Our Blog

April 17th, 2015

Hispanic Businesswoman Outside Office On Mobile PhoneIntegrating technology to reduce costs and increase productivity has always been a profitable approach for business owners. With the emergence of new technologies in recent years, businesses can take their pick from the best tools available. Among the best of these is the Windows Phone, the smartphone is packed with built-in functions suitable for various business activities. Here are some features you can implement in your business for better performance.

Data Sense

Nowadays, telecommunication service providers restrict your Internet usage to a few gigabytes of data on a monthly basis. When you’ve exceeded this data limit, your Internet speed goes down drastically, and you might even have to pay extra to maintain speed. Data Sense allows business users to stay productive while on the go by monitoring their data usage. You can set a monthly data limit and Data Sense will help you control background applications and save certain downloads for when you’re connected to a Wi-Fi network. This way, you can save your precious connection speed for when you need it most.

‘Running late’ notification

At important business meetings, you don’t want to be the one seen as unprofessional for turning up late, especially if you haven’t been able to let people know what’s happening. But even if you strive to be on time for every appointment, sometimes things are beyond your control. The ‘running late’ notification in the Windows Phone calendar app lets you send a quick message to your colleagues, to alert them to the fact that you’ll be late for a meeting. Simply do this by setting a default message, then choose a meeting in your calendar. The notification feature will pull contact information from your address book and send an email to attendees of your choice. Just make sure you have a good excuse when you do turn up!

Office Remote

This powerful application turns your Windows Phone device into a remote control for Microsoft Word, PowerPoint, and Excel documents. Business presentations are easier with Office Remote, which you can use to jump between PowerPoint slides and control a laser pointer to draw your audience’s attention. You can also use it to store your speech notes, and you can glance down to monitor your presentation time on the screen. Office Remote is simple to implement, requiring only Bluetooth and a small piece of add-in software that allows you to connect your Windows Phone and PC.

TeamViewer

What happens when you’re out of the office, and a client calls to request information stored on your computer? Well, the good news is you don’t need to rush to your desk. With TeamViewer, you can access your PC’s desktop right from your Windows Pphone device, as long as the computer is turned on and running the TeamViewer program. This can save you a lot of time when you’re outside and need to check a file or run a program on the go.

Mobile device management

If your business deals with confidential client information, then deploying Windows Phones to your employees can be risky. Microsoft has come up with Windows Intune, an application to centrally manage and secure your employee’s Windows Phone devices. Windows Intune allows the administrator to manage updates, control which applications can be installed, and protect the devices from viruses and malware.

If you want to integrate Windows Phones into your business, contact us today 623-444-2395 or ask@aztechworks.com to get started.

Published with permission from TechAdvisory.org. Source.
April 16th, 2015

Security_Apr1_CIf you think your email is fully protected from hackers, think again. A lack of sufficient email security measures can result in data theft, unauthorized access to sensitive information and the invasion of your computer by viruses and malware. Here are some tips to secure your email account from unwanted intruders and the many troubles that come with them.

Use separate email accounts

Most people use a single email account for all their personal needs. As a result, information from websites, newsletters, shopping deals, and messages from work get sent to this one inbox. But what happens when someone breaks into it? There’s a good chance they would be able to gain access to everything else.

Having multiple email accounts will not only boost your security, but also increases your productivity. You can have a personal account to communicate with your friends and family, another solely for receiving emails from work, and one recreational account for various website registrations and getting newsletters. Wise email users never put all their eggs in one basket!

Set strong passwords

Too many email accounts have predictable passwords. You might be surprised to learn that email passwords like ‘123456’, ‘qwerty’, and ‘password’ itself are still the most common around. For the sake of security, be a little more selective with your passwords. Spending a few moments on coming up with a good password will be beneficial in the long run. Mix upper and lower case letters, numbers, and special characters to form a unique password that makes sense and is memorable to you, but no-one else. Also, never use the same password for all your email accounts. This way, if someone hacks one of your accounts, all of the others are still safe.

When you see a link in an email, don’t click on it unless you’re expecting the link from a known source, such as from your friend or a confirmation link for your game account registration. The truth is that you never know where those links might lead you. Sometimes they can be safe, but other times they can infest your computer with viruses and malware.

