Microsoft is named a Leader for Field Service Management

Microsoft is named a Leader for Field Service Management

This article is contributed. See the original author and article here.

The past year has cultivated many personal and professional changes. No person or industry has been untouched. Even field service has embraced seismic changes as a result of the ongoing global pandemic. For many field service organizations, being dispatched to the customer’s location to diagnose and resolve an issue became more complex than ever before. In response, a shift began within field service to less hands-on, more remote, and more dynamic and proactive service operations.

Yes, change is inevitable, and this transformative tidal wave of change within the field service arena has been for the betterfor the service organization, its personnel, and the customers it supports. It is with great pride I share with you our position as a Leader within the IDC MarketScape for the Worldwide Manufacturing Field Service Management Applications Vendor Assessment 2021-2022.

We believe this placement recognizes Microsoft’s continuous investment and authority across our service solution and cloud functionality.

IDC 2021-2022 field service management vendor assessment.
IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of ICT suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor’s position within a given market. The Capabilities score measures vendor product, go-to-market and business execution in the short-term. The Strategy score measures alignment of vendor strategies with customer requirements in a 3-5-year timeframe. Vendor market share is represented by the size of the icons.

Noted capabilities

IDC MarketScape objectively noted the strengths, challenges, and considerations of each vendor. For Microsoft, the IDC MarketScape noted one of our strengths as “The ability to deliver specific capabilities to support the market is critical to rapid adoption and ROI. Customer references also noted that Microsoft’s integration with other enterprise applications and technical capabilities of the application helped speed deployment and achieve value quickly.”

IDC MarketScape also noted “Microsoft’s primary challenge with regard to field service management is with regard to industry-specific innovations. Microsoft has established a culture of innovation around many of its products and highlights service-specific offerings, which demonstrate the future of field service collaboration and execution. However, manufacturers and some service organizations lag behind those in other industries, and companies like Microsoft will need to provide both transformative offerings and incremental innovations that closely align with the risk aversion of the specific subvertical industry.” Fortunately, Microsoft caters to everyone from the intrepid to the risk-averse with both transformative offerings and incremental innovations that closely align with the customer’s palatable level of risk.

The study advised “Manufacturers and service organizations should consider Microsoft when they are looking for an integrated field service product offering that can seamlessly integrate IoT data, remote collaboration, AI, and AR/mixed reality capabilities to enable more predictive and proactive service outcomes. The ability to collaborate in real time and have on-demand insights is transforming the way field service and support can be conducted. Microsoft is helping manufacturers that are on this journey around servitization and the convergence of AI, IoT, and AR in the field.”

And the transformation is occurring in real-time. Take for example, Burckhardt Compression, a global leader in manufacturing and servicing, headquartered in Switzerland. The company builds and services massive compressors weighing up to 240 tons, creating pressure three times higher than at the deepest point in the ocean. This high pressure transforms gas to a liquid state so it has less volume and is transported easier. If the compressor fails, the liquid turns back to gas and the build-up of pressure can be critical for the ship and the crew.

Because maintenance is so critical, Burckhardt Compression had to send a service engineer to wherever the compressor was locatedwhich was time-consuming, resource-intensive, and simply not scalable. To provide support at any location, Burckhardt Compression adopted Microsoft Dynamics 365 Field Service for field service management and Dynamics 365 Remote Assist, a mixed reality application. Now remote service engineers have access to real-time service data and can support the ship’s technicians by engaging in on-demand video chat, providing instruction augmented with a schematic overlay, and creating markups onscreen over the actual compressor. And a case is automatically created in Dynamics 365 Field Service when a call is initiated by Dynamics 365 Remote Assist, and a recording of the repair work is saved.

