August 2016: Business Tech Bytes

Health care IT advances across region

Jill Van Hoesen

Jill Van Hoesen

Health care IT is undoubtedly a north country industry that has seen scores of advances. This year, you have most likely found that health care providers have successfully transitioned from a primarily paper-based system to a technology-driven digital one.

Where consumer health care cost savings is questionable, better patient care, which allows patients to be more actively engaged in their own care and ultimately healthier, can be credited to these IT advances. [Read more…]

July 2016: Business Tech Bytes

Optimize your web user experience

Jill Van Hoesen

Jill Van Hoesen

It’s your website but you need to make Google happy or your search ranking will suffer. So what makes Google happy these days? Is it responsive or adaptive design? Are you familiar with either or are you still supporting two versions of your website, one for mobile users and one for desktop users? [Read more…]

June 2016: Business Tech Bytes

Coming soon: ‘Facebook at Work’

Jill Van Hoesen

Jill Van Hoesen

You have a Facebook page, your business has a page, so does the social club you belong to, but most importantly so do all your “friends.” With more than 1.59 billion users worldwide, Facebook seems to be here to stay and is permeating further and further into our everyday lives. What do you think about Facebook at work? Did you know that “Facebook at Work” is already in the works? [Read more…]

May 2016: Business Tech Bytes

Engage employees in cybersecurity

Jill Van Hoesen

Jill Van Hoesen

It’s back, even though it never really went away. Ransomware, IRS, email and telephone scams. Cyber threats like these are very real to your business and are seen in the headlines almost daily. Do you think it will be the work of outsiders, malicious hackers trying to pilfer your customer’s confidential information? The biggest threat to your customers and your business can come from within. Negligence and ignorance of your employees is always very easy prey for cyber criminals. [Read more…]

April 2016: Business Tech Bytes

Modern classrooms require good tech

Jill Van Hoesen

Jill Van Hoesen

You have heard it before: technology is everywhere. It is part of your everyday life and it affects most every facet of it. Technology is a valuable learning tool and with the ever-increasing presence in our lives today, how can it not become part of every student’s curriculum? [Read more…]

March 2016: Business Tech Bytes

The right tools to manage IT disruption

Jill Van Hoesen

Jill Van Hoesen

Is information technology management in your enterprise increasingly about coordinating a concoction of disparate systems? Do you have varying departments making purchasing and usage decisions independently? Has the consumerization of IT, with all the tools and solutions in the palm of your employee’s hand, invaded your enterprise?

I’m sure most of your employees are using some cloud or personal software to abet them with their job.

In the 2015 Harvey Nash and KPMG CIO survey, “Into an Age of Disruption,” a full range of information technology topics, from recruitment and business strategy to overall IT priorities were explored. Nine out of 10 survey respondents believe that digital disruption will impact their organizations within the next decade, and 61 percent said they think they’ll capitalize on this disruption better than their present and future competitors.

“The speed of technology is what’s driving IT today,” said Bob Miano, president and CEO of Harvey Nash USAPAC. “Disruption is the norm now, so it’s about how fast companies can innovate. Pressure to produce at an accelerated pace is felt across all vertical markets, and has direct ties to the talent war.”

So the quandary, how do you deliver stable consistent IT performance that will drive revenue while still containing or even cutting costs? To be successful in managing your IT solutions more effectively, Janco Associate’s CIO Concern Management Toolkit recommends three focus areas of consideration: people, infrastructure and technology.

People — Security rises directly to the top. From cyber attacks to phishing emails, your employees are your biggest security concern. It goes hand in hand with cloud computing, how many new applications are being used each and every day on your network that is not under complete control of your IT organization? If you think you know, look again. No matter your business, technology applications are constantly evolving and changing in this digital age.

Infrastructure — Gone are the days of everyone accessing the IBM mainframe in a single location with IT approved standardized hardware and software. As new technologies are being implemented, traditional functions are being eliminated, making way for even further automation. This automation brings with it mountains of data which needs to be analyzed quickly and efficiently so that the decision making process within your enterprise can be improved. Records management, version control, retention and destruction are just a few of the traditional areas that still need to be under internal management and control.

Technology — BYOD, mobile applications, cloud storage. These represent non vented IT platforms that your employees are using in order to improve theirs and your bottom line. Your employees will use whatever applications are in the palm of their hands to get these results. Facebook, Twitter, Instagram, just to name a few, are the wave of the future and need to be managed more efficiently in most every enterprise today. This management needs to span from advertising to productivity losses. Does your business have a Facebook page? Check out Facebook Business Manager; that will assist with advertising. As for time spent on Facebook and other social media sites during work time? I’m soliciting your comments, suggestions, policies and procedures for an upcoming column.

To be sure, clouds, mobility, social media and BYOD has redistributed power within most very aspect of most every business. In the light of the every growing list of cyber-attacks, now more than ever there is a need to focus on designing an enterprise security and privacy strategic roadmap. These policies and procedures need to be based on governance models such as PCI, HIPAA or SOX depending on the nature of your business. Your end goal is for your people, infrastructure and technology to evolve beyond the point of being a motley and disjointed collection of software solutions, tools, and technologies. You need to attain the mindset and approach that will harness the full power that digital technology has to offer. It will be a challenging balancing act, but many IT teams and technology leaders have the innate aptitude to propel an organization through this complex “age of disruption.”

Jill Van Hoesen is chief information officer for Johnson Newspapers and a 25-year IT veteran. Contact her at Her column appears monthly in NNY Business.

February 2016: Business Tech Bytes

Long wait for Office Mobile was worth it


Jill Van Hoesen

It’s here, it’s free and this has certainly been a long time coming.

Microsoft Office Mobile is finally now available for any mobile device you may own. Originally released in 1996, as Pocket Office for Windows CE, the first mobile version of Microsoft Office came complete with Pocket Word, Excel, PowerPoint, and Access. Eleven years and many updates later Redmond rebranded Pocket Office to Windows Mobile and, in June 2007, released Office Mobile to coincide with its release of the Windows Mobile 5 operating system. This version still boasted the core Microsoft Office Mobile apps of Word, Excel and PowerPoint, while adding OneNote in Office Mobile 2007. [Read more…]

January 2016: Business Tech Bytes

‘Big data’ will drive transformational change

VanHoesenWAs 2015 trends appear in 2016 goals, fostering personalized customer engagement will continue to rise to the top. Tim Crawford, CIO and strategic advisor for AVOA, believes the Internet of Things, or IoT as its known, has changed the age-old saying “the customer is always right” to “customers care about their individual needs, not those of others.” [Read more…]

December 2015: Business Tech Bytes

Maintain digital security this season

Jill Van Hoesen

Jill Van Hoesen

The holiday season is the most wonderful time of the year. The most wonderful time of the year for cyber criminals, that is. ThreatMetrix, a digital identity company, recently released a report predicting a 25 percent increase in cyber attacks during the 2015 holiday season alone. Holiday scams of seasons past have been limited to telephone and direct mail, but cyber criminals will be in overdrive this holiday season trying to scam you and yours. [Read more…]

November 2015: Business Tech Bytes

Fine tune mobile for the holidays

VanHoesenWSince Thanksgiving Day has now become the new Black Friday, you need to be serious about when the holiday shopping season really starts. Nowadays between football games and the second helping of pecan pie, your customers are busy browsing, mostly on their mobile devices, for the “real deals.” Last year, Thanksgiving Day saw the highest sales growth of the whole Thanksgiving holiday weekend. [Read more…]