Updated Office 365 works with guests

September 29th, 2016

2016september29_office_aThe cloud has made it easier for people, businesses, and companies to interact and collaborate. And one of the best productivity tools on the market is Microsoft Office 365, which is making it even simpler to store, organize and share files online. Thanks to its newest update, you can enjoy all these functions when working with teammates, business partners, and customers outside of your organization. Read on for all the details regarding 365’s new guest-collaborator feature.

This new functionality mainly centers around Office 365 groups. A 365 group is essentially an email address with Office privileges that several people have access to. For example, if you have an Editorial Group, each individual writer at your organization will receive emails, calendar invites, and document read/edit privileges sent to editorial@acme.com.

If you’re interested in adding a guest from outside of your organization to an Office 365 group, the process is simple. From the group administration dashboard, click “Add Members.” Then, all you need to do is enter the email addresses of whomever you would like to add, and voilà.

Guest collaborators will receive an email alerting them of their new addition and access to group files, emails, and calendar items -- all accessible via Office on the web.

Take note, however, of Outlook’s alert: “You’re adding a guest to this group. As a member, they’ll have access to group content.” This will grant new guests all the same read/edit privileges as other group members -- including privileges from before the guest was added.

There is no requirement for guests to have a Microsoft account, and by always labeling the new member as a guest, original group members won’t ever have to worry about forgetting who should receive confidential document privileges.

Unless the guest is a trusted partner, we recommend creating 365 groups specially designated for the purpose of outside collaboration to ensure the privacy of your cloud documents. Administrators can remove them at any time, or guests can volunteer to leave on their own.

Adding and removing collaborators from outside of your organization may be as simple as adding an email address to a list, but the possibility for improved teamwork is limitless. If at any point in your workflow you feel that your work is suffering from bottlenecks in creation, communication, or collaboration, there’s a good chance Office 365 has a solution. If there’s anyone who will know that solution, it’s us. Message us today about collaborating on all your productivity dilemmas.

Published with permission from TechAdvisory.org. Source.

Topic office
September 26th, 2016

2016september29_virtualization_aAlmost every day, the virtualization industry takes a giant leap forward. Although this industry has been reserved for only the most technologically advanced of businesses over the years, it’s spreading like wildfire with advances in cloud computing. As engineers create virtual versions of hardware, storage, and even networks, digital architects are coming up with entirely new ways to design your IT framework. Today’s development comes in endpoint security, and we’ve got everything you need to know right here.

A virtual network is a way to connect two or more devices that aren’t physically linked by wires or cables. From the perspective of machines on a virtual network, they’re essentially sitting in the same room -- even if they’re on opposite sides of the globe. The advantages of this setup range from ease of management to reduced hardware costs. AT&T and Verizon have begun offering these services, and small- and medium-sized businesses have slowly begun to adopt them.

Meanwhile, another sector of the IT world has been making its own advances. Cutting-edge hardware firewalls are beginning to offer internal segmentation as a method of separating pieces of your internal network to keep them safe from threats that spread internally. The more segments you have, the safer your network is from poorly protected neighbors. But there are limits to how much capacity one of these hardware firewalls has for segmentation.

Virtualization giant VMware has taken notice and developed a prototype to combine these two services. In the hopes of unleashing ‘microsegmentation’ from the limits of physical hardware, Project Goldilocks will essentially create a virtual firewall for every virtualized application. When one of these applications is created or installed, it will come with a ‘birth certificate’ outlining every acceptable function it can perform. When making requests to the operating system, network, or hardware the application is installed on, Goldilocks will cross-reference the request with the birth certificate and deny anything that hasn’t been given permission.

Segmenting virtual networks and applying them to individual applications rather than entire networks or operating systems could revolutionize the market for endpoint security. Not only would it be easier to block malware infections, but those that made it through could be quarantined and terminated immediately because of the virtual nature of their location.

While virtualization may be a complicated state-of-the-art technology, all it really takes is a helping hand. With our full team of specialists, we’re ready to pull you into the next stage of your virtualized infrastructure. All you need to do is reach out us -- why not do it today?

Published with permission from TechAdvisory.org. Source.

September 22nd, 2016

2016september22_google_aLike breaking up with past lovers, when deleting something from our browsing history, we all have that lingering feeling that it’s never really gone. Some may even suspect that multinational tech giants such as Google might have been keeping tabs on all the searches you’ve made -- and they’re right. Unless a genie granted you an invisibility cloak for your deleted search items, they remain visible. Fortunately, that is reversible -- here’s how:

It’s estimated that Google currently processes over 40,000 search queries every second on average, which translates to over 3.5 billion searches per day and 1.2 trillion searches per year worldwide. It begs this question: How does Google manage to keep tabs on such a jaw-dropping amount?

