October 19th, 2016

2016october19_businessproductivity_bWith YouTube, Reddit, and Instagram just a few clicks away, it’s a miracle you can get anything done during an eight-hour workday. As you’re probably well aware by now, there is a huge possibility for employees to waste precious time on sites not related to your business. This problem arises when a company does nothing to monitor or regulate internet usage. To fix this, consider using internet monitoring software.

Time-saving measures At times, the internet can be very addictive. Internet monitoring software saves employees from the temptation of online videos and games by restricting access to time-wasting sites that you deem unnecessary for business. But internet monitoring software doesn’t even have to be as extreme as denying permission to harmless social media websites. Just letting your employees know that you’ll be randomly monitoring their internet activity discourages them from taking prolonged visits to their Instagram page.

Avoiding harmful websites The internet hosts plenty of unsavory links and websites. Employees who haphazardly click phishing links or access malware-ridden pornography sites can put your business at risk. Working with infected machines can slow down the entire system and, in some cases, completely halt operations. But by using internet monitoring tools you can restrict access to dangerous websites, and identify reckless employees to remove their internet privileges, if necessary.

Controlling bandwidth usage Even while using the internet for the right purposes, bandwidth can be used up quickly. Internet monitoring gives you up-to-the-minute reports on your bandwidth usage. Once you have a clear understanding of your company’s overall bandwidth usage, you can then control its expenditure. This feature allows you to prioritize bandwidth for critical business applications and reduce bandwidth for less necessary websites.

Increasing productivity on the internet Internet monitoring software may be a powerful tool, but it should be used responsibly. As a business owner, you need to walk a fine line between over-surveillance and under-surveillance. What you should do is establish a clear internet policy. Then, explicitly define the disciplinary measures to be dispensed on anybody who goes against the requirements of the internet policy. And deal with time-wasting employees on a case-by-case basis. It’s unreasonable to remove everyone’s Facebook privileges because one or two abused theirs.

Employee productivity can be difficult to achieve, especially with the proliferation of what we would like to call, “procrastination software.” But with web monitoring software, you can truly get your business -- and your employees -- back on track. Looking for more ways to increase business productivity with technology? Give us a call. We’ll be happy to make suggestions.

Published with permission from Source.

Topic business
October 14th, 2016

2016october14_office_bTechnology is ever-evolving and always improving. And with its new machine learning features, Office 365 is bringing new meaning to that aphorism. Long gone are the days of Clippy, Microsoft’s Office assistant, which has been replaced by far less personal, far more effective ‘intelligent’ tools. If you need a reason to make the move to Office 365, this article may have just what you’re looking for -- let’s find out.


How many times have you been working in a Word document or an Outlook email and needed to quote a report or copy in a graph from another file? With 365’s new ‘Tap’ service, you have the option to do that without even leaving the application you're working in. Microsoft’s intelligent assistant will even suggest information and data for you to insert based on what you’re writing. You may not even have to make the search -- it will predict what you need in advance!


A blank canvas is always intimidating when creating a presentation. Quickstarter for PowerPoint and Sway gives you the boost you need by suggesting outlines, layouts, and even information based on the subject you’re presenting on. For example, if you’re holding a meeting to discuss a business retreat, Quickstarter will suggest page layouts and important text for lodging, transportation, itinerary, etc. Half of your presentation could be finished within minutes of starting it.


Sometimes it seems like everyone else has stunningly beautiful PowerPoint presentations while ours just look like stock templates. And that’s why we’re so excited about the announcement of Designer. All you have to do is insert your text and your photos or graphics, and Microsoft’s machine learning will automatically position, resize, and fade each component so it looks like a professionally designed slide.


Everyone has made a graph based on Excel data before. It’s probably the swiftest software solution for transforming numbers into charts on the market, and it’s getting a pretty cool upgrade. Now you can convert geographic data like country names into colored and categorized maps. Go ahead and select a second column of data and watch the countries light up based on the differences between the data points in the second column. Do you have sales data that’s organized by location? Maps will let you create a chart that displays that information with little to no manipulation necessary.


The last announcement comes in the form of a standalone dashboard for aggregating your work habits. MyAnalytics pulls data from various 365 tasks to help you recognize meetings trends, most productive times of day, and project progression. And if you’re not ready to do anything with this data yourself, the dashboard will make suggestions to you such as ‘focus time,’ best collaborators, and productivity goals.

