SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Venture Point
your business world your way
The MobileEntrepreneur
OBJECTIVE
Improve the business effectiveness of today’s entrepreneurs by
providing guidance and practical help with:
•establishing a mobile working life
•wireless applications
•mobile technology, tools & techniques
•usage protocols and a code of ethics
CONTENT
1.Introduction
2.Tech Tools
3.Protocols, Standards, Code of Ethics
4.Human Resource Management
5.Virtual Meetings & VideoConferencing
6.Security
7.Branding
8.Virtual Offices
1. INTRODUCTION
Now have at least 4 working generations – Veteran Baby
Boomers, Generation X, Generation Y and Digital Natives. Each
has shown evolutionary movement in their way of doing
business from the most conventional way to a new, virtual
model. Much of this development is due to the evolution and
optimization of communication systems. The cell phone,
Blackberry, PDA and wireless technology allow mobility and are
making the fixed location workplace unnecessary for many.
2. TECHNOLOGY TOOLS
Hardware: Telephone VoIP, Smartphone, Tablet,
iPad, PC, Laptop
Software:
• Gmail,
• Skype,
• Sistema de mensajería de texto whats App,
• GotoMyPC,
• EverNote,
• mint.com,
• NeoBudget
2. TECHNOLOGY TOOLS
Gmail is a free, advertising-supported email service provided by Google. Users
may access Gmail as secure webmail, as well as viaPOP3 or IMAP4 protocols.
Gmail was launched as an invitation-only beta release on April 1, 2004.
and it
became available to the general public on February 7, 2007, though still in beta
status at that time. The service was upgraded from beta status on July 7, 2009,
along with the rest of the Google Apps suite.
The service allows users to communicate with peers by voice using a
microphone, video by using a webcam, and instant messaging over the
Internet. Phone calls may be placed to recipients on the traditional telephone
networks. Calls to other users within the Skype service are free of charge,
while calls to landline telephones and mobile phones are charged via a debit
-based user account system. Skype has also become popular for its additional
features, including file transfer, and videoconferencing.
WhatsApp Messenger is a proprietary, cross-platform instant messaging application
for smartphones. In addition to text messaging, users can send each other images,
video, and audio media messages. The client software is available for Android,
BlackBerry OS, iOS; Series 40, Symbian (S60); and Windows Phone.
http://www.gotomypc.eu/remote_access/pc_remote_access
GoToMyPC enables fast, easy and secure remote access to a
Mac or PC from any web browser.
•Work on your office computer from home.
•Travel anywhere and work remotely.
•Never go without your files, programs and email.
•Connect on the go from your tablet or phone.
Build knowledge. Share ideas. Get things done.
• Successful businesses are built on the knowledge of every team
member. Evernote Business gives your company the tools to collect,
discover and share the ideas, research and know-how that create an
effortlessly productive workplace.
http://evernote.com/business/
http://evernote.com/intl/es/video/
Your financial life, all in one place
Mint pulls all your financial accounts into one place. Set a budget, track your
goals and do more with your money, for free!
Mint believes money is for living. So they work to make everything simple
and streamlined. Sign up takes less than five minutes, then
Mint automatically pulls all your financial information into
one place, so you can finally get the entire picture.
https://www.mint.com/what-is-mint
Use the envelope method to track your spending and stick to a budget.
Access your budget anywhere
• You'll be able to view and manage your budget on any computer with a modern web browser.
Prepare for the unexpected
• Save a little from each paycheck to create an emergency fund for unexpected expenses.
Import from your bank
• Save hours of data entry by uploading transactions from your bank.
Methodically destroy debt
• Use our debt reduction worksheet to help create a strategy for getting out of debt.
http://www.youtube.com/watch?v=lmDTqQdSlTk
3. Protocols, Standards, Code of Ethics
• Impact our reputation.
• Comply with applicable laws and avoid
behaviors that harm our image and how
we are perceived by customers, partners
or people in general.
• Fosters character and demonstrates
multicultural awareness and business
culture.
TELEPHONE: THE FIRST IMPRESSION
• It is important to answer the telephone by the second ring.
• Give a proper greeting.
• It is your responsibility to return a call promptly after receiving word
of a missed call.
• Smile when talking.
• Do not cover the phone during the call.
• Try not to put the other person on hold..
RING TONE
• Think about what the ringtone says
about you.
• If you are embarrassed by your
ringtone in certain situations (trains,
office, when you're visiting your
mother), then you almost certainly
have made the wrong choice.​​
Choose a different ringtone.
SILENCE
Remember that your phone has the functions of
vibration or silence. Use It!!
s
SUGGESTIONS FOR USING THE PHONE
• Do not make calls to people from inappropriate places; a call from a bathroom is
very unpleasant.
• Bluetooth headsets are great in the car (they are safe and legal).
• If you are expecting an important call when meeting someone socially, explain at
the outset that you will have to take the call, and apologize in advance. Otherwise,
apologize and retire somewhere private to make or receive the call.
• Isolate yourself from noise or distractions that might
interfere with your conversation..
• Avoid talking publicly about intimate issues, using foul
language or being rude.
• During the call avoid having anything in your mouth that
hinders communication (cigarettes, candy, gum, drinks,
etc..).
• Although you may have a smartphone, it can be beneficial to
have a small notebook and pen to take notes.
SUGGESTIONS USING THE PHONE
BASIC CODE OF CONDUCT FOR TEXT MESSAGES
• Short messages and instant messaging.
• Do not cancel an appointment with a text message.
• Formal written communication should never be
replaced by a text message.
• Never send a condolence message by text.
• Avoid using confusing language and abbreviated text
as the recipient may not understand. (lol, omg, rofl)
• You can omit conventional greetings and farewells.
4. HUMAN RESOURCE MANAGEMENT
• Remote monitoring
• Distant work teams
• Virtual Meetings and Video Conferences
• Economic and energy savings
Helps you:
• Find and eliminate the waste of time
• Understand what is happening at work
• Track your projects to bill customers
• Fully automatic - no data entry
• Available for Windows, Mac, Linux, Android & iPhone
http://desktime.com
TIME DESK
REMOTE MONITORING
5. Virtual Meetings & VideoConferencing
• Virtual meetings take place
over the Internet, where
individuals, partners or
employees attend through
their computer without
physically traveling to the
meeting.
VIRTUAL MEETING PROTOCOL
• The first thing to understand when conducting a virtual meeting is that it is not
really a virtual meeting at all.
• The meeting is real, the activity is real, and the importance of the results are real.
• This is a real meeting that happens to take place in a virtual environment.
• Consider the processes that take place:
o Before meeting
o During the meeting
o After the meeting.
BEFORE THE MEETING:
The place to conduct the meeting.
1. Technology? Does everyone have the necessary resources?
2. Who are the participants and how will they be invited?
3. What time will the meeting be, and are there participants in different time zones?
4. What language will be spoken during the meeting?
5. Do you make and answer questions during the meeting, or after?
6. What materials will participants need? How will they be sent? Email? Fax?
Overnight Delivery?
DURING THE MEETING
1. Try to call or arrive a few minutes early.
2. Introduce all participants.
3. Follow the agenda.
4. Be accurate, use examples to ensure understanding, recap and
summarize.
5. Refer to the slide number or page number if you are using a
presentation previously sent.
6. Direct questions to each participant instead of saying "Are there any
questions?"
7. Listen to the views of all participants.
AFTER THE MEETING
1. The meeting does not end as soon as participants hang up or log off.
2. Sending notes shortly after the meeting helps ensure that everyone has the
same understanding of what happened and what will happen next.
3. Well documented decisions and action items with clear deadlines help
people understand how to proceed once they have been disconnected or
dismissed from the meeting.
4. Considering that people may be located in different time zones, the more
you can help people to be successful, the more willing and able they will be
to attend future meetings and take on additional responsibilities.
ADVANTAGES OF VIDEO CONFERENCING
AND VIRTUAL MEETINGS
• Economic
• Time-saving
• Maximize resources
• Improved quality of life
The use of videoconferencing is an efficient and dynamic communication that
goes beyond the traditional voice call. It incorporates much richer visual
communications and participation.
ADVANTAGES OF VIDEO CONFERENCING AND
VIRTUAL MEETINGS
Applications and Services
3G Video Conferencing
• Offers the possibility to partners, employees or users to initiate and / or
participate in videoconference from any location.
• Videoconferencing 3G multimedia communications ubiquity allows "face to
face" communication and a more effective exchange of information, it increases
productivity, and helps resolve issues quickly, including questions and doubts.
• Excellent visual collaboration system for global sales meetings, job interviews
or for the promotional launch of a product or service.
3G Mobile Phone Video Conference
Requirements
• The 3G Phone or Aircard
• Built-in Camera
• Data Plan
• Video Conferencing Client
6. Security
Computer security has three main goals:
• Confidentiality
• Integrity
• Availability
Basic Computer Security Methods
• Limit computer access to "safe" users.
• Peripherals can block any "unsafe" activity.
• Firewall and antivirus software.
Security
• What is cyber security?
• What are the risks?
• What can you do?
What can you do?
• Hacker, attacker, or intruder
• Malicious code
• Vulnerability
The Internet is Public
• It’s accessible and contains a wealth of information
• Has become a popular resource for communicating, for researching
topics, and for finding information about people
• You are not really anonymous when you are online
• Once online, you can be accessed by a world of strangers…and
remember, you have no idea what they might do with that information.
Guidelines when publishing
information on the Internet
• View the internet as a novel, not a diary
• Be careful what you advertise
• Realize that you can't take it back
• Before you publish something on the Internet, determine
what value it provides and consider the implications of
having the information available to the public – forever!
Why do you need a password?
• Choose a good password (numbers & letters).
• Don't use passwords that are based on personal information.
• Don't use words that can be found in any dictionary of any language.
• Develop a mnemonic for remembering complex passwords.
• Use both lowercase and capital letters.
• Use a combination of letters, numbers, and special characters.
• Use passphrases when you can.
• Use different passwords on different systems.
Why do you need a password?
• How to protect your password.
• Minimize the access other people have to your information.
• Lock your computer when you are away.
• Disconnect your computer from the Internet when you aren't using
it.
• Evaluate your security settings often.
What other steps can you take?
• Protect your computer against power surges
and brief outages.
• Back up all of your data.
7. BRANDING
A company or a person with a strong business identity and
a good position in the market will be a steady source of
income and safe in the long term – reputation, good name,
identity.
Professional Image
• Tools that can make a difference in your market:
o The Mission, Vision and Values of your company​​
o The value of your word
o Business cards and other advertising
o Design and layout of your website
o Virtual Offices
o Social Network
THE WHY AND THE VALUE OF VIRTUAL OFFICES
BACKGROUND
• Entrepreneurs who work alone are increasing every day
• Currently 58% of small business owners work from home
• More attractive for women entrepreneurs
• Companies can make some fixed infrastructure costs, variable and dependent
on the number of employees
8. VIRTUAL OFFICES
• A company requires between 200 and 250 sq ft
of office space per employee.
• Every day more people are working remotely.
• How much is spent on a simple change of
address for your office?
• Change of address (business cards, stationery,
stamps, TIME) can be expensive
• A virtual office can save money.
CO-WORKING
• Co-working (co-work) allows freelancers, entrepreneurs and SBs from
different sectors to share workspace, both physical and virtual, to develop
their professional projects independently, while encouraging joint projects.
CO-WORKING BENEFITS
RESULTS OF A RECENT SURVEY ON VIRTUAL OFFICES OR Co-
working SPACES:
• 92% of respondents said their social circle had increased significantly.
• 80% said their business had grown its network.
• Reported a 75% increase in productivity.
• 86% said that their isolation has decreased.
• 96% of respondents said that community is an important value among
members in their co-working space.
• 74% of people know all or many of the names of their companions in
the co-working space.
Responses to the question
"What do you like most about your
virtual office?"
81% said they liked the people
61% said their virtual office was the best place to work
46% said that price was the most important element
68% said they had no plans to leave their work area
17% said they would stay for at least one year
SOCIAL PLATFORMS
• Social platforms are increasingly used by companies and
institutions
• Review profiles of prospective employees, customers or
partners
• Facebook and Twitter let you get a sense of the environment,
friendships, tastes and interests of the candidates.
• For this reason, we must be careful with the information we
share in these social spaces and properly handle privacy
settings.
• Check the privacy settings on Social Media
• Create a personal profile and avoid mixing other professional
information
• Browse search results of our names in Google
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Weakness and strengths of computer
Weakness and strengths of computerWeakness and strengths of computer
Weakness and strengths of computerAmanjot_kaur
 
