Blog

October 16th, 2014

VoIP_Oct13_BVoIP has become one of the most popular communication systems implemented in small to medium businesses. While there are many different systems out there offering different solutions and features one element you should really look into is what experts call QoS, or Quality of Service. Here is a quick overview of what QoS is and some important questions to ask potential providers.

What is QoS?

When you hear VoIP providers or IT experts talking about Quality of Service what they are referring to is the overall performance of a VoIP system or network. This performance is usually measured by what the end-users think of as the system's performance and by looking at other statistics like bandwidth use, transmission (call) delay, error rates, etc.

Why is it important?

QoS is not just used for VoIP systems, in fact it has been something even traditional phone providers strive for. Think back to your original landline service, chances are that 99% of the time call quality was perfect, or near perfect. This is because traditional phone network providers invested in physical networks and connections that offer high QoS, all of the time. If you switch from one provider to another, there is a good chance that quality doesn't change.

With these well established physical networks, you are going to have to pay more though. Most traditional phone systems are more expensive than VoIP, because the network providers have to physically maintain their transmission network (phone lines, switches, etc.). This high-maintenance cost is also the reason why there are only a couple of phone providers in your area - it's just too costly for small companies to launch a traditional phone network.

The Internet, more specifically broadband connections, have enabled VoIP and therefore lead to a high number of VoIP providers, largely because you don't need to own the transmission network (in this case the Internet) to launch a VoIP platform. Because of this, the QoS amongst providers varies drastically.

What this means for you is that you should be taking a provider's QoS into account when looking for new VoIP systems. To help you ensure that you are getting the best possible, here are three questions you should ask each prospective provider:

1. How much of the network infrastructure your system uses do you own?

Almost every VoIP provider will rely at some point on public Internet in order to transmit their services. Essentially, the less infrastructure a company owns, the higher the risk that quality will be lower. Conversely, using more public systems means lower prices, so it really is a trade off you need to think about.

For businesses that rely on phone systems, one of the best options is to look for facilities-based providers. These companies own all, or most, of the network that carries VoIP calls and can therefore offer better services and quality.

2. How much traffic will run over public Internet?

This answer will vary amongst providers. Some of the most popular solutions amongst really small businesses and home users like Vonage will use almost 100% public Internet for their traffic. Other companies will use a mixture or public and private networks, often using public for more affordable services and private for high-end users.

For example, cable providers who offer VoIP calling will often use public Internet to carry lower-level traffic, while high-end business plans will often run on private networks. The reason to ask this question is because traffic that goes over public Internet networks will be subject to bandwidth sharing. If there is a high demand for bandwidth in the general area, call quality may drop.

3. What level of quality can you guarantee

Good providers will be able to guarantee a QoS that is comparable, or even better, than traditional networks. This is especially important for businesses who are looking to switch to a full VoIP solution. What a provider should do is run a few tests on your network and then give you a quality assurance. If it is too low, then look for another provider.

Want to know more about how VoIP can benefit your business? Get in touch with us first.

Published with permission from TechAdvisory.org. Source.

Topic VoIP General
October 16th, 2014

Productivity_Oct16_BFor a business to be productive there are a number of essential tools required, one of the most important being email. While there are numerous email providers and solutions, most rely on one of two protocols: POP or IMAP. These are a set of rules that dictate how data moves between systems, and the question many businesses should be asking is which protocol should they be using?

Difference between POP and IMAP

POP, or Post Office Protocol, was first developed in early 1984 and is currently in its third version (POP3). POP works by allowing users to retrieve email and download it onto their computer. Because this protocol was developed before constant Internet connections, it is meant to allow users to interact with their email on their computer and then connect to the server to send it.

What this means is that usually, you connect to the server and download all of your messages onto your computer and then disconnect from the server with all messages being deleted from the server. When you connect to the server again, the messages are uploaded from your computer to the server which then sends the messages to the recipients.

IMAP, or Internet Message Access Protocol, is a newer protocol that was designed for faster and constant Internet connections. Essentially, the email messages live on the server and the user downloads copies to their computer. When the copy is sent, it is uploaded to the server which then overwrites the message and sends it to the recipient.

Which protocol should my company be using?