Similarly, if you’re expecting a file from your friend or family, then go ahead and open the attachment. It’s always good to know the person sending the file. But be wary of attachments in emails from strangers. Even if the file name looks like a JPEG image, you should never open it. File names can be spoofed, and innocent files may be a clever virus in disguise, ready to latch itself onto your computer the moment you click on it.

Beware of email phishing

Phishing is a type of online scam when malicious users send you an email, saying that they’re representatives from high-profile websites like eBay, Facebook or Amazon. They claim that there’s a problem with your account, and that you should send them your username and password for verification. The fact is that, even if there was a genuine issue with your account, these companies would never ask for your password. You should ignore these phishing emails and sweep them into your spam box.

It all comes down to common sense when you’re dealing with email security issues. If you’re looking to secure your business emails, give us a call today 623-444-2395 or email ask@aztechworks.com and see how we can help.

Published with permission from TechAdvisory.org. Source.
Topic Security
April 15th, 2015

HealthcareIT_Mar16_AMedical institutions rely on their healthcare systems to facilitate the needs of their patients, whether through electronic medical records, prescription management or data entry software. Unfortunately, most healthcare service providers don’t realize how vulnerable their IT systems are to cyber attacks. One of the contributing factors to data breach is digitization. While there are several benefits of converting medical data from paper records into electronic files, there is no denying that it increases the risk of data theft. And since stolen healthcare information can be used to commit identity theft and financial crimes, securing healthcare data has become more important than ever.

According to healthcare security experts, healthcare data breaches are on the rise due to the high prices the data can command on the black market.

From financial information to medical information

In the past few years, cybercriminals’ focus has been on stealing financial data, including credit card numbers and personal information. But things are taking a turn, the result of financial institutions fortifying their database and raising client awareness of the problem. This is making it more difficult for hackers to steal financial data, let alone use them. Banks do their bit to protect their customers, too, by quickly identifying and canceling compromised credit cards.

Stronger data protection measures have forced criminals to turn their attention to medical data, which is typically much less secure. Patient data includes an individual’s date of birth, medical and physical records and social security number – information that can’t be easily reset, and that is significantly more valuable than credit card data.

Securing healthcare data

Healthcare data has become more attractive to criminals, and it’s crucial that medical institutions take necessary precautions to secure their patients’ information from data thieves. Here are some best practice measures to secure healthcare data.

  • Protect the network and Wi-Fi - As hackers use a variety of tools to break into IT systems and obtain medical records, healthcare organizations need to invest in secure firewalls and antivirus software to deploy on their healthcare devices. Network segregation is also a wise move so that, in the event that a breach does occur, the attacker can’t instantly access all of your organization’s information at once.
  • Educate employees - Staff members need to receive lessons about information security, including setting passwords, spam filters, protection against phishing, and other kinds of data breach methods.
  • Data encryption - Encrypting data is one of the safest ways to secure it. Healthcare institutions can encode patients information in such a way that only authorized users can access it. Multi encryption is also an effective way to keep out intruders.
  • Physical security - Most healthcare institutions still retain their patients’ records on paper, stored in cabinets. Ensure that all loopholes are covered by installing surveillance cameras and other physical security controls, such as electronic door locks.

It is of crucial importance for healthcare providers to secure sensitive information, in order to gain and retain the trust of your patients. If you want to know how your organization can better protect your patients information, give us a call at 623-444-2395 or email us ask@aztechworks.com.

Published with permission from TechAdvisory.org. Source.
April 14th, 2015

Sec C 164Are you concerned about internet security? Did you know there are a few simple ways to get increased protection that require only minimal investment of time? We’re not just talking about changing your passwords regularly or installing antivirus software. There are a few other methods that are less often talked about – here are three tips to boost your internet security that you might not have thought of yet.

Embrace two-factor authentication

Also known as two-step verification, most of us have likely dealt with this at one time or another. When you’re logging onto your bank’s website or your email account from a different computer than you normally use, you’re sometimes prompted for a one-time password – sent to you via text message, email or via some other method.

Nowadays, many sites such as Facebook, Dropbox and Twitter also give you the option to use two-factor authentication each time you log in. So if you’re looking for an easy way to up your security, it can give you that extra protection without slowing you down too much.

