Quadra

Connecting Technology and Business.

The Smack of the “SMAC”:


To start with, I should ask, Is your Business model ready for disruption from digital transformation? No? Don’t be afraid! we’re here to help you! The four megatrends, Social, Mobile, Big Data (Analytics) and Cloud seems to have a clear positive Impact on today’s transforming world. Digital transformation is occurring rapidly at almost all sectors. These four technologies will not only boost efficiency and cut costs, it will help you craft new business models.

Social – The easy global reach:

You want to publish an ad and you select the medium as paper. What is the people response on it? How many like it? How many don’t? What are the suggestions from the end users? What are the expectations? Costs incurred? Manpower Incurred?

Lots of questions with no answers in hand! Think about Digital on Social Media – An ad can achieve a global reach in seconds. No significant Manpower required, No high investments, Immediate suggestions from customers.

You’ll have a wider scope of Improving things when you go on Digital rather than going through any other medium.

The key capabilities of Social media are:

·         Increased ability to effectively communicate with customers

·         Increased employee collaboration

·         Improved ability to provide customer service

Mobile has become a new norm:

The smartphone era is emerging like never before. A mobile has become the true face of digital. Behind the scenes, we must cope up with technology. The mobile has become the interface between your brand and your customer. So, one must leverage the mobile to the max to accelerate the digital transformation and also transform the customer experience you deliver.

So, to help increase productivity of your employees, give them the luxury of working from anywhere whereas keeping your company data secure. Make changes to your internal IT to provision a Bring Your Own Device Environment.

A Real estate agency, Foxtons wanted to enhance employee mobility by deploying smartphones that run the Windows Phone 8 operating system and two productivity-boosting apps. But Foxtons needed to be able to remotely manage and secure the devices. To deliver this solution, Foxtons subscribed to the Windows Intune PC and mobile device management solution. Employees now use their smartphones to conduct business from anywhere, furthering their reputation for fast, attentive service.

The key benefits of using mobile devices and the LOB applications of your company are:

·         Access to corporate data from anywhere

·         Increased Employee productivity

·         Increased employee collaboration

Analytics:

Collect - Analyse – Identify – Decide is a way which we follow unknowingly. And Yes, this is the key role to success anywhere.

Organizations today have the ability to process and analyse large quantities of structured & unstructured data to generate real time business insights. The amount of data that organizations have to analyse is set to increase exponentially.  

However, leading companies aren’t just integrating more data into their analysis, they’re also using the results to develop new products and services.

This is how most of the e-commerce sites will work. Their key to success is to have different dimensional data and generate results by using that.

The key benefits of using Analytics are:

·         Integrate more data into decision making processes

·         Ability to generate faster insights

·         Integrate desperate data sources into analysis

Cloud:

Only cloud has the ability to deliver flexible capacity as needed.

Companies need to be agile, flexible and fast to meet customer expectations. Cloud computing can be the key to that responsiveness. “We have customers who give us 90 days to get something up and running,” observes a user of the Cloud. “There’s no way I can do that in my traditional data centre.” The public cloud delivers a time-to-market advantage that’s hard for enterprises to beat. “We see a lot of traction with customers who have projects that have a short window of time to deliver results,” says the user.

Heavy initial investments and massive operational costs is something that IT is afraid of. With the agile built-in, flexible environment, cloud helps you avoid that.

The stunning capabilities of cloud which helps you move faster:

·         Flexibility: Ability to scale up & down on demand

·         Increased business agility: Ability to respond quickly to new opportunities

·         Lower costs / Pay as you go

Conclusion of SMAC:

While it is clear that each of the technology has a tremendous impact, it’s always good to deploy the integrated solutions to achieve the greatest impact.

Any successful running business will have the SMAC concept deployed.

For example, let’s take PayTm (My Favorite), an Indian payment & e-commerce company. How quickly it coped up with the demonetization effect. Started promoting (Social) the payments bank. While the Indians were facing severe currency issues (Analytics), PayTm made India “Go Cashless from mobile” (Mobility) anywhere. Scan and Pay with no minimum purchase amount barriers. It helped the merchants to do a smooth business and also the customers to go cashless. They use a flexible environment on demand (Cloud).

Get Ready to face Disruption! SMAC – Social, Mobility, Analytics & Cloud!