SIGNews: Purple VRS Announces One Number for All
SIGNews: Purple VRS Announces One Number for AllSIGNews: Purple VRS Announces One Number for All
SIGNews: Purple VRS Announces One Number for AllPurple Communications
 
Symphony Interactive Gallery
Symphony Interactive GallerySymphony Interactive Gallery
Symphony Interactive Galleryhbertolo
 
Webinar on webinars
Webinar on webinarsWebinar on webinars
Webinar on webinarsIna Smith
 
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...Dave Amirault
 
Pragmatic Principles for Mobile Design
Pragmatic Principles for Mobile DesignPragmatic Principles for Mobile Design
Pragmatic Principles for Mobile DesignBrandon Carson
 
Americana university
Americana universityAmericana university
Americana universityBerlys
 

Was ist angesagt? (9)

Weakness and strengths of computer
Weakness and strengths of computerWeakness and strengths of computer
Weakness and strengths of computer
 
SIGNews: Purple VRS Announces One Number for All
SIGNews: Purple VRS Announces One Number for AllSIGNews: Purple VRS Announces One Number for All
SIGNews: Purple VRS Announces One Number for All
 
Symphony Interactive Gallery
Symphony Interactive GallerySymphony Interactive Gallery
Symphony Interactive Gallery
 
Blackberry
BlackberryBlackberry
Blackberry
 
Ub session 1
Ub session 1Ub session 1
Ub session 1
 
Webinar on webinars
Webinar on webinarsWebinar on webinars
Webinar on webinars
 
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
 
Pragmatic Principles for Mobile Design
Pragmatic Principles for Mobile DesignPragmatic Principles for Mobile Design
Pragmatic Principles for Mobile Design
 
Americana university
Americana universityAmericana university
Americana university
 

Ähnlich wie Mobile Entrepreneur Seminar

The Mobile Entrepreneur Part 2
The Mobile Entrepreneur Part 2The Mobile Entrepreneur Part 2
The Mobile Entrepreneur Part 2venturepointsa
 
Unit2 2 online-meetingguide
Unit2 2 online-meetingguideUnit2 2 online-meetingguide
Unit2 2 online-meetingguideKeiko24
 
Unit2 2 online-meeting guide
Unit2 2 online-meeting guideUnit2 2 online-meeting guide
Unit2 2 online-meeting guideKeiko24
 
technologyinbusinesscommunications-111208051054-phpapp01.pdf
technologyinbusinesscommunications-111208051054-phpapp01.pdftechnologyinbusinesscommunications-111208051054-phpapp01.pdf
technologyinbusinesscommunications-111208051054-phpapp01.pdfJinx33
 
Conducting effective online meetings and training
Conducting effective online meetings and trainingConducting effective online meetings and training
Conducting effective online meetings and trainingMohammad Hijazi
 