While most email servers will support POP, many experts agree that it is best if companies use newer email protocols. The reasons for this are:
  • POP is largely outdated. As stated above, this protocol was first introduced in the '80s. The current, and most popular, version was introduced in 1989.
  • POP can be less secure. By default, older protocols can transmit password and login data unencrypted, which means anyone with access to your network and tools could gain access to the data.
  • POP can't support multiple devices. Due to the way POP works, only the currently connected client can see email messages. If you are on your mobile device, but logged into your email client at work, you won't get messages on your device.
  • POP lacks important business features. Most of us rely on calendars, address books, and task lists that are integrated into most email clients. With POP, these are most likely third-party solutions that live on local machines. This makes it difficult to access this information from other locations.
There are some really great newer email systems out there, including servers that run IMAP protocols, and even Web-based email solutions that pretty much negate the need for email servers in the office. If you are currently using POP, it may be worthwhile to contact us to see how we can help upgrade your email solution.
Published with permission from TechAdvisory.org. Source.

Topic Productivity
October 15th, 2014

iPhone_Oct13_BiOS 8 has, like other versions of iOS, added and improved upon features. One of the biggest changes has to be the drastic improvement of the Notifications Center. With the most recent release, this Center has seen a number of changes, including the introduction of widgets that allow users to truly customize how this feature functions.

Customizing Notifications Center with widgets

While the Notifications Center has been an iOS feature for a number of versions now, Apple finally added more functionality to the Center in iOS 8 by turning on widget support. Widgets are essentially small apps that are meant to provide some of the functionality of a main app.

In the case of Apple, widgets can be added to your Notifications Center to enhance the overall look and functionality. For example, if you have Evernote installed on your device, you can add a widget to the Notifications Center that allows you to quickly create a new note or recording without having to open the app. Other widgets allow you to add an enhanced weather forecast or even a calculator.

In iOS 8, widgets have been enabled by default and can be interacted with by swiping down from the top of your screen to open the Notifications Center. From here, you can tap on Today to view relevant information for the day. This information is from a widget Apple calls Today Summary. You can add more widgets to the Center by:

  1. Opening your Notifications Center.
  2. Tapping on Today.
  3. Scrolling down to the bottom of the screen and tapping on Edit.
This will open a screen that lists all of the available widgets. Widgets with a red circle and minus sign beside them are already added to Notifications Center, while apps under DO NOT INCLUDE can be added. Tapping the green circle with the plus sign will add the widget, while tapping the red circle with the minus will remove it.

You can change the order of the widgets too, by tapping on the three lines to the right of the name and moving it up or down. When you are finished hit Done at the top of the screen and you should see the changes implemented immediately. If you are looking for more widgets, you will need to install apps that are widget compatible. We've found that a quick Internet search for "iOS 8 apps with widgets" returns lists of some great apps for you to try.

Customizing notifications for various apps

As you install and update apps, you may find that they start notifying you whenever there is a change, or where it is desired that you pay attention to some new information. Some of these notifications can be quite annoying, especially if you aren't really using the app at the moment, or you deem the notifications to be useless.

You can customize your app's notification settings by:

  1. Opening the Settings app.
  2. Selecting Notifications from the Settings menu.
  3. Tapping on the app you would like to change the notification settings for.
In the screen that pops up you should see a number of options including:
  • Show in Notification Center - The maximum number of notifications to show in the Notification Center.
  • Sounds - Play a sound when you receive a notification from this app.
  • Badge App Icon - Show the app's icon in the notifications.
  • Show on Lock Screen - Show the notification on the device's locked screen.
You can toggle these on and off as you wish.

Turning notifications off

If you would like to turn off all notifications for an app, you can do so by:
  1. Opening the Settings app.
  2. Selecting Notifications from the Settings menu.
  3. Tapping on the app you would like to change the notification settings for.
  4. Sliding the radio to the right of Allow Notifications to Off.
If you are looking to learn more about iOS 8 and how to get the most out of your iDevice, contact us today.
Published with permission from TechAdvisory.org. Source.

