Maybe you’re old enough to remember the internet without browsers. For everyone else, here’s how it used to work: you typed the address you wanted, then went there. No address, no page. Obviously, browsers brought the internet to the masses. And on the desktops of our devices there’s an app just like a browser for navigating the space inside the device. It’s called a file manager. But what do you do when your device (gulp) doesn’t have one?

Lacking a file manager makes even the most intuitive OS gradually get harder to use,because there’s no centralised way of finding files. It’s like the pre-browser internet days:no address, no file.

On desktop and laptop devices it’s relatively easy: Apple and Windows both come with file managers. Windows just updated from Windows Explorer in previous incarnations to File Explorer in Windows 8, while Apple uses Finder. But Android, while it has a file system, doesn’t have a file manager.

Obviously, that’s not as good as it could be, so what can users do to work around it?

Hit the Play Store

Just because a seemingly basic piece of functionality isn’t bundled with your OS, doesn’t mean you have to face life without it. Just head over to the Play Store and download the solution.

ES File Manager

Popular and free, ES covers the basics and comes with some impressive functions you didn’t know you couldn’t live without, like an archive creator. As well as arranging your files on your device it can also act as a cloud client for apps like Dropbox or Google Drive and supports App management.

Astro Cloud and File Manager

Another popular (and free) choice, Astro focusses more on cloud support than ES but otherwise they’re quite well matched. Astro uses a fullscreen viewer and contains other functions like an SD card optimizer and app management.

Solid Explorer

Solid Explorer comes with a free trial and costs a whopping $1.99 to unlock. Two separate explorer panes and drag and drop support means that hefty price tag might well be worth it, and Solid supports popular cloud options like Skydrive and Dropbox, has an indexed search function, and supports archived files like .zip and .rar.

AntTek Explorer Ex

You don’t need to use a paid-for app to get a full-featured, two-pane file manager. As well as the basics, AntTek supports streaming from a remote server, FTP and Samba, and Yandex, and if that’s not enough it also has built-in music and video players. And it’s free.

File management doesn’t bother some people, but if you live life through your phone – or if you BYOD to work – sooner or later, you’re going to need it!


Making a post or tweet ‘go viral’ has become the internet equivalent of the Philosopher’s Stone. Just as medieval alchemists labored over bubbling jars trying to find the magic formula to transmute base metal into gold, so modern marketers struggle over bubbling keyboards (OK,not quite) to find the right combination of words, images and ideas that makes people want to share content with everyone they know online. But we have things medieval alchemists didn’t have, like soap and teeth, but also like collaborations between analyser BuzzSumo and Content Marketers Fractl, who got together to analyse shares of over a million articles to find out what everyone should be doing to turn the base metal of a status update into viral gold.

1: Match the mood to the network

Different social networks have different ‘moods.’ LinkedIn is prevailingly positive: complaints don’t get much traction, but 70% of its top-shared articles were positive, while for Twitter, only 40% were positive, with 46% being negative and 14% neutral. On Facebook, still by far the biggest social network, the mood appears a bit negative – 47% negative, in fact, 36% positive and 17% neutral. (Once you correct for BuzzFeed and Upworthy’s relentless cheeriness it’s even darker: 30% positive, 57% negative.)

2: Facebook is where the sharing (mostly) happens

Facebook has about 62% of all the users of the top 5 social media platforms, but sees a disproportionate 82% of the shares. Either users are more engaged with Facebook, more likely to share content or possibly both: it’s not just that there are so many of them. Twitter has disproportionate virality too: it’s about the same size as LinkedIn but sees about four times as many shares.

3: Getting shared isn’t easy…

In fact,the vast majority of the most successful publishers manage only about 5, 000 shares per piece on average. Who does significantly better? Only Upworthy and BuzzFeed – but getting shares is basically their whole reason to exist. They do have some techniques we can all follow to get better results though…
4: Mystery and suspense, surprise and a twist in the tail

Posts that contain gems of unexpected information, or that trigger the ‘information gap’ effect (you won’t believe what that is) do best. We get hooked on stories quickly and the best simple narratives are already being told in headlines, making us want to click on them to find out how the story ends. This is in large part how BuzzFeed does it, though other factors like addressing news stories and social concerns is a part of their method too.

5: If you’re not killing it on every social network, that’s OK

…neither is anyone else. Most companies are really only succeeding on one or two social networks and for the majority, even that is a struggle. For marketers, it makes sense to figure out which networks clients stand to gain most from and focus, rather than trying to dominate across all networks.