Burckhardt Compression is serving customers faster by eliminating travel time and sharing expert knowledge across the globe in a matter of minutes increasing trust, safety, and business continuity. Now the company is looking to expand to add non-Burckhardt compressors to its service roster, thereby expanding its market presence and generating additional revenue. Burckhardt Compression is just one of many manufacturing and servicing organizations that have reaped value by deploying Dynamics 365 Field Service and harnessing its capabilities to build stronger, more collaborative, and proactive service delivery.

The bottom line

Many service organizations consist of dispatchers answering service calls, putting customers on hold, asking the same questions repeatedly, while searching for the next available technician to dispatch. This process is inefficient, costly, and unsatisfying to the customer.

The world of field service is changing. Today, service organizations are evolving into profit centers, redefining business models, and creating powerful and fulfilling customer experiencesall supported by leading edge solutions like Dynamics 365 Field Service.

We’re excited to be positioned as an IDC MarketScape Leader and are committed to bringing you the best and most featured field service application available. Depend on the multidimensional capabilities of Dynamics 365 Field Service to help you better personalize customer engagements, improve employee effectiveness, and optimize service operations now and tomorrow.

This is where innovation meets what’s possible.

Read the IDC MarketScape: Worldwide Manufacturing Field Service Management Applications 2021-2022 Vendor Assessment excerpt.

Learn more about Dynamics 365 Field Service.

The post Microsoft is named a Leader for Field Service Management appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Google Releases Security Updates for Chrome

This article is contributed. See the original author and article here.

Google has released Chrome versions 98.0.4758.80/81/82 for Windows and 98.0.4758.80 for Mac and Linux. These versions address vulnerabilities that an attacker could exploit to take control of an affected system.

CISA encourages users and administrators to review the Chrome Release Note and apply the necessary updates.

How to tell if someone is using your identity

How to tell if someone is using your identity

This article was originally posted by the FTC. See the original article here.

Identity Theft Awareness Week 2022

Taking steps to protect your personal information can help you minimize the risks of identity theft. But what if a thief gets your information anyway? Here are some of the ways thieves might use your stolen information and signs you can look out for.

An identity thief could use your information to get credit or service in your name.

  • How to spot it: Get your free credit report at AnnualCreditReport.com. Review it for accounts you didn’t open or inquiries you don’t recognize. A new credit card, a personal loan, or a car loan will appear as a new account. A new cell phone plan or utility service — like water, gas, or electric — will show up as an inquiry.

An identity thief could use your credit card or take money out of your bank account.

  • How to spot it: Check your credit card or bank statement when you get it. Look for purchases or withdrawals you didn’t make.
  • Bonus advice: Sign up to get text or email alerts from your credit card or bank whenever there’s a new transaction. This could help you spot unauthorized or fraudulent activity on your account.

An identity thief could steal your tax refund or use your Social Security number to work.

  • How to spot it: A notice from the IRS that there’s more than one tax return filed in your name could be a sign of tax identity theft. So could a notice that you have income from an employer you don’t work for.

An identity thief could use your health insurance to get medical care.

  • How to spot it: Review your medical bills and Explanation of Benefits statements for services you didn’t get. They could be a sign of medical identity theft.

An identity thief could use your information to file a claim for unemployment benefits.

  • How to spot it: A notice from your state unemployment office or employer about unemployment benefits that you didn’t apply for could be a sign of fraud.

If you discover any signs that someone is misusing your personal information, find out what to do at IdentityTheft.gov.

And remember to check out our daily free events and webinars with our co-partners during Identity Theft Awareness Week.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Improve seller productivity with a sales cadence

Improve seller productivity with a sales cadence

This article is contributed. See the original author and article here.

In sales, planning is everything. Without a plan, a sales rep might give up too easily on a prospect or appear too aggressive. A potential customer might forget about a proposal or become annoyed by too-frequent contacts. Creating a step-by-step plan for how to follow up with prospects in each stage of the sales process is the basis for a sales cadence. Microsoft Dynamics 365 Sales tools help you create, manage, and scale customized sales cadences across your organization.