Convey a Certain Idea or a Concept Stylishly

Need to insert an icon that conveys a certain ideaLightbulbor conceptsThought bubble,Head with Gears, but you don't want to draw it yourself? Microsoft has introduced a very easy and stylish way of doing this in your Word documents Documentor Presentation slidesFlip Calendar.

Check out the Icons button on the Insert tab. Choose a category like people, technology, or sports. Then click the icon that represents the idea or concept you have in mind.

 

You have 25+ categories to choose icons from.

These Icons can be managed and manipulated like any other graphic using the Graphics Tools that will appear as a contextual tab when the icon is clicked.

Now OneDrive for Business in under better control of the Admin

Control provisioning of OneDrive

OneDrive for a user is created when they click on OneDrive tile or access the service first time. Their ability to create OneDrive site is governed by the create personal site permission in SharePoint Online. By default, the permission is assigned to all users.

If your Organization is looking for a phased rollout then you can create specific user groups and assign the create personal site permission to them.

Enable Sync client restrictions

SharePoint Online administrator can use PowerShell cmdlets to enable the OneDrive for Business sync client from only the domains present in the safe recipients list. After that, if the version of sync client on a user’s PC is earlier than 15.0.4693.1000, sync client is considered outdated and user will not be able to sync documents.

Configure restricted Domain sharing

At a tenant level, administrators can configure external sharing by using either the Allow List or Deny List feature. Administrators can limit sharing invitations to a limited number of email domains by listing them in the Allow List or opt to use the Deny List, listing email domains to which users are prohibited to extend invitations.
 
Additional parameters have been added to the PowerShell, to allow configuration of restricted domains using PowerShell.

All external sharing invitation emails will blind copied to set mailboxes using available parameters.

Discourage Org-wide sharing

To discourage users from sharing files from their OneDrive with everyone in the Organization, hide “Everyone”, “All Users” and “Everyone except External Users” groups in the people picker.

Restrict Sync based on file types

When required, block syncing of certain file types using the new sync client. For e.g. sync of .pst and .mp4 can be blocked as all emails should be in EXO mailbox and videos should be in O365 Videos service or, just to conserve bandwidth consumption.

Monitor User activities

Office 365 Audit log search and Management Activity APIs enable monitoring of user activities on OneDrive and also integrate them with existing SIEM tool in your Organization. Refer to the Audit log search section later in this document.

Configure usage or anomaly based alerts

Office 365 Advanced Security Management enables you to set up anomaly detection policies, so you can be alerted to potential breaches of your network. For example, you can be alerted to impossible travel scenarios, such as if a user signs in to the service to check their mail from New York and then two minutes later is downloading a document from OneDrive in Tokyo.

Advanced Security Management also lets you set up that can track specific activities. With out-of-the-box templates like Mass download by a single user, IT can easily create policies that flag when someone is downloading an unusually large amount of data. Alerts can also be for multiple failed sign-in attempts or signs in from a risky IP address.

Configure Mobile App Management (MAM) for mobiles

Intune MAM, part of Enterprise Mobility + Security (EMS) suite, provides ability to manage OneDrive mobile app and disable user’s ability to copy-paste corporate content from their OneDrive to a non-managed/consumer app.

Configure Conditional Access

Azure AD Premium, part of Enterprise Mobility + Security (EMS) suite, provides Risk-based conditional access through an intelligent assessment of granting or blocking access to OneDrive. For e.g. access to OneDrive can be blocked is the user is using non-managed device.

Additional Administrative settings for the sync client

A variety of OneDrive and OneDrive for Business settings can be centrally administered through group policy. The group policy objects are available as part of the OneDrive Deployment Package.

The following User Configuration group policies are available:
• Coauthoring and in-app sharing for Office files
• Configure OneDrive.exe to receive updates after consumer production
• Prevent users from changing the location of their OneDrive folder
• Prevent users from configuring personal OneDrive accounts
• Set the default location for the OneDrive folder
• Users can choose how to handle Office files in conflict
The following Computer Configuration group policies are available:
• Prevent users from using the remote file fetch feature to access files on the computer
• Set the maximum percentage of upload bandwidth that OneDrive.exe uses

- Office 365: Everything You Wanted to Know - Jan 2017 - Microsoft

Secure Your Cloud Users with these Advanced Management Features

The cloud offers many security benefits to organizations, but also raises new security considerations. It can also add to existing ones such as shadow IT, the use of software that is not formally sanctioned by the organization. Office 365 Advanced Security Management, a new set of capabilities powered by Microsoft Cloud App Security gives you greater visibility and control over your Office 365 environment.

