scene for example. It could also be used to assist clients with investment opportunities, etc.
Dynamics 365 Remote Assist is an immersive tool that helps first-line workers trouble-shoot problems in a “hands-free” environment. First-line employees are the ones to engage with clients, such as receptionists and legal support staff, etc. The Remote Assist application allows them to address situations and improve efficiency.
In Conclusion
In a virtual news briefing, Microsoft corporate Vice President Alysa Taylor stated, “We continue to expand our category with AI and mixed reality. We’re taking another step forward on our journey to help empower every organization on the planet to achieve more through the acceleration of business applications.” That they have.

How and When to Set Up A Small Wireless Network In Your School

How and When to Set Up A Small Wireless Network In Your School

Limited wireless networks are just what they sound like: small networks with limited range that cannot handle the demands of, say, the entire population of a large high school full of students, faculty, and staff all carrying one to three personal devices. Small networks cannot handle the bandwidth demand from multiple classrooms of students streaming videos at approximately the same time while all classrooms report their attendance at the top of the hour and district emails regarding cybersecurity threats go out.

Potential Small Wireless Network Areas:

Administrative Offices
Small Administrative Office, Small Multimedia Lab/Library, Mobile Computer Lab
Any staff that needs to be (literally) mobile/wears multiple hats
Very small elementary school. Teachers who are using iPads or something to take attendance. Small schools might make it with a few high-powered wired PCs and Printers, plus a wireless network for the other stuff.
Annexed community (e.g. a construction module office or library)

Small networks range from a small administration office with a skeleton staff to several offices, connected printers and copiers, and a couple of dozen devices spread across a tiny school (and that’s stretching it to its limits). Anything more than that and a larger network is necessary.
What is a wireless network?
Wireless networks, or Wi-Fi networks, are networked radio signals that relay information (data) from the internet to devices (laptops, desktops, mobile phones, tablets, etc.). Over the years they have improved to the point that they are as secure, reliable, and fast as most wired networks.
Advantages Of A Small Network
Small schools or contained school communities can benefit by having a faster connection on the limited space. It costs less to install and maintain a small network as well, and its general exclusivity makes it a more secure method to share and receive data.
Certain types of information or use are better on a wired connection. So one of the advantages of using a limited, small wireless network is that in an office with equipment better left on a wired connection, such as a dedicated printer or copier, wireless can be for everyone else, or for other appropriate devices as you see fit.
Where To Start
Like with any project, you must determine the scope, budget, and overall goals. What is this network supposed to be able to do? How many devices should it be able to support, and at what bandwidth? You need to know what your goals are, what the scope of the project is, and the budgeting limitations.
You’ll want your main office, the library, and maybe a small computer lab or mobile lab (cart with laptops) to have Wi-Fi. Any other computers would need to be wired or else you’d have to get a much larger system.
This small Wi-Fi network can be a separate network from the rest of the school, to separate
one network from the other for security or speed purposes, or it can be used in a smaller school, or only by a select group of people.
What Should The Small Network Be Able To Handle?
Think about the demands that each individual might put onto the network. Employees, teachers, students , and guests may be on the network if that’s what your school decides, and they will each have their own needs. In an elementary school, very few students will have their own personal devices on them at all times, and even fewer will be using internet access on those devices. This is why the small network might be all right for a small elementary school but not appropriate for a secondary school, where students often have two-three devices.
Account for at least two devices per employee on the network. They will likely have personal devices such as laptops, smartphones, or tablets that they may want to use in addition to work-provided devices.
Once you have the scope down, you can move on to the next phase: choosing your equipment.
You’ll need:

Router(s)
Antenna
Extender
Ethernet Cables
Access Points

In Conclusion
If you have a small school or limited wireless needs to think about, go for the smaller wireless network. It offers convenient connectivity and could also be a way to test the waters on a wireless set-up. Further, elementary schools with fewer unknown devices being brought in could benefit from not wasting money on a monster system too large for the needs of the school. No matter what you decide, make sure that you properly measure the resources that you will need.

