SlideShare a Scribd company logo
Page 1
Leveraging Mobile
Computing in your
Job Search
Thomas (Pete) Petry
Page 2
Today’s Discussion
• Devices, Data Plans, WiFi Options and
Pricing
• Productivity (Tools, Apps, Resources)
• Job Site and Applications
• Usability, Connectivity and Sync
Page 3
10 Signs it’s time for a new phone
• Touch screen is slow to
respond
• Busted Screen is a hazard
• Battery life won’t get you
through lunch
• Your phone decides it’s
suddenly time to shutdown
(again)
• Your photos and videos look
like they were shot through a
screen door
• Good morning. You are still
out of space
• You flip open your phone to
answer calls
• Plugging in headphones is an
art
• No one can understand what
you are saying
• A 4G or LTE phone can deliver
content up to 10 times as fast
as your aging 3G phone and
5G is soon-to-come
Page 4
Battery Myths
• Batteries have Memory
• Off-brand chargers
damages batteries
• Charging overnight
damages batteries
• Don’t use while charging
• Turning off can damage
• Charge it completely
before using
• Putting your battery in the
freezer will extend its life
• Using the internet will run
down the battery faster
than anything else
• Turning off Wi-Fi,
Bluetooth, and GPSA will
prolong your battery
• Task Managers prolong
life
Page 5
Improving Android Battery Life
• Turn off WiFi, Bluetooth, NFC
and GPS
– Especially GPS!
• Turn on Power Saving Mode
• Tune your display brightness
• Tweak your apps
• Adjust your device functions
• Check your accounts
• Reduce your dependency
on cloud access
• Watch your multimedia
use
• Get a maid
• Get an extended battery
• Adjust the screen timeout
Page 6
Spring Cleaning
• Updates and Upgrades
• Unwanted/Unused Apps and Data
• Organize for business and pleasure
• Latest mobile security threats
• Use top apps for increased productivity
Page 7
4 reasons your router is slow
• Router Position
• Wireless Interference & Noise
• Your Neighbors
• Your Household
Page 8
Router Quick Check
• Keep your router central and high in your home and
away from other objects.
• Keep other electronic devices out of the way of the
router
• Check for Channel interference
• Keep your router’s firmware up-to-date and check its
security settings
• Avoid large downloads during waking hours
Page 9
There’s an App for that
• Calendar
• Productivity Tools
• Email
• Social Media
• Work Tools
• News Feeds
• Cell Phone Tools
• Performance Tools
• Wearable Devices
• Shopping
• Utilities (Gas/Electric)
• Employment
• Remote Connectivity
• Text/Messaging/VoIP
• Travel Applications
• Readers/Viewers
• Browsers/Launchers
• Health/Fitness
Page 10
Email Attachments
• Adobe Reader
• WinZip
• Microsoft Office Mobile
• DocuSign
• GoToMeeting
Page 11
Remote Support
• TeamViewer
• GoToMeeting
• Join.Me
• Skype
• Tight VNC
• Bomgar
• Chrome Remote
Desktop
Page 12
Identify Theft
• SSN
• DOB/POB
• DL/Passport
• Account Numbers
• Banking PINs
• Card Exp. Dates
• Security Codes
• Physical Address
• Email Address
• Phone Number
• Full Name
• Affiliations
– Memberships
– Employer
Page 13
Mitigating Security Risks
Page 14
Your Weakest Link
• Where did I find this link?
• What am I expecting to find on the other
side?
• What does the URL look like?
• What do others think of this link?
Page 15
Performance and Productivity
• Memory
• Storage
• Battery
• Applications
– Running Apps
– Background Apps
• Chargers
• Data Plan
– 3G, 4G, 4G LTE
• Usage
• Connectivity
– WiFi
– Bluetooth
– GPS
– NCF
Page 16
Productivity and Sync
Page 17
Job Specific
Page 18
Multitasking and ADT
Page 19
Devices
• Phones
• Tablets
• Laptops
• Desktops
• Netbook/Chromebook
Page 20
Questions?