Advanced Security Management includes:

  • Threat detection - Helps you identify high-risk and abnormal usage, and security incidents.

  • Enhanced control - Shapes your Office 365 environment leveraging granular controls and security policies.

  • Discovery and insights - Get enhanced visibility into your Office 365 usage and shadow IT without installing an end point agent.

Treat Detection

Advanced Security Management enables you to set up anomaly detection policies, so you can be alerted to potential breaches of your network. Anomaly detection works by scanning user activities and evaluating their risk against over 70 different indicators, including sign-in failures, administrator activity and inactive accounts. For example, you can be alerted to impossible travel scenarios, such as if a user signs in to the service to check their mail from New York and then two minutes later is downloading a document from SharePoint Online in Tokyo.



Advanced Security Management also leverages behavioral analytics as part of its anomaly detection to assess potentially risky user behavior. It does this by understanding how users typically interact with Office 365, spotting anomalies and giving the anomalous activity a risk score to help IT decide whether to take further action.

Enhanced Control

Advanced Security Management lets you set up activity policies that can track specific activities. With out-of-the-box templates, IT can easily create policies that flag when someone is downloading an unusually large amount of data, has multiple failed sign-in attempts or signs in from a risky IP address. Policies can also be customized to your environment. Using activity filters, IT can look for the location of a user, device type, IP address or if someone is granted admin rights. Alerts can be created to notify an IT lead immediately via email or text message.



Default activity policy templates that are included:

  • Administrative activity from a non-administrative IP address Alert when an admin user performs an administrative activity from an IP address that is not included in a specific IP range category.

  • User logon from a non-categorized IP address Alert when a user logs on from an IP address that is not included in a specific IP range category.

  • Mass download by a single user Alert when a single user performs more than 30 downloads within 5 minutes.

  • Multiple failed user log on attempts to an app Alert when a single user attempts to log on to a single app, and fails more than 10 times within 5 minutes.

  • Logon from a risky IP address Alert when a user logs on from a risky IP address to your sanctioned services. The Risky IP category contains, by default, anonymous proxies and TOR exits point.

After reviewing an alert and investigating a user’s activities, IT may deem that the behavior is risky and want to stop the user from doing anything else. This can be done directly from the alert. Some activities may be deemed so risky that IT may want to immediately suspend the account. To help with this, IT can configure the activity policy so that an account is automatically suspended if that risky activity takes place.

Advanced Security Management also shows which apps are connected to Office 365 in their environment, who is using them and the permissions they have. For example, if a user grants a scheduling application access to their Office 365 calendar data, IT will be able to see the details of the connection and revoke that application’s permissions with one click if they deem it a security risk.

Discovery and Insights

Advanced Security Management also provides an app discovery dashboard that allows IT Pros to visualize your organization’s usage of Office 365 and other productivity cloud services, so you can maximize investments in IT-approved solutions. With the ability to discover about 1,000 applications in categories like collaboration, cloud storage, webmail and others, IT can better determine the extent to which shadow IT is occurring in your organization. Advanced Security Management will also give you details about the top apps in each category. For example, you can see how much data is being sent to OneDrive for Business, Box, Dropbox and other cloud storage providers.



You can do all this without installing anything on device end points. To load the data into the dashboard, all you have to do is take the logs from your network devices and upload them via an easy-to-use interface.

Many organizations allow users to connect apps to Office 365 without IT intervention to help them be more productive. The challenge is that it reduces the visibility and control that IT has over what apps are doing with the data. App Permissions as part of Office 365 Advanced Security Management can help mitigate that risk.

App Permissions provides information to IT about which applications in their network have access to Office 365 data, what permissions they have and which users granted these apps access to their Office 365 accounts.



Based on this information, IT admins can choose to approve the app or revoke its access to Office 365. If they choose to revoke permissions to the app, it will no longer be able to access the information for any of the users in the Office 365 tenant. App Permissions also makes it easy for IT admins to notify users who have installed the application that is going to be banned.

- Office 365: Everything You Wanted to Know - Jan 2017 - Microsoft




A New Tube For Your Enterprise

Office 365 Videos is an intranet website portal where people in your organization can post and view videos. It's a streaming video service for your organization that's available with SharePoint Online in Office 365. It's a great place to share videos of executive communications or recordings of classes, meetings, presentations, or training sessions.

