Friday, December 21, 2012

I'll be (working from) home for Christmas!

With the Christmas Holidays (or Winter Break for those of you so inclined) fast approaching, it might be helpful to look at your options of getting some work done while you are away from the campus.

After all the shopping, parties, and gatherings with family and friends, you might just need to sneak off to the office for a while. Here are a few ideas to help you do so without going out in the cold!

The need to access resources inside your school network is the natural result of a maturing infrastructure.  Being able to do important tasks at the office while you are at home or while traveling or on vacation can dramatically improve your administrative oversight. And the ability to remotely access your computer at work is a necessity as workloads continue to encroach upon personal time.

Getting the big picture about remote access and then understanding your options might be helpful in deciding which method or technology is best suited for you. Without a basic understanding and game plan, the implementation of remote access can be a harrowing experience and very confusing. Let’s consider a few options.

From a practical standpoint, there are three methods of interacting with computers and resources in your organization from afar. There are other methods, including VNC, a popular open source solution, but my experience with these other solutions is that they require a higher degree of technical skill, both to install and to use. Our mandate is to keep things simple.

Depending upon the task at hand you may want to use all three of the following methods, which include:
  1. Website or web browser based programs
  2. Virtual Private Network or VPN
  3. Remote Desktop Connection or RDP
Website or browser based programs

Using browser based technologies to connect to resources in your organization is likely the simplest way to access remote resources, unless you have a firewall with remote access features. You have probably seen ads for “GoToMyPC.com” or “Logmein.com”.  This option requires you to visit a provider’s website, create a user account, and then download and install their software.

You then complete this same process on computers to be remotely controlled, by logging into your account installing the same software on each machine to be managed remotely. As you install the remote control software on each remote PC, you will see an icon that represents it in your list of controllable computers.  And if you manage all of your computers in one account, you can control any one of them, at any time by clicking on the icon that represents that specific computer.

The advantage of this type of access is that it is pretty reliable (based upon my own experience) and relatively easy to use. The most complex part of the process is understanding which role you are playing when you are installing the software and getting it set up properly. And be sure to record your passwords or access codes.

The disadvantage of this type of access is that it costs money. It is a subscription based service that will cost about $10.00 per month per machine you wish to control. There are some free versions (www.logmein.com) but they restrict the things you can do while connected using the free version in order to encourage you to buy a full-featured subscription.

It is important to understand that when you use this type of remote access you are only remotely controlling the remote PC. Read this statement slowly three times – I am remotely controlling my remote PC. When you disconnect from the remote PC, the work you have accomplished remains there, unless you specifically transfer the files to your controlling PC or laptop. And there may be challenges associated with getting that file transferred back to your current location.

This is an important concept to understand, because if you spend an hour working on a Power Point presentation at the office. It’s at the office! Saving it back to your home PC or Laptop is not always easy. Additionally, you must have the same software installed on your home PC or Laptop to use the file just created.

Bottom line; understand the inherent limitations of remotely controlling your office computer.

Virtual Private Networks

A VPN connection is an excellent choice for remote access to your network. But it is important to understand how a VPN connection works and the planning required using it. The most common VPN scenario associates your firewall device, installed to protect your network from outside intrusion, to your remote computer via software. The software facilitates the connection by opening a secure pathway across the Internet and through your firewall, to your remote computer. These client programs are normally manufacturer specific, designed to work only with your firewall, and provisioned with a security key or token to verify your identity.

A VPN connection is like virtually connecting an Ethernet cable into your network hub at the office. Just imagine a very long cable from the server room out the door, along the street, up your driveway, and into your den at home and you will get the concept. But that is all a VPN connection will do for you…, give you a remote connection. This alone may not provide you with the remote experience you desire because of the network security built into computers, printers, servers, and other devices at the school.

Think of it this way: you can take any PC or Laptop to the school and plug it into the network, but your connection may be restricted to just a few resources. Unless your PC or Laptop at home is joined to the school’s network, you may only have a connection to the Internet and access to very generously shared resources.