With these exciting and intelligent additions, entirely new levels of business productivity are possible. Even before Microsoft announced these features, Office 365 reigned supreme as one of only a few truly wonderful pieces of productivity software. If you haven’t made the transition yet, there’s no better time -- call us today.

Published with permission from Source.

Topic office
October 10th, 2016

2016october10_socialmedia_bFacebook has been used by people to connect and share information for a long time. However, until now Facebook struggled to break into the world of business. The good news is that starting today, the launch of Facebook at Work will make it possible to incorporate social media into your company’s workflow. Take a look at our review of the new service here.

Facebook releases generally take place in the company’s home country, the US. However, this time around the social media giant will launch its take on enterprise communication tools in London, where Facebook at Work was first dreamed up.

Facebook at Work has set its sights on improving productivity in the workplace. In addition to aesthetic updates like changing from the iconic blue color to a business-friendly grey, users will have a totally separate platform from the original Facebook. Work accounts are strictly for work interactions and will not mix with users’ personal profiles. So how is it different from just creating a work-friendly account on the original platform?

Facebook at Work creates a microcosm of the social media site, just for your company. Employees can communicate with coworkers, post pictures, plan for upcoming events, and make office announcements at ease. As an added bonus, Facebook at Work will employ auto-translate functionality to make communication between foreign nationals easy.

Aside from the fact that transitions will be easy with so many people already using the site for personal accounts, Facebook at Work is hoping Work Chat and Video Call options will be able to rival the likes of Skype for Business, Google Hangouts, and Slack. And with the addition of new avenues of privacy come new security guarantees. In an attempt to assuage the concerns of HR departments and paranoid employees alike, the improved security measures in Facebook at Work are separate from the personal platform and unique to the enterprise.

Regardless of whether or not you’re a fan of the original, Facebook at Work is a product keen on helping enterprises improve communications and increase work productivity. If you’re interested in getting in on the ground floor of this new workplace application, we’re your ticket. From product updates to completely new social media sites, we’re your one-stop-shop for getting the word out about your business and your product. Message us for more information today.

Published with permission from Source.

Topic Social Media
October 7th, 2016

2016october7_security_bThe technology of crime is evolving, and criminals get smarter every day. But when technology proves too difficult to exploit, criminals resort to manipulating information from their targets via social engineering. This burgeoning field allows criminals to trick people into disclosing sensitive information such as passwords and bank information. If you’re worried about the ability of your employees to avoid scams such as these, we have a few quick tips for you.

As more and more of our information moves into the digital realm, criminals are turning to social engineering to trick people into trusting them with their delicate information. People often trust others too easily and make themselves the targets of easy attacks from criminals. These attacks may come in the form of messages, baiting scenarios, fake company responses, and many others.

Most often, messages are sent to users in the form of an email that might contain a link or something to download. Although they may look legitimate, these emails often contain viruses; once the link is opened or you attempt to download it, a virus latches onto your computer, giving its creator free access to your email account and personal information.

Emails such as these can also come with a compelling story about needing help, winning the lottery, or even paying taxes to the government. Under the veil of legitimacy, criminals will ask you to trust them with your account details so they can either reward you or help you avoid fines and punishments. What you actually get is a bad case of identity theft.

In another scenario, criminals will bait their targets with “confidential information regarding their account.” This may come in the form of fake company messages that appear to be responses to your claims, which are followed up by a request for login details. While victims believe they are slamming the door on a crime by providing their information, they’ve actually provided their attackers with the keys.

There are several ways people can avoid becoming victims of social engineering. First, always ensure that you delete all spam from your email, and thoroughly research sources before responding to claims from a company -- even if it seems like the one you normally use.

The same applies for links. Confirm the destination of any link before clicking on it. Sites like are often used to shorten long and cumbersome links, but because users have grown accusomted to them they are often used to hide malacious misdirections.

Never give out sensitive information that includes your password, bank information, social security, or any other private details. No respectable financial institution will request this type of information through email or a site other than their own. If you’re unsure, navigate away from the page you’ve been sent to and visit the page you believe to be making the request. If the address doesn’t have the letter ‘s’ after ‘http,’ it’s likely a scam.

Last but not least, check that all your devices are protected by the most recent antivirus software. While the strength of social engineering lies in the fact that it’s people-driven rather than technology-driven, antivirus software can help detect and prevent requests from known cybercriminals.