Channels

  • Channel admins for Office 365 Video can create channels to organize videos.
  • You can have channels for particular subjects, for example, or for specific groups such as departments or teams
  • You see only the channels that you have permission to view

Uploading videos

  • To upload a video, you upload it to a specific channel.
  • You can upload multiple videos to a channel at the same time.
  • Anyone in your organization who has edit permission for a particular channel can upload videos to it

Editing information about a video

  • Providing information about a video will make it easier for other people to find it through search, and will provide additional context for it in Delve and the Office Graph.
  • You have to have owner or editor permission for the channel that the video is in

Owner and people metadata

  • Office 365 Video also shows who uploaded the video and the various people who are in the video.
  • This enhances the discoverability of the video and highlights the main speakers; it, too, enhances when and how your videos appear in other users’ Delve activity feeds pivoting off of the relevant context of who knows who

Changing a thumbnail for a video

  • After a video you've uploaded to Office 365 Video has been processed and is ready to play, you can add a custom thumbnail for the video or you can choose from one of the auto-generated thumbnails provided.

Add subtitles or captions

  • Subtitles or captions are lines of text that appear at the bottom of a video and provide a transcript of the audio portion of the video
  • You can add subtitles or captions to any video by uploading one or more subtitle or caption files



  • Office 365 Video only supports the Web Video Text Track (.vtt) file format.

Watching a video

  • You can watch videos from where they are featured on the Office 365 Video home page, and from specific channels.
  • When you select a video thumbnail, the video plays right in your browser window

Sharing videos with others


  • Embed an Office 365 video on your site. You can display the video on a SharePoint Online site or other website by adding the embed code for that video to the page where you want the video to appear.
  • Post to Yammer. You can post to Yammer about a video while you're watching it, and your post will automatically include a link to the video that you're watching.
  • Send a link to a video in an email. To get a link for a video, select the video in Office 365 Video and then copy the URL from the browser address bar.

Discover spotlighted channels and videos

  • Admin can spotlight up to three channels and four videos on the home page.
  • Person with edit permission for a channel can spotlight up to five videos on the page for that channel.

Find the most popular videos

  • See what videos are most popular for your entire organization, check the Trending section on the home page.
  • See what videos are particularly popular in a certain channel, check the Trending section on that channel page.

Find videos that you've uploaded

  • See what videos you've uploaded to a channel, select a channel, and then choose My Videos.

Search for a video

  • Search for a particular video by typing what you are searching for in the Search videos box.
  • Find videos that are in Office 365 Video by using SharePoint enterprise search.

Restore a video in the Recycle Bin

  • Deleted videos sit in the Recycle Bin for 90 days, and it is now possible to recover and restore videos from the Recycle Bin.
  • Admins can restore videos that have been deleted by a user

-Office 365: Everything You Wanted to Know - Jan 2017 -Microsoft



Yammer for Your Organization Too...

Here are some of the ways that organizations benefit from Yammer.

  • Centralize teams and projects. Simplify collaboration by providing teams and projects flexible workspaces that allow them to communicate, share files, and find resources in one place.

  • Promote knowledge sharing. Improve decision-making and reduce duplicate work by using Yammer to tap into knowledge across the organization and build on the work of others.

  • Foster innovation. Foster innovation by connecting employees, ideas, and information without regard for time zones, geographies, or hierarchies

  • Support remote/mobile workers. Identify and resolve problems with the customer experience by giving employees on the front line an efficient way to communicate with headquarters and supporting teams.

  • Improve internal communications. Improve the effectiveness of the corporate communications strategy by connecting employees to executives, groups, and feedback.

  • Expand external collaboration. Extend collaboration to customers, partners, and vendors by sending them a Yammer message, inviting them into a Yammer group, or setting up an external network.

  • Empower sales. Yammer can maximize your sales team’s effectiveness with better account insight, instant access to experts, and enhanced information when on the road.

  • Enhance HR practices. Reduce cost and initial training cycles for new employees by creating a designated group with the onboarding resources they need, while giving them access to subject matter experts across the organization.

  • Extend the reach of IT. Speed end-user adoption by sharing tips and tricks for new products. Enable self-help, access to peer expertise, and a searchable knowledge base to reduce total time to problem resolution.