More Related Content

What's hot

ISYS 363 Group Task 1
ISYS 363 Group Task 1ISYS 363 Group Task 1
ISYS 363 Group Task 1schaudhary13
 
Advice for parents: BYOD
Advice for parents: BYOD  Advice for parents: BYOD
Advice for parents: BYOD Linda Rubens
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Tom Eston
 
Information Technologies in Communication
Information Technologies in CommunicationInformation Technologies in Communication
Information Technologies in Communication
Reenu Mohan
 
Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)
Antigone Peyton
 
The Library in Your Pocket - NJLibraryLink
The Library in Your Pocket - NJLibraryLinkThe Library in Your Pocket - NJLibraryLink
The Library in Your Pocket - NJLibraryLinkMeredith Farkas
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)
Antigone Peyton
 
Wherever Your Patrons Are: Mobile Services for Libraries
Wherever Your Patrons Are: Mobile Services for LibrariesWherever Your Patrons Are: Mobile Services for Libraries
Wherever Your Patrons Are: Mobile Services for Libraries
Meredith Farkas
 
The No Good, Terrible, Very Bad Web Form — HighEdWeb 2014
The No Good, Terrible, Very Bad Web Form — HighEdWeb 2014The No Good, Terrible, Very Bad Web Form — HighEdWeb 2014
The No Good, Terrible, Very Bad Web Form — HighEdWeb 2014
FormAssembly
 
Delivering Innovative Mobile Services through Your Library - Part 2
Delivering Innovative Mobile Services through Your Library - Part 2Delivering Innovative Mobile Services through Your Library - Part 2
Delivering Innovative Mobile Services through Your Library - Part 2
Meredith Farkas
 
6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)
Isaac Feliciano
 
Bringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android EndpointBringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android Endpoint
Hamilton Turner
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
Rocket Matter, LLC
 
Internet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian ChildrenInternet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian Children
nickswebtsv
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
Sophos
 
The Library in Your Pocket: Mobile Trends for Libraries
The Library in Your Pocket: Mobile Trends for LibrariesThe Library in Your Pocket: Mobile Trends for Libraries
The Library in Your Pocket: Mobile Trends for Libraries
Meredith Farkas
 
Libraries to Go: Mobile Tech in Libraries
Libraries to Go: Mobile Tech in LibrariesLibraries to Go: Mobile Tech in Libraries
Libraries to Go: Mobile Tech in Libraries
Ellyssa Kroski
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 

What's hot (20)

ISYS 363 Group Task 1
ISYS 363 Group Task 1ISYS 363 Group Task 1
ISYS 363 Group Task 1
 
Advice for parents: BYOD
Advice for parents: BYOD  Advice for parents: BYOD
Advice for parents: BYOD
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Information Technologies in Communication
Information Technologies in CommunicationInformation Technologies in Communication
Information Technologies in Communication
 
20100831 igelu mobilise_ugent
20100831 igelu mobilise_ugent20100831 igelu mobilise_ugent
20100831 igelu mobilise_ugent
 
Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)
 
The Library in Your Pocket - NJLibraryLink
The Library in Your Pocket - NJLibraryLinkThe Library in Your Pocket - NJLibraryLink
The Library in Your Pocket - NJLibraryLink
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)
 
Wherever Your Patrons Are: Mobile Services for Libraries
Wherever Your Patrons Are: Mobile Services for LibrariesWherever Your Patrons Are: Mobile Services for Libraries
Wherever Your Patrons Are: Mobile Services for Libraries
 
The No Good, Terrible, Very Bad Web Form — HighEdWeb 2014
The No Good, Terrible, Very Bad Web Form — HighEdWeb 2014The No Good, Terrible, Very Bad Web Form — HighEdWeb 2014
The No Good, Terrible, Very Bad Web Form — HighEdWeb 2014
 
Delivering Innovative Mobile Services through Your Library - Part 2
Delivering Innovative Mobile Services through Your Library - Part 2Delivering Innovative Mobile Services through Your Library - Part 2
Delivering Innovative Mobile Services through Your Library - Part 2
 
6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)
 
Bringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android EndpointBringing Government and Enterprise Security Controls to the Android Endpoint
Bringing Government and Enterprise Security Controls to the Android Endpoint
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Patrick hochstenbach mobilize u gent
Patrick hochstenbach mobilize u gentPatrick hochstenbach mobilize u gent
Patrick hochstenbach mobilize u gent
 
Internet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian ChildrenInternet Safety tips for Parents of Christian Children
Internet Safety tips for Parents of Christian Children
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
The Library in Your Pocket: Mobile Trends for Libraries
The Library in Your Pocket: Mobile Trends for LibrariesThe Library in Your Pocket: Mobile Trends for Libraries
The Library in Your Pocket: Mobile Trends for Libraries
 