It’s not like Google is a superior being capable of seeing and hearing all. It’s only when you log into your Gmail or Google account that Google will be able to record it all -- removed items included. See your very own search history by using the link: history.google.com/history. In that history page, Google even has its own specific audio page as well as meticulous records of every single place you’ve been to on the Internet.

You can even analyze the information with the handy “search my searches” tool. Image searches and watched YouTube videos are also recorded. Previous Google Maps searches can also be reviewed, and if you feel like it, you can download your entire history and browse through it in your spare time.

For those wishing to delete certain files or certain search records, the Independent advises you on exactly how to do it: “To delete particular files, you can click the checkbox on the left and then move back to the top of the page and select ‘delete.’ To get rid of everything, you can press the ‘More’ button, select ‘Delete options’ and then ‘Advanced’ and click through. The easiest way to stop Google recording everything is to turn off the virtual assistant and never to use voice search. But that solution also gets at the central problem of much privacy and data use today – doing so cuts off one of the most useful things about having an Android phone or using Google search.”

Another method would be to head over to the top left of the screen where you’ll find a drop-down menu that includes the option “Activity Controls.” Select this and then switch off the slider marked “Web & App Activity.”

Keeping records might come in handy when you want to look back for something, but for those who enjoy their privacy, there are ways to prevent Google from going through your search history. For more information, please give us a call or send us an email. We are more than happy to help in any way we can.

Published with permission from TechAdvisory.org. Source.

Topic Google
September 21st, 2016

2016september21_security_aAs with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival -- or demise -- of a business. If you’re looking for a list of the industry’s most relevant terms, you’ve come to the right place.

Malware

For a long time, the phrase ‘computer virus’ was misappropriated as a term to define every type of attack that intended to harm or hurt your computers and networks. A virus is actually a specific type of attack, or malware. Whereas a virus is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as a type of malware.

Ransomware

Don’t let all the other words ending in ‘ware’ confuse you; they are all just subcategories of malware. Currently, one of the most popular of these is ‘ransomware,’ which encrypts valuable data until a ransom is paid for its return.

Intrusion Protection System

There are several ways to safeguard your network from malware, but intrusion protection systems (IPSs) are quickly becoming one of the non-negotiables. IPSs sit inside of your company’s firewall and look for suspicious and malicious activity that can be halted before it can deploy an exploit or take advantage of a known vulnerability.

Social Engineering

Not all types of malware rely solely on fancy computer programming. While the exact statistics are quite difficult to pin down, experts agree that the majority of attacks require some form of what is called ‘social engineering’ to be successful. Social engineering is the act of tricking people, rather than computers, into revealing sensitive or guarded information. Complicated software is totally unnecessary if you can just convince potential victims that you’re a security professional who needs their password to secure their account.

Phishing

Despite often relying on face-to-face interactions, social engineering does occasionally employ more technical methods. Phishing is the act of creating an application or website that impersonates a trustworthy, and often well-known business in an attempt to elicit confidential information. Just because you received an email that says it’s from the IRS doesn’t mean it should be taken at face value -- always verify the source of any service requesting your sensitive data.

Anti-virus

Anti-virus software is often misunderstood as a way to comprehensively secure your computers and workstations. These applications are just one piece of the cybersecurity puzzle and can only scan the drives on which they are installed for signs of well known malware variants.

Zero-day attacks

Malware is most dangerous when it has been released but not yet discovered by cybersecurity experts. When a vulnerability is found within a piece of software, vendors will release an update to amend the gap in security. However, if cyber attackers release a piece of malware that has never been seen before, and if that malware exploits one of these holes before the vulnerability is addressed, it is called a zero-day attack.

Patch

When software developers discover a security vulnerability in their programming, they usually release a small file to update and ‘patch’ this gap. Patches are essential to keeping your network secure from the vultures lurking on the internet. By checking for and installing patches as often as possible, you keep your software protected from the latest advances in malware.

Redundant data

When anti-virus software, patches, and intrusion detection fail to keep your information secure, there’s only one thing that will: quarantined off-site storage. Duplicating your data offline and storing it somewhere other than your business’s workspace ensures that if there is a malware infection, you’re equipped with backups.

