Mobile Entrepreneur Seminar

  • 571 views
Uploaded on

We help Small Business Owners to discover the best tools to be a smart mobile entrepreneur right away. We are offering a seminar every month to maximize the efficiency of the mobile tools we are …

We help Small Business Owners to discover the best tools to be a smart mobile entrepreneur right away. We are offering a seminar every month to maximize the efficiency of the mobile tools we are using. We’ll teach how: The best mobile tools for you as an entrepreneur How can you improve your business image being mobile savy The latest mobile tips Barter your services and create new centers of influence We help small businesses to get a professional image with the right mobile tools

More in: Business , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
571
On Slideshare
0
From Embeds
0
Number of Embeds
7

Actions

Shares
Downloads
2
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • *
  • Introducción – Antecedentes Herramientas de Tecnología Protocolos, Códigos y Normas de Ética Empresariales Administración de Recursos Humanos Branding *
  • This has led to the office, a home office, a virtual office and the office "nomad", which really does not need an office. Traditional markets are being divided into niches to support the different requirements of entrepreneurs who have found a need to expand their businesses virtually everywhere. The current business models have reduced or erased completely the conventional office. Their locations are now more accessible. This changes their marketing, sales and operational components. These challenges create opportunities for growth, in the development of flexiblity and creativity of these entrepreneurs in Motion.
  • Es un software que permite comunicaciones de texto, voz y vídeo sobre Internet. Los usuarios interesados pueden descargar gratuitamente la aplicación ejecutable del sitio web oficial y pueden hablar entre ellos gratuitamente. Esta aplicación también incluye una característica denominada  YY SkypeOut , que permite a los usuarios llamar a teléfonos convencionales, cobrándoles diversas y bajas tarifas según el país de destino, pudiendo llamar a casi cualquier teléfono del mundo. Otra opción que brinda Skype es SkypeIn, gracias a la cual se otorga un número de teléfono para que desde un aparato telefónico, en cualquier parte del mundo, se pueda contactar al computador. Además, se provee de un servicio de buzón de voz. La interfaz de Skype es muy parecida a la de otros software de mensajería instantánea, tales como Windows Live Messenger o Yahoo! Messenger, y, de igual forma que en éstos, es posible entablar una conversación de mensajes instantáneos entre usuarios del mismo software. Este programa también permite dejar mensajes de voz (buzón) en caso de que el usuario no se encuentre disponible, siendo ése un servicio de pago que viene incluido con SkypeIn. *
  • WhatsApp  es un software propietario multiplataforma de mensajería instantánea para teléfonos inteligentes. Además del envío de texto, permite la transmisión de imágenes, video y audio, así como la localización del usuario siempre y cuando exista la posibilidad. La aplicación utiliza la red de datos del dispositivo móvil en el que se esté ejecutando, por lo tanto funciona conectada a Internet a diferencia de los servicios tradicionales de mensajes cortos o Sistema de mensajería multimedia. Este software se aplica en muchos formatos de celulares. Contrariamente a las creencias de muchas personas, la aplicación para celulares no es una red social a diferencia de redes sociales como Twitter o Facebook. *
  • El trabajo en equipo de la oficina desde su casa. Viajar a cualquier lugar y trabajar de forma remota. Nunca vayas sin tus archivos, programas y correo electrónico. Conéctate en cualquier lugar desde tu tableta o teléfono. Cuando se conecta a tu Mac o PC  , lo que ves es una imagen en tiempo real de la pantalla de su ordenador. Instantánea trabajar con los archivos, programas y redes - desde cualquier lugar - como si estuviera en su escritorio. *
  • Evernote  es una aplicación informática destinada a la organización de información personal mediante el archivo de notas. Existen versiones para diversos sistemas operativos que se instalan y versión web. La versión software para Windows tiene soporte para pantallas táctiles y reconocimiento de escritura. *
  • Mint saca todas sus cuentas financieras en un solo lugar.   Establezca un presupuesto, el seguimiento de sus objetivos y hacer más  con su dinero. https://www.mint.com/what-is-mint/ *
  • Accede a tu presupuesto en cualquier lugar Usted será capaz de ver y administrar su presupuesto en cualquier ordenador con un navegador web moderno. Accede a tu presupuesto con seguridad Tenga la seguridad de que su información presupuestaria se mantiene de forma segura y sin peligro *
  • Nuestras acciones individuales y colectivas pueden tener un impacto directo en nuestra reputación. Por ello, debemos siempre cumplir con las leyes aplicables y evitar comportamientos que pudieran causar un daño a nuestra reputación y a la manera en que nos perciben nuestros clientes, el público y nuestros socios. Todos debemos velar por mantener y promover nuestra excelente reputación en todas nuestras actividades, sin importar en dónde llevamos a cabo nuestras actividades comerciales. Debemos esforzarnos continuamente para fomentar el carácter multicultural y demostrar una conciencia y sensibilidad cultural en los lugares donde realizamos nuestras actividades comerciales, cumpliendo estrictamente al mismo tiempo nuestro Código de Ética y Conducta Empresarial, así como las leyes y la reglamentación en vigor. Independientemente de que trabajemos en obras en un lugar alejado o en una oficina cosmopolita, todos tenemos una responsabilidad y una función vital que desempeñar. ALGUNOS DE ESTOS CODIGOS Y NORMAS SON: *