When correctly planned an implemented, a VPN connection can be as close to a seamless or transparent connection to your school network as possible. But it has to be correctly implemented and you need to understand the consequence of that implementation.

For example, joining your home PC or Laptop to the Domain at the school may interrupt the small peer to peer network in your home. And changing from a workgroup to a domain and back may cause you a significant amount of grief. You may even loose important files and documents. (A workgroup is the most common way to create a shared broadband connection at home with DSL or Cable Internet service. A Domain is the network security model used in most schools.)

The benefits of VPN are quite remarkable. You simply turn on your remote PC or Laptop and do your tasks. Since you are part of the network, you will have full access to your email, your shared folders, and Client/Server based applications such as QuickBooks, Microsoft Office, Microsoft SQL, etc.

Remote Desktop

No discussion of remote access would be complete without considering Remote Desktop Connection, or Remote Desktop Protocol (RDP), a very useful tool built into all Windows XP and later Microsoft Windows based computers. It is similar to web based remote access technologies in that it allows your home PC or Laptop screen to display your office screen in a real time remote control session. In Windows 7, the Remote Desktop program is found at the Start Menu > All Programs > Accessories folder.

Properly setup, RDP works great. It is quick, reliable, not subject to constant fiddling, and allows you to control both local and remote resources, i.e. local and remote hard drives, printers, and CD’s. And once you are plugged into the network, it can find computers by name.

The challenge in setting up and using remote desktop is twofold. First you must know the name or IP address of the machine you wish to control. And second you must get through the firewall protecting your network. Remote Desktop uses Domain Name Services (DNS) to translate computer names to network addresses, so setting it up can be a little tricky.

RDP is generally a set it and forget it type of configuration. Once it finds your remote desktop, it will remember the settings and allow you to connect quickly by clicking on an icon located on your desktop.

Using RDP will require your network administrator to open a port in your firewall and then route your RDP session to the correct PC. And don’t forget that the on premises user always wins with RDP. In other words, if you are using RDP and someone at the office touches your mouse or presses a key on your keyboard, you will get disconnected. And unlike a browser based technology where users on both ends can see the screen, RDP will not display both the remote and local session at once.

Summary

Technical Support has been completely revolutionized by remote access technologies. It is a fundamental component of providing support services to the schools we manage. And we use each one of these different methods extensively.

As a school administrator, the benefits of remote access should be very obvious to you. Choosing which method to use may be a little less clear and will depend in large measure on what specific task you need to accomplish. It will be further determined by your network infrastructure, Internet bandwidth, installed software, and level of technical support to set it up.

Feel free to call if you need assistance in deciding which of these remote access methods will work best for you. And don’t wait until the holidays begin, you have to set these solutions up while at school – it is quite difficult to do this entirely from home.

One final note: Remote access is not the same thing as working collaboratively with other team members who may also be remote. That kind of anytime, anywhere, access to your important files is a function of your core technology infrastructure. Search this site for articles about Office 365 for Education for more information.



Friday, December 14, 2012

Online Marketing - Part 3 of 3

Which social media platforms are you or someone on behalf of your school using?

The question is becoming more important as the communities we serve get more connected – socially. Equally important is an evaluation of how well your social media strategy and your marketing strategy align, and the extent to which they are used consistent with your school’s current and future policies.

For me personally, just figuring out how to use social media has been a challenge – one that in large measure still eludes me. But I understand it well enough to observe some less than desirable outcomes of what started as good intentions. The purpose of this article is to view social media in its entirety and discuss an overall social media strategy. It seems that there are three common challenges that exist with respect to social media.

Priorities, Processes, and Control

I addressed these issues in an article written over a year ago. And while the popularity and adaptation of the different social media platforms have changed. I believe these principals still apply to all of the variants of social media.