We aren’t just creating a glossary of cyber security terms; every day, we’re writing a new chapter to the history of this ever-evolving industry. And no matter what you might think, we are available to impart that knowledge on anyone who comes knocking. Get in touch with us today and find out for yourself.

Published with permission from TechAdvisory.org. Source.

Topic Security
September 19th, 2016

2016september19_voip_aA lot goes into upgrading your phone system, and in cases where a traditional PBX system is being replaced by an off-site VoIP solution, there are many details to consider. One aspect often overlooked is the way hold music and messaging are set up; but this is something that needs to be taken quite seriously. After all, it influences whether your customer - or potential customer - waits patiently on the line or hangs up and goes away.

When an operator asks a client for permission to put them on hold, what they’re really saying is “Can you wait there a short time not talking to anybody?” It’s a small window of speech-free standing-by that occurs at different times throughout a call, and for different durations.

And, it can result in two distinctly different outcomes: an untroubled customer who will stick around to finish their business, or a disgruntled one who will most likely quit the call and come back another time. With a VoIP phone system, a mix of engaging music, constructive messages, and interesting information can put the kibosh on finicky fleeing clients.

Music

We’d all agree there’s no accounting for taste when it comes to music, but there are some things you definitely DON’T want playing while a potentially agitated or impatient customer is on hold. So how do you choose the best sounds for them to hear whilst waiting?

With a VoIP system’s easy-to-navigate dashboard, you simply click a tab called “Hold Music” or something similar, and then upload your audio. Focus on trendy, easily recognizable music that suits your brand, and takes your clientele’s demographics into account.

You can also enter through your VoIP user interface freely to schedule how frequently a particular track plays and for how long, and to configure whether it restarts or continues where it left off when a caller is placed back on hold.

Marketing Messages

Your VoIP system’s audio files aren’t restricted to music, of course. There is a world of opportunity there to keep your on-hold customers not only engaged by sound, but marketed to, too. Remember, your goal isn’t just to eliminate silence, it’s to do so with a purpose.

“Hold message” scripts that riff on your company’s TV and radio ads might elicit an “I think I’ve heard this somewhere” response. Conversely, you could put a totally new spin on the usual tone and style of your marketing messages and really get creative with humorous mini-commercials that make your customers chuckle (and a little bit of levity never hurt nobody!).

You could also create files that catalogue your company’s services in unconventional ways, such as in alphabetical order; highlight seasonal promotions or other new specials; and announce upcoming product launches -- or simply hint at them to coax your customer into a bit of standby sleuthing. Whatever the case may be, your VoIP system’s interface makes it easy to have multiple messages at the ready.

Facts & Figures

Why is your customer doing business with you in the first place? Try to remind them while they wait, perhaps by telling them about your company’s founding fathers’ esteemed histories or about some of the innovations you’ve brought to your industry’s marketplace.

New information and intriguing anecdotes will take their minds off of the fact that they aren’t being served, so you could also pose a playful trivia or “Did you know?” kind of contest where providing a correct answer once the call resumes wins them a prize.

Or, tailor-make announcements that make it clear you’re doing your best to solve the customer’s issues: whether they went through the “internet service” IVR menu or they’re there to “renew membership,” program your VoIP system to play an upbeat, service-appropriate message that makes them feel like they’re getting personalized care.

VoIP functionality actually gives you an opportunity to turn the on-hold experience into a positive customer service experience. So if you’re looking for a way to make sure the window of speech-free standing-by doesn’t slam shut, get in touch with us today and we’ll help you increase the odds that your clients hold the line happily.

Published with permission from TechAdvisory.org. Source.

Topic voip
September 15th, 2016

2016september15_socialmedia_aHow many times have you heard the saying “It’s not about what you do but who you know”? -- probably too many to count. Regardless of whether that’s your current business mantra, it's hard to ignore the advantages of tapping into your network. From landing jobs to furthering your career, the benefits of building relationships are undeniable. If you’re thinking, “Well, that sounds easier said than done,” you’re right. But here’s a tool that can lend you a helping hand: LinkedIn Alumni.

Get started

Access the Alumni tool by going to the homepage and hovering over “My Network.” Then select “Find Alumni.” From there, you are free to perform any search for individuals who have attended your school. You can apply one or more of the following filters:
  • Where they live (geographic location)
  • Where they work (company)
  • What they do (job function)
  • What they studied (major)
  • What they’re skilled at (LinkedIn skills)
  • How you are connected (first- and second-degree connections, group members, etc.)
On top of that, you can also identify alumni by the year they attended school, or you can conduct a text search for specifics that don’t fit in any of the listed filters.