Transform Your HR Organization

An engaged workforce means good things for your company’s HR and Corporate Communications Organizations. With Yammer, employees feel empowered to make a difference by contributing to recruiting efforts, recognizing peer performance, and learning from experts throughout the company or industry. Yammer increases employee engagement by giving every team member a voice and the tools and information to do more.

  • Onboard new hires quickly. Enable new hires to ramp up faster and continue to develop their skills over time as they learn from their peers.

  • Recognize top talent. Identify high performers and publicly recognize employees who do great work - increasing engagement, satisfaction, and retention.

  • Gain insight into performance. Keep up to date with what your team is working on and the progress made.

  • Start a company dialogue. Connect with your coworkers and encourage two-way dialogues in order to improve communication among teams, employees, managers, and executives.

  • Give employees a voice. Spark creativity and innovation by allowing all employees to share ideas, offer feedback and help drive business results.

Transform Your Marketing Organization

Collaboration across teams and with customers is critical to your organization’s marketing success. With Yammer, you can engage with agencies to build high-impact campaigns across geographies, share customer insights, and drive refined go-to market strategies. You can also improve execution through real-time collaboration of collateral. Empower your employees to become brand ambassadors and strengthen your competitive position with Yammer.

  • Centralize information. Create one workspace where designated teams can sync up and get projects done.

  • Accelerate collateral development. Develop quality collateral much faster and in real-time with colleagues, ensuring that the salesforce is always equipped with the latest materials.

  • Collaborate securely with agencies. Share information and gather feedback easily with internal and external agencies through external private networks.

  • Plan and execute events. Drive awareness of activities and promote interaction among attendees pre-, during-, and post-event.

  • Create brand ambassadors. Easily ensure employees and partners are aligned with company messaging and positioning.

Empower Your Sales Organization

Finding the right information at the right time is critical to the success of your sales team. With Yammer, sales representatives can tap into the collective knowledge of your organization to close deals quickly and increase customer retention. Empower your teams to instantly access expertise and information, gain a competitive advantage, and secure deals faster.

  • Access and share key information. Quickly distribute the latest key messaging out to the entire field.

  • Connect mobile workers. Give your mobile and remote sellers access to key information in a timely manner with the Yammer mobile app.

  • Beat the competition. Share in real-time what is and isn’t working in the field, giving your team a competitive advantage.

- Office 365: Everything You Wanted to Know - Jan 2017 - Microsoft

Share File Links – Not Attachments – in Mails

When you attach a file in a cloud location such as OneDrive or SharePoint, Outlook will send your recipients a link to the file. Permission to access the file is granted automatically to every recipient. This makes collaboration easy because you don't have to worry about attachments being dropped, and you can be sure that everyone is collaborating on the same (and most up-to-date) version of the file.

  1. In Outlook, create a message.

Note: For an existing message, click Reply, Reply All, or Forward.

  1. On the ribbon, click Attach File, and choose Browse Web Locations.
  2. Choose OneDrive, the file you want to attach, and then choose Insert.
  3. In your email message, choose the down arrow for the attachment.
  4. Choose Change Permissions, and then choose one of the following:
    • Recipients can Edit if you want recipients to be able to modify the file.
    • Recipients can View, the default option, if you want recipients to be able to read, but not modify, the file.

Change Permission options include Recipients can edit and Recipients can view

 - Microsoft Support

 


Unable to find a shared file? Here is Help!

Someone shared a OneDrive (personal), OneDrive for Business or a SharePoint file with you, but you can't find the email message that has the link. No problem. You can click File > Open > Shared with Me. This will show you all files that have been shared with you.

Just click the file name and it will open the file for you from its original location.

Make sure

  • You are connected to the internet

  • The file permission granted to you is still active

  • The file has not been moved elsewhere by the user

More relevant (frequently used) documents will be listed on top.

You must have a live Office 365 subscription and you must have signed into your account (Microsoft or Work or School account) to access these shared documents.

If you have an edit permission, you too can share the same files with others.

File Sharing Hacks

If you want to receive a file of a type that is blocked by Outlook, you can ask the sender to either make the file available without using Outlook, or make it less likely to be blocked by Outlook. The following are some safe ways to share files with people that you trust.