  • Es importante recordar, que el teléfono es para muchas personas la primera impresión que se lleva de una empresa o individuo Es por lo tanto, un aspecto muy importante a tener en cuenta., algunas reglas importantes son: Al sonar el teléfono, se debe atender al máximo de dos repiques la llamada entrante, contestando y respondiendo inmediatamente, sin que tenga que esperar el interlocutor, dando un correcto saludo de buenos días, tardes o noches, dependiendo de la hora. Es responsabilidad del que recibe una llamada y en el momento no puede contestar o la comunicación se corta o se interrumpe de volverse a comunicar con la persona que le esta llamando Mientras se atiende la llamada lo más recomendable es no dejar a la otra persona en espera; Es de mal gusto hablar con otra persona tratando de tapar el auricular; Sonría al hablar eso demuestra eficacia, alegría y buen humor, elemento que se debe reproducir a todos y no el de enojo o mal humor. *
  • Reflexione en lo que el tono de llamada dice de usted: Rocker?, moda adolescente?, videojugador?, seductor?, nerd?, tv adicto?, "invisible?" Si usted se avergüenza por su tono de llamada en ciertas situaciones (trenes, oficina, cuando usted está visitando su madre) es casi seguro que ha hecho la elección equivocada. Inténtelo de nuevo. *
  • Recuerde que su teléfono celular tiene función de vibrador. Asegúrese de que su conversación telefónica no moleste a otras personas. Conversaciones íntimas no son adecuadas frente a los demás. (temas de dinero, sexo o lenguaje soez o vulgar no es adecuado frente a otras personas. No utilice el teléfono en "zonas tranquilas o inadecuadas" (Bibliotecas, cines, teatros, iglesias, conferencias, Bancos, Trenes, etc. . Incluso si usted está en una zona designada, tenga en cuenta que su voz distraerá si es demasiado alta. Si la línea está mal y la conversación es inaudible, explique que hay un problema y cuelgue. La gente en persona merece más atención que un aparato, por lo que siempre que sea posible apague el teléfono en situaciones sociales. *
  • No haga llamadas a personas de lugares inapropiados; una llamada de un cuarto de baño es muy desagradable. Auriculares Bluetooth están muy bien en el coche (de hecho son seguros y legales). Si usted está esperando una llamada importante cuando se conoce a alguien socialmente, explíquele desde el principio que usted tendrá que tomar la llamada, y pida disculpas por adelantado. De lo contrario, se excusa al retirarse a algún lugar privado para hacer o recibir dicha llamada. *
  • Tratar, en la medida de lo posible, de estar aislado de ruidos o distracciones que pudieran interferir en nuestra atención para nuestro interlocutor. Evite hablar públicamente sobre temas Íntimos o sobre Sexo, Dinero o utilizar lenguaje soez o descortés . En el diálogo respectivo, lo ideal es no tener nada en la boca que entorpezca la comunicación ya sea (cigarros, caramelos, chicles, bebidas, etc.). Si se utiliza el teléfono como una línea de negocios es recomendable siempre tener a la mano una pequeña libreta y pluma para hacer anotaciones . Mientras se atiende la llamada lo más recomendable es no dejar a la otra persona en espera; Es de mal gusto hablar con otra persona tratando de tapar el auricular; Sonría al hablar eso demuestra eficacia, alegría y buen humor, elemento que se debe reproducir a todos y no el de enojo o mal humor. *
  • Los mensajes de texto son ideales para transmitir un mensaje corto, instantáneo. Si tiene que cancelar una cita, siempre es mejor realizar una llamada telefónica; Escritos formales, tales como, cartas de agradecimiento nunca deberían sustituirse por un texto. Los mensajes de condolencia enviados por texto nunca deberían utilizarse. Evitar el uso de lenguaje confuso, texto abreviado, si el destinatario no puede entenderlo. Use tanto la gramática convencional, ortografía y la puntuación tanto como sea necesario para que usted mismo y el destinatario puedan entender claramente. Se pueden omitir saludos y despedidas convencionales. *
  • Supervisión a distancia, Equipos de trabajo distantes, Juntas Virtuales y Video conferencias Ahorros económicos y de energía *
  • Le ayuda a: Encontrar y eliminar la pérdida de tiempo Entender lo que está pasando en el trabajo Dar el seguimiento de sus proyectos a facturar a sus clientes Completamente automático - sin entrada de datos Disponible para Windows, Mac, Linux y Android y iPhone Una herramienta de supervisión a distancia puede ser DeskTime es un   software de seguimiento de tiempo real que rastrea y  analiza la productividad  por clasificación, de diferentes aplicaciones que da usted o sus empleados utilizando categorías  de "productivo", "improductivo" o "neutral"  . Se ejecuta en silencio y discretamente en segundo plano, que no requiere entrada del usuario. Mide analiza, la continuidad de quien trabajar mejor DeskTime mide su productividad, y revela sus mayores pérdidas de tiempo, facultando a usted ya sus empleados a tomar decisiones más informadas acerca de sus hábitos en el gasto de tiempo. A través de poder visualizar dichos hábitos para poder así aumentar la productividad en el lugar de trabajo. Ideal para trabajos basados ​​en computadoras – tales como- diseñadores, ingenieros de software, profesionales independientes , pequeñas y medianas empresas Características adicionales - Proyectos, mensajes de iPhone / android, a distancia. DeskTime le permite separar el tiempo dedicado a diferentes proyectos, por lo que  la facturación   es mucho más fácil. Los dueños de negocios también reciben informes a intervalos regulares con diferentes gráficos, que representan el estado de su empresa.  Además DeskTime , permite a sus empleados dejar mensajes cuando está de viaje, y también se puede acceder a DeskTime desde su dispositivo móvil (Android, iPhone, tablet), para dejar mensajes y vigilar a los empleados cuando usted está fuera de la ciudad. *
  • *
  • De este modo se facilita al individuo el ejercicio de sus derechos, opiniones, reportes y se logra asegurar el buen gobierno corporativo *