The benefits of LinkedIn Alumni

Imagine that you’re looking for work in a new city. Let’s say you're looking for a marketing job in Texas. With the Alumni tool, select “Dallas/Fort Worth” area under “Where they live” and “Marketing” under “What they do.” If you are interested in a specific area of marketing like social media, you can refine your search by selecting “Social Media Marketing” for the “What they’re skilled at” filter. The more you target your search, the more relevant your results will be. From there, you can sift through profiles and send messages to those you want to have an actual conversation with. You can dip your toes into the water first by setting up an informational interview or exchanging questions via email.

If you’re looking to change careers but don’t know anyone in your new sector, all you need is filter for your alma mater. It shouldn’t be hard to reach out to anyone who went to the same school as you, because going to that school is what you both share in common. If you want to know how others made the leap toward where you’re headed, you can use the “What they studied” and “What they’re skilled at” filters for further information. You might also be able to find an individual with a nontraditional background, but who’s nonetheless working in the industry you want. This person may have insight into how to land the job without possessing the typical required experience.

Know how to contact the candidates

After narrowing down your search by utilizing the appropriate filters, you now have a list of individuals you wish to connect with. Technically, you’re just about done with the “Alumni Tool” portion of the process, but you’re not at the finish line just yet. All that’s left is to reach out to the people in your list and make the most out of the search.

If you have a first-degree connection with certain people, message them by clicking on the envelope icon found below the job title. Without a first-degree connection, you’ll see a silhouette and plus sign below the job title. From there, look to the bottom right of the profile photo; if there’s a Venn diagram, hover over it to see the connections you share. If you have a good relationship with one of these mutual connections, you should consider reaching out to see whether he or she would be willing to make an introduction.

There are a few ways to connect even without mutual connections. One option is to leverage your school’s alumni database to find contact information. Another is to send a personalized connection request. In the message, politely and briefly explain your reasons for wanting to connect. That should do it!

When used properly, networks truly are the keys to success. Like any other untapped resource, you must proceed with caution and know how to fully utilize it. If you have questions or concerns regarding LinkedIn’s Alumni tool, don’t hesitate to call in or send us an email. Let us be a part of the success that awaits you.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
September 14th, 2016

2016september14_businesscontinuity_aDelta is paying big for the IT outage that occurred last month: millions of dollars in damages, 2300 cancelled flights, and significant reputational damage. Despite the harsh cut to the airline’s bottom line, Delta will probably still survive. But the real question is this: Can your business survive after long periods of downtime? A natural disaster, power outage, or successful hack can be the downfall of many small- to medium-sized businesses. But if you learn from the lessons of Delta’s IT mishap, your organization has a good chance of staying on its feet.

Strive for 100% redundancy According to Delta’s chief information officer, a power failure caused the company’s data center to crash, grounding thousands of would-be passengers. Although power was restored six hours after the incident, critical systems and network equipment failed to switch to a secondary site, corrupting valuable data in the process. And while some systems failed over, other vital applications didn’t; this created bottlenecks, decreased revenue, and diminished customers’ confidence.

Delta’s case is a massive wakeup call not just for the airline industry but for every business -- large and small. Companies must implement disaster recovery plans for their data centers, on-site technology, and Cloud applications to continue servicing customers while fixing the main issue with their primary systems. Companies also need to get rid of the false notion that redundancy plans to assure service continuity is restricted to larger corporations. DR and business continuity solutions are extremely affordable today, and a partnership with a provider can help you in more ways than one (more on this later).

Always test your backups

So although Delta had a plan to bring its business back to normalcy, the DR plan left a lot to be desired in practice. This begs the question as to whether the airline company is actually testing, reviewing, and reinforcing its vulnerabilities to different disasters.

The point is that even though your company may have a failover protocol in place, that protocol adds no value to your business unless it has been rigorously tried and tested. In order to avoid the same fate as Delta, make sure to find out whether your disaster recovery plan is capable of running mission-critical applications like email and customer service applications before -- not after -- downtime occurs.

Account for different types of vulnerability

In an interview with the Associated Press, Delta CEO Ed Bastian said, “We did not believe, by any means, that we had this type of vulnerability.” Indeed, it’s often hard to foresee what threats and vulnerabilities a natural disaster, power outage, or hacker can produce. But it’s not impossible.

