Seven Ways to Use Google Plus to Help Your EnterpriseAdded 3rd Jan 2012
Launched only six months ago, Google+ is the new kid on the social networking block. Despite the late start, it's becoming increasingly useful and important for small businesses. Here are seven ways Google+ can be useful to you at work.
1. Google+ Pages
If your business provides any type of product or service to the public, you need to have a presence on Google+. Like Facebook Pages, Google+ Pages are a destination for anyone seeking information about your offerings. Users can "follow" you by adding you to one of their Circles.
2. Google+ Profile
If you want the people in your business to be noticed on the Internet, each one of them should have an individual Google+ profile. Each time you write an article or blog post, include your email address and a link to your Google+ profile. In Google+, create a link back to the article or post, which will tell Google you are the author. When the post shows up in a Google search, your picture will appear beside it, with the option for a user to add you to a Circle directly from the search page. The number of Circles you are in will appear as well, giving you instant authority as your numbers grow.
3. Google+ Chat
Google+ Chat is the same as chat in Gmail, but it includes people in your Circles. It works great for instant messaging, audio, and video chats with your colleagues and even customers. The chat area in Google+ shows if they are online and if they can video-chat. You can then communicate with them by simply clicking and typing.
4. Google+ Hangouts
Hangouts is a free video conferencing tool that allows up to 10 participants, and focuses its main screen on whoever is talking at the time. It can be accessed by phone as well, allowing remote workers and those on the road to join group meetings. Hangouts also allows screen sharing, which combined with its On Air broadcasting and recording tools, make it an excellent presentation tool. It can also be used while sharing a Google Doc, taking remote collaboration to a new level.
[Related: Five Google+ Hangouts Features Businesses Will Love]
5. Google+ Stream
If you need to share ideas with colleagues or customers, Google+ is a great way to do it. You can jot down a note, or add notes to pictures or videos as well as links to Web pages, and then share them with a Circle of people. Only those in the Circle will see what you've shared, and they can reply back. It's a great way to have an informal discussion about a topic.
6. Gmail Integration
With Google+ now linked to Gmail, as you are reading an email, you'll see any Google+ activity by its sender appear on the right side of your screen. This allows you to easily add people, such as customers and vendors, to your Circles, and automatically keeps your contact information up-to-date as well.
7. Reader Integration
If you use Google Reader to keep up with your favorite websites via RSS, it's likely you run across articles you want to share with your colleagues. With Google+ integration, you can easily share an article with any circle you choose, so those people can read and comment, and of course share their own as well.
India's Essar Group has finally sold its operation in east Africa to Kenya's Safaricom and Airtel Kenya for $100 million after years of running the operation at a loss.
With smartphones and tablets increasingly at risk from malware, researchers from North Carolina State University have devised a new and potentially better way to detect it on Android devices.
Automation, virtualization, cloud computing -- these technology trends are transforming the data center and enabling companies to lower costs, increase flexibility and improve reliability. However, these shifts require IT, and their outsourcing providers, to rethink traditional strategies.
The first Cebit trade show in the post-Snowden era will focus on security, showing off locally developed bug-proof phones and messaging systems, as well as the ability to protect mobile devices using smartcards.
CIOs who haven't moved their companies from Windows XP by now ought to be fired, some people think, but those who haven't and are still on the job have options for saving their bacon.
The U.S. National Security Agency (NSA) has turned the European Union into a tapping "bazaar" in order to spy on as many EU citizens as possible, NSA leaker Edward Snowden said.
A phenomenal idea that reveals the damage traditional toys have had on our children and facilities how we can encourage our girls to take up careers in science, technology, engineering and mathematics.
A new commercial tool designed to allow cybercriminals to easily transform legitimate Android applications into malicious software has hit the underground market, paving the way for cheap and easy development of sophisticated Android malware.
Malware often does strange things, but this one -- which looked like Skype installed on a corporate domain controller -- was most "peculiar," says Jim Butterworth, a security expert at ManTech International, whose security subsidiary HBGary recently found the custom-designed remote-access Trojan on a customer's network.
Microsoft will deliver five security updates to customers next week, two tagged as "critical," including one that will quash the open vulnerability in Internet Explorer that hackers have been exploiting since January.
Having lots of Wi-Fi networks packed into a condominium or apartment building can hurt everyone's wireless performance, but Stanford University researchers say they've found a way to turn crowding into an advantage.
Organizations can now add machine-generated data to their palate of information sources that can be aggregated and analyzed, thanks to a new connector jointly developed by Tableau Software, a provider of business intelligence software, and Splunk, which sells a log-file search engine.
The Tor network is in danger of being swamped by criminals abusing its anonymity to hide an underworld of parasitic botnets, malicious command and control and ‘darknet' markets, according to research from Kaspersky Lab.
Rogue adverts that use social engineering to persuade users to install malware have displaced porn as the leading method of attack on mobile devices, according to a report from security firm Blue Coat.
A convoluted web of applications is stunting the digital transformation of the world's biggest international organisations.