  • Se deben considerar los siguientes aspectos importantes: ¿Qué lugar es el que queremos usar ¿Qué tecnología que necesitamos? ¿Estamos seguros de que todo el mundo tiene esa disposición? ¿Quiénes son los participantes adecuados y cómo deberían ser invitados? ¿A qué hora se celebrará la reunión y cómo podemos definir el tiempo si los participantes están en diferentes zonas horarias? ¿En qué idioma se llevará a cabo la reunión? ¿Será que hacen que sea difícil para algunos de los participantes? ¿Hay algo que podamos hacer para reducir la dificultad? ¿Se harán y se contestaran preguntas durante la reunión? ¿Hay algún material que los participantes necesitarán que deben enviarse por correo electrónico, por fax o por correo expreso a ellos?. No dependa exclusivamente de las conexiones a Internet. En muchas áreas del mundo, estas conexiones no son tan confiables. Incluso la conexión más fiable cae ocasionalmente, a continuación, el participante se deja sin la información necesaria. En una reunión cara a cara, los asistentes podrán compartir rápidamente o hacer otra copia. Esto no es tan fácil en un entorno virtual *
  • Trate de llamar o llegue unos minutos antes para asegurarse de que la tecnología está bien configurada y funcionando. A menos que sea una pequeña reunión donde todos los participantes están bien familiarizados, pida a los participantes Manténgase y mantenga a los participantes lo más cerca posible a la agenda de publicación: Sea lo más preciso posible, de ejemplos verifique la comprensión, recapitule y resuma a menudo. Refiérase a la diapositiva número, o número de página si está utilizando una presentación enviada previamente Haga preguntas directas a cada participante en lugar de decir "¿Hay alguna pregunta? “ Haga preguntas a todos cuando sea apropiado y cuando sea necesario asegurarse de que se escuchen las opiniones de todos.. Tenga en cuenta el hecho de que posiblemente no podrá ver a todos los asistentes por si tienen preguntas o inquietudes acerca de un artículo, usted tendrá que hacer preguntas o crear un proceso para llegar a ellos. *
  • *
  • Ahorro económico Reduzca los gastos de viaje hasta un 75 por ciento. Ahorro de tiempo : Menos viajes, menores desplazamientos, más productividad por trabajador. Maximizar los recursos : No se requiere nuevos equipos. Los usuarios en movilidad utilizan sus móviles 3G con Videollamada y los que están en una ubicación fija su propio PC con WebCam. Mejora de la calidad de vida : Los empleados pasan menos tiempo viajando y lejos de sus familias, obteniendo trabajadores más saludables, felices y generalmente más productivos El empleo de la Videoconferencia en movilidad es un modo eficaz y dinámico de comunicación, al ir más allá de la clásica llamada de voz incorporando comunicaciones visuales mucho más ricas y colaborativas con un coste efectivo. *
  • Aplicaciones y Servicios de Videoconferencia 3G Ofrezca la posibilidad a sus ejecutivos, socios, empleados o usuarios de iniciar y/o participar en Videoconferencia desde cualquier localización usando su móvil 3G. Ahora podrá mantener reuniones, acceder a conferencias en directo o recibir asistencia en tiempo real por Videollamada mediante móviles 3G. Videoconferencia 3G, ubicuidad en las comunicaciones multimedia La comunicación "cara a cara" proveé un intercambio de información más efectivo, ayuda a resolver rápidamente incidencias, preguntas, d udas e incrementa la productividad. Un excelente sistema de colaboración visual para reuniones de ventas globales, realizar entrevistas de trabajo o para el lanzamiento pro mocional de un producto o servicio. *
  • The 3G Phone or Aircard All 3G phones and Aircards allow devices to communicate with high-speed mobile broadband networks available in most of the United States. To check if you have a 3G device, look in the upper right corner of your smartphone display to see if you have a 3G icon. If so, this indicates you have 3G, or high-speed, mobile broadband coverage. All Aircards offer 3G connections where available, but they may revert to a slower network if necessary to keep your connection active. Built-in Camera In order for you to transmit video from a mobile device, your cell phone or smartphone must include a built-in camera. Even if your phone has a built-in camera, it will be difficult to watch someone else's video while you transmit yours, unless your phone has a camera on the front of the phone, near the screen. Sponsored Links Top 10 Video Conferencing Companies Compared in Our Free Chart. Download Now! CompareVideoConference.com Data Plan Most 3G video conferencing involves data-intensive activity. If you attempt video conference calls on your 3G device without an unlimited data plan, you may find yourself charged for data overuse. Thankfully, all wireless carriers offer an unlimited data plan that can save the hassles of excess data fees. Video Conferencing Client Skype is the most common video conference software on computers, but their dedicated client for mobile phones does not support video conferencing as of early 2010. In its place, the Fring client available for mobile phones allows users to connect to Skype using a third-party client, which allows video conferencing on cell phones. Fring's client works on most cell phones, and it is free, making it worthy software if it fits your needs. iVisit Mobile is a video conference client that allows Windows mobile devices to conference with other mobile devices and Windows and Mac computers that also have the client installed. While iVisit is a not a free solution, it does provide easy integration between mobile and desktop devices. iVisit does offer a free trial, so before making a purchase you can make sure the software runs well on your phone and that your cell carrier has a strong 3G high-speed connection in your area. Read more:  3G Mobile Phone Video Conference Requirements | eHow.com Read more: 3G Mobile Phone Video Conference Requirements | eHow.com  http://www.ehow.com/list_6002329_3g-phone-video-conference-requirements.html#ixzz2K3W74n7o   Las siguientes ligas son de algunas aplicaciones que ya existen http://www.tango.me/ http://qik.com/ *
  • Confidentiality: Making sure people cannot acquire information they should not ( keeping secrets ) Integrity: Making sure people cannot change information they should not ( protecting data ) Availability: Making sure people cannot stop the computer from doing its job. *
  • Basic computer security methods (in approximate order of strength) can be: Limit access to computers to "safe" users. Peripherals which block any "unsafe" activity. Firewall and antivirus software. *