Collaboration
CollaborationCollaboration
Collaborationasmakh89
 
Third Sector Start Up Tech Tools Feb15
Third Sector Start Up Tech Tools Feb15Third Sector Start Up Tech Tools Feb15
Third Sector Start Up Tech Tools Feb15PAVS Communities 2.0
 
Web conferencing.....
Web conferencing.....Web conferencing.....
Web conferencing.....pumascomm
 
Mark Jastine Pertez Chapter 9
Mark Jastine Pertez Chapter 9 Mark Jastine Pertez Chapter 9
Mark Jastine Pertez Chapter 9 Jaypee Tan
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICTRolly Franco
 
Technology in business communications
Technology in business communicationsTechnology in business communications
Technology in business communicationsHitesh Kothari
 
Modern media in organisational communication
Modern media in organisational communication Modern media in organisational communication
Modern media in organisational communication Tanmay Mundra
 
Technological advancements in business communication
Technological advancements in business communicationTechnological advancements in business communication
Technological advancements in business communicationAmanJeet Singh
 
NextPointe Hosted VoIP Phone System Review
NextPointe Hosted VoIP Phone System ReviewNextPointe Hosted VoIP Phone System Review
NextPointe Hosted VoIP Phone System ReviewNextPointe Inc.
 
The mobile ecosystem & technological strategies
The mobile ecosystem & technological strategiesThe mobile ecosystem & technological strategies
The mobile ecosystem & technological strategiesIvano Malavolta
 
SFSU ISYS 363-1 Fall 2013-group: Padres
SFSU ISYS 363-1 Fall 2013-group: PadresSFSU ISYS 363-1 Fall 2013-group: Padres
SFSU ISYS 363-1 Fall 2013-group: PadresAllison Fleming
 
First Time Video Conferencing
First Time Video ConferencingFirst Time Video Conferencing
First Time Video ConferencingPaul Richards
 
Resistance is futile! The digital workplace is coming
Resistance is futile! The digital workplace is comingResistance is futile! The digital workplace is coming
Resistance is futile! The digital workplace is comingIntranätverk
 
Teleconferncing by abhishek mahajan
Teleconferncing by abhishek mahajanTeleconferncing by abhishek mahajan
Teleconferncing by abhishek mahajanAbhishek Mahajan
 

Ähnlich wie Mobile Entrepreneur Seminar (20)

The Mobile Entrepreneur Part 2
The Mobile Entrepreneur Part 2The Mobile Entrepreneur Part 2
The Mobile Entrepreneur Part 2
 
Unit2 2 online-meetingguide
Unit2 2 online-meetingguideUnit2 2 online-meetingguide
Unit2 2 online-meetingguide
 
Unit2 2 online-meeting guide
Unit2 2 online-meeting guideUnit2 2 online-meeting guide
Unit2 2 online-meeting guide
 
technologyinbusinesscommunications-111208051054-phpapp01.pdf
technologyinbusinesscommunications-111208051054-phpapp01.pdftechnologyinbusinesscommunications-111208051054-phpapp01.pdf
technologyinbusinesscommunications-111208051054-phpapp01.pdf
 
Conducting effective online meetings and training
Conducting effective online meetings and trainingConducting effective online meetings and training
Conducting effective online meetings and training
 
Collaboration
CollaborationCollaboration
Collaboration
 
Third Sector Start Up Tech Tools Feb15
Third Sector Start Up Tech Tools Feb15Third Sector Start Up Tech Tools Feb15
Third Sector Start Up Tech Tools Feb15
 
ART of SHARING
ART of SHARINGART of SHARING
ART of SHARING
 
Web conferencing.....
Web conferencing.....Web conferencing.....
Web conferencing.....
 
Mark Jastine Pertez Chapter 9
Mark Jastine Pertez Chapter 9 Mark Jastine Pertez Chapter 9
Mark Jastine Pertez Chapter 9
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Technology in business communications
Technology in business communicationsTechnology in business communications
Technology in business communications
 
Modern media in organisational communication
Modern media in organisational communication Modern media in organisational communication
Modern media in organisational communication
 
Technological advancements in business communication
Technological advancements in business communicationTechnological advancements in business communication
Technological advancements in business communication
 
NextPointe Hosted VoIP Phone System Review
NextPointe Hosted VoIP Phone System ReviewNextPointe Hosted VoIP Phone System Review
NextPointe Hosted VoIP Phone System Review
 
The mobile ecosystem & technological strategies
The mobile ecosystem & technological strategiesThe mobile ecosystem & technological strategies
The mobile ecosystem & technological strategies
 
SFSU ISYS 363-1 Fall 2013-group: Padres
SFSU ISYS 363-1 Fall 2013-group: PadresSFSU ISYS 363-1 Fall 2013-group: Padres
SFSU ISYS 363-1 Fall 2013-group: Padres
 
First Time Video Conferencing
First Time Video ConferencingFirst Time Video Conferencing
First Time Video Conferencing
 
Resistance is futile! The digital workplace is coming
Resistance is futile! The digital workplace is comingResistance is futile! The digital workplace is coming
Resistance is futile! The digital workplace is coming
 
Teleconferncing by abhishek mahajan
Teleconferncing by abhishek mahajanTeleconferncing by abhishek mahajan
Teleconferncing by abhishek mahajan
 

Kürzlich hochgeladen

Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfASGITConsulting
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesAurelien Domont, MBA
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressorselgieurope
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 

Kürzlich hochgeladen (20)

WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and Templates
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 

