Internet2 CIO to Discuss the Emerging Higher Education Community Cloud at Three Rivers Systems Annual Global Users Conference


St. Louis, MO (PRWEB) June 09, 2014

Dr. Khalil Yazdi, CIO in Residence at Internet2, will be the keynote speaker on June 10 at the Three Rivers Systems CAMS Connect annual global users conference. His presentation The Emerging Higher Education Community Cloud: What It Portends for the Future of IT in Education will provide an overview of the research and education communitys Internet2 NET+ initiative that aims to leverage advanced networking and community engagement to make cloud services more relevant and accessible.

Internet2, a member-owned advanced technology community founded by the nations leading higher education institutions in 1996, provides a collaborative environment for US research and education organizations to accelerate research discovery, advance national global education, and improve the delivery of public services. Internet2s membership includes U.S. and international leaders in research, academia, industry and government, including Harvard University, Johns Hopkins University, MIT, Stanford, Amazon Web Services, Microsoft and the National Institutes of Health.

Universities and colleges are rapidly adopting cloud computing as a way to provide technology services and deliver new applications and services more cost effectively and efficiently. A community cloud is a private cloud that is shared among a group of like-minded organizations with common technology needs.

Our clients are natural fits for the community cloud model, so were excited to bring someone of Dr. Yazdis stature to speak at our Global Users Community Conference, said Amir Tajkarimi, President and Founder of Three Rivers Systems. Our company has made significant R&D investments in its CAMS Cloud offering over the past several years and we believe it is unique in its ability to deliver a true cloud-based solution that reduces the costs, complexity and risks associated with academic ERP projects.

Dr. Yazdi brings more than three decades of practical experience on strategic IT challenges facing higher education executive leaders and is well respected as a cloud computing expert. As CIO in Residence at Internet2, he is responsible for cloud services development, working with service providers and university IT leadership to identify opportunities where strategic engagement will drive value to the Internet2 community.

A record number of Three Rivers Systems customers are expected to attend this years CAMS Connect conference, held June 9-11 in St. Louis for users of its CAMS Enterprise academic enterprise resource planning (ERP) system. Other planned activities include a keynote presentation from Christophe Savard, CIO at Canadian University of Dubai, numerous client presentations, topical working sessions hosted by Three Rivers Systems subject matter experts, and updates on recent and future enhancements to the CAMS Enterprise software.

About CAMS Enterprise

CAMS Enterprises disruptive technology makes it a fundamentally different academic ERP unlike all others that were designed for the past and are incapable of operating efficiently in the modern world. CAMS Enterprise is an easy-to-use and implement, totally integrated, Web-native management system with everything in one place admissions; student information; financial aid; student services; fiscal management with HR and payroll; fund-raising; alumni relations; document management, learning management, a full suite of portals, and more for managing the entire student life cycle. With an out-of-the-box configuration and self-service customization, CAMS Enterprise removes all barriers to success seen with conventional systems. CAMS affordable licensing, off-the-shelf configuration and easy implementation translate into the lowest total cost of ownership of any academic ERP while yielding the quickest and highest ROI.

About Three Rivers Systems Inc.

Three Rivers Systems Inc. is the only privately-held, independent, debt-free, one-stop company focused solely on high-quality academic ERP solutions for higher education institutions of all sizes. For more than 25 years from its St. Louis headquarters, the company has focused on innovation and service to its worldwide customers. Always innovating, the company invests significant revenues back into product R&D to improve existing products while developing new ones so users always get the exact functionality, industry experience and accurate project management they need. Its business model and products are designed to ensure institutional effectiveness, more-efficient business processes, student success and satisfaction.

# # #

Contact: Jim Clayman, Three Rivers Systems Inc., Director of Marketing & Communications, 636-386-8616 x1501, jimc(at)ThreeRiversSystems(dot)com

Products or service names mentioned herein are the trademarks of their respective owners.







Penetrator 7.0 Provides Total Security to Corporate Users


Ferndale, WA (PRWEB) November 4, 2009

SecPoint’s Penetrator 7.0 (http://www.secpoint.com/penetrator.html) guards against the most common attacks to large-scale businesses, including SQL injection and Cross Site Scripting.

SQL injection relies on poor checking of the information returned from web page requests. By using specific characters, it’s possible for SQL commands to be passed back to the databases running a website. The technique is popular because if a hacker can interrogate the database sufficiently, he might be able to extract their customers’ credit card numbers.