The top salespeople have a well-crafted plan to get their desired results, whether they are demonstrating a product or following up with leads. A successful plan, or sales cadence, involves knowing where your prospects are in the buyer’s journey and understanding how to reach them the right way, with the right message, at the right time to move them to the next step.

If you fail to plan, you are planning to fail.

A modern proverb

In this post, you’ll learn:

  • What a sales cadence is
  • What to consider when designing a sales cadence
  • What an effective sales cadence looks like
  • How Dynamics 365 Sales can help you build a sales cadence

What is a sales cadence?

A sales cadence is a detailed plan to connect with prospects and close deals. A sales cadence includes a prescribed sequence of activities, like reaching out on LinkedIn, sending emails, making calls, sharing case studies, arranging meetings, and sending text messages, which happen at specified intervals.

An effective sales cadence improves the efficiency of sales reps. A sales cadence guides sellers on which prospects to connect with, what communication channel to use, and what information to share at each touchpoint. This structured approach reduces guesswork and aims to grow the sales pipeline and conversion rate.

Managers create a sales cadence to guide sales reps in handling different types of prospects and sales scenarios. For example, one cadence could be used for inbound inquiry leads, and another cadence could be used for upcoming renewals.

As organizations mature, they can evolve their cadences to adapt to specific geographies, industries, companies, languages, and other parameters.

A strong sales cadence library also helps you scale your sales organization. Automated sales cadences ease the onboarding process for sellers as you grow, building in best practices and sequencing their activities.

How to design a sales cadence

When you design your sales cadences, consider these five elements:

  • Prospects: It all starts with knowing your potential customers. What challenges or obstacles do they have? Why are they looking for a solution? What platforms do they use? What constraints do they contend with? What are their skills? Who is the decision maker?
  • Communication channel:Reach out to prospects using the right channel, such as email, a phone call, messaging apps, or LinkedIn.
  • Wait time: Consider a strategic delay between subsequent steps. You don’t want to be too soon or too late in your follow-ups.
  • Attempts: Understand the optimal number of touchpoints to establish contact and build a relationship.
  • Messaging:Use the right messaging, content, tone, and personalization to engage with prospects.

It’s important to note that creating an effective plan is not a one-time process. It takes time and iteration to fine-tune your sales cadences.

Example: A sales cadence for inbound inquiries

Here’s an example of a sales cadence for responding to inbound inquiries.

  • Target: Leads that have reached out through your website or other channels.
  • Purpose: Focus on and respond to high-priority inquiries to improve your conversion rate.
  • Description: By responding immediately and through multiple channels, you are more likely to achieve a higher conversion rate. Since responding within the first hour increases your chance to close the deal by seven times, start with an automated email response, then follow up with a phone call. Connect on a social platform like LinkedIn. Finally, send an email that provides relevant information about your product or services.

Example of a sequence created to support a sales cadence for handling inbound inquiries.

Create a sales cadence with sequence designer

The sales accelerator capability in Dynamics 365 Sales helps sellers spend less time searching for the best next customer to reach out to. Design and build your sales cadences in the sequence designer. Sales accelerator gathers information from multiple sources to build a strong and prioritized pipeline, offers context, and surfaces recommendations throughout each step in the sequence, speeding the sales process.

To create a sequence, you go to the Sales Insights settings area and open the Sequences page. For more details, check out the documentation: Create and activate a sequence.

You can use the sequence designer to configure sequences of activities for specific prospects, leads, opportunities, contacts, and so on, applying different strategies depending on priority. For example, leads of lower priority might have more automated email steps, whereas leads from your targeted accounts might have more personalized touchpoints.

As in the example sales cadence shown earlier, sequences can include multiple activities, with wait times between activities as needed. You can branch activities based on the response, such as if an email is opened or a reply is received. Using sales accelerator’s tight integration with LinkedIn, you can even send LinkedIn InMail or create a connect request as part of your sales cadence.