Mobile Entrepreneur Seminar

  • 3. OBJECTIVE Improve the business effectiveness of today’s entrepreneurs by providing guidance and practical help with: •establishing a mobile working life •wireless applications •mobile technology, tools & techniques •usage protocols and a code of ethics
  • 4. CONTENT 1.Introduction 2.Tech Tools 3.Protocols, Standards, Code of Ethics 4.Human Resource Management 5.Virtual Meetings & VideoConferencing 6.Security 7.Branding 8.Virtual Offices
  • 5. 1. INTRODUCTION Now have at least 4 working generations – Veteran Baby Boomers, Generation X, Generation Y and Digital Natives. Each has shown evolutionary movement in their way of doing business from the most conventional way to a new, virtual model. Much of this development is due to the evolution and optimization of communication systems. The cell phone, Blackberry, PDA and wireless technology allow mobility and are making the fixed location workplace unnecessary for many.
  • 6. 2. TECHNOLOGY TOOLS Hardware: Telephone VoIP, Smartphone, Tablet, iPad, PC, Laptop
  • 7. Software: • Gmail, • Skype, • Sistema de mensajería de texto whats App, • GotoMyPC, • EverNote, • mint.com, • NeoBudget 2. TECHNOLOGY TOOLS
  • 8. Gmail is a free, advertising-supported email service provided by Google. Users may access Gmail as secure webmail, as well as viaPOP3 or IMAP4 protocols. Gmail was launched as an invitation-only beta release on April 1, 2004. and it became available to the general public on February 7, 2007, though still in beta status at that time. The service was upgraded from beta status on July 7, 2009, along with the rest of the Google Apps suite.
  • 9. The service allows users to communicate with peers by voice using a microphone, video by using a webcam, and instant messaging over the Internet. Phone calls may be placed to recipients on the traditional telephone networks. Calls to other users within the Skype service are free of charge, while calls to landline telephones and mobile phones are charged via a debit -based user account system. Skype has also become popular for its additional features, including file transfer, and videoconferencing.
  • 10. WhatsApp Messenger is a proprietary, cross-platform instant messaging application for smartphones. In addition to text messaging, users can send each other images, video, and audio media messages. The client software is available for Android, BlackBerry OS, iOS; Series 40, Symbian (S60); and Windows Phone.
  • 11. http://www.gotomypc.eu/remote_access/pc_remote_access GoToMyPC enables fast, easy and secure remote access to a Mac or PC from any web browser. •Work on your office computer from home. •Travel anywhere and work remotely. •Never go without your files, programs and email. •Connect on the go from your tablet or phone.
  • 12. Build knowledge. Share ideas. Get things done. • Successful businesses are built on the knowledge of every team member. Evernote Business gives your company the tools to collect, discover and share the ideas, research and know-how that create an effortlessly productive workplace. http://evernote.com/business/ http://evernote.com/intl/es/video/
  • 13. Your financial life, all in one place Mint pulls all your financial accounts into one place. Set a budget, track your goals and do more with your money, for free! Mint believes money is for living. So they work to make everything simple and streamlined. Sign up takes less than five minutes, then Mint automatically pulls all your financial information into one place, so you can finally get the entire picture. https://www.mint.com/what-is-mint
  • 14. Use the envelope method to track your spending and stick to a budget. Access your budget anywhere • You'll be able to view and manage your budget on any computer with a modern web browser. Prepare for the unexpected • Save a little from each paycheck to create an emergency fund for unexpected expenses. Import from your bank • Save hours of data entry by uploading transactions from your bank. Methodically destroy debt • Use our debt reduction worksheet to help create a strategy for getting out of debt. http://www.youtube.com/watch?v=lmDTqQdSlTk
  • 15. 3. Protocols, Standards, Code of Ethics • Impact our reputation. • Comply with applicable laws and avoid behaviors that harm our image and how we are perceived by customers, partners or people in general. • Fosters character and demonstrates multicultural awareness and business culture.
  • 16. TELEPHONE: THE FIRST IMPRESSION • It is important to answer the telephone by the second ring. • Give a proper greeting. • It is your responsibility to return a call promptly after receiving word of a missed call. • Smile when talking. • Do not cover the phone during the call. • Try not to put the other person on hold..
  • 17. RING TONE • Think about what the ringtone says about you. • If you are embarrassed by your ringtone in certain situations (trains, office, when you're visiting your mother), then you almost certainly have made the wrong choice.​​ Choose a different ringtone.
  • 18. SILENCE Remember that your phone has the functions of vibration or silence. Use It!! s
  • 19. SUGGESTIONS FOR USING THE PHONE • Do not make calls to people from inappropriate places; a call from a bathroom is very unpleasant. • Bluetooth headsets are great in the car (they are safe and legal). • If you are expecting an important call when meeting someone socially, explain at the outset that you will have to take the call, and apologize in advance. Otherwise, apologize and retire somewhere private to make or receive the call.
  • 20. • Isolate yourself from noise or distractions that might interfere with your conversation.. • Avoid talking publicly about intimate issues, using foul language or being rude. • During the call avoid having anything in your mouth that hinders communication (cigarettes, candy, gum, drinks, etc..). • Although you may have a smartphone, it can be beneficial to have a small notebook and pen to take notes. SUGGESTIONS USING THE PHONE
  • 21. BASIC CODE OF CONDUCT FOR TEXT MESSAGES • Short messages and instant messaging. • Do not cancel an appointment with a text message. • Formal written communication should never be replaced by a text message. • Never send a condolence message by text. • Avoid using confusing language and abbreviated text as the recipient may not understand. (lol, omg, rofl) • You can omit conventional greetings and farewells.
  • 22. 4. HUMAN RESOURCE MANAGEMENT • Remote monitoring • Distant work teams • Virtual Meetings and Video Conferences • Economic and energy savings
  • 23. Helps you: • Find and eliminate the waste of time • Understand what is happening at work • Track your projects to bill customers • Fully automatic - no data entry • Available for Windows, Mac, Linux, Android & iPhone http://desktime.com TIME DESK REMOTE MONITORING
  • 24.
  • 25. 5. Virtual Meetings & VideoConferencing • Virtual meetings take place over the Internet, where individuals, partners or employees attend through their computer without physically traveling to the meeting.
  • 26. VIRTUAL MEETING PROTOCOL • The first thing to understand when conducting a virtual meeting is that it is not really a virtual meeting at all. • The meeting is real, the activity is real, and the importance of the results are real. • This is a real meeting that happens to take place in a virtual environment. • Consider the processes that take place: o Before meeting o During the meeting o After the meeting.
  • 27. BEFORE THE MEETING: The place to conduct the meeting. 1. Technology? Does everyone have the necessary resources? 2. Who are the participants and how will they be invited? 3. What time will the meeting be, and are there participants in different time zones? 4. What language will be spoken during the meeting? 5. Do you make and answer questions during the meeting, or after? 6. What materials will participants need? How will they be sent? Email? Fax? Overnight Delivery?
  • 28. DURING THE MEETING 1. Try to call or arrive a few minutes early. 2. Introduce all participants. 3. Follow the agenda. 4. Be accurate, use examples to ensure understanding, recap and summarize. 5. Refer to the slide number or page number if you are using a presentation previously sent. 6. Direct questions to each participant instead of saying "Are there any questions?" 7. Listen to the views of all participants.
  • 29. AFTER THE MEETING 1. The meeting does not end as soon as participants hang up or log off. 2. Sending notes shortly after the meeting helps ensure that everyone has the same understanding of what happened and what will happen next. 3. Well documented decisions and action items with clear deadlines help people understand how to proceed once they have been disconnected or dismissed from the meeting. 4. Considering that people may be located in different time zones, the more you can help people to be successful, the more willing and able they will be to attend future meetings and take on additional responsibilities.
  • 30. ADVANTAGES OF VIDEO CONFERENCING AND VIRTUAL MEETINGS • Economic • Time-saving • Maximize resources • Improved quality of life
  • 31. The use of videoconferencing is an efficient and dynamic communication that goes beyond the traditional voice call. It incorporates much richer visual communications and participation. ADVANTAGES OF VIDEO CONFERENCING AND VIRTUAL MEETINGS
  • 32. Applications and Services 3G Video Conferencing • Offers the possibility to partners, employees or users to initiate and / or participate in videoconference from any location. • Videoconferencing 3G multimedia communications ubiquity allows "face to face" communication and a more effective exchange of information, it increases productivity, and helps resolve issues quickly, including questions and doubts. • Excellent visual collaboration system for global sales meetings, job interviews or for the promotional launch of a product or service.
  • 33. 3G Mobile Phone Video Conference Requirements • The 3G Phone or Aircard • Built-in Camera • Data Plan • Video Conferencing Client
  • 34. 6. Security Computer security has three main goals: • Confidentiality • Integrity • Availability
  • 35. Basic Computer Security Methods • Limit computer access to "safe" users. • Peripherals can block any "unsafe" activity. • Firewall and antivirus software.
  • 36. Security • What is cyber security? • What are the risks? • What can you do?
  • 37. What can you do? • Hacker, attacker, or intruder • Malicious code • Vulnerability
  • 38. The Internet is Public • It’s accessible and contains a wealth of information • Has become a popular resource for communicating, for researching topics, and for finding information about people • You are not really anonymous when you are online • Once online, you can be accessed by a world of strangers…and remember, you have no idea what they might do with that information.
  • 39. Guidelines when publishing information on the Internet • View the internet as a novel, not a diary • Be careful what you advertise • Realize that you can't take it back • Before you publish something on the Internet, determine what value it provides and consider the implications of having the information available to the public – forever!
  • 40. Why do you need a password? • Choose a good password (numbers & letters). • Don't use passwords that are based on personal information. • Don't use words that can be found in any dictionary of any language. • Develop a mnemonic for remembering complex passwords. • Use both lowercase and capital letters. • Use a combination of letters, numbers, and special characters. • Use passphrases when you can. • Use different passwords on different systems.
  • 41. Why do you need a password? • How to protect your password. • Minimize the access other people have to your information. • Lock your computer when you are away. • Disconnect your computer from the Internet when you aren't using it. • Evaluate your security settings often.
  • 42. What other steps can you take? • Protect your computer against power surges and brief outages. • Back up all of your data.
  • 43. 7. BRANDING A company or a person with a strong business identity and a good position in the market will be a steady source of income and safe in the long term – reputation, good name, identity.
  • 44. Professional Image • Tools that can make a difference in your market: o The Mission, Vision and Values of your company​​ o The value of your word o Business cards and other advertising o Design and layout of your website o Virtual Offices o Social Network
  • 45. THE WHY AND THE VALUE OF VIRTUAL OFFICES BACKGROUND • Entrepreneurs who work alone are increasing every day • Currently 58% of small business owners work from home • More attractive for women entrepreneurs • Companies can make some fixed infrastructure costs, variable and dependent on the number of employees
  • 46. 8. VIRTUAL OFFICES • A company requires between 200 and 250 sq ft of office space per employee. • Every day more people are working remotely. • How much is spent on a simple change of address for your office? • Change of address (business cards, stationery, stamps, TIME) can be expensive • A virtual office can save money.
  • 47. CO-WORKING • Co-working (co-work) allows freelancers, entrepreneurs and SBs from different sectors to share workspace, both physical and virtual, to develop their professional projects independently, while encouraging joint projects.
  • 48. CO-WORKING BENEFITS RESULTS OF A RECENT SURVEY ON VIRTUAL OFFICES OR Co- working SPACES: • 92% of respondents said their social circle had increased significantly. • 80% said their business had grown its network. • Reported a 75% increase in productivity. • 86% said that their isolation has decreased. • 96% of respondents said that community is an important value among members in their co-working space. • 74% of people know all or many of the names of their companions in the co-working space.
  • 49. Responses to the question "What do you like most about your virtual office?" 81% said they liked the people 61% said their virtual office was the best place to work 46% said that price was the most important element 68% said they had no plans to leave their work area 17% said they would stay for at least one year
  • 50. SOCIAL PLATFORMS • Social platforms are increasingly used by companies and institutions • Review profiles of prospective employees, customers or partners • Facebook and Twitter let you get a sense of the environment, friendships, tastes and interests of the candidates. • For this reason, we must be careful with the information we share in these social spaces and properly handle privacy settings. • Check the privacy settings on Social Media • Create a personal profile and avoid mixing other professional information • Browse search results of our names in Google