Cyber security is essential to the success of any modern business. Don’t let yourself become victim to criminals who have mastered the art of social engineering. While we’re proud of our extensive experience as technology professionals, we also have more than enough expertise to keep your business safe from those who are using people-based exploits. Get in touch with us today for all your security concerns.

Published with permission from Source.

Topic Security
September 30th, 2016

2016september30_businessvalue_bBesides looking like an early version of Cyclops from The X-Men, what’s with all the hype on virtual reality? How much of a difference can be made by slipping ourselves into a three-dimensional world? For businesses, operating with the same routine day in and day out can be quite monotonous for employees. Imagine if they were able to see the world in a new way -- what would happen? If the promise of futuristic fun doesn’t suffice, here are other reasons to embrace VR:

Create your own virtual product prototypes

With the help of virtual reality, you’ll no longer have to rely on manufacturing when you want to see what your product physically looks like and how it might work. These virtual products allow you to make any changes before going through with production. According to Abi Mandelbaum, CEO and co-founder of YouVisit, “Model creation in VR, for example, can save companies time and money, as these types of models or prototypes allow viewers to examine a product and make changes without the time or expense of building a physical model.”

Virtual designs for engineers

Especially beneficial for engineers, architects and other professionals that work with building or engineering large structures, virtual reality helps save both time and money. As an alternative to small models or 2D renderings, VR offers a more immersive experience that helps design and replicate structures.

Virtual tours

Let’s say that you’re a real estate agent showing houses to potential buyers. Your buyers might be in a different state or simply don’t want to spend time going from house-to-house. Virtual reality allows customers to see what the home looks likes in a three-dimensional setting without them having to actually be there.

Showing all the angles of a product

In order to entice buyers into making a purchase, they must first get an idea as to what it’s actually like, and they need to see as many angles as possible -- especially for products that customers don’t get to physically touch. With virtual reality, customers are given a better idea of what your product is like. Abi Mandelbaum says that “Virtual reality can allow current and potential customers to explore a product before they commit to making a purchase. Furthermore, VR completely immerses customers, helping place a product directly into their (virtual) hands or empowering viewers to see a product in action.”

Take customers on an adventure

If you are in any tourism or adventure-based business, you can use virtual reality to give customers a taste of what to expect from the attractions. Imagine that you have an amusement park and want to attract customers’ attention. You can opt to offer a short VR replication of one of your rides so people can see whether or not they’d like it. Or if you own a resort or campground, you’ll also be able to create reality versions of whatever activities you offer.

VR has the potential to take your small- and medium-sized business to the next level if done properly of course. If you have any questions about how you can mesh virtual reality with your company, don’t hesitate to send us an email or give us a call. We’ll be more than happy to assist with your queries.

Published with permission from Source.

Topic business
September 29th, 2016

2016september29_office_bIf you thought Office 365 couldn’t get any better, Microsoft was not of the same mind. Late last month the company announced a new feature that allows users to invite guests to interact with 365 groups and their content. Whether they’re international business partners, local customers, or infrequent clients, you can involve them regardless of their 365 subscription. Here’s a look at the nitty-gritty details.

This new functionality mainly centers around Office 365 groups. A 365 group is essentially an email address with Office privileges that several people have access to. For example, if you have an Editorial Group, each individual writer at your organization will receive emails, calendar invites, and document read/edit privileges sent to

If you’re interested in adding a guest from outside of your organization to an Office 365 group, the process is simple. From the group administration dashboard, click “Add Members.” Then, all you need to do is enter the email addresses of whomever you would like to add, and voilà.

Guest collaborators will receive an email alerting them of their new addition and access to group files, emails, and calendar items -- all accessible via Office on the web.

Take note, however, of Outlook’s alert: “You’re adding a guest to this group. As a member, they’ll have access to group content.” This will grant new guests all the same read/edit privileges as other group members -- including privileges from before the guest was added.

There is no requirement for guests to have a Microsoft account, and by always labeling the new member as a guest, original group members won’t ever have to worry about forgetting who should receive confidential document privileges.

Unless the guest is a trusted partner, we recommend creating 365 groups specially designated for the purpose of outside collaboration to ensure the privacy of your cloud documents. Administrators can remove them at any time, or guests can volunteer to leave on their own.