In August, US court documents showed hackers stole 130 million credit and debit card numbers from Heartland Payment Systems through vulnerabilities that a penetration test could have identified.

SecPoint CEO Victor Christiansenn says the first step anyone should take to secure their business is to do a risk assessment to identify threats and vulnerabilities to their IT infrastructure.

“With targeted attacks on the rise and web applications the focus of criminal gangs, testing your network with the Penetrator 7.0 will help any firm deal with the increasing threat of confidential data theft and ensure its security,” he says.

SecPoint’s Penetrator 7.0 helps identify SQL injection and Cross Site Scripting with its automatic crawl engine. Furthermore, it features 50 language dictionaries to crack WPA2 networks and stops ‘war-driving’, where hackers try to take advantage of a company’s open wireless network.

For IT administrators on the move, there is the Portable Penetrator (http://www.secpoint.com/portable-penetrator.html) which comes pre-loaded on a laptop and offers vulnerability scanning and Wi-Fi Security Auditing of WEP, WPA and WPA2 networks. It quickly delivers PDF reports with recommended solutions on how to solve each vulnerability when it is connected to a corporate server system.

Both the Penetrator and portable Penetrator can scan multiple remote locations to deliver centralised reporting, so if a client has a head office in London and sub-offices in Hamburg and Dublin they can scan the internal networks in the sub offices and collect the completed reports in London without human interaction.

SecPoints Online Penetrator also allows clients to subscribe to the Secpoint cloud server and scan their corporate IP addresses for vulnerabilities remotely.

Penetrator 7.0 adds:

PC Users Urged to Upgrade to Windows 8.1 for Improved Security


Hoboken, New Jersey (PRWEB) May 08, 2014

eMazzanti Technologies CEO, Carl Mazzanti, urged Windows users to upgrade to Windows 8 to counter increasing security threats as he discussed From Windows XP to Windows 8.1: Changes, Differences, Trends on the popular blogtalkradio program VMB, The Voice of Manhattan Business, sponsored by the Manhattan Chamber of Commerce.

The rocket ship growth of malware and spyware runs across all platforms, stated Mazzanti. Users should upgrade to Windows 8.1 to increase security and counter the threats. Each new version of Windows has a much smaller threat landscape, with Windows 8 having one tenth the attack surface vs. Windows XP.

In the informative interview, Mazzanti also summarized the progression and issues of each of the Windows versions from Windows 2000 to Windows 7, whats different in Windows 8 and Windows 8.1, and the expected release of Windows 9, spring of 2015.

In discussing the benefits of Windows 8/8.1, Mazzanti mentioned improved performance as evidenced by faster boot times, and shared insights about the Tiles, a major user interface change from Windows 7.

The tiles are much more than links to directories, explained Mazzanti. They are a phenomenal way of pulling in active data you might be interested in on multiple platforms without having to launch individual apps.

The program concluded with a brief discussion of what to expect in Windows 9 and beyond. Mazzanti said he hopes to see file storage synced across all devices, a sexier user interface and faster setup on any new device, with automatic transfer of settings and apps.

Customer feedback is insanely important to Microsoft, stated Mazzanti. With so much input, we are excited about whats coming in future releases of Windows, particularly the user experience.

The timely 45 minute program aired at noon, May 7, 2014. However, eMazzanti encourages everyone to access the complete recorded interview.

Other related resource information:

Continuing the Windows 8 vision with Windows 8.1

eMazzanti Article Gives 10 Reasons Why Windows 8.1 is Worth It

About eMazzanti Technologies

eMazzanti Technologies team of trained, certified experts provide 24

Blacknight Calls on Internet Users to Reclaim their Online Identity


Carlow, Ireland (PRWEB) July 29, 2013

Leading Irish domain registrar and hosting company Blacknight is calling on Internet users to take control of their own online lives.

Blacknight (http://www.blacknight.com) want Internet users to know that storing their data on social networks is not a long-term online content management solution. As social networks rise and fall, so does the information stored there. The safest and most effective way to store and manage online content is through a personally controlled business or personal site. A domain name and website run on an open source platform like WordPress and hosted by the individual or company creates a space for content and data to live over time in one place.

Michele Neylon of Blacknight explains, If there is one thing I tell people over and over again, it is that the most important thing you can do for yourself and your online business is to get a good domain name and build a site on it. Do not rely solely on social networks to store your content and information. It is unprofessional but most alarmingly; it’s impermanent. If Facebook should suddenly go out of business, all of your data goes with it. You need a domain name and a website to house all of your personal and business data.