Update browsers and devices

Did you know that dated versions of browsers, operating systems and even other software packages can create an easy entry point for hackers? Often, new updates are created specifically to fix security holes. And hackers are ever aware that people can be lazy – saving that update for another day that never seems to come. They’ll often try to take advantage of this, searching for outdated devices to infiltrate while their victims watch YouTube on last year’s version of Firefox.

Yes, installing an update might take 15 minutes of your time. But it can pay dividends in preventing a security breach that could cost you or your business thousands.

Use HTTPs

When was the last time you typed those letters into a browser? Probably not this decade. It’s no wonder most people are unaware of this tip. So for those who are oblivious, https is the secure version of http – hypertext transfer protocol. Believe it or not, that last “s” actually adds an extra layer of protection. It encrypts information sent, both ways, between a website’s server and you.

You’re probably thinking, adding that last “s” to http (or even typing in http in general) is a complete pain in the rear. So to make this easier you can actually install a program like “HTTPS Everywhere” that’ll automatically switch an http into an https for you. Currently “HTTPS Everywhere” is available for Firefox, Chrome and Opera.

Looking for more tips to boost your internet security? Get in touch us at 623-444-2395 or ask@aztechworks.com to find out how we can help.

Published with permission from TechAdvisory.org. Source.
Topic Security
April 13th, 2015

Hardware_Feb26_CYou’ve been for your morning run while wearing a watch that checks your heart rate. You pop on your Google Glass headset to check the morning’s emails, and the chain hanging around your neck begins to vibrate with an incoming text message. Even if you are not the world’s biggest wearable tech user at the moment, this is a big trend and one that’s here to stay. Having productivity boosting technology attached to your person can make you more effective in your business and personal life than you imagined. Yet many consider Google Glass to have been something of a flop, and the Apple Watch could be headed for slow consumer take-up – here’s why you shouldn’t go throwing caution to the wind when it’s released. Personally I never buy version 1 of any new product no matter who created it. I leave that to others to do the beta testing for me.

The battery dwindles all too quickly

Much like your smartphone – perhaps even more so, in fact – if you buy yourself an Apple Watch then it’s likely you will want it to travel with you everywhere. That means it’s going to be on your wrist, in use and burning through its battery charge, for a good portion of the day. It might not be running at full capacity the whole time, but it’s unlikely to be on complete standby either. You might use it to check the time, the weather, your e-mails. It might sound an alarm when you need to leave the office for a client meeting, display your fitness regime progress at a glance, or help you find directions to the convention you’re attending tomorrow morning.

And while Apple claims its Watch will hold out on you for between three and four days when in one of two standby modes, in truth there’s no way those modes are going to get much use when you’re playing with your brand new toy. In fact, experts believe that with moderate to heavy use you could expect it to begin powering down after just two and a half hours. That’s not much help if you are hoping to use it as a more convenient replacement for your smartphone. Though Apple is rumored to be mulling over a more powerful battery, that will likely be released at some point in the future – in the meantime, less than perfect battery life will be off-putting to potential Watch users.

It’s late to the party

Okay, so Apple has demonstrated before that it can show up after everyone else and still do a great job of ruffling feathers – it certainly wasn’t the first smartphone around, and yet it has managed to do an impressive job of market domination. But Apple’s rivals have been in the smartwatch arena for some time and that means companies like LG, using the Android Wear platform to develop their devices, have the benefit of almost a year of customer feedback behind them. Put simply, they already have more of an idea than Apple as to what consumers are looking for in terms of both design and features. With Apple likely to be playing catch-up for some time, it seems probable that it will be a while before the Apple Watch will become a must-have gadget.

It’s just too Apple – and yet not

Apple has carved a reputation out of devices that sell themselves thanks to killer apps that make them essential purchases. When the idea of the Apple Watch was first touted, it was meant to do the same – a comprehensive fitness regime tracking app that revolutionized your exercise routine would have put it well and truly on the map. Yet technological capability and regulatory compliance appear to have got in the way, and what has made it to market seems to be a watered down version of the dream. Without this, the device looks to be scheduled for release with little to really wow its audience aside from incorporation of the Apple Pay service.

And yet Apple Watch appears to have burned itself on two fronts because, while its apps have failed to impress critics, the distinctive Apple design goes against the grain of industry efforts to make wearable tech look less tech-y. With watches especially, the aim has been to produce devices that look like their traditional, analog cousins, in order to make it feel more socially acceptable to wear them. Nonetheless, having the latest iPhone release has undoubtedly become a status symbol, and Apple’s refusal to rein in its branding could prove to be a worthwhile gamble and make the Apple Watch even more attractive to consumers.