  • What is cyber security? It seems that everything relies on computers and the internet now — communication (email, cellphones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. How much of your daily life relies on computers? How much of your personal information is stored either on your own computer or on someone else's system? Cyber security involves protecting that information by preventing, detecting, and responding to attacks. What are the risks? There are many risks, some more serious than others. Among these dangers are viruses erasing your entire system, someone breaking into your system and altering files, someone using your computer to attack others, or someone stealing your credit card information and making unauthorized purchases. Unfortunately, there's no 100% guarantee that even with the best precautions some of these things won't happen to you, but there are steps you can take to minimize the chances. What can you do? The first step in protecting yourself is to recognize the risks and become familiar with some of the terminology associated with them. *
  • What can you do? The first step in protecting yourself is to recognize the risks and become familiar with some of the terminology associated with them. Hacker, attacker, or intruder  - These terms are applied to the people who seek to exploit weaknesses in software and computer systems for their own gain. Although their intentions are sometimes fairly benign and motivated solely by curiosity, their actions are typically in violation of the intended use of the systems they are exploiting. The results can range from mere mischief (creating a virus with no intentionally negative impact) to malicious activity (stealing or altering information). Malicious code  - Malicious code, sometimes called malware, is a broad category that includes any code that could be used to attack your computer. Malicious code can have the following characteristics: It might require you to actually do something before it infects your computer. This action could be opening an email attachment or going to a particular web page. Some forms propagate without user intervention and typically start by exploiting a software vulnerability. Once the victim computer has been infected, the malicious code will attempt to find and infect other computers. This code can also propagate via email, websites, or network-based software. Some malicious code claims to be one thing while in fact doing something different behind the scenes. For example, a program that claims it will speed up your computer may actually be sending confidential information to a remote intruder. Viruses and worms are examples of malicious code. Vulnerability  - In most cases, vulnerabilities are caused by programming errors in software. Attackers might be able to take advantage of these errors to infect your computer, so it is important to apply updates or patches that address known vulnerabilities (see  Understanding Patches  for more information). *
  • Why is it important to remember that the internet is public? Because the internet is so accessible and contains a wealth of information, it has become a popular resource for communicating, for researching topics, and for finding information about people. It may seem less intimidating than actually interacting with other people because there is a sense of anonymity. However, you are not really anonymous when you are online, and it is just as easy for people to find information about you as it is for you to find information about them. Unfortunately, many people have become so familiar and comfortable with the internet that they may adopt practices that make them vulnerable. For example, although people are typically wary of sharing personal information with strangers they meet on the street, they may not hesitate to post that same information online. Once it is online, it can be accessed by a world of strangers, and you have no idea what they might do with that information. *
  • What guidelines can you follow when publishing information on the internet? View the internet as a novel, not a diary  - Make sure you are comfortable with anyone seeing the information you put online. Expect that people you have never met will find your page; even if you are keeping an online journal or blog, write it with the expectation that it is available for public consumption. Some sites may use passwords or other security restrictions to protect the information, but these methods are not usually used for most websites. If you want the information to be private or restricted to a small, select group of people, the internet is probably not the best forum. Be careful what you advertise  - In the past, it was difficult to find information about people other than their phone numbers or address. Now, an increasing amount of personal information is available online, especially because people are creating personal web pages with information about themselves. When deciding how much information to reveal, realize that you are broadcasting it to the world. Supplying your email address may increase the amount of spam you receive (see Reducing Spam for more information). Providing details about your hobbies, your job, your family and friends, and your past may give attackers enough information to perform a successful social engineering attack. Realize that you can't take it back  - Once you publish something online, it is available to other people and to search engines. You can change or remove information after something has been published, but it is possible that someone has already seen the original version. Even if you try to remove the page(s) from the internet, someone may have saved a copy of the page or used excerpts in another source. Some search engines "cache" copies of web pages; these cached copies may be available after a web page has been deleted or altered. Some web browsers may also maintain a cache of the web pages a user has visited, so the original version may be stored in a temporary file on the user's computer. Think about these implications before publishing information—once something is out there, you can't guarantee that you can completely remove it. As a general practice, let your common sense guide your decisions about what to post online. Before you publish something on the internet, determine what value it provides and consider the implications of having the information available to the public. Identity theft is an increasing problem, and the more information an attacker can gather about you, the easier it is to pretend to be you. Behave online the way you would behave in your daily life, especially when it involves taking precautions to protect yourself.  *