How SMBs Can Use Cloud To Act Big

On April 22, 2015, in Business Technology, by Staff Contributor

SMBs often shy away from big tech changes more than their larger counterparts: after all, they can’t afford even a single Ford Edsel moment. The risks inherent in betting on unknown outcomes is higher. But cloud isn’t some dream of how computing could be. It’s not the future like jetpacks, it’s the future like central locking. And it carries far more benefits for the SMB than for larger enterprises. Why?Because large enterprises are benefitting from services they generate in-house,which smaller businesses often have to simply do without. With a good cloud provider you can contract out everything from security through business processes to data management and behave like a much bigger company, in a non-Edsel kind of way.

1: Hand Over Your Security and Compliance Concerns

CIOs of larger firms worry about regulatory compliance and data security, malware and leaks. For smaller businesses that’s even more of a worry because there’s less hardware and specialised staff to work on it. But there is someone who has loads of both: your cloud provider. Get your security and compliance backed by an SLA and it’s a problem you can tick off. Cloud computing gives SMBs a streamlined, efficient security and compliance concerns.

2: Better Collaboration Through Cloud

One of the big differences between a smaller business and a larger one is attention to working processes. As a result, larger businesses handle things like interdepartmental communications and keeping clients informed automatically while smaller concerns struggle to locate documents and juggle the phone, email and productivity. The more of that you can hand off to the Cloud the better, and managed cloud can take on the tasks that big companies handle in-house, letting you roll like a Fortune 500 company.

3: Data Control Becomes Easy

When you’re running to keep up with OS and hardware changes and shuffling documents and spreadsheets around multiple computers, you’re probably all too aware that a lot of that time and energy is wasted. If three or four people need to work on a project, as often as not the result is three or four mutually contradictory versions of it. Cloud makes this and other aspects of data control and management effortless for the business. You become the end consumer, soall you have to produce is what your business actually does. In the age of slick managed cloud, producing and servicing your own IT makes about as much sense as producing and servicing your own electricity grid. You (probably) don’t need a generator – and you probably don’t need a data center either.


The 5 Tech Trends SMBs Should Follow

On April 17, 2015, in Business Technology, by Staff Contributor

There’s a million trends in tech for business. Not only could you not follow them, most of them are,by the law of averages, going to lead nowhere. Remember Iridium, or Microsoft Bob? No? Exactly. But some of the trends we’re watching now are actually seismic shifts in the way the tech landscape supports business. Here are five that deserve to have you on board.

1: Lock the Door!

…before the horse bolts. In a world where malware and cyber-attacks are the rule not the exception, you will be attacked, so get prepared. Verizon found in a survey earlier this year that the most popular type of cyberattack is one that could affect small businesses, not just giants. Get the best cybersecurity system you can afford.

2: Take Your Business Mobile

By 2017, mobile ecommerce will be worth almost ten times what it was worth in 2012. It’s going to be a $114 billion market- and yet, 93% of small and medium business’ websites don’t work on mobile. To succeed in a marketplace where the same customer might view your site on three or four different devices, you need a responsive website that looks great on everything.

3: Take Your Payments Mobile Too!

In 2013, 15% of smartphone users worldwide payed for something with their smartphone. And as an online payment system battle between Apple and Google gets underway and PayPal and BitCoin exemplify two radically different models, we don’t know exactly which form of mobile payment is going to triumph. But we do know that mobile payments are set to become ubiquitous.

4: Get Professional About Being Social

If you’re restricting your contact with your customers to those occasions when they actually ring you up or walk into your premises you’re leaving a lot on the table. At the same time, while customers now expect social media interaction, these networks aren’t the panaceas they once seemed. Generating organic reach is getting harder and harder,and while they’ve never cost money by comparison with traditional marketing channels social media networks have always been a time suck. Hire a professional to manage your company’s social media presence and get the most out of it.

5: Small Businesses Need Big Data

All businesses collect huge quantities of data now. When processes are digitised records are generated automatically so there’s little effort involved in generating the information in the first place, but the effort you put into analysing it yields real rewards. You’ll see patterns in customer behavior or responses to your efforts that will show you where to go next. That’s big data in action, and it’s not just for big businesses.


At the F8 conference in Fort Mason, San Francisco on Thursday, Facebook’s chief technology officer, Mike Schroepfer, announced plans to roll out a new piece of hardware.

Codenamed ‘Aquila,’ for the eagle the Greek god Zeuss rode across the sky (really!), the innovative piece of tech Facebook announced on Thursday is a drone designed to beam the internet down to millions of people worldwide,allowing the company to effectively supply its own infrastructure to difficult-to-reach areas.

Aquila has the same wingspan as a 747 but is constructed of ultra-lightweight materials and is mostly wing, meaning it weighs less than a small car.

It’s going to need that light weight. It’s designed to stay in the air for as long as three months at once. The design uses solar power to drive propellers, and will also require sufficient energy to let drones stay in contact with one another across wider areas to supply continuous access to the web.