Of course, Apple will count on its legions of fans to make the Watch a success in spite of whatever shortcomings it might have. Wearable technology is certainly here to stay, and the Apple Watch release is a development for both consumers and businesses to keep a close eye on. Though you might want to hold back on the Apple Watch being the productivity boosting device your company has been longing for, it could yet win its way into our technological hearts – you’ll have to watch this space (excuse the pun).

To learn more about the benefits to your business of wearable technology and other hardware solutions, give us a call today at 623-444-2395 or email us ask@aztechworks.com.

Published with permission from TechAdvisory.org. Source.
Topic Hardware
April 10th, 2015

SocialMedia_Mar16_CThere was a time when social media platforms were hashtag-free. But the reality in today’s online world is that hashtags are one of the most prominent tools used in social media. And with more businesses than ever engaging in social media to stay competitive, let’s take a look at how different social media sites make use of hashtags, and how you can use them to the advantage of your business.

Twitter

Twitter hashtags don’t support special characters like +, !, $, %, -, ^, &, * but do support letters, numbers and underscores. There are no hashtag limits as long as you keep your message within the usual 140 characters.

The best way to use hashtags in Twitter is through hosting and participating in Twitter chats. You don’t need to be in an event to network with people through the official hashtag; event organizers usually market the official hashtag very well. In other words, you’ll get additional exposure if you use it.

Useful Twitter hashtag tools include:

Hashtagify which tracks trending hashtags and shows related hashtags for any base terms you provide.
TwChat lets you discover, participate in and host Twitter chats. This is best used for monitoring and archiving any hashtag streams.

Instagram

Just like Twitter, Instagram hashtags don’t support special characters like +, !, $, %, -, ^, &, *, but do support letters, numbers and underscores. You can add up to 30 hashtags to a single photo or tag your photo after publishing it by listing the hashtags in the comments.

After you tag your post with a hashtag, you’ll be able to tap on the hashtag to see a page that shows all photos and videos people have uploaded with the same hashtag. Instagram hashtags can dramatically increase your following, especially if you use hot and trending hashtags which are easily found here.

The best use of hashtags on Instagram is to participate in hashtag games like #tbt (Throwback Thursday) and #MondayBlues. Both can increase your following and interactions since people click on these specific hashtags to see photos of other participants. Additionally, location-based hashtags also work very well on Instagram, whether abbreviated or in full, for example #LA and #LosAngeles.

Facebook

Facebook hashtags are similar to other social platforms; they support the standard set of characters including numbers, letters and underscore but don’t support special characters.

However, searching by hashtag on Facebook is a little unlike the rest, in that when you search for a hashtag you often end up on a Facebook page instead of a hashtag search result page. But there’s an easier way to generate hashtag search results – simply add the hashtag text after facebook.com/hashtag/, for example facebook.com/hashtag/cats.

You can also bring up hashtag search results by clicking on any hashtag in your Facebook stream. Do keep in mind that Facebook’s ranking algorithm is complex and seems to classify hashtags according to how closely you are related to the person posting the update, as well as how often the two of you interact.

The growing use of hashtags has changed how we use different social media platforms for the better. Still, it’s important to understand how these different platforms make use of hashtags in order to optimize them to your business’s advantage. Looking to learn more about how social media can help your business? Contact us at 623-444-2395 or ask@aztechworks.com today!

Published with permission from TechAdvisory.org. Source.
Topic Social Media
April 9th, 2015

BI_Feb4_CMicrosoft has just upped the ante on its data analyst products. The company recently announced that it will now be offering its Power BI product for free. It’s clear that Microsoft doesn’t want Excel to define the company in terms of data analysis. And this move could multiply their reach in the business intelligence sector by 10 times. But why is it free? Here’s what you need to know about Power BI and the likely reason behind its $0 price tag.

What is Power BI?

Power BI is a Cloud service which mainly functions as a self-service data analysis tool. What makes it unique is its use of advanced visualization options (graphs, charts, etc.) and the ability to find data by using natural language to ask questions and get answers. For example, you can simply type, “which department had the lowest sales profits last month?” and then get a chart that will visually display the sales from the different departments.