Topic iPhone
October 13th, 2014

Source: 3D Corporation | Published October 13, 2009

Extreme weather during the fall and winter months can cause a wide variety of business-stopping events at your facility, but you can proactively protect your network from the elements by following 3D’s Network Winterization Checklist:

  • Ensure your important machines are protected with battery backup units (UPS).
  • Check the batteries in each UPS.
  • Test each UPS to prove it will power your systems in case of a power outage. The only way to know if they will function when it matters most is by testing them beforehand.
  • Check that all your equipment is plugged into surge suppressors. A power strip is not a surge suppressor unless it is labeled as such (they look the same).
  • Verify that all your network equipment, switches, router, and firewall are protected by a UPS.

Click here to read the entire article.

October 9th, 2014

Security_Oct07_BIn late spring of this year news broke of the biggest security issue to date - Hearbleed. Many companies leapt to secure themselves from this, but the fallout from it is still being felt. That being said, there is a new, even bigger, security problem called Shellshock that all businesses need to now be aware of.

What exactly is Shellshock?

Shellshock is the name applied to a recently uncovered software vulnerability which could be exploited to hack and compromise untold millions of servers and machines around the world. At its heart, the Shellshock vulnerability is based on a program called Bash. This is a Unix-based command program that allows users to type actions that the computer will then execute. It can also read files called scripts that contain detailed instructions.

Bash is run in a text-based window called a shell and is the main command program used by OS X and Unix. If you have a Mac computer and want to see what Bash looks like, simply hit Command (Apple Key) + Spacebar and type in Terminal. In the text-based window that opens in Bash you can enter commands using the Bash language to get your computer to do something e.g., eject a disc, connect to a server, move a file, etc.

The problem with Bash however is that it was recently discovered that by entering a specific line of code '() { :; };)' in a command you could get a system to run any following commands. In other words, when this command is used, Bash will continue to read and execute commands that come after it. This in turn could lead to a hacker being able to gain full, yet unauthorized, access to systems without having to enter a password. If this happens, there is very little you can do about it.

Why is this such a big issue?

To be clear: Shellshock should not directly affect most Windows-based machines, instead it affects machines that use Unix and Unix-based operating systems (including OS X). So why is this so big a deal when the majority of the world uses Windows-based computers? In truth, the majority of end-users will be safe from this exploit. However, the problem lies with bigger machines like Web servers and other devices such as networking devices, and computers that have had a Bash command shell installed.

While most users have Windows-based computers, the servers that support a vast percentage of the Internet and many business systems run Unix. Combine this with the fact that many other devices like home routers, security cameras, Point of Sale systems, etc. run Unix and this is becomes a big deal.

As we stated above, hackers can gain access to systems using Bash. If for example this system happens to be a Web server where important user information is stored, and the hacker is able to use Bash to gain access and then escalate themselves to administrative status, they could steal everything. In turn this could lead to the information being released on to the Web for other hackers to purchase and subsequently use to launch other attacks - even Windows-based systems. Essentially, there are a nearly unlimited number of things a hacker can do once they have access.

If this is not dealt with, or taken seriously, we could see not only increased data breaches but also larger scale breaches. We could also see an increase in website crashes, unavailability, etc.

So what should we do?

Because Shellshock mainly affects back-end systems, there is little the majority of users can do at this time. That being said, there are many Wi-Fi routers and networks out there that do use Unix. Someone with a bit of know-how can gain access to these and execute attacks when an individual with a system using Bash tries to connect to Wi-Fi. So, it is a good idea to refrain from connecting to unsecured networks.

Also, if you haven't installed a Bash command line on your Windows-based machine your systems will probably be safe from this particular exploit. If you do have servers in your business however, or networking devices, it is worthwhile contacting us right away. The developers of Bash have released a partial fix for this problem and we can help upgrade your systems to ensure the patch has been installed properly.

This exploit, while easy to execute, will be incredibly difficult to protect systems from. That's why working with an IT partner like us can really help. Not only do we keep systems up-to-date and secure, we can also ensure that they will not be affected by issues like this. Contact us today to learn how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
October 8th, 2014

iPad_Oct07_BFor iPad 2 and newer users, you are likely already aware of the fact that iOS 8 has been released, and are probably already using it. While the new version of the popular system introduces a number of great changes and features, there has been reports that the update has led to some older devices seeing a drop in their battery life. If you think this is happening to you, it would be a good idea to find out which apps are using the most battery power.

