July 2012
In this issue

> Mobile Workforce
> Get More Hours in Your Day
> Cool Things About HP ProLiant Servers
> When to Consider a Server
> Create a Table of Contents
> Business Continuity Tip
> Cartoon/Quote

Zip! Create a Table of Contents in Two Steps
used with permission from Microsoft

Word makes it really easy to create a Table of Contents (TOC). It's a two-step process: first you assign a "style" to each heading in your document, and then you tell Word where to create the TOC.

Let's say you're creating a sales proposal to convince Fabrikam, a medical-device distributor, that they need your line of ultrasound products. You have sections for product specifications, a product catalogue, pricing, and more. You need to roll all of them up into one TOC, so Fabrikam's CIO can see at a glance what you'll cover at the pitch meeting.

Assign Styles to Headings

A style is a set of formatting instructions that you apply to a heading such as its font, size, and color.

Let's start by assigning a style to the top-level heading in your document. Select the heading, and then go to the Styles group on the Home tab, and click Heading 1.

Read more


Business Continuity Tip

Fuel to the Fire
It seems that each summer our nation is plagued with wildfires. And this year is no exception. According to FEMA, 11 states are currently being affected by wildfires, including the record-breaking flames scorching New Mexico and Colorado. Click here for a map of current fire activity.

Wildfires often begin unnoticed but become massive quickly, igniting brush, trees, homes and businesses in their path of destruction. Preparation and risk management is the key to protecting your business from fire damage and losses.



Please forward this newsletter to anyone else in your organization who might be interested!

Help Protect Your Mobile Workforce From Cyber Attacks
used with permission from HP Technology at Work

The shift from office workers becoming mobile and at-home workers is unavoidable. As technology makes it easier for employees to access the same information outside the office as inside, companies are often left scrambling to figure out how to keep their data secure.

Mobile employees take their notebook PCs with them when they€re traveling or working from home, yet they access information in the same way they would in the office. One problem that mobile workers face is they might not always have the full protection of the corporate firewall or other security systems. As a result, their notebook PCs have increased exposure to viruses, worms, and other types of malware, increasing the risk that these machines will become infected or compromised. When these notebook PCs are later reconnected to the office network, their machines can be used as an entry-point for theft or other attacks.

Read more


How to Get More Hours in Your Day: A Managed IT Service
used with permission from the Cisco Small Business Resource Center

How many staff hours would your business reclaim by outsourcing network maintenance and support?

A managed service provider (MSP) can handle it for you around the clock--remotely monitoring your network, proactively averting problems, updating and patching systems, and responding to tech support calls. And it would probably save you money too.

Re-Allocating Management Time

Have you calculated how much management time (and salary) is being eaten up by IT problems?

"The IT management at one of our client companies had been assigned to the director of finance, because he was the best qualified employee to do it," says Austen Clark, sales director at Clark Integrated Technologies (CIT). "But he realized that he was spending 70 percent of his time--over US$55,000 of his salary--dealing with IT issues rather than managing the company's financials. So he outsourced the IT responsibilities to us".

Read more


10 Cool Things About HP ProLiant Servers
used with permission from HP Technology at Work

In today€s data centers, an IT manager€s life is more hectic than it should be. Error alerts, system events, installation and update issues, and calls to support desks make it hard to get anything done. But HP€s next generation of servers€HP ProLiant Gen8€revolutionizes that experience. Allowing IT professionals to monitor networks remotely and lightening their loads via a slew of automated, intelligent features, these really are the world€s most self-sufficient servers. Here€s why:

  1. Early video. We designed in the ability to display video within 3 seconds after the server is powered on. This is in contrast to previous generation servers which could take one or more minutes to receive video, thus giving customers status and error alerts where previously they would receive a black screen no boot error.
     
  2. HP Intelligent Provisioning. Everything you need is pre-loaded for painless system setup and deployment. In fact, this leads to 45% fewer steps and 3 times faster deployment.

Read more


When to Consider a Server
reprinted with permission from the HP Small Business Center

You read business technology articles and you talk with savvy IT professionals. The message from both is that key business systems are built on servers, but what exactly does that mean? "Server" is a broad term that may quickly bring a host of questions immediately to mind:

  • How is a server different from a desktop system and can you use a high-end desktop in place of a server?
  • What are storage area networks?
  • How do you know when you need a server?
  • Do you need more than one server?
  • How much memory and disk space will it need?
  • Will you have to replace it in six months?
  • And of course, how much will it all cost?

How is a server different from a desktop?

Read more




 

Quote of the Month

"I like to see a man proud of the place in
which he lives. I like to see a man live so that his place will be proud of him.
"

- Abraham Lincoln


Databranch, Inc.
132 North Union Street, Suite 108    |     Olean, New York 14760
(716) 373-4467 - Olean    |    (607) 733-8550 - Corning/Elmira
www.databranch.com


Databranch does not knowingly participate in SPAM.   If you wish to be removed from this list, please follow the link below and you will be taken off this list.  Thank you for your interest in our e-newsletter.