Adding and removing collaborators from outside of your organization may be as simple as adding an email address to a list, but the possibility for improved teamwork is limitless. If at any point in your workflow you feel that your work is suffering from bottlenecks in creation, communication, or collaboration, there’s a good chance Office 365 has a solution. If there’s anyone who will know that solution, it’s us. Message us today about collaborating on all your productivity dilemmas.

Published with permission from Source.

Topic office
September 21st, 2016

2016september21_security_bEveryone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today.


For a long time, the phrase ‘computer virus’ was misappropriated as a term to define every type of attack that intended to harm or hurt your computers and networks. A virus is actually a specific type of attack, or malware. Whereas a virus is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as a type of malware.


Don’t let all the other words ending in ‘ware’ confuse you; they are all just subcategories of malware. Currently, one of the most popular of these is ‘ransomware,’ which encrypts valuable data until a ransom is paid for its return.

Intrusion Protection System

There are several ways to safeguard your network from malware, but intrusion protection systems (IPSs) are quickly becoming one of the non-negotiables. IPSs sit inside of your company’s firewall and look for suspicious and malicious activity that can be halted before it can deploy an exploit or take advantage of a known vulnerability.

Social Engineering

Not all types of malware rely solely on fancy computer programming. While the exact statistics are quite difficult to pin down, experts agree that the majority of attacks require some form of what is called ‘social engineering’ to be successful. Social engineering is the act of tricking people, rather than computers, into revealing sensitive or guarded information. Complicated software is totally unnecessary if you can just convince potential victims that you’re a security professional who needs their password to secure their account.


Despite often relying on face-to-face interactions, social engineering does occasionally employ more technical methods. Phishing is the act of creating an application or website that impersonates a trustworthy, and often well-known business in an attempt to elicit confidential information. Just because you received an email that says it’s from the IRS doesn’t mean it should be taken at face value -- always verify the source of any service requesting your sensitive data.


Anti-virus software is often misunderstood as a way to comprehensively secure your computers and workstations. These applications are just one piece of the cybersecurity puzzle and can only scan the drives on which they are installed for signs of well known malware variants.

Zero-day attacks

Malware is most dangerous when it has been released but not yet discovered by cybersecurity experts. When a vulnerability is found within a piece of software, vendors will release an update to amend the gap in security. However, if cyber attackers release a piece of malware that has never been seen before, and if that malware exploits one of these holes before the vulnerability is addressed, it is called a zero-day attack.


When software developers discover a security vulnerability in their programming, they usually release a small file to update and ‘patch’ this gap. Patches are essential to keeping your network secure from the vultures lurking on the internet. By checking for and installing patches as often as possible, you keep your software protected from the latest advances in malware.

Redundant data

When anti-virus software, patches, and intrusion detection fail to keep your information secure, there’s only one thing that will: quarantined off-site storage. Duplicating your data offline and storing it somewhere other than your business’s workspace ensures that if there is a malware infection, you’re equipped with backups.

We aren’t just creating a glossary of cyber security terms; every day, we’re writing a new chapter to the history of this ever-evolving industry. And no matter what you might think, we are available to impart that knowledge on anyone who comes knocking. Get in touch with us today and find out for yourself.

Published with permission from Source.

Topic Security
September 15th, 2016

2016september15_socialmedia_bAside from having an up-to-date LinkedIn profile, there seems to be more waiting around than getting job interviews or receiving promotions. Why so? You’ve given all the relevant information needed to land a job, or to convince your boss that it’s time for you to step up the corporate ladder -- but what else is missing? Your network. Knowing how to fully utilize your network will help advance your career by leaps and bounds. All you have to do is start using LinkedIn’s Alumni tool.

Get started

Access the Alumni tool by going to the homepage and hovering over “My Network.” Then select “Find Alumni.” From there, you are free to perform any search for individuals who have attended your school. You can apply one or more of the following filters:
  • Where they live (geographic location)
  • Where they work (company)
  • What they do (job function)
  • What they studied (major)
  • What they’re skilled at (LinkedIn skills)
  • How you are connected (first- and second-degree connections, group members, etc.)
On top of that, you can also identify alumni by the year they attended school, or you can conduct a text search for specifics that don’t fit in any of the listed filters.