Libraries to Go: Mobile Tech in Libraries
Libraries to Go: Mobile Tech in LibrariesLibraries to Go: Mobile Tech in Libraries
Libraries to Go: Mobile Tech in Libraries
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 

Viewers also liked

La Renegá
La RenegáLa Renegá
La Renegá
alejandro10
 
Интернет для предпринимателя1
Интернет для предпринимателя1Интернет для предпринимателя1
Интернет для предпринимателя1Sergey Zyryanov
 
Aitp identify theft
Aitp identify theftAitp identify theft
Aitp identify theft
Thomas Petry
 
Цели
ЦелиЦели
Цели
Sergey Zyryanov
 
Life
LifeLife
Creativity + Willingness =
Creativity + Willingness =Creativity + Willingness =
Creativity + Willingness =guest24aec1
 
TeacherProficiency
TeacherProficiencyTeacherProficiency
TeacherProficiencyeducate889
 
Тема 3. Система предпродажной подготовки
Тема 3. Система предпродажной подготовкиТема 3. Система предпродажной подготовки
Тема 3. Система предпродажной подготовки
Sergey Zyryanov
 
Where Did Mousiehousie13 Go
Where Did Mousiehousie13 GoWhere Did Mousiehousie13 Go
Where Did Mousiehousie13 Gomousie
 
Персональный Бренд
Персональный БрендПерсональный Бренд
Персональный Бренд
Sergey Zyryanov
 
Material Didaktikoa
Material DidaktikoaMaterial Didaktikoa
Material Didaktikoaguest516be3
 
Thomas Tinnefeld Die Syntax Des Journal Officiel
Thomas Tinnefeld Die Syntax Des Journal OfficielThomas Tinnefeld Die Syntax Des Journal Officiel
Thomas Tinnefeld Die Syntax Des Journal Officiel
Thomas Tinnefeld
 
Budget Stritch
Budget StritchBudget Stritch
Budget Stritcheducate889
 
The future of your identity
The future of your identityThe future of your identity
The future of your identity
Thomas Petry
 
Aitp evolution of the modern day help desk - october 14th 2004
Aitp   evolution of the modern day help desk - october 14th 2004Aitp   evolution of the modern day help desk - october 14th 2004
Aitp evolution of the modern day help desk - october 14th 2004
Thomas Petry
 
Your electronic medical record - Structure versus Non-Structure - Order verus...
Your electronic medical record - Structure versus Non-Structure - Order verus...Your electronic medical record - Structure versus Non-Structure - Order verus...
Your electronic medical record - Structure versus Non-Structure - Order verus...
Thomas Petry
 
Gure gorputza ezagutzen
Gure gorputza ezagutzenGure gorputza ezagutzen
Gure gorputza ezagutzenguest516be3
 

Viewers also liked (19)

La Renegá
La RenegáLa Renegá
La Renegá
 
Интернет для предпринимателя1
Интернет для предпринимателя1Интернет для предпринимателя1
Интернет для предпринимателя1
 
Aitp identify theft
Aitp identify theftAitp identify theft
Aitp identify theft
 
Цели
ЦелиЦели
Цели
 
2 A P2009
2 A P20092 A P2009
2 A P2009
 
Life
LifeLife
Life
 
Creativity + Willingness =
Creativity + Willingness =Creativity + Willingness =
Creativity + Willingness =
 
TeacherProficiency
TeacherProficiencyTeacherProficiency
TeacherProficiency
 
Тема 3. Система предпродажной подготовки
Тема 3. Система предпродажной подготовкиТема 3. Система предпродажной подготовки
Тема 3. Система предпродажной подготовки
 
5 Ap
5 Ap5 Ap
5 Ap
 
Where Did Mousiehousie13 Go
Where Did Mousiehousie13 GoWhere Did Mousiehousie13 Go
Where Did Mousiehousie13 Go
 
Персональный Бренд
Персональный БрендПерсональный Бренд
Персональный Бренд
 
Material Didaktikoa
Material DidaktikoaMaterial Didaktikoa
Material Didaktikoa
 
Thomas Tinnefeld Die Syntax Des Journal Officiel
Thomas Tinnefeld Die Syntax Des Journal OfficielThomas Tinnefeld Die Syntax Des Journal Officiel
Thomas Tinnefeld Die Syntax Des Journal Officiel
 