Hinweis der Redaktion

  1. *
  2. Introducción – Antecedentes Herramientas de Tecnología Protocolos, Códigos y Normas de Ética Empresariales Administración de Recursos Humanos Branding *
  3. This has led to the office, a home office, a virtual office and the office "nomad", which really does not need an office. Traditional markets are being divided into niches to support the different requirements of entrepreneurs who have found a need to expand their businesses virtually everywhere. The current business models have reduced or erased completely the conventional office. Their locations are now more accessible. This changes their marketing, sales and operational components. These challenges create opportunities for growth, in the development of flexiblity and creativity of these entrepreneurs in Motion.
  4. Es un software que permite comunicaciones de texto, voz y vídeo sobre Internet. Los usuarios interesados pueden descargar gratuitamente la aplicación ejecutable del sitio web oficial y pueden hablar entre ellos gratuitamente. Esta aplicación también incluye una característica denominada  YY SkypeOut , que permite a los usuarios llamar a teléfonos convencionales, cobrándoles diversas y bajas tarifas según el país de destino, pudiendo llamar a casi cualquier teléfono del mundo. Otra opción que brinda Skype es SkypeIn, gracias a la cual se otorga un número de teléfono para que desde un aparato telefónico, en cualquier parte del mundo, se pueda contactar al computador. Además, se provee de un servicio de buzón de voz. La interfaz de Skype es muy parecida a la de otros software de mensajería instantánea, tales como Windows Live Messenger o Yahoo! Messenger, y, de igual forma que en éstos, es posible entablar una conversación de mensajes instantáneos entre usuarios del mismo software. Este programa también permite dejar mensajes de voz (buzón) en caso de que el usuario no se encuentre disponible, siendo ése un servicio de pago que viene incluido con SkypeIn. *
  5. WhatsApp  es un software propietario multiplataforma de mensajería instantánea para teléfonos inteligentes. Además del envío de texto, permite la transmisión de imágenes, video y audio, así como la localización del usuario siempre y cuando exista la posibilidad. La aplicación utiliza la red de datos del dispositivo móvil en el que se esté ejecutando, por lo tanto funciona conectada a Internet a diferencia de los servicios tradicionales de mensajes cortos o Sistema de mensajería multimedia. Este software se aplica en muchos formatos de celulares. Contrariamente a las creencias de muchas personas, la aplicación para celulares no es una red social a diferencia de redes sociales como Twitter o Facebook. *
  6. El trabajo en equipo de la oficina desde su casa. Viajar a cualquier lugar y trabajar de forma remota. Nunca vayas sin tus archivos, programas y correo electrónico. Conéctate en cualquier lugar desde tu tableta o teléfono. Cuando se conecta a tu Mac o PC  , lo que ves es una imagen en tiempo real de la pantalla de su ordenador. Instantánea trabajar con los archivos, programas y redes - desde cualquier lugar - como si estuviera en su escritorio. *
  7. Evernote  es una aplicación informática destinada a la organización de información personal mediante el archivo de notas. Existen versiones para diversos sistemas operativos que se instalan y versión web. La versión software para Windows tiene soporte para pantallas táctiles y reconocimiento de escritura. *
  8. Mint saca todas sus cuentas financieras en un solo lugar.   Establezca un presupuesto, el seguimiento de sus objetivos y hacer más  con su dinero. https://www.mint.com/what-is-mint/ *
  9. Accede a tu presupuesto en cualquier lugar Usted será capaz de ver y administrar su presupuesto en cualquier ordenador con un navegador web moderno. Accede a tu presupuesto con seguridad Tenga la seguridad de que su información presupuestaria se mantiene de forma segura y sin peligro *
  10. Nuestras acciones individuales y colectivas pueden tener un impacto directo en nuestra reputación. Por ello, debemos siempre cumplir con las leyes aplicables y evitar comportamientos que pudieran causar un daño a nuestra reputación y a la manera en que nos perciben nuestros clientes, el público y nuestros socios. Todos debemos velar por mantener y promover nuestra excelente reputación en todas nuestras actividades, sin importar en dónde llevamos a cabo nuestras actividades comerciales. Debemos esforzarnos continuamente para fomentar el carácter multicultural y demostrar una conciencia y sensibilidad cultural en los lugares donde realizamos nuestras actividades comerciales, cumpliendo estrictamente al mismo tiempo nuestro Código de Ética y Conducta Empresarial, así como las leyes y la reglamentación en vigor. Independientemente de que trabajemos en obras en un lugar alejado o en una oficina cosmopolita, todos tenemos una responsabilidad y una función vital que desempeñar. ALGUNOS DE ESTOS CODIGOS Y NORMAS SON: *
  11. Es importante recordar, que el teléfono es para muchas personas la primera impresión que se lleva de una empresa o individuo Es por lo tanto, un aspecto muy importante a tener en cuenta., algunas reglas importantes son: Al sonar el teléfono, se debe atender al máximo de dos repiques la llamada entrante, contestando y respondiendo inmediatamente, sin que tenga que esperar el interlocutor, dando un correcto saludo de buenos días, tardes o noches, dependiendo de la hora. Es responsabilidad del que recibe una llamada y en el momento no puede contestar o la comunicación se corta o se interrumpe de volverse a comunicar con la persona que le esta llamando Mientras se atiende la llamada lo más recomendable es no dejar a la otra persona en espera; Es de mal gusto hablar con otra persona tratando de tapar el auricular; Sonría al hablar eso demuestra eficacia, alegría y buen humor, elemento que se debe reproducir a todos y no el de enojo o mal humor. *
  12. Reflexione en lo que el tono de llamada dice de usted: Rocker?, moda adolescente?, videojugador?, seductor?, nerd?, tv adicto?, "invisible?" Si usted se avergüenza por su tono de llamada en ciertas situaciones (trenes, oficina, cuando usted está visitando su madre) es casi seguro que ha hecho la elección equivocada. Inténtelo de nuevo. *
  13. Recuerde que su teléfono celular tiene función de vibrador. Asegúrese de que su conversación telefónica no moleste a otras personas. Conversaciones íntimas no son adecuadas frente a los demás. (temas de dinero, sexo o lenguaje soez o vulgar no es adecuado frente a otras personas. No utilice el teléfono en "zonas tranquilas o inadecuadas" (Bibliotecas, cines, teatros, iglesias, conferencias, Bancos, Trenes, etc. . Incluso si usted está en una zona designada, tenga en cuenta que su voz distraerá si es demasiado alta. Si la línea está mal y la conversación es inaudible, explique que hay un problema y cuelgue. La gente en persona merece más atención que un aparato, por lo que siempre que sea posible apague el teléfono en situaciones sociales. *
  14. No haga llamadas a personas de lugares inapropiados; una llamada de un cuarto de baño es muy desagradable. Auriculares Bluetooth están muy bien en el coche (de hecho son seguros y legales). Si usted está esperando una llamada importante cuando se conoce a alguien socialmente, explíquele desde el principio que usted tendrá que tomar la llamada, y pida disculpas por adelantado. De lo contrario, se excusa al retirarse a algún lugar privado para hacer o recibir dicha llamada. *
  15. Tratar, en la medida de lo posible, de estar aislado de ruidos o distracciones que pudieran interferir en nuestra atención para nuestro interlocutor. Evite hablar públicamente sobre temas Íntimos o sobre Sexo, Dinero o utilizar lenguaje soez o descortés . En el diálogo respectivo, lo ideal es no tener nada en la boca que entorpezca la comunicación ya sea (cigarros, caramelos, chicles, bebidas, etc.). Si se utiliza el teléfono como una línea de negocios es recomendable siempre tener a la mano una pequeña libreta y pluma para hacer anotaciones . Mientras se atiende la llamada lo más recomendable es no dejar a la otra persona en espera; Es de mal gusto hablar con otra persona tratando de tapar el auricular; Sonría al hablar eso demuestra eficacia, alegría y buen humor, elemento que se debe reproducir a todos y no el de enojo o mal humor. *