5 Important Features You’ll Find In iOS12

5 Important Features You’ll Find In iOS12

Apple’s newest software update has arrived, and it’s already making an impact in how effectively users manage their smartphones. iOS 12, which comes preinstalled in the iPhone XS and iPhone XS Max, is equipped with a number of shiny, new features sure to delight iPhone and iPad users, old and new models alike. From stronger battery performance to significant upgrades to maps, notifications and passwords, iOS 12 is robust in its delivery. Here, we’ll explore some of iOS12’s most anticipated new features, and how they can help you achieve more with your iPhone or iPad.
Battery Performance And Battery Life
Mobile phones are designed to help users achieve everyday tasks with ease. However, with this great power comes a need for great battery life. Luckily, iOS12 delivers on this front. The new update offers significant upgrades in both battery life and performance, helping you operate your device for longer and with more speed than ever before. What’s more, owners of older model iPhones are reaping the biggest benefits. In terms of the newest update, the older your iPhone model, the better. According to Apple, older models can expect to see speed boosts of up to 70% faster.
Earlier versions of iOS allowed users to see how much battery their favorite apps were using, and for how long. In efforts to help users further understand the extent of their usage, iOS 12 offers users charts that display battery use in great detail. The charts are broken down by Screen On usage and Screen Off Usage. Also, now users are able to see how fast their battery was depleted, as well as how these levels were during any part of the previous 24 hours. There is also a long-term overview to help users evaluate their usage over time.
Instant Tuning
An onslaught of notifications can be annoying and distracting. The new software update seeks to remedy the inconvenience of too many notifications. Now, ioS offers instant tuning, which means users can now edit notification settings on the notification itself. They can even set specific apps to deliver notifications silently, meaning they’ll show up on the display, but without vibrations or sound alerts.
Some other changes to notifications? The Do Not Disturb feature on your phone just got a whole lot more effective, allowing you to further manage the time frames in which you do not want disruptions. You can set your phone on Do Not Disturb for a certain time frame, for a certain location, or pretty much whatever time you choose.
Grouped Notifications
A common complaint among iPhone users is the barrage of notifications they receive on their screen after they’ve been inactive. Instead of receiving one notification for text messages, they were forced to scroll through endless notifications, which made it hard to easily locate priority alerts. Now, with grouped notifications, users will instead see one notification for each app, leaving more room for prioritizing tasks.
Redesigned Maps App
The modern day smartphone user relies heavily on map apps to help them reach their destinations. Glitches in the map apps are highly inconvenient for users, and the new iOS update helps to alleviate this. Other improvements include more detail like foliage, buildings, pools, pedestrian pathways and the ability to see into buildings. Currently, this feature is only available in certain areas, such as the city of San Francisco. The upgrades are expected to be available in a growing number of cities over the next year. You’ll also find improvements to traffic, construction notifications, and real-time road conditions — all intended to make your driving experience more safe and efficient.
Improved Password Management
Given the outstanding popularity of smartphones and their capabilities to manage so many aspects of everyday life, security is always a concern. While Apple devices have typically operated with their own password systems, now users are able to access their own much more easily. The latest iOS update offers an AutoFill setting that allows your chosen password manager to be available everywhere. This means password managers like OnePass and Dashlane are fair game.
Improved QR Code Reader
QR codes haven’t quite caught on for iPhone and iPad users. This may be because of several reasons. One reason may be that, prior to iOS12, scanning QR codes required a special app, making it sometimes difficult to quickly capture QR codes in passing. The newest software update comes equipped with a QR scanning shortcut that can be accessed through iPhone’s lock screen. You can do this by adding a new widget to your device’s Control Center.

Smartphones, in their bid to deliver everything users hope for in a device and more, require sporadic updates to run at their optimal performance. iOS12 is just the latest to bring a new range of benefits to iPhone and iPad users everywhere. No telling what the future holds.

HIPAA Violations Are Not Limited To Data Disclosure

HIPAA Violations Are Not Limited To Data Disclosure

Four hospitals – Boston Medical Center, Brigham and Women’s Hospital, Massachusetts General (both teaching hospitals affiliated with the Harvard Medical School), and New York Presbyterian – have been fined by HHS’ Office of Civil Rights (OCR) for breaches of patient privacy. The takeaway here is that under HIPAA, protected health information extends to photos and films of patients, and permission has to be sought to obtain and make use of either of them.