  • How do you choose a good password? Most people use passwords that are based on personal information and are easy to remember. However, that also makes it easier for an attacker to guess or "crack" them. Consider a four-digit PIN number. Is yours a combination of the month, day, or year of your birthday? Or the last four digits of your social security number? Or your address or phone number? Think about how easily it is to find this information out about somebody. What about your email password—is it a word that can be found in the dictionary? If so, it may be susceptible to "dictionary" attacks, which attempt to guess passwords based on words in the dictionary. Although intentionally misspelling a word ("daytt" instead of "date") may offer some protection against dictionary attacks, an even better method is to rely on a series of words and use memory techniques, or mnemonics, to help you remember how to decode it. For example, instead of the password "hoops," use "IlTpbb" for "[I] [l]ike [T]o [p]lay [b]asket[b]all." Using both lowercase and capital letters adds another layer of obscurity. Your best defense, though, is to use a combination of numbers, special characters, and both lowercase and capital letters. Change the same example we used above to "Il!2pBb." and see how much more complicated it has become just by adding numbers and special characters. Longer passwords are more secure than shorter ones because there are more characters to guess, so consider using passphrases when you can. For example, "This passwd is 4 my email!" would be a strong password because it has many characters and includes lowercase and capital letters, numbers, and special characters. You may need to try different variations of a passphrase—many applications limit the length of passwords, and some do not accept spaces. Avoid common phrases, famous quotations, and song lyrics. Don't assume that now that you've developed a strong password you should use it for every system or program you log into. If an attacker does guess it, he would have access to all of your accounts. You should use these techniques to develop unique passwords for each of your accounts. Here is a review of tactics to use when choosing a password: *
  • Lock your computer when you are away from it.  Even if you only step away from your computer for a few minutes, it's enough time for someone else to destroy or corrupt your information. Locking your computer prevents another person from being able to simply sit down at your computer and access all of your information. Disconnect your computer from the Internet when you aren't using it.  The development of technologies such as DSL and cable modems have made it possible for users to be online all the time, but this convenience comes with risks. The likelihood that attackers or viruses scanning the network for available computers will target your computer becomes much higher if your computer is always connected. Depending on what method you use to connect to the Internet, disconnecting may mean disabling a wireless connection, turning off your computer or modem, or disconnecting cables. When you are connected, make sure that you have a firewall enabled (see  Understanding Firewalls  for more information). Evaluate your security settings.  Most software, including browsers and email programs, offers a variety of features that you can tailor to meet your needs and requirements. Enabling certain features to increase convenience or functionality may leave you more vulnerable to being attacked. It is important to examine the settings, particularly the security settings, and select options that meet your needs without putting you at increased risk. If you install a patch or a new version of the software, or if you hear of something that might affect your settings, reevaluate your settings to make sure they are still appropriate (see  Understanding Patches  Most software, including browsers and email programs, offers a variety of features that you can tailor to meet your needs and requirements. Enabling certain features to increase convenience or functionality may leave you more vulnerable to being attacked. It is important to examine the settings, particularly the security settings, and select options that meet your needs without putting you at increased risk. If you install a patch or a new version of the software, or if you hear of something that might affect your settings, reevaluate your settings to make sure they are still appropriate (see Understanding Patches,  Safeguarding Your Data  Most software, including browsers and email programs, offers a variety of features that you can tailor to meet your needs and requirements. Enabling certain features to increase convenience or functionality may leave you more vulnerable to being attacked. It is important to examine the settings, particularly the security settings, and select options that meet your needs without putting you at increased risk. If you install a patch or a new version of the software, or if you hear of something that might affect your settings, reevaluate your settings to make sure they are still appropriate (see Understanding Patches, Safeguarding Your Data, and  Evaluating Your Web Browser's Security Settings  for more information). *