  16. Los mensajes de texto son ideales para transmitir un mensaje corto, instantáneo. Si tiene que cancelar una cita, siempre es mejor realizar una llamada telefónica; Escritos formales, tales como, cartas de agradecimiento nunca deberían sustituirse por un texto. Los mensajes de condolencia enviados por texto nunca deberían utilizarse. Evitar el uso de lenguaje confuso, texto abreviado, si el destinatario no puede entenderlo. Use tanto la gramática convencional, ortografía y la puntuación tanto como sea necesario para que usted mismo y el destinatario puedan entender claramente. Se pueden omitir saludos y despedidas convencionales. *
  17. Supervisión a distancia, Equipos de trabajo distantes, Juntas Virtuales y Video conferencias Ahorros económicos y de energía *
  18. Le ayuda a: Encontrar y eliminar la pérdida de tiempo Entender lo que está pasando en el trabajo Dar el seguimiento de sus proyectos a facturar a sus clientes Completamente automático - sin entrada de datos Disponible para Windows, Mac, Linux y Android y iPhone Una herramienta de supervisión a distancia puede ser DeskTime es un   software de seguimiento de tiempo real que rastrea y  analiza la productividad  por clasificación, de diferentes aplicaciones que da usted o sus empleados utilizando categorías  de "productivo", "improductivo" o "neutral"  . Se ejecuta en silencio y discretamente en segundo plano, que no requiere entrada del usuario. Mide analiza, la continuidad de quien trabajar mejor DeskTime mide su productividad, y revela sus mayores pérdidas de tiempo, facultando a usted ya sus empleados a tomar decisiones más informadas acerca de sus hábitos en el gasto de tiempo. A través de poder visualizar dichos hábitos para poder así aumentar la productividad en el lugar de trabajo. Ideal para trabajos basados ​​en computadoras – tales como- diseñadores, ingenieros de software, profesionales independientes , pequeñas y medianas empresas Características adicionales - Proyectos, mensajes de iPhone / android, a distancia. DeskTime le permite separar el tiempo dedicado a diferentes proyectos, por lo que  la facturación   es mucho más fácil. Los dueños de negocios también reciben informes a intervalos regulares con diferentes gráficos, que representan el estado de su empresa.  Además DeskTime , permite a sus empleados dejar mensajes cuando está de viaje, y también se puede acceder a DeskTime desde su dispositivo móvil (Android, iPhone, tablet), para dejar mensajes y vigilar a los empleados cuando usted está fuera de la ciudad. *
  19. *
  20. De este modo se facilita al individuo el ejercicio de sus derechos, opiniones, reportes y se logra asegurar el buen gobierno corporativo *
  21. Se deben considerar los siguientes aspectos importantes: ¿Qué lugar es el que queremos usar ¿Qué tecnología que necesitamos? ¿Estamos seguros de que todo el mundo tiene esa disposición? ¿Quiénes son los participantes adecuados y cómo deberían ser invitados? ¿A qué hora se celebrará la reunión y cómo podemos definir el tiempo si los participantes están en diferentes zonas horarias? ¿En qué idioma se llevará a cabo la reunión? ¿Será que hacen que sea difícil para algunos de los participantes? ¿Hay algo que podamos hacer para reducir la dificultad? ¿Se harán y se contestaran preguntas durante la reunión? ¿Hay algún material que los participantes necesitarán que deben enviarse por correo electrónico, por fax o por correo expreso a ellos?. No dependa exclusivamente de las conexiones a Internet. En muchas áreas del mundo, estas conexiones no son tan confiables. Incluso la conexión más fiable cae ocasionalmente, a continuación, el participante se deja sin la información necesaria. En una reunión cara a cara, los asistentes podrán compartir rápidamente o hacer otra copia. Esto no es tan fácil en un entorno virtual *
  22. Trate de llamar o llegue unos minutos antes para asegurarse de que la tecnología está bien configurada y funcionando. A menos que sea una pequeña reunión donde todos los participantes están bien familiarizados, pida a los participantes Manténgase y mantenga a los participantes lo más cerca posible a la agenda de publicación: Sea lo más preciso posible, de ejemplos verifique la comprensión, recapitule y resuma a menudo. Refiérase a la diapositiva número, o número de página si está utilizando una presentación enviada previamente Haga preguntas directas a cada participante en lugar de decir "¿Hay alguna pregunta? “ Haga preguntas a todos cuando sea apropiado y cuando sea necesario asegurarse de que se escuchen las opiniones de todos.. Tenga en cuenta el hecho de que posiblemente no podrá ver a todos los asistentes por si tienen preguntas o inquietudes acerca de un artículo, usted tendrá que hacer preguntas o crear un proceso para llegar a ellos. *
  23. *
  24. Ahorro económico Reduzca los gastos de viaje hasta un 75 por ciento. Ahorro de tiempo : Menos viajes, menores desplazamientos, más productividad por trabajador. Maximizar los recursos : No se requiere nuevos equipos. Los usuarios en movilidad utilizan sus móviles 3G con Videollamada y los que están en una ubicación fija su propio PC con WebCam. Mejora de la calidad de vida : Los empleados pasan menos tiempo viajando y lejos de sus familias, obteniendo trabajadores más saludables, felices y generalmente más productivos El empleo de la Videoconferencia en movilidad es un modo eficaz y dinámico de comunicación, al ir más allá de la clásica llamada de voz incorporando comunicaciones visuales mucho más ricas y colaborativas con un coste efectivo. *
  25. Aplicaciones y Servicios de Videoconferencia 3G Ofrezca la posibilidad a sus ejecutivos, socios, empleados o usuarios de iniciar y/o participar en Videoconferencia desde cualquier localización usando su móvil 3G. Ahora podrá mantener reuniones, acceder a conferencias en directo o recibir asistencia en tiempo real por Videollamada mediante móviles 3G. Videoconferencia 3G, ubicuidad en las comunicaciones multimedia La comunicación "cara a cara" proveé un intercambio de información más efectivo, ayuda a resolver rápidamente incidencias, preguntas, d udas e incrementa la productividad. Un excelente sistema de colaboración visual para reuniones de ventas globales, realizar entrevistas de trabajo o para el lanzamiento pro mocional de un producto o servicio. *
  26. The 3G Phone or Aircard All 3G phones and Aircards allow devices to communicate with high-speed mobile broadband networks available in most of the United States. To check if you have a 3G device, look in the upper right corner of your smartphone display to see if you have a 3G icon. If so, this indicates you have 3G, or high-speed, mobile broadband coverage. All Aircards offer 3G connections where available, but they may revert to a slower network if necessary to keep your connection active. Built-in Camera In order for you to transmit video from a mobile device, your cell phone or smartphone must include a built-in camera. Even if your phone has a built-in camera, it will be difficult to watch someone else's video while you transmit yours, unless your phone has a camera on the front of the phone, near the screen. Sponsored Links Top 10 Video Conferencing Companies Compared in Our Free Chart. Download Now! CompareVideoConference.com Data Plan Most 3G video conferencing involves data-intensive activity. If you attempt video conference calls on your 3G device without an unlimited data plan, you may find yourself charged for data overuse. Thankfully, all wireless carriers offer an unlimited data plan that can save the hassles of excess data fees. Video Conferencing Client Skype is the most common video conference software on computers, but their dedicated client for mobile phones does not support video conferencing as of early 2010. In its place, the Fring client available for mobile phones allows users to connect to Skype using a third-party client, which allows video conferencing on cell phones. Fring's client works on most cell phones, and it is free, making it worthy software if it fits your needs. iVisit Mobile is a video conference client that allows Windows mobile devices to conference with other mobile devices and Windows and Mac computers that also have the client installed. While iVisit is a not a free solution, it does provide easy integration between mobile and desktop devices. iVisit does offer a free trial, so before making a purchase you can make sure the software runs well on your phone and that your cell carrier has a strong 3G high-speed connection in your area. Read more:  3G Mobile Phone Video Conference Requirements | eHow.com Read more: 3G Mobile Phone Video Conference Requirements | eHow.com  http://www.ehow.com/list_6002329_3g-phone-video-conference-requirements.html#ixzz2K3W74n7o   Las siguientes ligas son de algunas aplicaciones que ya existen http://www.tango.me/ http://qik.com/ *