Whether focusing on a blog, personal, photo sharing or business site, it is advantageous to create a place online from which to host content that is sourced to preferred social media platforms. Not only does this create a personal record of everything a user publishes online, but it also makes it easier to control online identity.

Neylon continues, The amount of content a person creates over time becomes a record of their life. If suddenly, every holiday photo, opinion and important announcement or business contact were to disappear due to the collapse of a social media service, it would be devastating.

For those seeking to re-claim their online identity, Blacknight offers domain name registration in over two hundred extensions including .COM, .EU, .BIZ, .CO and .ME, which can be perfectly paired with No Fluff Cloud Hosting. For those who prefer a more traditional hosting setup, Blacknight also provides Standard Hosting, Shared Hosting, Hosted SharePoint, Dedicated/ Colocation, and Mobile Friendly Hosting through goMobi. Each service has several pricing and performance tiers so Blacknight customers can create a package that fits their needs.

For more information about Blacknights suite of services please visit http://www.blacknight.com

About Blacknight:

Blacknight are an Irish based, ICANN accredited domain registrar and hosting company. Recipients of several awards for their revolutionary use of social media, Blacknight are one of Europes most cutting edge Internet companies. Blacknight constantly seek to lead the way by introducing innovative solutions for its client base and provide dedicated servers and colocation as well as a comprehensive range of Microsoft Windows and Linux based hosting plans and domain name registration services to business globally.







Find More Cloud Hosting Press Releases

Panda Security Uncovers New Massive Attack on Android Users via Malicious Ads on Facebook

Orlando, FL (PRWEB) February 24, 2014

Panda Security, The Cloud Security Company, has uncovered a new massive attack on Android users, using an elaborate ploy on Facebook encouraging people to download a series of apps. Panda Security has contacted Facebook to warn of this malicious advertising campaign on the popular social network.

Trojan Apps

When users access Facebook from their Android mobile device, they will see different messages under the title Suggested Post advertising WhatsApp tips like: “Want to know how to see your contacts chats on WhatsApp? Find out here! or “Want to hide your WhatsApp connection status? Download this app so people cant see you. If the intended victim clicks on any of these ads, they are redirected to a fake version of Google Play, the Android app store. The user, thinking that this is the genuine site, downloads the free app, which is really a Trojan that subscribes users to a premium-rate SMS service without their knowledge. Currently, Panda is only seeing these ploys occurring for Facebook users in Spain, but is keeping an eye on it to determine if it will spread to other countries.

In this attack, cyber-criminals have taken advantage of Facebooks targeted advertising options. In this case, the ad is only shown to Spanish Facebook users who are accessing the social network from an Android mobile device. We carried out tests using the same account from a PC, an iPad, an iPhone and Android and the ads were only displayed when using the Google operating system,” said Luis Corrons, Technical Director of PandaLabs at Panda Security.

The Trojan checks all inbound messages received on the device and if the sender is the premium-rate SMS service, the message is intercepted and deleted so the user is unaware. Yet this technique doesnt work with the latest 4.4 (KitKat) version of Android, so the creators have come up with an ingenious trick to overcome this: when the message is received, the phone volume is muted for two seconds and the inbound message is marked as read. The app includes an SMS counter, so when the first message is received from the premium-rate service, it reads it to get the confirmation PIN and registers the user on the corresponding website to activate the premium-rate SMS service.

Anti-Competition

The Trojan also deletes any messages sent from the number 22365, another number associated with premium-rate SMS services, although from a company apparently unrelated to this attack. All signs would suggest that this is designed to protect against a specific competitor: if another Trojan tried to register to an SMS service it wouldnt be able to access the confirmation message and consequently it couldnt access the PIN and activate the service.

The cyber-criminals are not just using WhatsApp as bait, but also any topic that could attract users like amazing videos, Candy Crush tricks, Angry Birds tricks, and others.

Panda Mobile Security Offers Protection

Thanks to Panda Mobile Security 1.1 and its Privacy Audit feature, any app with these potentially dangerous profiles will be classified as Cost money and can be deleted directly from that section. That said, not all apps in this category are malicious: any app with sufficient permissions to operate in the way described above will be in this category. If users discover an app installed that shouldnt have these permissions, they should delete it immediately.

More details on the PandaLabs blog.