The drone will connect people below it to the internet via lasers fired from about 90, 000 feet (about 17 miles) above the surface of the earth, where drag is sufficiently low and there is little atmospheric turbulence.
So how soon can you expect to see one of these slow-moving monsters in the skies over your home?

Well,Facebook is cagey about the specifics, but the New York Times notes that commercial deployment ‘may take years,’ though the machines are due to be trialed this year. Facebook CEO Mark Zuckerburg gets further into the details: ‘As part of our effort to connect the world, we’ve designed unmanned aircraft that can beam internet access down to people from the sky. Today, I’m excited to share that we’ve successfully completed our first test flight of these aircraft in the UK.’ Zuckerburg went on to explain that: ‘Aircraft like these will help connect the whole world because they can affordably serve the 10% of the world’s population that live in remote communities without existing internet infrastructure.’
The drones are currently under development at a UK company, Ascenta, that Facebook acquired last year. Eventually, the social media giant hopes to be running a fleet of 1, 000 drones, though how it hopes to get the governments of the world to ’like’ the idea of filling their airspace with giant, remote-controlled laser platforms isn’t certain.


CIOs and IT professionals are under pressure from all quarters.In an increasingly fast-paced environment they’re struggling to implement more compex IT solutions on one hand and fend off a range of security threats with the other. What are their key concerns?

CIOs are seeing their job scopes continue to expand and develop, but they share a small number of key concerns. Overwhelmingly, research indicates, they’re thinking about just a few key things – but they’re thinking about them a lot.

The big concerns for CIOs are virtualisation and security. Protiviti’s 2015 IT Priorities Survey found that, of the 1000-plus CIOs, IT VPs and IT directors who responded, 86% cited virtualisation as this year’s ‘most significant’ concern.

Why? Well, for well over half of the companies polled, they expected to undergo a major IT transformation starting this year, but which they expect to last a year or longer. That transformation is likely to leave IT staff architecting and implementing complex systems in partnership with new companies or alone – all while keeping the lights on at the same time. The three main reasons IT staff gave for undergoing IT transformations were cost and simplification at 64%, new functionality at 55% and service assurance at 48%. These concerns, and the benefits that virtualization can bring, are likely to be magnified for smaller enterprises, with the slashed TCO offered by virtualization making more of a difference to a smaller balance sheet. Whether an SMB opts to repurpose existing servers for virtualization or look for a fully managed solution, or something in between, it’s an issue the majority of IT leaders will have to decide on going forward.

The other major concern for IT leaders is security, with 83% citing malware and virus threats as their main concern and the same number pointing instead to data breach and privacy laws. Proviti’s managing director, Jonathan Wyatt, commented: ‘gone are the days when information security and data privacy issues are viewed as just technical issues,’ arguing that they now called into play questions of ‘critical business policy, governance, compliance and communications that must be addressed across the enterprise.’ That’s probably why many CIOs and IT leaders were working to extend and strengthen their internal relationships, reaching out to C-level and senior executives, boards of directors and business-unit leaders. One result of the changes in IT implementation might be a more integrated approach to data handling, security and infrastructure across the whole enterprise.

Other major concerns for IT leaders included enterprise architecture, at 81%, and patch management, pointing to the ‘cleft stick’ many IT staff find themselves in: running to keep up means they struggle to implement newer, more efficient and secure solutions.


4 Undercover Google Drive Tips

On April 8, 2015, in Business Technology, by Staff Contributor

Google Drive is how most of us are meeting SaaS for the first time. No more hunting for data sticks, no more ‘it’s on my other computer’ – but while we might be pleased with it, how well do we really know it? Here are four ways to get more out of Google Drive.

Google Drive is intuitive to use. For one thing, it quite closely resembles certain other applications… for another, it’s simple and there’s help available. But using it and getting the most out of it are two different things. Here’s how to use Google Drive to push your productivity like never before.

1: You Can Work Offline

Yes, it’s the equivalent of boasting that your airplane also has wheels. But sometimes you do have to work offline, and when that happens you can stay with Google Drive. There’s an ‘offline’ mode that lets you view, edit and create documents, though you need Chrome to use it. In Chrome, go to your Google Drive account, click on the gear icon and select Settings. In the General tab, select ‘Sync Google Doc, Sheets, Slides, & Drawings files to this computer so that you can edit offline.’ Chrome will save all your changes, then sync them with Google Drive when you’re back online.

2: Track Revision History

If multiple people are working on a document, it can get hard to remember what it looked like to start with. Losing your past versions can be hard if you’re used to desktop apps that let you go back and compare. Actually, Drive does too: go to File and click See revisions history, and you can select from multiple prior versions of the same document. You can even use the Show more detailed revisions option to group revisions by your own criteria.