By conducting a comprehensive audit of your data center security and disaster protocols, your business will be more aware and adept at minimizing the risk of potential disasters. This also means evaluating and preparing for disasters that are likely to happen to your business depending on its geographic location. Southern US, for instance, is prone to hurricanes and flooding.

Call for help

These lessons and strategies are all crucially important, but pulling off a DR and business continuity solution on your own may be difficult. For this reason, it’s critical to have a planned partnership with a managed services provider that can assess, plan, test and install the continuity solutions your business needs in order to minimize the impact and avoid encountering a Delta IT outage of your own.

To find out more about business continuity and guaranteeing complete IT redundancy, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic business
September 13th, 2016

2016september13_office_aMany suffer from glossophobia, the fear of public speaking. Reasons vary, from traumatic childhood experiences to the inability to imagine your co-workers in their underwear. Enter Microsoft PowerPoint. This program helps visually depict a presentation, whether it be for a class project or a boardroom meeting, or to convince parents to buy your first car. With the nine following tips, you can maximize the efficiency of your next PowerPoint presentation.

Start slideshows instantly

The audience doesn’t want to see the speaker’s cluttered desktop or unread emails as the PowerPoint presentation is being set up. Simply name the file with a .PPS or .PPSX file extension and voilà! Bypass the editing mode and start the show with a double click and end it with the Esc key.

Pull back the focus with Blackouts and Whiteouts

Audience members have the tendency to lose focus or drift away when presentations are longer than usual. If you suspect audience members are starting to lose focus, hit the B key for a complete blackout or the W key for a total whiteout. Then hit any key or click the mouse to return to the slides - this technique helps get the eyes back on you, where they belong.

Say no to bullet points

Both Steve Jobs and Tim Cook agree that bulleted lists aren’t the ticket. A better way to create lists is to drop each item in one at a time, if possible, next to a big image that is the main focus of your presentation. Don’t forget to talk about each individual list item, but not with bullets.

Insert pictures from Flickr and OneNote

Jazz up presentations by including images or memes that’ll make the audience laugh instead of doze off. Head to the Insert tab and select Online Pictures; you’ll see Office.com Clip Art, Bing Image Search, Flickr, OneNote and even Facebook. The vast pool of online imagery is now at your disposal.

Chart animation

The challenge doesn’t lie in inserting the chart into the presentation, but in making it interesting. Enter chart animation. After inserting the chart, click the Animations tab and activate the Animations pane. From there, click Add Animation. Pick an animated effect. Then, in the Animation Pane where you see the entry for the chart's animation, right click and select Effect Options.

This lets you customize sound and animation timing. But on the final tab—Chart Animation—be sure to change Group Chart from "As One Object" to "By Category." This makes charts display on screen one element at a time as you click, with bars or pieces of pie arriving one after the other, as if each was its own slide.

Kiosk presentations

Kiosk mode simply plays your presentation on a loop without allowing any human intervention or desktop access. This is ideal for trade shows and kiosks that you’d find in malls. Simply click the Slideshow tab > setup Slideshow > and in the dialog box, click next to Browsed at kiosk. Duration, audio, animation and transitions are fully customizable.

Extend music over multiple slides

Why confine your favorite tunes to just one slide? Expand it over the duration of your presentation by clicking on the speaker icon that indicates the embedded audio. Look for the Audio Tools above the tabs on top. Now select the new Playback tab, and in the Start section make sure to check the box for “Play Across Slides.” And presto, the audio is played across the next few slides or until the music runs out.

Duplication

If you are constantly reusing the same element throughout your presentation, the good old Ctrl-C+Ctrl-V is fine, but Duplication is better. Hold Ctrl while you click and drag on the object to create an exact dupe, keep selecting and making dupes and they’ll all space themselves out evenly. You can even dupe entire sets of slides; simply select one or more slides on the left navigation pane, select Insert, click New Slide menu and select Duplicate Selected Slides.

Animate, animate, animate

Any element of a PPT slide is animatable. Choose the element, go to the Animations tab, and at the right end of the Animations Gallery, click the down arrow to get "More." You can choose from many options about how an element appears, gets emphasis, or disappears—but for animated motion, go to the fourth section. If you pick Custom Path, you can get the object to do just about any wild motions you want on the screen before it settles down. Keep in mind that you don’t want an audience with motion sickness. PowerPoint presentations are complicated -- that’s a fact. So is how effective it becomes once utilized properly. If you have any further questions regarding our tips or how to execute them, please feel free to give us a call or send us an email. We’re more than happy to answer all of your questions.
Published with permission from TechAdvisory.org. Source.