Options available when adding steps to a sequence in Sales accelerator

Next steps

A good sales cadence is a necessary to improve seller productivity, increase conversion rates, and close more deals. As we adjust to virtual ways of working, digitizing sales becomes a priority for most organizations. To get started, use sales accelerator in Dynamics 365 Sales to set up a sales cadence for the most common scenarios faced by the sales team.

To start building your own sequences in Dynamics 365 Sales, visit the documentation: Manage sequences. If you use a custom app, also refer to this section of the FAQ page for sales accelerator: How to add work list site map to your custom app.

Access to sales accelerator has now been made easier: new and existing customers using Dynamics 365 Sales (excluding Dynamics 365 Sales Professional) will now see sales accelerator and sequences available for quick setup. Read the documentation to learn more about setting up digital selling capabilities.

The post Improve seller productivity with a sales cadence appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Catch new episodes of Unpacking Endpoint Management in 2022

Catch new episodes of Unpacking Endpoint Management in 2022

This article is contributed. See the original author and article here.

Last March, my colleague Danny Guillory and I embarked on an idea based on your feedback—a targeted and interactive web series focused on “real talk” around unified endpoint management. We wanted it to be open to everyone and reasonably transparent. We wanted to foster a live community event where we could not only bring on guests from Microsoft engineering teams, but also (more importantly) engage with you directly through live Q&A!


So far, the level of engagement has been amazing. You’ve asked questions and we’ve tried our best to provide answers or find answers when we couldn’t. We’ve been listening to your feedback (really appreciate it!) and taking your ideas to the product teams developing Microsoft Endpoint Manager. Now we continue our monthly web series in 2022 and are innovating the show further by:



  • Bringing in customers and industry professionals to share their experiences and best practices around Endpoint Manager (capital “E”, capital “M”) and endpoint management.

  • Expanding the platforms through which you can consume the show (podcast option, anyone?)

  • Opening up the ability for you to post questions one week in advance of each show so you can make sure your questions get in.

  • Exploring new topics as well as revisiting previous topics with more proven and recommended practices alongside out-of-the-box thinking and ideas around innovating endpoint management.


And so, Unpacking Endpoint Management continues—the first Friday of each month—in 2022 here on the Tech Community! Our next episode will be this Friday, February 4th at 8:00 AM Pacific Time!


Remember to follow Wheaton’s Law and keep it civil. And finally, don’t forget to bookmark https://aka.ms/UnpackingEndpointManagement for a list of future episodes! In addition, you can find a list of previous episodes – now on demand – including the now-famous “Policy Pizza Party” premiere episode.


Have an idea for a future episode? Drop us a comment below!


SteveThomasGLADIATOR_0-1643736039341.png


 

FBI Releases PIN on Potential Cyber Activities During the 2022 Beijing Winter Olympics and Paralympics

This article is contributed. See the original author and article here.

The Federal Bureau of Investigation (FBI) has released a Private Industry Notification (PIN) to warn entities associated with the February 2022 Beijing Winter Olympics and March 2022 Paralympics that malicious cyber actors could use a broad range of cyber activities to disrupt these events. These activities include distributed denial-of-service attacks, ransomware, malware, social engineering, data theft or leaks, phishing campaigns, disinformation campaigns, and insider threats. Additionally, the FBI PIN warns Olympic participants and travelers of potential threats associated with mobile applications developed by untrusted vendors. The FBI urges all athletes to keep their personal cell phone at home and use a temporary phone while attending the events.

CISA encourages all travelers to the 2022 Beijing Winter Olympics and Paralympics to review FBI PIN: Potential for Malicious Cyber Activities to Disrupt the 2022 Beijing Winter Olympics and Paralympics and apply the recommendations.

Samba Releases Security Updates

Samba Releases Security Updates

This article is contributed. See the original author and article here.

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

SSL

Secure .gov websites use HTTPS

A lock (lock icon) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Identity theft can happen to anyone

Identity theft can happen to anyone

This article was originally posted by the FTC. See the original article here.

