Blog

Schedule meetings with Microsoft FindTime

Schedule meetings with Microsoft FindTime

While an impressive arsenal of weapons can help you win a battle, you need diligence, perseverance and sacrifice to win the war. But when that war is waged in the arena of calendar management, you’re dealing with a whole other monster. When scheduling meetings, uncontrollable factors like varying schedules and department-specific time constraints mean that the same war strategy won’t yield the same successful results.

How to build a better chatbot

How to build a better chatbot

In today’s tech-centric world, the demand for new apps is overwhelming the supply. Whether due to simple curiosity or just plain excitement, people are usually drawn to chatbots. In time, however, novelty wears thin and people lose interest. This may be partially due to the fact that bots aren’t as engaging as we initially imagined them to be.

6 tips for improving your SMB’s Facebook page

6 tips for improving your SMB’s Facebook page

Facebook’s most recent monthly active users numbered over 1.7 billion. Billion, with a ‘b.’ Since creating and managing a page for your business is free, there simply isn’t an excuse to put off doing so another day. Whether your page is being neglected because of low traffic or ROI on the time you invest in it, 1.7 billion is too large a number to ignore.

Newest member of Office 365: Bookings

Newest member of Office 365: Bookings

The latest addition to the Office 365 family is Bookings. This online service helps schedule appointments with businesses using software. Good ‘ol pen and paper definitely still work, but given the world’s technological advances, digital appointment management makes sense.

Free decryption tools fight ransomware

Free decryption tools fight ransomware

In computers, as in war, encryption is a way of encoding sensitive information so only authorized parties can make use of it. Unfortunately, computer hackers have developed ways to infiltrate your company’s network and systems, take your confidential data hostage, and unlawfully encrypt it.