The benefits of LinkedIn Alumni

Imagine that you’re looking for work in a new city. Let’s say you're looking for a marketing job in Texas. With the Alumni tool, select “Dallas/Fort Worth” area under “Where they live” and “Marketing” under “What they do.” If you are interested in a specific area of marketing like social media, you can refine your search by selecting “Social Media Marketing” for the “What they’re skilled at” filter. The more you target your search, the more relevant your results will be. From there, you can sift through profiles and send messages to those you want to have an actual conversation with. You can dip your toes into the water first by setting up an informational interview or exchanging questions via email.

If you’re looking to change careers but don’t know anyone in your new sector, all you need is filter for your alma mater. It shouldn’t be hard to reach out to anyone who went to the same school as you, because going to that school is what you both share in common. If you want to know how others made the leap toward where you’re headed, you can use the “What they studied” and “What they’re skilled at” filters for further information. You might also be able to find an individual with a nontraditional background, but who’s nonetheless working in the industry you want. This person may have insight into how to land the job without possessing the typical required experience.

Know how to contact the candidates

After narrowing down your search by utilizing the appropriate filters, you now have a list of individuals you wish to connect with. Technically, you’re just about done with the “Alumni Tool” portion of the process, but you’re not at the finish line just yet. All that’s left is to reach out to the people in your list and make the most out of the search.

If you have a first-degree connection with certain people, message them by clicking on the envelope icon found below the job title. Without a first-degree connection, you’ll see a silhouette and plus sign below the job title. From there, look to the bottom right of the profile photo; if there’s a Venn diagram, hover over it to see the connections you share. If you have a good relationship with one of these mutual connections, you should consider reaching out to see whether he or she would be willing to make an introduction.

There are a few ways to connect even without mutual connections. One option is to leverage your school’s alumni database to find contact information. Another is to send a personalized connection request. In the message, politely and briefly explain your reasons for wanting to connect. That should do it!

When used properly, networks truly are the keys to success. Like any other untapped resource, you must proceed with caution and know how to fully utilize it. If you have questions or concerns regarding LinkedIn’s Alumni tool, don’t hesitate to call in or send us an email. Let us be a part of the success that awaits you.

Published with permission from Source.

Topic Social Media
September 14th, 2016

2016september14_businesscontinuity_bCompanies can pay a hefty sum if they ever experience any downtime. In fact, Delta Air Lines had a bad bout of severe downtime just last month. In just three days, the airline company cancelled 2300 scheduled flights and suffered $150 million in income loss. That doesn’t even account for the considerable reputational damage from delayed service. So how do you avoid sharing the same, expensive fate? Here are some valuable business continuity lessons we can all learn from Delta’s IT outage.

Strive for 100% redundancy According to Delta’s chief information officer, a power failure caused the company’s data center to crash, grounding thousands of would-be passengers. Although power was restored six hours after the incident, critical systems and network equipment failed to switch to a secondary site, corrupting valuable data in the process. And while some systems failed over, other vital applications didn’t; this created bottlenecks, decreased revenue, and diminished customers’ confidence.

Delta’s case is a massive wakeup call not just for the airline industry but for every business -- large and small. Companies must implement disaster recovery plans for their data centers, on-site technology, and Cloud applications to continue servicing customers while fixing the main issue with their primary systems. Companies also need to get rid of the false notion that redundancy plans to assure service continuity is restricted to larger corporations. DR and business continuity solutions are extremely affordable today, and a partnership with a provider can help you in more ways than one (more on this later).

Always test your backups

So although Delta had a plan to bring its business back to normalcy, the DR plan left a lot to be desired in practice. This begs the question as to whether the airline company is actually testing, reviewing, and reinforcing its vulnerabilities to different disasters.

The point is that even though your company may have a failover protocol in place, that protocol adds no value to your business unless it has been rigorously tried and tested. In order to avoid the same fate as Delta, make sure to find out whether your disaster recovery plan is capable of running mission-critical applications like email and customer service applications before -- not after -- downtime occurs.

Account for different types of vulnerability

In an interview with the Associated Press, Delta CEO Ed Bastian said, “We did not believe, by any means, that we had this type of vulnerability.” Indeed, it’s often hard to foresee what threats and vulnerabilities a natural disaster, power outage, or hacker can produce. But it’s not impossible.

By conducting a comprehensive audit of your data center security and disaster protocols, your business will be more aware and adept at minimizing the risk of potential disasters. This also means evaluating and preparing for disasters that are likely to happen to your business depending on its geographic location. Southern US, for instance, is prone to hurricanes and flooding.