  27. Confidentiality: Making sure people cannot acquire information they should not ( keeping secrets ) Integrity: Making sure people cannot change information they should not ( protecting data ) Availability: Making sure people cannot stop the computer from doing its job. *
  28. Basic computer security methods (in approximate order of strength) can be: Limit access to computers to "safe" users. Peripherals which block any "unsafe" activity. Firewall and antivirus software. *
  29. What is cyber security? It seems that everything relies on computers and the internet now — communication (email, cellphones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. How much of your daily life relies on computers? How much of your personal information is stored either on your own computer or on someone else's system? Cyber security involves protecting that information by preventing, detecting, and responding to attacks. What are the risks? There are many risks, some more serious than others. Among these dangers are viruses erasing your entire system, someone breaking into your system and altering files, someone using your computer to attack others, or someone stealing your credit card information and making unauthorized purchases. Unfortunately, there's no 100% guarantee that even with the best precautions some of these things won't happen to you, but there are steps you can take to minimize the chances. What can you do? The first step in protecting yourself is to recognize the risks and become familiar with some of the terminology associated with them. *
  30. What can you do? The first step in protecting yourself is to recognize the risks and become familiar with some of the terminology associated with them. Hacker, attacker, or intruder  - These terms are applied to the people who seek to exploit weaknesses in software and computer systems for their own gain. Although their intentions are sometimes fairly benign and motivated solely by curiosity, their actions are typically in violation of the intended use of the systems they are exploiting. The results can range from mere mischief (creating a virus with no intentionally negative impact) to malicious activity (stealing or altering information). Malicious code  - Malicious code, sometimes called malware, is a broad category that includes any code that could be used to attack your computer. Malicious code can have the following characteristics: It might require you to actually do something before it infects your computer. This action could be opening an email attachment or going to a particular web page. Some forms propagate without user intervention and typically start by exploiting a software vulnerability. Once the victim computer has been infected, the malicious code will attempt to find and infect other computers. This code can also propagate via email, websites, or network-based software. Some malicious code claims to be one thing while in fact doing something different behind the scenes. For example, a program that claims it will speed up your computer may actually be sending confidential information to a remote intruder. Viruses and worms are examples of malicious code. Vulnerability  - In most cases, vulnerabilities are caused by programming errors in software. Attackers might be able to take advantage of these errors to infect your computer, so it is important to apply updates or patches that address known vulnerabilities (see  Understanding Patches  for more information). *
  31. Why is it important to remember that the internet is public? Because the internet is so accessible and contains a wealth of information, it has become a popular resource for communicating, for researching topics, and for finding information about people. It may seem less intimidating than actually interacting with other people because there is a sense of anonymity. However, you are not really anonymous when you are online, and it is just as easy for people to find information about you as it is for you to find information about them. Unfortunately, many people have become so familiar and comfortable with the internet that they may adopt practices that make them vulnerable. For example, although people are typically wary of sharing personal information with strangers they meet on the street, they may not hesitate to post that same information online. Once it is online, it can be accessed by a world of strangers, and you have no idea what they might do with that information. *
  32. What guidelines can you follow when publishing information on the internet? View the internet as a novel, not a diary  - Make sure you are comfortable with anyone seeing the information you put online. Expect that people you have never met will find your page; even if you are keeping an online journal or blog, write it with the expectation that it is available for public consumption. Some sites may use passwords or other security restrictions to protect the information, but these methods are not usually used for most websites. If you want the information to be private or restricted to a small, select group of people, the internet is probably not the best forum. Be careful what you advertise  - In the past, it was difficult to find information about people other than their phone numbers or address. Now, an increasing amount of personal information is available online, especially because people are creating personal web pages with information about themselves. When deciding how much information to reveal, realize that you are broadcasting it to the world. Supplying your email address may increase the amount of spam you receive (see Reducing Spam for more information). Providing details about your hobbies, your job, your family and friends, and your past may give attackers enough information to perform a successful social engineering attack. Realize that you can't take it back  - Once you publish something online, it is available to other people and to search engines. You can change or remove information after something has been published, but it is possible that someone has already seen the original version. Even if you try to remove the page(s) from the internet, someone may have saved a copy of the page or used excerpts in another source. Some search engines "cache" copies of web pages; these cached copies may be available after a web page has been deleted or altered. Some web browsers may also maintain a cache of the web pages a user has visited, so the original version may be stored in a temporary file on the user's computer. Think about these implications before publishing information—once something is out there, you can't guarantee that you can completely remove it. As a general practice, let your common sense guide your decisions about what to post online. Before you publish something on the internet, determine what value it provides and consider the implications of having the information available to the public. Identity theft is an increasing problem, and the more information an attacker can gather about you, the easier it is to pretend to be you. Behave online the way you would behave in your daily life, especially when it involves taking precautions to protect yourself.  *