Priorities

It is still my opinion that your first priority, when evaluating online venues, is your school’s website. A properly constructed and managed website becomes a virtual community unto itself and the consolidation point for all of your social media channels. As hard as it is to imagine, there are still plenty of folks – especially parents – who simply don’t get the Facebook phenomena and probably never will. For them a tweet is something they long to hear after a long, cold winter, 1+ is decent Golf score for a tough hole on par 5, and Pinterest is just bad spelling.

So it seems that placing significant content on your main school website ought to be your highest priority. It might be a better strategy to liken your main website to the hub of a bicycle wheel, with all of the spokes leading to/from the hub to your various social venues. From a marketing standpoint, your online strategy, including all of your social channels ought to be designed with the purpose of driving traffic to your school website and gathering leads for prospective students.  Here are some other reasons why your main website ought to be your highest priority:

1. Social platforms, while here to stay are a bit unpredictable and your community will probably move in and out of various social channels on a regular basis. Placing a greater emphasis on social channels at the expense of meaningful content on your website could end up diluting your message over time and eliminating much of your intended audience.
2. Content is king! While social channels are buzzing and brimming with activity, it is still a social channel. Real content, including legally required notices and documents should not to be delivered in a social setting. While announcements, opinions, and chatter can drive awareness of policy and administrative processes, the clear and authorized information should still be on your main website after proper review and publishing guidelines are followed.  
3. The social media landscape is changing very rapidly, and the apparent winners today may not be the winners long-term. Your ability to move in and out of the social channels of choice will be enhanced by a clear website strategy. That strategy should not rely on the success or failure of a particular social media.

Process

Social media as a business (or school) is different than social media for personal use. Understand the difference and avoid mixing the two. If you are into social media, you have undoubtedly experienced cases of extreme over posting. And you certainly don’t want to be like that as an institution. It is not uncommon for companies to employ social media experts, whose sole focus is on developing and delivering social content. While it is unlikely that will have the luxury of such expenditure, there should be a clear strategy in your school about this process
.
The last thing your principal wants is another assignment, but someone at that level ought to be the champion of the school and the school’s social media advocate. But principals and other staff members are not perpetual, so be sure that your social media account is.

It is also important to be consistent in your policymaking with respect to social media. Do you attempt to build a Facebook community, but ban the use of Facebook within your school? Are you trying to build a twitter following, but restrict use of mobile devices in your organization?

One idea is to develop your own internal social media platform. This is done automatically for you if you are using the Office 365 for Education platform. See my article about Live@EDU services.

Control

One common challenge is well-intentioned individuals, associated with your school, who create social media accounts using their own personal information and your legal name. This is a very precarious situation that should be handled sooner, rather than later. Having control over your messaging is essential, even when those individuals are key stakeholders in your organization. Much like the nightmares we have seen with domain names, ownership of Facebook pages with your official name by unauthorized individuals can be embarrassing at the least and potentially a legal nightmare in the worst case scenario.

Want to see how big of a problem this is? Just do a Facebook search using the name of your school. If you see more than one entry, you have a problem. More importantly, your users have a problem because they don’t know who to follow.

Social Media can be of great benefit to your school. Set clear priorities, designate specific individuals to manage it, and maintain control of this important piece of intellectual property. And remember, that from a marketing perspective, social media exists to obtain prospective students. So make sure there is a consistent and easy way to gather and track leads for followup.

Friday, December 7, 2012

Online Marketing Part 2 of 3

I have a confession to make. I am not a marketing expert.  So what presumption causes me to write an article about email marketing? First of all, I get slammed by marketing emails daily and have a reasonably good idea about what works for me. And I also subscribe to a number of very helpful newsletters.

As a consumer of both good and bad marketing email, I have experience. As an architect of such systems for customers, I have understanding of system requirements. And there are a number of common sense practices about this subject. Consider the following and see if you don’t agree.