Call for help

These lessons and strategies are all crucially important, but pulling off a DR and business continuity solution on your own may be difficult. For this reason, it’s critical to have a planned partnership with a managed services provider that can assess, plan, test and install the continuity solutions your business needs in order to minimize the impact and avoid encountering a Delta IT outage of your own.

To find out more about business continuity and guaranteeing complete IT redundancy, contact us today.

Published with permission from Source.

Topic business
September 13th, 2016

2016september13_office_bIt’s normal for us to utilize whatever tools we can to make things a little easier. Wanting to use tech to make presentations easier to understand is no exception. Although Microsoft PowerPoint can help you through the daunting task of speaking in public, that isn’t always the case. If your slides distract the audience from what you’re trying to say, or if they decide to throw a technical fit and malfunction half-way through, it’s best that you take a look at the following tips:

Start slideshows instantly

The audience doesn’t want to see the speaker’s cluttered desktop or unread emails as the PowerPoint presentation is being set up. Simply name the file with a .PPS or .PPSX file extension and voilà! Bypass the editing mode and start the show with a double click and end it with the Esc key.

Pull back the focus with Blackouts and Whiteouts

Audience members have the tendency to lose focus or drift away when presentations are longer than usual. If you suspect audience members are starting to lose focus, hit the B key for a complete blackout or the W key for a total whiteout. Then hit any key or click the mouse to return to the slides - this technique helps get the eyes back on you, where they belong.

Say no to bullet points

Both Steve Jobs and Tim Cook agree that bulleted lists aren’t the ticket. A better way to create lists is to drop each item in one at a time, if possible, next to a big image that is the main focus of your presentation. Don’t forget to talk about each individual list item, but not with bullets.

Insert pictures from Flickr and OneNote

Jazz up presentations by including images or memes that’ll make the audience laugh instead of doze off. Head to the Insert tab and select Online Pictures; you’ll see Clip Art, Bing Image Search, Flickr, OneNote and even Facebook. The vast pool of online imagery is now at your disposal.

Chart animation

The challenge doesn’t lie in inserting the chart into the presentation, but in making it interesting. Enter chart animation. After inserting the chart, click the Animations tab and activate the Animations pane. From there, click Add Animation. Pick an animated effect. Then, in the Animation Pane where you see the entry for the chart's animation, right click and select Effect Options.

This lets you customize sound and animation timing. But on the final tab—Chart Animation—be sure to change Group Chart from "As One Object" to "By Category." This makes charts display on screen one element at a time as you click, with bars or pieces of pie arriving one after the other, as if each was its own slide.

Kiosk presentations

Kiosk mode simply plays your presentation on a loop without allowing any human intervention or desktop access. This is ideal for trade shows and kiosks that you’d find in malls. Simply click the Slideshow tab > setup Slideshow > and in the dialog box, click next to Browsed at kiosk. Duration, audio, animation and transitions are fully customizable.

Extend music over multiple slides

Why confine your favorite tunes to just one slide? Expand it over the duration of your presentation by clicking on the speaker icon that indicates the embedded audio. Look for the Audio Tools above the tabs on top. Now select the new Playback tab, and in the Start section make sure to check the box for “Play Across Slides.” And presto, the audio is played across the next few slides or until the music runs out.


If you are constantly reusing the same element throughout your presentation, the good old Ctrl-C+Ctrl-V is fine, but Duplication is better. Hold Ctrl while you click and drag on the object to create an exact dupe, keep selecting and making dupes and they’ll all space themselves out evenly. You can even dupe entire sets of slides; simply select one or more slides on the left navigation pane, select Insert, click New Slide menu and select Duplicate Selected Slides.

Animate, animate, animate

Any element of a PPT slide is animatable. Choose the element, go to the Animations tab, and at the right end of the Animations Gallery, click the down arrow to get "More." You can choose from many options about how an element appears, gets emphasis, or disappears—but for animated motion, go to the fourth section. If you pick Custom Path, you can get the object to do just about any wild motions you want on the screen before it settles down. Keep in mind that you don’t want an audience with motion sickness. PowerPoint presentations are complicated -- that’s a fact. So is how effective it becomes once utilized properly. If you have any further questions regarding our tips or how to execute them, please feel free to give us a call or send us an email. We’re more than happy to answer all of your questions.
Published with permission from Source.

Topic office