Another distinct characteristic of Power BI is its ability to collect and analyze data from various applications and services. These include Salesforce.com, Marketo, Excel, Zendesk and more.

And lastly, being a Cloud based service, the data is easily shareable, and employees can access it whether they’re in the office or on another continent.

Do I really need data analysis for my business?

It’s easier to get ahead of the competition if you know where you’ve been. With knowledge of your past failings or successes, you’ll know what methods and strategies are working and which ones aren’t. Then you can make appropriate business decisions based on facts and not assumptions.

For some, Excel may give you the ability to track all the Business Intelligence you desire – if the data you need is relatively simple and is kept all in one place. But if you have large amounts of data over various applications, then a product like Power BI can be a huge time saver since you won’t have to waste hours finding and organizing it.

If Power BI is so awesome, why is it free?

Power BI comes in two versions: the free one and a pro version for $9.99 a month. The pro version will feature more support for streaming data, quicker scheduled data refresh, and more storage. But light to medium data analysis users will still gain much from the free version.

Likely the real reason for the free version of Power BI is to capture market share from Tableau software, which currently dominates the self-service analytics market. Microsoft appears to be trying to create a simpler data analytic system that will be less complex than Tableau and more appealing to non-tech users.

And once they get sign-ups, Microsoft can then use this as a gateway to sell other Microsoft business products.

Published with permission from TechAdvisory.org. Source.
April 8th, 2015

Trouble aheadDisasters can happen at any time, which is why it is important for your company to have a business continuity plan. In the event your business gets hit with an unforeseen disaster, you’ll be able to minimize damage, downtime, and impact to your business operations. If you don’t have a contingency plan to protect valuable data and technology, you may face serious consequences, the worst of which is shutting down your business for good.

Relevant factors such as your business’s resources, location, suppliers, customers, and employees must be carefully analyzed before a business continuity plan can be formed. It is also necessary to test the plan and check whether it’s working or not. Here are some proven methods to test your continuity plan’s efficiency.

Review the BCP

You have a business continuity plan ready with all the necessary information, contingency locations, personnel, contacts and service companies. The question is can you really pull it off? Have the plan reviewed regularly, or at least quarterly. Gather a team of individuals, heads of departments and managers to discuss the plan. Focus on the business continuity plan’s feasibility and pinpoint any areas where it might be strengthened.

Determine time and duration to test the plan

You should decide how often you test your business continuity plan, and for how long. Even if you have a solid plan in place, it’s still wise to review it again after a few months. Come up with a schedule for testing the plan and share it with employees. Testing time may take anywhere from one day to two weeks. However it can also take as little as three hours to determine the effectiveness of the plan by monitoring employees’ responses and decision-making abilities, based on the guidelines of the business continuity plan.

Outline objectives to employees

Most business continuity plans fail because they have never been properly relayed to employees. Emphasizing the plan’s importance to your business and demonstrating it to employees is crucial. You need to outline objectives for the business continuity test to your employees, informing them how you plan to measure its success and failure, so that they get a general idea of their roles and your expectations.

Create a scenario

Create a fake scenario that affects your business – whether it’s setting off fire alarms or announcing another disaster. Employees should act as though the scenario is genuine, and refer to their duties in the business continuity plan, going through it step by step. Monitor the time it takes to get everything under control, from contacting customers to checking business resources and temporary meeting locations.

Evaluation

After the business continuity plan is put to test, gather your employees to discuss the plan’s overall performance. Identify where it needs improvement and encourage the parts that worked best. Make changes to key persons and actions where necessary, to ensure that the continuity plan is working at its best.

Having a business continuity plan is good, but testing it regularly is equally important. Contact us today at 623-444-2395 or email ask@aztechworks.com  op0and see how we can help you cope with unexpected disasters.

Published with permission from TechAdvisory.org. Source.
April 6th, 2015

MobileGeneral_Mar06_CAs the latest technology permeates the business world to an ever greater extent, consumers are increasingly turning to mobile payment platforms for the ease and convenience they offer in settling up without fumbling around for coins, notes and cards. And businesses that adopt these new technologies are the ones that are cleaning up with increased client conversion and retention, sales, and profit. The latest development in the mobile payment platform sector is the announcement of Google’s Android Pay platform – here’s what you need to know.