How to see the battery power apps are using on iOS 8

One of the first things you should do when you notice that your battery is draining faster than normal is to look at how much power each app is using. This can be done by:
  1. Tapping on the Settings app.
  2. Selecting General from the menu bar on the left-hand side of the Settings app.
  3. Tapping on Usage which is located in the menu that opens in the right side of the screen. Selecting Battery Usage.
In the window that opens you will be able to see basic battery information like how long you have used the device since its last charge, and how much power has been used. While this is useful in its own right, there is also valuable information about what apps are using the most power.

This data displays apps that are using the most power first, so you can quickly see what apps are power hungry and take action. In iOS 8, a new tab was actually introduced into the Battery Usage tracker, which shows a seven day running average of the most power hungry apps.

Tapping on the tab that says Last 7 Days at the top of the screen will bring this information up. This is useful because it gives you a better view of the truly power hungry apps.

What do I do with apps that are really draining my iPad's battery?

There are a number of things you can do, including:
  • Uninstalling the app: If the app with the highest battery drain isn't overly useful, then possibly the best step to take would be to uninstall it. Another option may be to look for a similar app and give that a try to see if it fares any better on battery use.
  • Change when you use the app: Some apps, like video recording suites, bandwidth or processing-heavy apps like games, drain your battery quickly when they are running. Instead of using them while on battery power, try to use them when your iPad is plugged into a power source.
  • Limit use until the app is updated: If you are experiencing battery drain, there is a good chance that other users are as well. You can either limit the use of the app until an app update is issued, (most updates will usually fix battery issues), or try to contact the developer directly. Take a look on iTunes for the app and you should see developer contact information there.
  • Dim the display: The iPad has a great display, and many apps look good when you have the display's brightness set at its brightest. The issue with this however, is that a super-bright display will drain your battery quickly. Try turning the display brightness down as low as possible in order to slow how fast the battery is drained.
  • Limit network connections: Similar to your display, having Wi-Fi or Bluetooth radios always on will also drain your battery. If you aren't connected to Wi-Fi, or don't have any Bluetooth devices, then it is best to turn them off. The reason for this is because if they are on, they constantly look for a connection which eats up battery power.
If you are looking for more ways to decrease or manage the power drain on your iPad contact us today to see how we can help.
Published with permission from TechAdvisory.org. Source.

Topic iPad
October 7th, 2014

Office365_Oct07_BMicrosoft Office is one of the most popular, and most installed, software suites in the world. For those looking to integrate it into their office, there are essentially two ways you can do so: Purchase Microsoft Office 2013, or Office 365. While you get Office with both of these options, there is confusion as to what the difference is between the two.

What is Microsoft Office 2013?

Microsoft Office 2013 is the latest version of Microsoft's popular Office suite. With apps like Word, PowerPoint, Excel, and more, it is mostly similar to all previous versions of Office. When you purchase this type of Office you receive a number of licenses allowing you to install this on up to five computers or devices - depending on the version (e.g., Home, Student, Professional) of Office that you get.

You can purchase these products outright, as you have done with previous versions of Office, but Microsoft is really pushing their subscription-based version of Office, what they call Office 365. When you subscribe to the Office 365 version of Microsoft 2013, you get the same software as you would if you purchased it outright, the only difference is you pay for it either monthly or yearly, instead of all at once.

What is Office 365 for business then?

Where it gets confusing for many is that in 2011 Microsoft launched a cloud-based version of Office for businesses also called Office 365. Despite the same name as the subscription-based version of Office 2013, this is a different product that is aimed at businesses.

Office 365 for businesses is a monthly (or yearly) per-user subscription service that offers businesses productivity software, enhanced communication apps like email and video conferencing; guaranteed security; and support for intranet and collaboration solution SharePoint.

With Office 365 for business, companies can sign up for a number of plans. Some of them, like Office 365 Small Business Premium and Office 365 Midsize Business, offer full versions of Office 2013 (including Word, Excel, PowerPoint, Lync, Outlook, Notes, Access, etc) that users can install on their computers or mobile devices. Other versions, like Office 365 Small Business, come with Office Web Apps which can be accessed via your browser.

Which is better for business?

Most businesses will benefit more from Office 365 because of the extra features and enhanced security. Not to mention the fact that the monthly per-user cost is usually lower when compared to licensing the same version of Office 2013 for each individual.