Sending an email newsletter is one of the most cost effective ways of reaching an audience. Once configured, it costs virtually nothing to send and if created with some artistic consideration, can be a welcome addition to the mindless advertising that prevails in your subscriber’s inbox.  And if managed properly, your electronic newsletter can be self-supporting. Subscribers can add, remove, and modify their email and choose the format of your message.

So what is the difference between a helpful email newsletter and mindless email advertising?

I would boil it down to three simple ideas. You might want to conduct an internal review. Of course your own situation will depend on your intended audience, but develop your email newsletter with these concepts in mind:
  • Permission
  • Content
  • Frequency
Permission

The most important principle that you should observe is permission, as in having it. There is nothing more annoying than to receive unsolicited email, which is primarily advertising, that pretends to be an informative newsletter.  Well, there is something more annoying, getting the same message several times at once (duplicate emails) or repetitively (too frequently).

So as you think about permission, please be considerate. There are wide ranging audiences for your electronic communication. Some may not know you at all, and have little interest. Others may be deeply connected to your organization and be very interested in your messaging. Most will be somewhere in between.

Be sure to have permission to send, in the case of familiar contacts; and a very easy and reliable unsubscribe feature for messages sent to those who may not have interest at the present time. It is important to note that there are laws on the books of some states requiring that your unsolicited email messages contain an “Unsubscribe” link in them. Regardless of the law, this is always a good idea.

The surest method of obtaining permission is to provide a sign-up link on your website (or in an email) for subscribing to your content. You may also gather email addresses from referrals, printed media, or word of mouth. In the world of commerce, it is very common to buy lists of potential recipients of your newsletter, but that may not be practical in the real world of Charter Schools.

Content is King

Much like your website, prospective students (and parents) will read your message for content. So find a good balance between too little and too much. I have seen entire newsletters that only amount to three solid sentences of information, and I have seen multipage tomes that require a serious read. You ought to be somewhere comfortably in the middle

A common format for electronic newsletters is to publish an introductory paragraph with a catchy headline and solid, well written introductory paragraph. And then include a “Read More” link for the remainder of the article.

This allows your readers to hit the highlights, and then expand on the articles of interest. This will save space, allowing a full set of articles on a single page. Be sure to dress up your email newsletter with some nice imagery, but don’t overdo it and ensure your images are formatted for the web.

More advanced newsletter solutions will allow you to accommodate both html and text based email messages. If you don’t understand the difference, html is better if you want graphics to accompany your words. Text is, well… text only, no pictures provided.

And one last thing, don’t embed music in your electronic newsletter. That can be highly embarrassing and/or annoying. Imagine sitting quietly, catching up on your email, waiting for a meeting or event to start while reviewing an email newsletter just received. Then without warning, Bon Jovi begins blaring out of your computer speakers when you open the email from one of your favorite organizations. That’s a sure way to get an unsubscribe request, at a minimum.

Frequency

Finally, be sure to keep the frequency and consistency of your email newsletter at a reasonable level. And be sure that your system has the capacity to detect duplicate recipients, one good email newsletter is good – but more (of the same newsletter) is not better!

Be careful as you determine a publishing schedule for your email newsletter. Remember that it takes time and effort to create useful and interesting content. And consistency is important if you want to build/maintain an engaged readership. Don’t overcommit yourself to creating content, or you may find yourself trying to be creative and dilute your purpose.

Frequency is a function of content and audience. If your newsletter is to highlight this week’s events at your school, then a monthly newsletter may not be sufficient. If it is a monthly Board Report, then weekly won’t quite work either.

Summary

Periodic newsletters to your community can be a very engaging and helpful service, but do this purposefully and with planning. There are open source (free) software solutions that will provide the functionality you need, assuming your website has been designed properly. So paying for a service such as Constant Contact may not be necessary. However, if the budget allows, commercial services may be easier for you to manage. Either way, obtain permission from your recipients directly or indirectly, produce good content, and publish your newsletter at a frequency that you and your audience can maintain.

If you need guidance on which email newsletter solution is best for you, please contact us. We are always eager to help.