  • What other steps can you take? Sometimes the threats to your information aren't from other people but from natural or technological causes. Although there is no way to control or prevent these problems, you can prepare for them and try to minimize the damage. Protect your computer against power surges and brief outages.  Aside from providing outlets to plug in your computer and all of its peripherals, some power strips protect your computer against power surges. Many power strips now advertise compensation if they do not effectively protect your computer. Power strips alone will not protect you from power outages, but there are products that do offer an uninterruptible power supply when there are power surges or outages. During a lightning storm or construction work that increases the odds of power surges, consider shutting your computer down and unplugging it from all power sources. Back up all of your data.  Whether or not you take steps to protect yourself, there will always be a possibility that something will happen to destroy your data. You have probably already experienced this at least once— losing one or more files due to an accident, a virus or worm, a natural event, or a problem with your equipment. Regularly backing up your data on a CD or network reduces the stress and other negative consequences that result from losing important information . Determining how often to back up your data is a personal decision. If you are constantly adding or changing data, you may find weekly backups to be the best alternative; if your content rarely changes, you may decide that your backups do not need to be as frequent. You don't need to back up software that you own on CD-ROM or DVD-ROM—you can reinstall the software from the original media if necessary.   *
  • *
  • ANTECEDENTES Los empresarios que trabajan solos irán aumentando día a día Actualmente 58% de los Pequeños empresarios trabajan desde su casa Hay una clara tendencia a que este mercado sea mas atractivo entre las mujeres empresarias Las empresas pueden convertir su renta, que es un gasto fijo, en un gasto variable dependiendo directamente del numero de empleados, de la tecnología y del staff que realmente utilicen *
  • Una empresa requiere entre 200 y 250 sqft de oficina por empleado. Esta tendencia es inevitable, cada día serán mas quienes trabajen de manera remota. Considere cuanto se gasta en un cambio de domicilio? Eso se lo pueden ahorrar usando una oficina virtual, independientemente que después necesiten establecer una oficina fija. En un futuro cambio de domicilio (tarjetas de presentación, papelería, timbres, TIEMPO) de hecho será el gasto mas grande *
  • El  coworking  ( co-trabajo ) es una forma de trabajo que permite a profesionales independientes, emprendedores y pymes de diferentes sectores compartir un mismo espacio de trabajo, tanto físico como virtual, para desarrollar sus proyectos profesionales de manera independiente, a la vez que fomentan proyectos conjuntos. El  neologismo   co-trabajo  es la traducción en español al termino coworking , pero el termino coworking es más aceptado que el término cotrabajo. *
  • Para confirmar esto, la encuesta también se comprueba cuánta gente sabía los nombres de sus compañeros de trabajo compañeros y viceversa, después de todo, una comunidad no puede ser demasiado coherente si la gente no sabe los nombres de los demás. Las respuestas mostraron que el 74% de la gente sabe todos o muchos de los nombres de sus compañeros en el espacio coworking. *
  • Las plataformas sociales cada día son más utilizadas por  las empresas e  instituciones para consultar el perfil de sus futuros empleados, clientes o socios. Sitios como  Facebook y Twitter  permiten tener una noción del entorno, amistades, gustos e intereses de los candidatos. Por eso, debemos ser cuidadosos con la información que compartimos en estos espacios sociales y manejar correctamente la configuración de privacidad. Se recomienda: - Revisar la configuración de la privacidad en Facebook - Crear un perfil personal y otro profesional para no mezclar información -  Explorar los resultados de búsqueda de nuestro nombre en Google  *

Transcript

  • 1. Venture Pointyour business world your way
  • 2. The MobileEntrepreneur
  • 3. OBJECTIVEImprove the business effectiveness of today’s entrepreneurs byproviding guidance and practical help with:•establishing a mobile working life•wireless applications•mobile technology, tools & techniques•usage protocols and a code of ethics
  • 4. CONTENT1.Introduction2.Tech Tools3.Protocols, Standards, Code of Ethics4.Human Resource Management5.Virtual Meetings & VideoConferencing6.Security7.Branding8.Virtual Offices
  • 5. 1. INTRODUCTIONNow have at least 4 working generations – Veteran BabyBoomers, Generation X, Generation Y and Digital Natives. Eachhas shown evolutionary movement in their way of doingbusiness from the most conventional way to a new, virtualmodel. Much of this development is due to the evolution andoptimization of communication systems. The cell phone,Blackberry, PDA and wireless technology allow mobility and aremaking the fixed location workplace unnecessary for many.
  • 6. 2. TECHNOLOGY TOOLSHardware: Telephone VoIP, Smartphone, Tablet,iPad, PC, Laptop
  • 7. Software:• Gmail,• Skype,• Sistema de mensajería de texto whats App,• GotoMyPC,• EverNote,• mint.com,• NeoBudget2. TECHNOLOGY TOOLS
  • 8. Gmail is a free, advertising-supported email service provided by Google. Usersmay access Gmail as secure webmail, as well as viaPOP3 or IMAP4 protocols.Gmail was launched as an invitation-only beta release on April 1, 2004.and itbecame available to the general public on February 7, 2007, though still in betastatus at that time. The service was upgraded from beta status on July 7, 2009,along with the rest of the Google Apps suite.
  • 9. The service allows users to communicate with peers by voice using amicrophone, video by using a webcam, and instant messaging over theInternet. Phone calls may be placed to recipients on the traditional telephonenetworks. Calls to other users within the Skype service are free of charge,while calls to landline telephones and mobile phones are charged via a debit-based user account system. Skype has also become popular for its additionalfeatures, including file transfer, and videoconferencing.
  • 10. WhatsApp Messenger is a proprietary, cross-platform instant messaging applicationfor smartphones. In addition to text messaging, users can send each other images,video, and audio media messages. The client software is available for Android,BlackBerry OS, iOS; Series 40, Symbian (S60); and Windows Phone.