3: The Web Clipboard

One of the least-known features of Google Drive is its Web Clipboard feature, which is weird because it’s one of the most useful. You can copy and paste data across multiple Docs, Sheets and Slides, it holds multiple items at once (unlike OS clipboards!) and you can access its contents from any of your devices. If you want to use it, select an item and go to Edit > Web Clipboard > Copy to web clipboard. Items you haven’t accessed within 30 days get automatically deleted, though, so don’t start using it for storage!

4: Search for Links in Documents
Normally when you want to add links to a document, you have to go to the page and copy the link. Not any more. Instead, highlight some text, go to Insert > Link, and a search box appears, letting you do the whole process right in your Doc.


Disaster-Proofing Your Data

On April 3, 2015, in Business Technology, by Staff Contributor

What stands between your data and disaster? You do.

IT disasters cost US businesses $1.2 trillion every year. Worldwide, the total is $6.2 trillion. And more of that comes from so-called ‘silent disasters’ software bugs or malware and hardware failures than you’d think. Everyone thinks about preparing for floods or hurricanes, because they’re high-profile and high-impact. Fact is, they’re also low-probability.

And with leaking, hacking and security risks riding front-of-mind for so many, it’s easy to forget that many of the the disasters that put your whole company IT system up on blocks are just that – accidents. It really doesn’t matter, after all, where they come from. What matters is how you respond to them.

1: Plan For Disaster

Anticipate likely problems before they arise. No, you can’t get ready for everything – but you can build data loss templates that reflect the most likely threats you face. Map out two to four of the most likely scenarios and base your preparations on those. Look at the data losses you’ve suffered in the past, or those that affected other enterprises in your business vertical and geographic location, and build on that knowledge to prepare.

2: Make Sure You Have the Right Tools

Ensure that the processes and technology to deal with the treats you’ve identified are in place. Have backup and recovery, snapshot and replication capacity ready for when it;’s needed. A good disaster recovery plan will need all these in place to cover any eventuality. Augment their efficacy and prevent overuse by building in a monitoring tool that’s sensitive and accurate, with a low number of false positives.

3: Test It!

Just like a fire alarm system is only as good as the last fire drill, so a data recovery plan, too, is only as good as its last test. When was the last time you tested yours? If the last time you tested your data recovery plan, the solution involved switching out a blown valve, you need to step up testing. Otherwise you just think you’re ready – when you need your data recovery plan the most, it might let you down.

With a resiliency plan in place, you’ll be equipped to hit the ground running if disaster does strike, as well as being more likely to catch internal problems like ailing hardware or buggy programs in the bud, before they can trigger a disaster.


3 Essential Elements of a Secure Mobile Strategy

On April 1, 2015, in Business Technology, by Staff Contributor

Mobility and BYOD are a gift for companies looking for improved agility and productivity. But they come with downsides built in, including security worries. If you strategise them right, though, you can get their benefits without falling prey to any of the pitfalls.

These are the top 3 essential elements of a secure mobility strategy.

1: Manage What Matters…

…and stop trying to manage everything else.

The days when the IT department had a realistic chance of controlling data flows through an enterprise are over. Instead, it’s time to triage: vital data must be managed and protected, while the majority of data can simply be ignored by IT. One way to do this is MDM – Mobile Device Management. This allows you to check whether a device remains secure before it accesses your company network – whether it’s owned by a worker or the company. Another is MAM – Mobile Application Management, which involves diffusing an app but centralizing its security settings and controls. Finally, virtualization and sandboxing holds out the hope of making the spread of conventional malware all but impossible and preventing large-scale hacking too.

2: Automate the Outcome You Want

It’s the things we don’t have to think about that boost productivity. How many business bloggers have you seen, talking about the power of habit? It’s the same in IT. Set up your systems so the right thing happens automatically. When an employee gets a new device, whoever owns it, make all their work materials available on it with the click of a single URL. When employees move from one physical location to another, pre-configured controls adapt the level of access that’s available to avoid security risks – and tell the person what’s going on and why. Use Active Directory to assign containers – sets of information, apps and access privileges – to roles rather than individuals, so that when someone new enters or leaves a role, everything they need is available.

3: Avoid the Dreaded Quadruple Bypass

A ‘quadruple bypass’ refers to the leakiest, most insecure setup you can have: BYOD on a consumer-grade device, handling sensitive company information and going straight to cloud. Completely sidestepping the control and monitoring of IT at every stage, this ‘bypass’ is ripe for hackers, leaks and malware. This is the structure you’ll find if IT hasn’t been involved in implementing BYOD and cloud!

This is the nightmare scenario for IT and it must be avoided at all costs. Fortunately, that’s not that difficult. It has to be by making other options more attractive, though. Give workers a superior user experience on IT-approved, secure systems and they won’t wander from it. It’s the best guarantee of security.