  • Use a shared server    You might want to ask the sender to save the attachment to a server or an FTP site that you can access. This can include a secure network share server such as SharePoint. The sender can send you a link to the attachment on the server or FTP site. You can click the link to access the file and save it to your computer.
  • Use a file compression utility    Using a compression utility, such as WinZip, creates a compressed archive file that has a different file name extension. Outlook doesn’t recognize these file name extensions as potential threats. Therefore, it doesn’t block the new attachment. Many third-party compression utilities are available.
  • Rename the file    You can request that the sender rename the attachment to use a file name extension that Outlook doesn’t recognize as a threat. For example, an executable file that has the file name extension .exe could be renamed as a Word file that has a .docx file name extension.

Ask the sender to resend the renamed attachment to you. To save the attachment and rename it to use the original file name extension, do the following:

  1. Locate the attachment in the email message.
  2. Right-click the attachment, and then click Copy.
  3. Right-click the desktop, and then click Paste.
  4. Right-click the pasted file, and then click Rename.
  5. Rename the file to use the original file name extension, such as .exe.

- Microsoft Support

Six tips to a better engaged online meeting

15 percent of an organization’s collective time is spent in meetings, as reported by the Harvard Business Review. But as technologies change, workloads increase and attention spans shorten, truly reaching your audience can be a challenge. Making use of tools like Skype for Business (SfB) for such meetings can not only reduce the challenges of distance and travel but also give the participants an added luxury of attending the meeting from wherever they are – not necessarily at their office meeting rooms. Result? More attendance. More savings in travel costs.

But there is a flipside to this.

A major hurdle is addressing the audience across multiple locations. Attendees might join from a conference room at office or might connect from various enterprise or home connections. Involving the audience and making them feel that their efforts are appreciated will go a long way in making the meeting successful. But, this might be an unsurmountable challenge.

Here are six tips to make your SfB meetings and webinars more interesting and fruitful:

Send a meeting request in advance – Use your Outlook calendar to open a new meeting and choose a suitable date and time. You can make use of the Scheduling Assistant for this purpose. Include all the names of the invitees to the event one below the other. (Include also names of people who you want to just inform of this meeting – though they might not participate – and mark them as optional attendees). Then choose the date and the time slot in which all required attendees are available. Optionally, add a room if you want, to book it for your convenience. (This must be enabled already in your enterprise). Set a reminder for the meeting depending upon the preparation time required for the meeting.

Make joining hazel-free—Click the “Skype meeting” option to include the auto generated hyperlink Join Skype Meeting appear in the body of the meeting invitation. Also, include any audio bridge numbers, participant PINs, document attachments (Optionally, include a Meeting Notes OneNote notebook page) in the invitation. Add reusable parts of documents – if any - that have been already shared among the users internally by clicking on the Document Item feature. Once the invitation is received at the participants’ end, all that he/she needs to do to join the meeting is the one-click on the Join Skype Meeting link.

Take control of your meeting - Make use of the Meeting Options feature to choose who all should wait in the lobby or join the meeting without waiting. You can also nominate / manage presenters for and during the meeting. This will provide an uninterrupted flow to keep everyone’s attention on the content being presented. You can also set some limitations – disabling IM, mute attendees, block attendees’ video – only presenters can always share audio and video.

Show, don’t just tell, important information—Effective visual communication is key to employee engagement in meetings. Show videos, presentations, websites, pictures and presenters themselves—instead of a static image that’s easy to ignore. On-site employees shouldn’t get a different meeting experience or information from people joining the meeting from other locations.

Allow for feedback, comments and engagement—If employees feel that they can’t ask questions or get involved in a meeting, they’re likely to pay little or no attention to the proceedings. Keep watch on the IM window for comments or suggestions flowing in. Appoint a person (moderator?) to attend to questions from the audience so that queries can be addressed promptly. Conduct polls at intervals to receive feedback from the participants, to gauge the interest of the participants on the topic being handled, whether they are following your line of thought and also to make sure you are driving home your point.

Mind the anywhere any time any device access - Since the meeting attendees are given the freedom to choose which devices they use to join the meeting, it is also more likely that you will hold their engagement through the duration of your meeting. (It gives everyone the freedom to participate whatever works best for them: on-the-go, at their desk or from anywhere their devices are connected to the internet). Keep this distributed audience in mind when you are speaking and keep addressing them - if possible, by individual names - so that they feel engaged well.

Follow these and your next meeting might be the most productive ever.