  • 11. http://www.gotomypc.eu/remote_access/pc_remote_accessGoToMyPC enables fast, easy and secure remote access to aMac or PC from any web browser.•Work on your office computer from home.•Travel anywhere and work remotely.•Never go without your files, programs and email.•Connect on the go from your tablet or phone.
  • 12. Build knowledge. Share ideas. Get things done.• Successful businesses are built on the knowledge of every teammember. Evernote Business gives your company the tools to collect,discover and share the ideas, research and know-how that create aneffortlessly productive workplace.http://evernote.com/business/http://evernote.com/intl/es/video/
  • 13. Your financial life, all in one placeMint pulls all your financial accounts into one place. Set a budget, track yourgoals and do more with your money, for free!Mint believes money is for living. So they work to make everything simpleand streamlined. Sign up takes less than five minutes, thenMint automatically pulls all your financial information intoone place, so you can finally get the entire picture.https://www.mint.com/what-is-mint
  • 14. Use the envelope method to track your spending and stick to a budget.Access your budget anywhere• Youll be able to view and manage your budget on any computer with a modern web browser.Prepare for the unexpected• Save a little from each paycheck to create an emergency fund for unexpected expenses.Import from your bank• Save hours of data entry by uploading transactions from your bank.Methodically destroy debt• Use our debt reduction worksheet to help create a strategy for getting out of debt.http://www.youtube.com/watch?v=lmDTqQdSlTk
  • 15. 3. Protocols, Standards, Code of Ethics• Impact our reputation.• Comply with applicable laws and avoidbehaviors that harm our image and howwe are perceived by customers, partnersor people in general.• Fosters character and demonstratesmulticultural awareness and businessculture.
  • 16. TELEPHONE: THE FIRST IMPRESSION• It is important to answer the telephone by the second ring.• Give a proper greeting.• It is your responsibility to return a call promptly after receiving wordof a missed call.• Smile when talking.• Do not cover the phone during the call.• Try not to put the other person on hold..
  • 17. RING TONE• Think about what the ringtone saysabout you.• If you are embarrassed by yourringtone in certain situations (trains,office, when youre visiting yourmother), then you almost certainlyhave made the wrong choice.​​Choose a different ringtone.
  • 18. SILENCERemember that your phone has the functions ofvibration or silence. Use It!!s
  • 19. SUGGESTIONS FOR USING THE PHONE• Do not make calls to people from inappropriate places; a call from a bathroom isvery unpleasant.• Bluetooth headsets are great in the car (they are safe and legal).• If you are expecting an important call when meeting someone socially, explain atthe outset that you will have to take the call, and apologize in advance. Otherwise,apologize and retire somewhere private to make or receive the call.
  • 20. • Isolate yourself from noise or distractions that mightinterfere with your conversation..• Avoid talking publicly about intimate issues, using foullanguage or being rude.• During the call avoid having anything in your mouth thathinders communication (cigarettes, candy, gum, drinks,etc..).• Although you may have a smartphone, it can be beneficial tohave a small notebook and pen to take notes.SUGGESTIONS USING THE PHONE
  • 21. BASIC CODE OF CONDUCT FOR TEXT MESSAGES• Short messages and instant messaging.• Do not cancel an appointment with a text message.• Formal written communication should never bereplaced by a text message.• Never send a condolence message by text.• Avoid using confusing language and abbreviated textas the recipient may not understand. (lol, omg, rofl)• You can omit conventional greetings and farewells.
  • 22. 4. HUMAN RESOURCE MANAGEMENT• Remote monitoring• Distant work teams• Virtual Meetings and Video Conferences• Economic and energy savings
  • 23. Helps you:• Find and eliminate the waste of time• Understand what is happening at work• Track your projects to bill customers• Fully automatic - no data entry• Available for Windows, Mac, Linux, Android & iPhonehttp://desktime.comTIME DESKREMOTE MONITORING
  • 24. 5. Virtual Meetings & VideoConferencing• Virtual meetings take placeover the Internet, whereindividuals, partners oremployees attend throughtheir computer withoutphysically traveling to themeeting.
  • 25. VIRTUAL MEETING PROTOCOL• The first thing to understand when conducting a virtual meeting is that it is notreally a virtual meeting at all.• The meeting is real, the activity is real, and the importance of the results are real.• This is a real meeting that happens to take place in a virtual environment.• Consider the processes that take place:o Before meetingo During the meetingo After the meeting.
  • 26. BEFORE THE MEETING:The place to conduct the meeting.1. Technology? Does everyone have the necessary resources?2. Who are the participants and how will they be invited?3. What time will the meeting be, and are there participants in different time zones?4. What language will be spoken during the meeting?5. Do you make and answer questions during the meeting, or after?6. What materials will participants need? How will they be sent? Email? Fax?Overnight Delivery?
  • 27. DURING THE MEETING1. Try to call or arrive a few minutes early.2. Introduce all participants.3. Follow the agenda.4. Be accurate, use examples to ensure understanding, recap andsummarize.5. Refer to the slide number or page number if you are using apresentation previously sent.6. Direct questions to each participant instead of saying "Are there anyquestions?"7. Listen to the views of all participants.