Some other benefits Office 365 for Business include:

  • All users are on the same version of Office: Because Office 365 for Business is based in the cloud and is managed via a central admin panel, you can ensure that all users have exactly the same version of Office, which in turn ensures that your files will be compatible.
  • Reduced licensing costs: If you were to purchase individual versions of Office 2013 for your employees, you could end up paying over USD $399 for the Professional version which can only be installed on one computer. Compare this with Office 365 Small Business Premium which costs USD $12.50 per user, per month and offers the same version of Office, along with more features.
  • Enhanced security and uptime: Microsoft guarantees that Office 365 software will be up and running 99.9% of the time, which means the programs you rely on will be available when you need them.
  • It's more mobile: With Office Web Apps and Office 2013 mobile apps you can take your work anywhere. Combine this with solutions like SharePoint which allow you to store documents in a central location, which makes it easier to access your files while out of the office. Beyond that, if you would like to use the Office mobile apps, you will need an Office 365 subscription.
If you are looking to integrate Office 365 into your organization, or would like to learn more, contact us today.
Published with permission from TechAdvisory.org. Source.

October 2nd, 2014

Security_Sep29_BBusiness owners and managers are becoming increasingly worried about the security of their systems and networks. While the vast majority have implemented some form of security, this may not be enough. In fact, we have helped a number of businesses with flawed security measures in place. The issue is, how do you know if your security is working sufficiently? Here are five common security flaws you should be aware of.

1. Open wireless networks

Wireless networks are one of the most common ways businesses allow their employees to get online. With one main Internet line and a couple of wireless routers, you can theoretically have the whole office online. This method of connecting does save money, but there is an inherent security risk with this and that is an unsecure network.

Contrary to popular belief, simply plugging in a wireless router and creating a basic network won't mean you are secure. If you don't set a password on your routers, then anyone within range can connect. Hackers and criminal organizations are known to look for, and then target these networks. With fairly simple tools and a bit of know-how, they can start capturing data that goes in and out of the network, and even attacking the network and computers attached. In other words, unprotected networks are basically open invitations to hackers.

Therefore, you should take steps to ensure that all wireless networks in the office are secured with passwords that are not easy to guess. For example, many Internet Service Providers who install hardware when setting up networks will often just use the company's main phone number as the password to the router. This is too easy to work out, so changing to a password that is a lot more difficult to guess is makes sense.

2. Email is not secure

Admittedly, most companies who have implemented a new email system in the past couple of years will likely be fairly secure. This is especially true if they use cloud-based options, or well-known email systems like Exchange which offer enhanced security and scanning, while using modern email transition methods.

The businesses at risk are those using older systems like POP, or systems that don't encrypt passwords (what are known as 'clear passwords'). If your system doesn't encrypt information like this, anyone with the right tools and a bit of knowledge can capture login information and potentially compromise your systems and data.

If you are using older email systems, it is advisable to upgrade to newer ones, especially if they don't encrypt important information.

3. Mobile devices that aren't secure enough

Mobile devices, like tablets and smartphones, are being used more than ever before in business, and do offer a great way to stay connected and productive while out of the office. The issue with this however is that if you use your tablet or phone to connect to office systems, and don't have security measures in place, you could find networks compromised.

For example, if you have linked your work email to your tablet, but don't have a screen lock enabled and you lose your device anyone who picks it up will have access to your email and potentially sensitive information.

The same goes if you accidentally install a fake app with malware on it. You could find your systems infected. Therefore, you should take steps to ensure that your device is locked with at least a passcode, and you have anti-virus and malware scanners installed and running on a regular basis.

4. Anti-virus scanners that aren't maintained

These days, it is essential that you have anti-virus, malware, and spyware scanners installed on all machines and devices in your company and that you take the time to configure these properly. It could be that scans are scheduled during business hours, or they just aren't updated. If you install these solutions onto your systems, and they start to scan during work time, most employees will just turn the scanner off thus leaving systems wide-open.

The same goes for not properly ensuring that these systems are updated. Updates are important for scanners, because they implement new virus databases that contain newly discovered malware and viruses, and fixes for them.

Therefore, scanners need to be properly installed and maintained if they are going to even stand a chance of keeping systems secure.