Topic office
September 8th, 2016

2016september8_virtualization_aSometimes technology solutions seem safer merely because they’re not widespread enough to be a lucrative target. Although increasingly popular, virtualization’s resilient protection protocols and low adoption rates tend to offset the cost vs. benefit considerations of creating an exploit. Or at least, that was the case. Late last month VMware announced an update to patch a gap that allowed attackers to compromise virtualized cloud infrastructures. We’ve compiled everything you need to know to protect yourself here.

Since its first software release in 2001, VMware has remained the leading provider of virtualization platforms, with most sources estimating double-digit leads in market share over the nearest competitor. By creating virtual environments stored on a network server or in a cloud environment, the company has given their clients the ability to create workstations, software, and even networks that can be utilized remotely. Fast forward to today, and VMware is working overtime to maintain its reputation by preempting software security vulnerabilities.

Obviously, when delivering any kind of specialized privileges over a network, adequate protection is of the utmost concern. In this case, two services for managing mobile clouds (vIDM and vRealize) were found to be vulnerable to exploits wherein users with minimal rights could cheat their way into full administrative privileges.

The security team at VMware elaborated that when executed in just one of the two services, this flaw would not be considered critical. However, when combined, it could pose an imminent threat to the security of your cloud infrastructure. To amend this oversight, ask your managed services provider or IT staff to update vIDM and vRealize to their most recent versions (2.7 and 7.1, respectively) as soon as possible. If this can’t be achieved in a realistic time frame, blocking port 40002 would act as a temporary workaround.

Sufficient security requires by-the-minute responses to the latest breaches and exploits. By partnering with us, you’ll never need to worry about checking in regarding patches or breaches you read about in the news. Instead, you’ll be hearing about them from us when we come around to install the updates. Choose the safe option -- contact us today with any of your virtualization needs or questions.

Published with permission from TechAdvisory.org. Source.

September 6th, 2016

2016September6_Google_AIn today’s day and age, staying on top of your tech game is no easy feat, especially when new innovations pop up every single day. Today, many small- and medium-sized businesses have realized the benefits of adopting cloud database services for the betterment of their company. Google has recently announced many updates concerning its cloud services, all of which have surpassed the beta stage -- music to the ears of business owners.

Google recently came forward with an array of announcements regarding its Cloud Platform -- in particular, its various cloud database services. Major updates have been implemented to its budget cold data cloud storage service: Nearline, increasing disk volume speed and allowing users to use personal encryption keys to Cloud Storage.

On the database side, Google’s cloud database services have officially left the beta station. For example, the second generation version of Cloud SQL, a tool that aids in running and managing MySQL databases in the cloud, is now available after nine long months. Another NoSQL database, Cloud Bigtable, which focuses on large analytics and operational workloads, is now available as well.

Another service making its way out of the beta works is the API for Google Cloud Datastore, Google’s own web and mobile app workload NoSQL database. Cloud Datastore has been available for quite some time, yet developers were only able to use it as a part of the Google App Engine. With the introduction of the API, developers are able to utilize it outside of the Google App Engine as well. Favored by the likes of Snapchat, Cloud Datastore currently handles up to 15 trillion requests monthly.

Among the various additions to these services throughout the course of their betas, the one that users most look forward to is the SLA (service-level agreement) backing, which provides Cloud Datastore with 99.5% monthly uptime. Good news for those wishing to use Microsoft’s flagship database server within the Google Cloud, there are now (still in beta) SQL Server images with built-in licenses with the capability of bringing existing licenses onto its platform.

In order for Google to exceed Microsoft’s popularity in the running of cloud SQL servers, they must allow enterprise-level users to bring their existing applications and workloads to the cloud. Storage-wise, Google’s affordable cold data storage service, Nearline, is in direct competition with Amazon’s Glacier storage, which also provides low availability guarantees for an affordable price. In the past, Nearline users had to deal with data access latency of 3-5 seconds; but since the latency is gone, access is “almost real-time.”

On top of that, Google’s Persistent Disk volumes are faster with a maximum read and write IOPS (Input/Output Operations Per Second) that has risen from 15,000 to 25,000. This is useful to both database applications and other types of local data storage as well.

The Google team stated that “Today marks a major milestone in our tremendous momentum and commitment to making Google Cloud Platform the best public cloud for your enterprise database workloads.” If you thought Google wasn’t taking its Cloud Platform seriously, think again.

Published with permission from TechAdvisory.org. Source.

Topic Google