  • 28. AFTER THE MEETING1. The meeting does not end as soon as participants hang up or log off.2. Sending notes shortly after the meeting helps ensure that everyone has thesame understanding of what happened and what will happen next.3. Well documented decisions and action items with clear deadlines helppeople understand how to proceed once they have been disconnected ordismissed from the meeting.4. Considering that people may be located in different time zones, the moreyou can help people to be successful, the more willing and able they will beto attend future meetings and take on additional responsibilities.
  • 29. ADVANTAGES OF VIDEO CONFERENCINGAND VIRTUAL MEETINGS• Economic• Time-saving• Maximize resources• Improved quality of life
  • 30. The use of videoconferencing is an efficient and dynamic communication thatgoes beyond the traditional voice call. It incorporates much richer visualcommunications and participation.ADVANTAGES OF VIDEO CONFERENCING ANDVIRTUAL MEETINGS
  • 31. Applications and Services3G Video Conferencing• Offers the possibility to partners, employees or users to initiate and / orparticipate in videoconference from any location.• Videoconferencing 3G multimedia communications ubiquity allows "face toface" communication and a more effective exchange of information, it increasesproductivity, and helps resolve issues quickly, including questions and doubts.• Excellent visual collaboration system for global sales meetings, job interviewsor for the promotional launch of a product or service.
  • 32. 3G Mobile Phone Video ConferenceRequirements• The 3G Phone or Aircard• Built-in Camera• Data Plan• Video Conferencing Client
  • 33. 6. SecurityComputer security has three main goals:• Confidentiality• Integrity• Availability
  • 34. Basic Computer Security Methods• Limit computer access to "safe" users.• Peripherals can block any "unsafe" activity.• Firewall and antivirus software.
  • 35. Security• What is cyber security?• What are the risks?• What can you do?
  • 36. What can you do?• Hacker, attacker, or intruder• Malicious code• Vulnerability
  • 37. The Internet is Public• It’s accessible and contains a wealth of information• Has become a popular resource for communicating, for researchingtopics, and for finding information about people• You are not really anonymous when you are online• Once online, you can be accessed by a world of strangers…andremember, you have no idea what they might do with that information.
  • 38. Guidelines when publishinginformation on the Internet• View the internet as a novel, not a diary• Be careful what you advertise• Realize that you cant take it back• Before you publish something on the Internet, determinewhat value it provides and consider the implications ofhaving the information available to the public – forever!
  • 39. Why do you need a password?• Choose a good password (numbers & letters).• Dont use passwords that are based on personal information.• Dont use words that can be found in any dictionary of any language.• Develop a mnemonic for remembering complex passwords.• Use both lowercase and capital letters.• Use a combination of letters, numbers, and special characters.• Use passphrases when you can.• Use different passwords on different systems.
  • 40. Why do you need a password?• How to protect your password.• Minimize the access other people have to your information.• Lock your computer when you are away.• Disconnect your computer from the Internet when you arent usingit.• Evaluate your security settings often.
  • 41. What other steps can you take?• Protect your computer against power surgesand brief outages.• Back up all of your data.
  • 42. 7. BRANDINGA company or a person with a strong business identity anda good position in the market will be a steady source ofincome and safe in the long term – reputation, good name,identity.
  • 43. Professional Image• Tools that can make a difference in your market:o The Mission, Vision and Values of your company​​o The value of your wordo Business cards and other advertisingo Design and layout of your websiteo Virtual Officeso Social Network
  • 44. THE WHY AND THE VALUE OF VIRTUAL OFFICESBACKGROUND• Entrepreneurs who work alone are increasing every day• Currently 58% of small business owners work from home• More attractive for women entrepreneurs• Companies can make some fixed infrastructure costs, variable and dependenton the number of employees
  • 45. 8. VIRTUAL OFFICES• A company requires between 200 and 250 sq ftof office space per employee.• Every day more people are working remotely.• How much is spent on a simple change ofaddress for your office?• Change of address (business cards, stationery,stamps, TIME) can be expensive• A virtual office can save money.
  • 46. CO-WORKING• Co-working (co-work) allows freelancers, entrepreneurs and SBs fromdifferent sectors to share workspace, both physical and virtual, to developtheir professional projects independently, while encouraging joint projects.
  • 47. CO-WORKING BENEFITSRESULTS OF A RECENT SURVEY ON VIRTUAL OFFICES OR Co-working SPACES:• 92% of respondents said their social circle had increased significantly.• 80% said their business had grown its network.• Reported a 75% increase in productivity.• 86% said that their isolation has decreased.• 96% of respondents said that community is an important value amongmembers in their co-working space.• 74% of people know all or many of the names of their companions inthe co-working space.
  • 48. Responses to the question"What do you like most about yourvirtual office?"81% said they liked the people61% said their virtual office was the best place to work46% said that price was the most important element68% said they had no plans to leave their work area17% said they would stay for at least one year
  • 49. SOCIAL PLATFORMS• Social platforms are increasingly used by companies andinstitutions• Review profiles of prospective employees, customers orpartners• Facebook and Twitter let you get a sense of the environment,friendships, tastes and interests of the candidates.• For this reason, we must be careful with the information weshare in these social spaces and properly handle privacysettings.• Check the privacy settings on Social Media• Create a personal profile and avoid mixing other professionalinformation• Browse search results of our names in Google
  • 50. Thank You