5. Lack of firewalls

A firewall is a networking security tool that can be configured to block certain types of network access and data from leaving the network or being accessed from outside of the network. A properly configured firewall is necessary for network security, and while many modems include this, it's often not robust enough for business use.

What you need instead is a firewall that covers the whole network at the point where data enters and exits (usually before the routers). These are business-centric tools that should be installed by an IT partner like us, in order for them to be most effective.

How do I ensure proper business security?

The absolute best way a business can ensure that their systems and networks are secure is to work with an IT partner like us. Our managed services can help ensure that you have proper security measures in place and the systems are set up and managed properly. Tech peace of mind means the focus can be on creating a successful company instead. Contact us today to learn more.
Published with permission from TechAdvisory.org. Source.

Topic Security
October 1st, 2014

BCP_Sep29_BWhen it comes to business continuity, many business owners are aware of the fact that a disaster can happen at any time, and therefore take steps to prepare for this, usually by implementing a continuity plan. However, the reality is that many businesses implement plans that could lead to business failure. One way to avoid this with your continuity strategy is to know about the common ways these plans can fail.

There are many ways a business continuity or backup and recovery plan may fail, but if you know about the most common reasons then you can better plan to overcome these obstacles, which in turn will give you a better chance of surviving a disaster.

1. Not customizing a plan

Some companies take a plan that was developed for another organization and copy it word-for-word. While the general plan will often follow the same structure throughout most organizations, each business is different so what may work for one, won't necessarily work for another. When a disaster happens, you could find that elements of the plan are simply not working, resulting in recovery delays or worse. Therefore, you should take steps to ensure that the plan you adopt works for your organization.

It is also essential to customize a plan to respond to different departments or roles within an organization. While an overarching business continuity plan is great, you are going to need to tailor it for each department. For example, systems recovery order may be different for marketing when compared with finance. If you keep the plan the same for all roles, you could face ineffective recovery or confusion as to what is needed, ultimately leading to a loss of business.

2. Action plans that contain too much information

One common failing of business continuity plans is that they contain too much information in key parts of the plan. This is largely because many companies make the mistake of keeping the whole plan in one long document or binder. While this makes finding the plan easier, it makes actually enacting it far more difficult. During a disaster, you don't want your staff and key members flipping through pages and pages of useless information in order to figure out what they should be doing. This could actually end up exacerbating the problem.

Instead, try keeping action plans - what needs to be done during an emergency - separate from the overall plan. This could mean keeping individual plans in a separate document in the same folder, or a separate binder that is kept beside the total plan. Doing this will speed up action time, making it far easier for people to do their jobs when they need to.

3. Failing to properly define the scope

The scope of the plan, or who it pertains to, is important to define. Does the plan you are developing cover the whole organization, or just specific departments? If you fail to properly define who the plan is for, and what it covers there could be confusion when it comes to actually enacting it.

While you or some managers may have the scope defined in your heads, there is always a chance that you may not be there when disaster strikes, and therefore applying the plan effectively will likely not happen. What you need to do is properly define the scope within the plan, and ensure that all parties are aware of it.

4. Having an unclear or unfinished plan

Continuity plans need to be clear, easy to follow, and most of all cover as much as possible. If your plan is not laid out in a logical and clear manner, or written in simple and easy to understand language, there is an increased chance that it will fail. You should therefore ensure that all those who have access to the plan can follow it after the first read through, and find the information they need quickly and easily.

Beyond this, you should also make sure that all instructions and strategies are complete. For example, if you have an evacuation plan, make sure it states who evacuates to where and what should be done once people reach those points. The goal here is to establish as strong a plan as possible, which will further enhance the chances that your business will recover successfully from a disaster.

5. Failing to test, update, and test again

Even the most comprehensive and articulate plan needs to be tested on a regular basis. Failure to do so could result in once adequate plans not offering the coverage needed today. To avoid this, you should aim to test your plan on a regular basis - at least twice a year.

From these tests you should take note of potential bottlenecks and failures and take steps in order to patch these up. Beyond this, if you implement new systems, or change existing ones, revisit your plan and update it to cover these amendments and retest the plan again.

If you are worried about your continuity planning, or would like help implementing a plan and supporting systems, contact us today.