Budget Stritch
Budget StritchBudget Stritch
Budget Stritch
 
The future of your identity
The future of your identityThe future of your identity
The future of your identity
 
Aitp evolution of the modern day help desk - october 14th 2004
Aitp   evolution of the modern day help desk - october 14th 2004Aitp   evolution of the modern day help desk - october 14th 2004
Aitp evolution of the modern day help desk - october 14th 2004
 
Your electronic medical record - Structure versus Non-Structure - Order verus...
Your electronic medical record - Structure versus Non-Structure - Order verus...Your electronic medical record - Structure versus Non-Structure - Order verus...
Your electronic medical record - Structure versus Non-Structure - Order verus...
 
Gure gorputza ezagutzen
Gure gorputza ezagutzenGure gorputza ezagutzen
Gure gorputza ezagutzen
 

Similar to 40 plus leveraging mobile computing to aid in job search v2.1

Android101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereAndroid101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphere
Dennis Heinle
 
Basic Computer Centre in Ambala
Basic Computer Centre in AmbalaBasic Computer Centre in Ambala
Basic Computer Centre in Ambala
babyuma
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
Geoffrey Vaughan
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
Security Innovation
 
SFSU ISYS 363-1 Fall 2013-group: Padres
SFSU ISYS 363-1 Fall 2013-group: PadresSFSU ISYS 363-1 Fall 2013-group: Padres
SFSU ISYS 363-1 Fall 2013-group: PadresAllison Fleming
 
Isys 363 group part 1 padres
Isys 363 group part 1 padresIsys 363 group part 1 padres
Isys 363 group part 1 padresAllison Fleming
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentation
Scott Burnett
 
Blackberry 101 pdf
Blackberry 101 pdfBlackberry 101 pdf
Blackberry 101 pdfPhil Morris
 
chapter 4 2014 (1).pptx
chapter 4 2014 (1).pptxchapter 4 2014 (1).pptx
chapter 4 2014 (1).pptx
FerasGhdora
 
Internet.pptx
Internet.pptxInternet.pptx
Internet.pptx
slideshareppt
 
Recent developments in data analytics and big data
Recent developments in data analytics and big dataRecent developments in data analytics and big data
Recent developments in data analytics and big data
Dez Blanchfield
 
Smartphones
SmartphonesSmartphones
Smartphones
Drew Shope
 
The internet standard.pptx
The internet standard.pptxThe internet standard.pptx
The internet standard.pptx
AllwardSingh
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game Plan
Erick Solms
 
Internet Applications
Internet ApplicationsInternet Applications
Internet Applications
Marlon Jamera
 
Technology and Business Growth! - What Companies Need To Know
Technology and Business Growth! -  What Companies Need To KnowTechnology and Business Growth! -  What Companies Need To Know
Technology and Business Growth! - What Companies Need To Know
Brian Bluff
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
Troy C. Fulton
 

Similar to 40 plus leveraging mobile computing to aid in job search v2.1 (20)

Android101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereAndroid101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphere
 
Basic Computer Centre in Ambala
Basic Computer Centre in AmbalaBasic Computer Centre in Ambala
Basic Computer Centre in Ambala
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
SFSU ISYS 363-1 Fall 2013-group: Padres
SFSU ISYS 363-1 Fall 2013-group: PadresSFSU ISYS 363-1 Fall 2013-group: Padres
SFSU ISYS 363-1 Fall 2013-group: Padres
 
Isys 363 group part 1 padres
Isys 363 group part 1 padresIsys 363 group part 1 padres
Isys 363 group part 1 padres
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentation
 
Blackberry 101 pdf
Blackberry 101 pdfBlackberry 101 pdf
Blackberry 101 pdf
 
chapter 4 2014 (1).pptx
chapter 4 2014 (1).pptxchapter 4 2014 (1).pptx
chapter 4 2014 (1).pptx
 
Internet.pptx
Internet.pptxInternet.pptx
Internet.pptx
 
Recent developments in data analytics and big data
Recent developments in data analytics and big dataRecent developments in data analytics and big data
Recent developments in data analytics and big data
 