  33. How do you choose a good password? Most people use passwords that are based on personal information and are easy to remember. However, that also makes it easier for an attacker to guess or "crack" them. Consider a four-digit PIN number. Is yours a combination of the month, day, or year of your birthday? Or the last four digits of your social security number? Or your address or phone number? Think about how easily it is to find this information out about somebody. What about your email password—is it a word that can be found in the dictionary? If so, it may be susceptible to "dictionary" attacks, which attempt to guess passwords based on words in the dictionary. Although intentionally misspelling a word ("daytt" instead of "date") may offer some protection against dictionary attacks, an even better method is to rely on a series of words and use memory techniques, or mnemonics, to help you remember how to decode it. For example, instead of the password "hoops," use "IlTpbb" for "[I] [l]ike [T]o [p]lay [b]asket[b]all." Using both lowercase and capital letters adds another layer of obscurity. Your best defense, though, is to use a combination of numbers, special characters, and both lowercase and capital letters. Change the same example we used above to "Il!2pBb." and see how much more complicated it has become just by adding numbers and special characters. Longer passwords are more secure than shorter ones because there are more characters to guess, so consider using passphrases when you can. For example, "This passwd is 4 my email!" would be a strong password because it has many characters and includes lowercase and capital letters, numbers, and special characters. You may need to try different variations of a passphrase—many applications limit the length of passwords, and some do not accept spaces. Avoid common phrases, famous quotations, and song lyrics. Don't assume that now that you've developed a strong password you should use it for every system or program you log into. If an attacker does guess it, he would have access to all of your accounts. You should use these techniques to develop unique passwords for each of your accounts. Here is a review of tactics to use when choosing a password: *
  34. Lock your computer when you are away from it.  Even if you only step away from your computer for a few minutes, it's enough time for someone else to destroy or corrupt your information. Locking your computer prevents another person from being able to simply sit down at your computer and access all of your information. Disconnect your computer from the Internet when you aren't using it.  The development of technologies such as DSL and cable modems have made it possible for users to be online all the time, but this convenience comes with risks. The likelihood that attackers or viruses scanning the network for available computers will target your computer becomes much higher if your computer is always connected. Depending on what method you use to connect to the Internet, disconnecting may mean disabling a wireless connection, turning off your computer or modem, or disconnecting cables. When you are connected, make sure that you have a firewall enabled (see  Understanding Firewalls  for more information). Evaluate your security settings.  Most software, including browsers and email programs, offers a variety of features that you can tailor to meet your needs and requirements. Enabling certain features to increase convenience or functionality may leave you more vulnerable to being attacked. It is important to examine the settings, particularly the security settings, and select options that meet your needs without putting you at increased risk. If you install a patch or a new version of the software, or if you hear of something that might affect your settings, reevaluate your settings to make sure they are still appropriate (see  Understanding Patches  Most software, including browsers and email programs, offers a variety of features that you can tailor to meet your needs and requirements. Enabling certain features to increase convenience or functionality may leave you more vulnerable to being attacked. It is important to examine the settings, particularly the security settings, and select options that meet your needs without putting you at increased risk. If you install a patch or a new version of the software, or if you hear of something that might affect your settings, reevaluate your settings to make sure they are still appropriate (see Understanding Patches,  Safeguarding Your Data  Most software, including browsers and email programs, offers a variety of features that you can tailor to meet your needs and requirements. Enabling certain features to increase convenience or functionality may leave you more vulnerable to being attacked. It is important to examine the settings, particularly the security settings, and select options that meet your needs without putting you at increased risk. If you install a patch or a new version of the software, or if you hear of something that might affect your settings, reevaluate your settings to make sure they are still appropriate (see Understanding Patches, Safeguarding Your Data, and  Evaluating Your Web Browser's Security Settings  for more information). *
  35. What other steps can you take? Sometimes the threats to your information aren't from other people but from natural or technological causes. Although there is no way to control or prevent these problems, you can prepare for them and try to minimize the damage. Protect your computer against power surges and brief outages.  Aside from providing outlets to plug in your computer and all of its peripherals, some power strips protect your computer against power surges. Many power strips now advertise compensation if they do not effectively protect your computer. Power strips alone will not protect you from power outages, but there are products that do offer an uninterruptible power supply when there are power surges or outages. During a lightning storm or construction work that increases the odds of power surges, consider shutting your computer down and unplugging it from all power sources. Back up all of your data.  Whether or not you take steps to protect yourself, there will always be a possibility that something will happen to destroy your data. You have probably already experienced this at least once— losing one or more files due to an accident, a virus or worm, a natural event, or a problem with your equipment. Regularly backing up your data on a CD or network reduces the stress and other negative consequences that result from losing important information . Determining how often to back up your data is a personal decision. If you are constantly adding or changing data, you may find weekly backups to be the best alternative; if your content rarely changes, you may decide that your backups do not need to be as frequent. You don't need to back up software that you own on CD-ROM or DVD-ROM—you can reinstall the software from the original media if necessary.   *
  36. *
  37. ANTECEDENTES Los empresarios que trabajan solos irán aumentando día a día Actualmente 58% de los Pequeños empresarios trabajan desde su casa Hay una clara tendencia a que este mercado sea mas atractivo entre las mujeres empresarias Las empresas pueden convertir su renta, que es un gasto fijo, en un gasto variable dependiendo directamente del numero de empleados, de la tecnología y del staff que realmente utilicen *
  38. Una empresa requiere entre 200 y 250 sqft de oficina por empleado. Esta tendencia es inevitable, cada día serán mas quienes trabajen de manera remota. Considere cuanto se gasta en un cambio de domicilio? Eso se lo pueden ahorrar usando una oficina virtual, independientemente que después necesiten establecer una oficina fija. En un futuro cambio de domicilio (tarjetas de presentación, papelería, timbres, TIEMPO) de hecho será el gasto mas grande *
  39. El  coworking  ( co-trabajo ) es una forma de trabajo que permite a profesionales independientes, emprendedores y pymes de diferentes sectores compartir un mismo espacio de trabajo, tanto físico como virtual, para desarrollar sus proyectos profesionales de manera independiente, a la vez que fomentan proyectos conjuntos. El  neologismo   co-trabajo  es la traducción en español al termino coworking , pero el termino coworking es más aceptado que el término cotrabajo. *
  40. Para confirmar esto, la encuesta también se comprueba cuánta gente sabía los nombres de sus compañeros de trabajo compañeros y viceversa, después de todo, una comunidad no puede ser demasiado coherente si la gente no sabe los nombres de los demás. Las respuestas mostraron que el 74% de la gente sabe todos o muchos de los nombres de sus compañeros en el espacio coworking. *
  41. Las plataformas sociales cada día son más utilizadas por  las empresas e  instituciones para consultar el perfil de sus futuros empleados, clientes o socios. Sitios como  Facebook y Twitter  permiten tener una noción del entorno, amistades, gustos e intereses de los candidatos. Por eso, debemos ser cuidadosos con la información que compartimos en estos espacios sociales y manejar correctamente la configuración de privacidad. Se recomienda: - Revisar la configuración de la privacidad en Facebook - Crear un perfil personal y otro profesional para no mezclar información -  Explorar los resultados de búsqueda de nuestro nombre en Google  *