Published with permission from TechAdvisory.org. Source.

October 1st, 2014

OSX_Sep29_BFrom the Macbook Pro to the light Macbook Air, Apple's laptops have become a popular device for many business users. As with all other laptops, these devices can run on battery power and being able to conserve this is worth knowing about. In fact, with all Apple computers there is an energy management feature that could prove useful in configuring how much power is used.

What is Energy Saver for Mac?

Energy Saver is a feature included in all versions of OS X after version 10.6 (Snow Leopard) that allows users to configure how their computer users energy - both when running on battery and when plugged in. All Apple computers have this feature, including desktop computers, but it is most useful for those with laptops, where you can configure your laptop to extend battery life.

Accessing Energy Saver preferences

There are two ways you can access the Energy Saver function on your Mac. If you are using a laptop, you should see a battery icon in the top menu bar of the screen, usually located on the right. Press this and select Open Energy Saver Preferences…

If you don't see the battery icon at the top of your screen, or are using a desktop, then press Command + Spacebar to open Spotlight. Type Energy Saver in the bar that opens at the top of the screen and click on Energy Saver from the drop-down search results.

Looking at the Energy Saver preferences

Depending on the type of Mac you are using - laptop or desktop - you should see up to three tabs - modes of power - at the top of the screen:
  • Battery
  • Power Adapter
  • UPS (Uninterruptable Power Supply)
Clicking on any of the tabs will bring up power settings related to that particular power source.

Configuring energy use while on Battery

When you click the Battery tab you should see the following options come up (on OS X Mavericks and later.)
  • Turn display off after: This is a slider bar that allows you to set how long the computer needs to be inactive (no buttons clicked, or user interaction) before the display is turned off. When you are operating off the battery, it is a good idea to set this lower so that the display - which draws power - will be turned off quicker, saving more power.
  • Put hard disks to sleep when possible: When ticked, the hard disks will be put to sleep when the system isn't being used, or they are not needed.
  • Slightly dim the display while on battery power: Will lower the brightness of the screen when the power cord is unplugged in order to save more energy.
  • Enable Power Nap while on battery power: Power Nap is a feature that allows the computer to wake up every now and then in order to check for software updates. It is a good idea to turn this function off if you are worried about saving battery life, instead checking for updates when the computer is awake.

Configuring energy use while on Power Adapter

When you click on the Power Adapter tab you should see the following options:
  • Turn display off after: This is a slider which allows you to set when the display will turn off, after there has been no activity for a set period of time.
  • Prevent computer from sleeping automatically when the display is off: By default, when the display is off on your computer, it will also go to sleep, which means all non-essential components are turned off. If you are say downloading a large file, or work with an IT team who needs access to your systems at night, then this is a good option to enable.
  • Put hard disks to sleep when possible: When there is no activity, or the hard drives are not being used, your computer will shut them down, saving power.
  • Wake for Wi-Fi network access: When you switch networks, your Wi-Fi turns on, or a program requires access to the Internet, the computer will wake up.
  • Enable Power Nap while plugged into a power adapter: As above, stopping searches for software updates in the short-term to save battery life.

Configuring energy use while on UPS

When you click on the UPS tab you should see the following options:
  • Computer sleep: Is a slider bar that allows you to set how long the computer should wait after inactivity to put itself to sleep.
  • Display sleep: Is a slider bar that allows you to set how long the computer should wait when there is no activity to shut the display off while under UPS power.
  • Put hard disks to sleep when possible: When ticked, the hard disks will be put to sleep when the system isn't being used, or they are not needed.
  • Slightly dim the display while on UPS: Will lower the brightness of the screen when the power cord is unplugged in order to save more energy.
  • Start up automatically after a power failure: The UPS is designed to kick in when the power fails, and if your computer is connected to an UPS, and the power goes out - shutting it down - it will restart automatically when the power comes back on.
  • Restart automatically if the computer freezes: If your computer freezes while connected to a UPS, it will restart automatically.
You can tick each of the options as you see fit and we recommend trying out different choices to see how your power usage fluctuates. If you have any concerns about how much power your systems are using, or their overall configuration, contact us today to learn how we can help.
Published with permission from TechAdvisory.org. Source.

Topic Apple Mac OS