What, Exactly, Was The Violation?
The violation in each case was allowing film crews from TV shows to film patients and their treatment without first obtaining permission. The total of fines for the four hospitals was $3, 199,000, an average of $799,750 per incident. That’s a chunk of change for even a major teaching hospital.
The first three hospitals listed above said that allowing the filming was not a violation of protected health information (PHI) and that patient consent had been obtained and that they were not liable for any fine. The OCR disagreed and decided that films and photos of patient treatment were, in fact, PHI and that the same HIPAA laws and regulations that cover data breaches applied here. This establishes a precedent that OCR can follow in the future.
Of course, healthcare organizations are proud of the services they provide, and the knee-jerk response of the public relations department will, of course, be to invite the media in when there is something to celebrate. Photos of treatment, films of procedures, and interviews with patients naturally follow. The lesson from the OCR decisions in the cases of these four hospitals is that it’s perfectly okay to do this, provided appropriate patient consent is obtained first.
OCR does not provide a standard form for permission to film or photograph. That will have to be developed by the hospital’s legal department, which should craft the consent, not only with HIPAA in mind but also any applicable state laws covering health care or privacy.
What About Digital Media?
The situation gets more complex if the films or photos are taken or stored using digital media, and that will very often be the case. Once this is done, all of the regulations and laws covering PHI in digital form apply. This gives OCR an opening to expand the fines to cover a double violation, even if the violation(s) stems from the same single incident.
It is worth noting that three of the four hospitals involved made the defense that they had, in fact, obtained patient consent. OCR apparently found that whatever form was used did not meet the HIPAA standards for consent. It should also be noted that under HIPAA, there is a difference between “authorization” and “consent.”
What Is Consent? What’s Authorization?
Authorization is more formal and must involve a signed document. The advice from the legal department is likely to be that there are ambiguities surrounding consent that are not present in the definition of authorization, and that obtaining authorization is always the safer course.
Just as providers have the motto that “if it’s not in the chart, it didn’t happen,” the posture of health care organizations should be “if we don’t have a signed form, consent was not given.” In particular, mere verbal consent is never a sufficient defense—it’s not worth the paper it isn’t printed on. The Privacy Rights Clearinghouse provides a good summary of consent versus authorization at How Can Covered Entities Use and Disclose PHI. Remember, in three of the cases discussed above, whatever the hospitals thought was consent was a violation in the eyes of the OCR.
“Health care operations” are generally, but not exclusively, exempt from HIPAA. “Health care operations” is somewhat ambiguous. Generally, the term refers to the activities that healthcare providers regularly engage in to keep the organization in operation – credentialing, billing, accounting, data operations (except handling of PHI) are generally HIPAA exempt.
But there are no necessary parallels between HIPAA and state laws, and “healthcare operations” that are perfectly exempt from HIPAA. Plus, these may be covered by privacy rights under state laws. Again, your legal department is the best authority on this, and if state laws differ from HIPAA, it makes sense for one form to cover both the required federal and state consents. A complete list of the activities covered by the term may be found at 45 Code of Federal Regulations 164.50.
What’s The Takeaway?
The chief takeaway from these four incidents is that common sense, or what appears to be common sense, does not govern here; the law and regulations do. Having good legal advice in any case where there is ambiguity is a good idea. If you are uncertain about what “covered activity” means, then consult your lawyers. You’re paying good money for legal counsel so make use of them.

It’s Cyber Security Awareness Month…Are You Prepared?

It’s Cyber Security Awareness Month…Are You Prepared?

Are You REALLY Secure? Follow This Checklist To Know For Sure
 
When everything is going well, the last thing you want to do is think about what will happen when something goes wrong.
It can be easy to think that just because you’ve recently bought some new hardware, or updated your security software, or simply the fact that it’s been a while since you had to deal with a major issue.
Don’t let that give you false confidence.
We don’t have to dwell on the potential for disaster though – you and I know that it’s a possibility, so let’s just leave it at that. What’s important about this is that you know to cover your bases. No need to assume the worst – just plan for it, so you know you’re covered.
What Are The Main 3 Areas Of Cybersecurity That You Need To Verify?
As important as cybersecurity is, it doesn’t have to be complicated. Follow this checklist to ensure you have all your bases covered:

Do you have the necessary range of cybersecurity solutions?
This is easy – do you have a firewall? Do you have antivirus software? Do you have a spam filter for your email?By investing in these solutions, you can eliminate a vast majority of common cybersecurity threats.

Does your staff follow cybersecurity best practices?

The next step is to make sure your staff is contributing to your cybersecurity, not hurting it. Especially when it comes to their email practices.
Cybercriminals often use email as a way to transmit viruses, ransomware, and other malicious software. Give your staff the following list and have them walk through it when they’re unsure about an email:

Do I know the sender of this email?
Does it make sense that it was sent to me?
Can I verify that the attached link or PDF is safe?
Does the email threaten to close my accounts or cancel my cards if I don’t provide information?
Is this email really from someone I trust or does it just look like someone I trust? What can I do to verify?
Does anything seem “off” about this email, its contents or sender?

Do you have an effective backup plan in place?

While these other two points are preventative, in this case, you’re ensuring you have a viable response to when something breaks through your cybersecurity.
In the event that your data is stolen, compromised or encrypted and held at ransom, a recent and regular backup will keep you protected.
And that’s it! Does that sound like a bit too much to handle? The good news is that you don’t have to deal with IT security on your own.
As vital as each one of those tasks is for your security, there is still the problem of making sure they are all done on a regular basis. That’s where a trusted partner in IT support can be so helpful.
By having an expert team of IT security professionals assess your network and manage its many aspects, you can ensure that your technology is secure, without having to see to it yourself.
Be sure to partner with a reliable IT support provider like {company} to make sure all your bases are covered when it comes to your cybersecurity.