About Panda Security

Founded in 1990, Panda Security is the worlds leading provider of cloud-based security solutions, with products available in more than 23 languages and millions of users located in 195 countries around the world. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples every day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on system performance. Panda Security has 80 offices throughout the globe with US headquarters in Florida and European headquarters in Spain.

Panda Security collaborates with The Stella Project, a program aimed at promoting the incorporation into the community and workplace of people with Down syndrome and other intellectual disabilities, as part of its Corporate Social Responsibility policy.

For more information, please visit http://www.pandasecurity.com/.







Related Cloud Computing Press Releases

Lavu Inc. Partners With Technology-minded Entrepreneurs to Bring Lavu iPad POS to Users Worldwide


Albuquerque, NM (PRWEB) January 23, 2014

Careers for technology-minded entrepreneurs as Certified POS Lavu Specialists are now an option worldwide. Now open for business on six continents in 30 different countries, resellers of the Lavu iPad POS system are able to tailor a full-featured restaurant point of sale system for clients while still having full control over their own business. Specialists are able to customize their business to their own skill-sets and technical abilities.

As part of the development offered to distributors of their iPad POS, Lavu Inc. has announced their second-annual Lavu Specialist conference. Lavu Connect 2014 will be held April 11th through the 13th at the Hyatt Regency Tamaya Resort and Spa in Bernallilo, New Mexico, located 20 miles north of Albuquerque.

This conference will cover new sales and marketing strategies, future product development, information about the Lavu Local Server and KDS Pro software, and information on the anticipated Lavu Hospitality software, which will be exclusively sold by attendees. Each of the five training sessions in Connect 2014 will have discussion periods for attendees to ask questions directly to Lavu Inc. management. New technology and corporate-level partnership announcements are expected.

One of my favorite parts of being a Lavu Specialist is the yearly Lavu conference, where I can meet Specialists from all around the world and share experiences, said Bank Thanapon, a Lavu Specialist from Thailand. Thanapon has set up more than 65 locations with Lavu iPad POS since he founded his company SoftLavu in October of 2012. In terms of income and profit, Lavu has a great system for Specialists. You can earn earn points toward free software licenses with the more clients you have.

Lavu empowers its specialists like no other, and I certainly share and respect their if they succeed, we succeed philosophy, said Borja Zamora, a reseller in the tech hub of San Francisco. Working with POS Lavu has been a pleasure since the beginning. Its flexibility and design make it a sexy product, and the whole team’s responsiveness and willingness to help don’t cease to amaze me.

You shouldn’t settle for less than the best when it comes to a product as critical to your business as a point of sale system, continued Zamora. Tablet-based POS systems are a natural step that are redefining the service industry, with all the advantages of traditional systems and very few of the drawbacks. Rather than struggling in such a tech-saturated city like San Francisco, Zamoras company, Service Industry Technologies (SIT) is thriving. Zamora said, Increasing competition, you ask? We keep doubling our sales year after year.”

Recently, Lavu Specialist Jason Feemster and his company POSUSA have expanded from central New Mexico to serve the Dallas/Ft. Worth, Texas area. After being introduced to POS Lavu, we knew right away that Lavu and mobile point of sale systems were game changers in the POS Market, said Feemster. Since Feemster founded POSUSA, he has brought Lavu iPad POS to over 80 mom-and-pop restaurants, bars, and chain locations.

“Working with Lavu means partnering with a pioneering company in expanding a product that will undoubtedly succeed,” said Zamora. Thanapon agreed, Being a Lavu Specialist is one of the best choices Ive ever made in my life.

About Lavu Inc.

Founded in Albuquerque, NM, and operating worldwide, Lavu Inc. was formed as a solution to common point of sale problems and restaurant industry issues. Lavu Inc. offers POS Lavu as a full-featured point of sale software solution at a fair price. Through cloud computing, wireless mobility, and multi-touch devices, POS Lavu redefines the entire approach to restaurant business management.







Secure-24 Launches Oracle Exalytics Solution and Center of Excellence for Oracle Exalytics Users


Southfield, Michigan (PRWEB) June 11, 2013

Secure-24, Inc. a Gold level member in the Oracle Partner Network (OPN) and leading provider of managed hosting, application outsourcing and enterprise cloud services announced today a new solution encompassing Oracle Exalytics to deliver the fastest performance for business intelligence, modeling, forecasting and planning applications.