It’s the second day of Identity Theft Awareness Week and today we’re talking about steps that can help reduce your risk of identity theft.

Many of us access our online accounts — credit cards, investments, insurance, or checking and savings accounts — nearly every day. In our digital world, bits of our personal information are everywhere. Identity thieves know this and look for ways — both high-tech, like lifting our passwords, or low-tech, like stealing our mail — to get their hands on our money and personal information.

Since identity theft can happen to anyone, here are some ways to keep your money and personal information safe.

  • Protect documents that have personal information. Keep things with personal information — think financial records or Social Security and Medicare cards — in a safe place. Shred them before you throw them away. If you get statements with personal information in the mail, take your mail out of the mailbox as soon as you can.
  • Don’t share your Social Security number with someone who contacts YOU. While some organizations might need your Social Security number to identify you, they won’t call, email, or text you to ask for it. So if someone contacts you, asks you for your Social Security number, and says they’re from the IRS, your bank, or your employer — it’s a scam.
  • Protect your information online and on your phone. If you’re logging in to an online account, use a strong password. Add multi-factor authentication for accounts that offer it. Multi-factor authentication makes it harder for scammers to log in to your accounts if they do get your username and password.
  • Review your bills. Charges for things you didn’t buy, or an unexpected bill, could be a sign of identity theft.

Remember to check out the free events and webinars each day of Identity Theft Awareness Week. And if you think someone has been using your personal information to open accounts, buy things, or file taxes, report it and get recovery help at IdentityTheft.gov.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

HDInsight Kafka Cluster Sizing

This article is contributed. See the original author and article here.



The most accurate way to model your use case is to simulate the load you expect on your own hardware. You can do this using the load generation tools that ship with Kafka


 


However, if you want to size a cluster without simulation, a very simple rule could be to size the cluster based on the amount of disk-space required (which can be computed from the estimated rate at which you get data times the required data retention period).


A slightly more sophisticated estimation can be done based on network and disk throughput requirements. To make this estimation, let’s plan for a use case with the following characteristics:



  • W – MB/sec of data that will be written

  • R – Replication factor

  • C – Number of consumer groups, that is the number of readers for each write


Kafka is mostly limited by the disk and network throughput.


The volume of writing expected is W * R (that is, each replica writes each message). Data is read by replicas as part of the internal cluster replication and also by consumers. Because every replicas but the master read each write, the read volume of replication is (R-1) * W. In addition each of the C consumers reads each write, so there will be a read volume of C * W. This gives the following:



  • Writes: W * R

  • Reads: (R+C- 1) * W


An easy way to model the real consumer lagging is to assume a number of lagging readers you to budget for. To model this, let’s call the number of lagging readers L. A very pessimistic assumption would be that L = R + C -1, that is that all consumers are lagging all the time. A more realistic assumption might be to assume no more than two consumers are lagging at any given time.


Based on this, we can calculate our cluster-wide I/O requirements:



  • Disk Throughput (Read + Write): W * R + L * W

  • Network Read Throughput: (R + C -1) * W

  • Network Write Throughput: W * R


Deciding Number of Disks


In HDInsight Kafka cluster you can choose the number of disks (only) during the cluster creation. The number varies based on VM SKU, the size of each disk is 1 TB.


eg : For E8aV4, once can attach up to 16 disks where as for D12V2 its 8.


 


Deciding Number of Brokers/Workers


If the selected VM  have a 1 Gigabit Ethernet card with full duplex, then that would give 125 MB/sec read and 125 MB/sec write. Likewise you can calculate the total read-write capacity per machine.  Once we know the total requirements, as well as what is provided by one machine, you can divide to get the total number of machines needed.


 


Note : This gives a machine count running at maximum capacity, assuming no overhead for network protocols, as well as perfect balance of data and load. Since there is protocol overhead as well as imbalance, you want to have at least 2x this ideal capacity to ensure sufficient capacity.