When Google launches Android Pay, it will act as more than just another app like Apple Pay, or Google’s existing Wallet app (which will continue to be in use, and will be powered by Android Pay). This means it will be useful to developers and retailers looking to allow users to make payments for products and services from right within their apps on Android devices.

Apple technology already enables iPhone users to buy goods in real-life stores using near-field communication (NFC), and Google’s Android Pay system will do the same. A similar technology to Apple’s is Google’s local storage of bank card information, which takes away the need for you to have a phone signal to make payments. There are also benefits to security – another feature that Android Pay will adopt from its rival is the use of one-time, automatically generated credit card numbers for each transaction. This helps to fight fraud because even if the retailer you shop with subsequently suffers a data breach, any card numbers the fraudsters get hold off would have expired already.

Google ultimately hopes that its Android Pay system will also include support for fingerprint scanning and other security features, further boosting the peace of mind you can have while using it to shop and settle up.

Competition is beefing up in the mobile payment platform arena. While Google Wallet failed to gain much traction when it first launched in 2011 – it was considered by many to be ahead of its time – the recent growth of Apple Pay appears to have revived hope in the Google alternative. What’s more, Samsung recently debuted Samsung Pay, which is big on payment security and will come as default on the latest models of the Galaxy and Edge range of devices. The Samsung system has the potential to quickly achieve far greater reach since, while Apple Pay only works where retailers already have NFC installed, Samsung recently acquired the firm LoopPay, and as a result Samsung Pay will also support the use of conventional magnetic credit card readers.

And even PayPal is moving in on mobile payment territory. Though the company has for some time had its own apps that make it easy to send cash to friends or suppliers, or to make purchases at participating retailers, PayPal is still better known for its web-based payments system. However, PayPal recently acquired Paydiant, a startup due to launch later in 2015 with a competitor to all the other mobile payment platforms, known as CurrentC. It could prove stiff competition indeed, since it’s backed by retailers like Wal-Mart and 7-Eleven.

Don’t be fooled into thinking that your business can ignore the rapid growth of mobile payments. To find out how to leverage them to your benefit, contact us at 623-444-2395 or email info@aztechworks.com.

Published with permission from TechAdvisory.org. Source.
April 3rd, 2015

iPad_Mar20_CIf you’re on-trend and at the forefront of developments in the Apple range, you’ve long since switched your allegiance from what suddenly seems like a clunky, oversized iPad, and are using the sized-down iPad Mini. The changes almost echo the trend in pre-smartphone times, when smaller, smaller, smaller was all we were hungry for. But, however you dress it up, size reduction almost always comes at the expense of functionality. Here’s why you might want to dust down your full-sized iPad and let it enjoy a new lease of life. Better still, grab a brand new iPad Air 2.

It’s big enough to share

Whether in meetings or on the go, the full sized iPad screen is better suited to showing documents, images and web sites to others. The iPad Mini may be more easily portable, but its screen size is comparable to that of the iPhone 6, and a phone just isn’t the best platform for displaying information to a group. The screen size on models like the iPad Air makes this much easier and more effective.

It takes great photos

For some time, the iPad camera seemed inferior to that of the iPhone. But the iPad Air 2 changes all that – the 9 Megapixel camera makes it perfect for photo needs in the office. We’re thinking instant capturing of whiteboard scribbles at the end of a brainstorming session, quickly and efficiently scanning documents, and maybe just the odd workplace selfie. It’s suddenly comparable to the camera power of the iPhone and superior to that of the iPad Mini. Combine that with the bigger screen, and the business productivity advantages of the full-sized iPad Air 2 are plain to see.

It’s a productivity machine

Again it comes partly down to the full-sized screen, but a more generously proportioned iPad – whether that’s the new iPad Air 2 or an older model – is simply better for getting the job done. While the iPad Mini boasts the same resolution as the iPad Air 2, the latter’s extra screen area gives you more space to work with. The Mini offers the same amount of limited room for maneuver as the latest iPhone model, which is fine when you’re on the move and want to complete a quick task on the fly, but less so when you need to get serious work done. The larger screen allows you to drag and drop information, move things around and switch between multiple applications at ease.

Getting the highest levels of productivity out of your technology is all about selecting the gear that works best for you. Want to learn how to best deploy iPads and other Apple devices in your business? Give us a call.

Published with permission from TechAdvisory.org. Source.
Topic iPad