POWERPOINT2
POWERPOINT2POWERPOINT2
POWERPOINT2
 
Smartphones
SmartphonesSmartphones
Smartphones
 
The internet standard.pptx
The internet standard.pptxThe internet standard.pptx
The internet standard.pptx
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game Plan
 
Internet Applications
Internet ApplicationsInternet Applications
Internet Applications
 
Technology and Business Growth! - What Companies Need To Know
Technology and Business Growth! -  What Companies Need To KnowTechnology and Business Growth! -  What Companies Need To Know
Technology and Business Growth! - What Companies Need To Know
 
Android vs iOS
Android vs iOSAndroid vs iOS
Android vs iOS
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 

40 plus leveraging mobile computing to aid in job search v2.1

  • 1. Page 1 Leveraging Mobile Computing in your Job Search Thomas (Pete) Petry
  • 2. Page 2 Today’s Discussion • Devices, Data Plans, WiFi Options and Pricing • Productivity (Tools, Apps, Resources) • Job Site and Applications • Usability, Connectivity and Sync
  • 3. Page 3 10 Signs it’s time for a new phone • Touch screen is slow to respond • Busted Screen is a hazard • Battery life won’t get you through lunch • Your phone decides it’s suddenly time to shutdown (again) • Your photos and videos look like they were shot through a screen door • Good morning. You are still out of space • You flip open your phone to answer calls • Plugging in headphones is an art • No one can understand what you are saying • A 4G or LTE phone can deliver content up to 10 times as fast as your aging 3G phone and 5G is soon-to-come
  • 4. Page 4 Battery Myths • Batteries have Memory • Off-brand chargers damages batteries • Charging overnight damages batteries • Don’t use while charging • Turning off can damage • Charge it completely before using • Putting your battery in the freezer will extend its life • Using the internet will run down the battery faster than anything else • Turning off Wi-Fi, Bluetooth, and GPSA will prolong your battery • Task Managers prolong life
  • 5. Page 5 Improving Android Battery Life • Turn off WiFi, Bluetooth, NFC and GPS – Especially GPS! • Turn on Power Saving Mode • Tune your display brightness • Tweak your apps • Adjust your device functions • Check your accounts • Reduce your dependency on cloud access • Watch your multimedia use • Get a maid • Get an extended battery • Adjust the screen timeout
  • 6. Page 6 Spring Cleaning • Updates and Upgrades • Unwanted/Unused Apps and Data • Organize for business and pleasure • Latest mobile security threats • Use top apps for increased productivity
  • 7. Page 7 4 reasons your router is slow • Router Position • Wireless Interference & Noise • Your Neighbors • Your Household
  • 8. Page 8 Router Quick Check • Keep your router central and high in your home and away from other objects. • Keep other electronic devices out of the way of the router • Check for Channel interference • Keep your router’s firmware up-to-date and check its security settings • Avoid large downloads during waking hours
  • 9. Page 9 There’s an App for that • Calendar • Productivity Tools • Email • Social Media • Work Tools • News Feeds • Cell Phone Tools • Performance Tools • Wearable Devices • Shopping • Utilities (Gas/Electric) • Employment • Remote Connectivity • Text/Messaging/VoIP • Travel Applications • Readers/Viewers • Browsers/Launchers • Health/Fitness
  • 10. Page 10 Email Attachments • Adobe Reader • WinZip • Microsoft Office Mobile • DocuSign • GoToMeeting
  • 11. Page 11 Remote Support • TeamViewer • GoToMeeting • Join.Me • Skype • Tight VNC • Bomgar • Chrome Remote Desktop
  • 12. Page 12 Identify Theft • SSN • DOB/POB • DL/Passport • Account Numbers • Banking PINs • Card Exp. Dates • Security Codes • Physical Address • Email Address • Phone Number • Full Name • Affiliations – Memberships – Employer
  • 14. Page 14 Your Weakest Link • Where did I find this link? • What am I expecting to find on the other side? • What does the URL look like? • What do others think of this link?
  • 15. Page 15 Performance and Productivity • Memory • Storage • Battery • Applications – Running Apps – Background Apps • Chargers • Data Plan – 3G, 4G, 4G LTE • Usage • Connectivity – WiFi – Bluetooth – GPS – NCF
  • 19. Page 19 Devices • Phones • Tablets • Laptops • Desktops • Netbook/Chromebook