Secure-24s team of experts will present Oracle Exalytics and other solutions during Kscope13, a gathering of Oracle developers, architects, and administrators. The event takes place at the Sheraton Hotel in New Orleans from June 23 27, 2013.

Our new Oracle Exalytics solution allows companies to stay ahead of the curve by providing powerful in-memory processing and real-time business intelligence. Clients also benefit from our expert management of their systems by teams of technical experts who have deep knowledge and experience in Oracle applications, said Mike Jennings, Chief Executive Officer of Secure-24.

Secure-24s managed hosting solutions leveraging Oracle Exalytics allows clients to access in-depth information visualization and exploration to quickly provide actionable insights from high volumes of data. Those not attending KScope13 can experience the new solution through Secure-24s Center of Excellence for Oracle Exalytics, which showcases the full range of competencies and power running Hyperion Planning and Oracle Business Intelligence Suite Enterprise Edition (OBIEE).

For both Hyperion Planning and OBIEE, organizations benefit from high availability and fast performance from a secure and compliant environment. The cloud and hosting solutions are deployed from Secure-24s data centers in the United States and expertly managed utilizing ITIL and COBIT processes and standards.

Secure-24 has a unified infrastructure to host and manage business-critical Oracle applications including Hyperion, Oracle E-Business Suite, PeopleSoft, JD Edwards, and Fusion.

Companies are facing increased pressure to respond quickly to changing market needs and gain instant insights from applications like Hyperion Planning. Choosing a managed hosting provider, like Secure-24, as a business strategy can drive IT innovation, reduce risks and provide greater control of IT environments, said Keith Webster, Alliance and Channel Manager at Secure-24. Its also why global technology leaders are partnering with Secure-24 to reach clients with comprehensive IT solutions.

About Secure-24, Inc.

Headquartered in Metro Detroit, Secure-24 delivers managed IT operations, hosting and cloud computing from its state-of-the-art data centers. Secure-24 helps mid-market companies and large organizations that operate globally increase efficiencies through managed hosting and cloud solutions for Oracle business applications. Secure-24 is an Oracle Gold Partner for hosting Oracle Enterprise Performing Management (EPM) solutions, such as Hyperion, Oracle E-Business Suite, PeopleSoft, JD Edwards, and Fusion.

About Oracle PartnerNetwork

Oracle PartnerNetwork (OPN) Specialized is the latest version of Oracle’s partner program that provides partners with tools to better develop, sell and implement Oracle solutions. OPN Specialized offers resources to train and support specialized knowledge of Oracle products and solutions and has evolved to recognize Oracle’s growing product portfolio, partner base and business opportunity. Key to the latest enhancements to OPN is the ability for partners to differentiate through Specializations. Specializations are achieved through competency development, business results, expertise and proven success. To find out more visit http://www.oracle.com/partners.

###

Trademarks

Oracle is a registered trademark of Oracle Corporation and/or its affiliates.







International Users of Lavu iPad POS for Restaurants Now Accept Chip and PIN Payments with iZettle


Albuquerque, NM (PRWEB) January 03, 2014

Lavu Inc., makers of the original iPad POS for restaurants, has announced their partnership with European company iZettle Payments. International Lavu POS users can now accept Chip and PIN payments with a fully integrated system.

Lavu POS is currently used in over 80 countries worldwide, and can now offer Chip and PIN service to European countries such as Sweden, Norway, Denmark, Finland, Germany, Spain, and the United Kingdom as well as Mexico and Brazil in the Americas.

This union completely integrates Lavu iPad POS with Chip and PIN processing hardware and EMV smart card technology. Complete integration means streamlined workflow and faster transactions, important to the hospitality industry.

iZettle’s goal is to help small businesses take payments, whatever need they might have, said Nina Fernstrom, Head of Partnerships & Operations UK. International Lavu clients can now use Chip and PIN processing with EMV smart card technology, as well as traditional swiped card processing. iZettle offers no fixed fees or lock-in contracts with a low processing rate.

Social payments company iZettle was founded in 2011 and has quickly risen to prominence in the European payments space. Sweden’s Financial Supervisory Authority regulates iZettle, whose services are EMV approved, compliant with PCI DSS (Payment Card Industry Data Security Standard).

Lavu was the very first full-featured iPad POS App in the Apple App Store. Developed specifically for restaurants, bars and nightclubs, and quick serve business types, Lavu is a business management software suite that incorporates cloud data, a simple touchscreen interface, and wireless technologies.

Lavu POS fulfills the need of many businesses around the world, whether it’s in the restaurant or hospitality industry. Through our partnership and integration, we are thrilled to be able to give these businesses access to iZettle payments and help them run their business in a more efficient way, said Fernstorm.

Integrating iZettle with Lavu POS is simple. Once an iZettle account is created, Lavu clients will only need to add iZettle as a payment option in the Admin Control Panel. Lavu Inc. already has customers using the iZettle processing solution.

About Lavu Inc.

Founded in Albuquerque, NM, and operating worldwide, Lavu Inc. was formed as a solution to common point of sale problems and restaurant industry issues. Lavu Inc. offers POS Lavu as a full-featured point of sale software solution at a fair price. Through cloud computing, wireless mobility, and multi-touch devices, Lavu iPad POS redefines the entire approach to restaurant business management.







More Cloud Computing Press Releases

Bytes Computer and Network Solutions PC Complete Care Protected Thousands of Home Computer Users from Dangerous Java and Internet Explorer Zero Day Vulnerabilities


Scottsbluff, NE (PRWEB) September 28, 2012

According to Landon Clark, Bytes Computer and Network Solutions Network Specialist, hacker exploitation of vulnerabilities discovered in common software programs are exceedingly common. This is the reason every software company updates and patches their programs regularly, says Clark. Its especially common with software that everyone uses, like Java and Internet Explorer. Vulnerabilities within the programs make it easy for hackers to get access to a large number of people.

The security firm FireEye was first to report the Java program zero day vulnerability on August 26. Eric Romang of Zataz.com discovered the Internet Explorer vulnerability on September 16. Installed on millions of computers around the world, hackers used vulnerabilities within both programs to infect host computers with viruses, run malicious programs and steal personal information.

We recently received information similar to the Java issue concerning an exploit in Microsoft Internet Explorer, says Clark. The exploit affects an unpatched vulnerability in IE 6, 7, 8 and 9. To get a little technical, this vulnerability downloads a malware payload named Poison Ivy. Once the Poison Ivy software is downloaded to a users machine, the attacker will have all the control they need to steal private information, open more holes and flood the computer with viruses.

To protect more than one thousand PC Complete Care customers from the Java and Internet Explorer vulnerabilities, the computer help support team at Bytes Computer and Network Solutions ran scripts through customers computer software. We were able to apply the fix on the backend without disrupting the customers computer use or requiring their time. PC Complete Care customers can sit back and feel safe knowing that we are on top of it, Clark says.

The company will handle future software vulnerabilities the same way, through special fix scripts applied during PC Complete Cares normal schedule of software updates. We run software updates every evening to keep our customers computers current, says Clark. If I had to put a percentage on the number fixed so far, I would say 85 percent have gone through successfully. We will complete the other 15 percent when those customers turn their computers on again.

About Bytes Computer and Network Solutions

Bytes Computer and Network Solutions is the premier source for cutting edge service, on-site and remote computer help support, technology, custom applications, web design and cloud hosting for businesses and individuals in Scottsbluff, Nebraska and nationwide. Established in 2001, the company, led by a group of youthful software enthusiasts, now grosses over $ 1 million annually. Their newest comprehensive computer reliability service, PC Complete Care, increases computer speed and is earning rave reviews from business and individual clients.

For additional information, contact Todd Lewis, Vice President, Bytes Computer and Network Solutions, 308.635.2983 or TLewis(at)bytescomputer(dot)com.







AppsCare, powered by Netpremacy, announce increased collaboration for its users through offline editing for Google Presentations


London, UK (PRWEB UK) 24 January 2013

AppsCare provide Google Apps, a cloud-based suite of collaborative tools to thousands of companies across the globe. Google Presentations, similar to the Microsoft product, ‘PowerPoint’ is part of the Google Apps suite. AppsCare customers are now able to view and edit Google Presentations even when there is no Internet connection available. Offline capabilities for Google Presentations impact customers of AppsCare, a Google Enterprise Premier Partner. This will “increase remote access for our customers using the suite as it provides access to presentations when travelling on an airplane or train without wireless Internet,” said a spokesperson from AppsCare.

How does it work? All formatting changes are saved to a local cache and then synched to Google Drive when back online. When working online any edits that are made when using Google Drive products are automatically saved, so there is no need to worry about searching for the latest version of a file.

In order for AppsCare’s customers to be able to work in offline mode, it needs to be enabled.

A few things to note: