<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/tag/Tech/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog #Tech</title><description>GTconsult - Blog #Tech</description><link>https://www.gtconsult.com/blogs/tag/Tech</link><lastBuildDate>Tue, 31 Mar 2026 13:31:23 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Power Automate in SharePoint]]></title><link>https://www.gtconsult.com/blogs/post/power-automate-in-sharepoint</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Power Automate Blog.jpg"/>A blog focusing on the transformative power of Power Automate. This blog looks at: What is Power Automate? What are Power Automate's key uses? What are the different types of flows in Power Automate? Practical examples/uses of Power Automate.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_sg-RV5wDS9C5NgRZ6W8YyA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_lVuEzsJLQ5y4zVAi2VMlXg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " data-equal-column=""><style type="text/css"> [data-element-id="elm_lVuEzsJLQ5y4zVAi2VMlXg"].zprow{ background-image:linear-gradient(to bottom, rgba(30,34,45,0.4), rgba(30,34,45,0.4)), url(/Blog%20Site/standard-quality-control-collage-concept-2.jpg); border-radius:1px; } </style><div data-element-id="elm_RjyINlOvT6GU1fVYAvtanQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_RjyINlOvT6GU1fVYAvtanQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ba91DqevSrKCqJF5MbW4bQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ba91DqevSrKCqJF5MbW4bQ"].zpelem-heading { border-radius:1px; text-shadow:1px 1px 1px #000000; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div><h2><span style="color:rgb(255, 255, 255);">Integrating Power Automate for SharePoint Solutions</span></h2></div></h2></div>
<div data-element-id="elm_Np8A9Fi9RsOzLR4iUlWiGA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Np8A9Fi9RsOzLR4iUlWiGA"].zpelem-text { text-shadow:1px 1px 1px #000000; border-radius:1px; text-shadow:1px 1px 1px #000000; } [data-element-id="elm_Np8A9Fi9RsOzLR4iUlWiGA"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ text-shadow:1px 1px 1px #000000; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:16px;color:rgb(255, 255, 255);">Power Automate, a component of Microsoft's Power Platform, is a powerful tool that allows users to automate workflows and streamline processes across various applications and services. When integrated with SharePoint, Power Automate becomes a robust solution for automating repetitive tasks, reducing manual effort, and improving overall productivity within SharePoint environments.</span><br></p></div>
</div><div data-element-id="elm_frRRlJhAoKLT5Tbw9lcEZw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_frRRlJhAoKLT5Tbw9lcEZw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_frRRlJhAoKLT5Tbw9lcEZw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div><div data-element-id="elm_CwFJIq7RInh7SZ6AJl3y7w" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_CwFJIq7RInh7SZ6AJl3y7w"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sF8fKk-JAys5thkuSCAjbg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_sF8fKk-JAys5thkuSCAjbg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_5XeXqAATPQdAsBkLid73lg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_5XeXqAATPQdAsBkLid73lg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_EFQZo2suEpNOL-9wPZwAEA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EFQZo2suEpNOL-9wPZwAEA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>In today's fast-paced business environment, efficiency and productivity are essential. Manual tasks and repetitive workflows can bog down productivity and hinder progress. However, with tools like Power Automate, businesses can revolutionize their operations by automating processes seamlessly within SharePoint.</p><p><br></p><div style="color:inherit;"><p>If you have been following/reading our blogs or are familiar with Microsoft's offerings you may be aware that Microsoft has a family of products that form part of the Power Platform, namely:&nbsp;</p><p><br></p><div style="color:inherit;"><ul><li>Power BI </li><li><a href="https://www.gtconsult.com/blogs/post/powerapps-in-sharepoint" title="Power Apps" target="_blank" rel="">Power Apps</a><br></li><li>Power Automate</li><li>Power Virtual Agents </li><li>Power Pages&nbsp;</li></ul></div></div></div></div>
</div><div data-element-id="elm_ol9Hq7qBmrg9fGjY_B1lpg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ol9Hq7qBmrg9fGjY_B1lpg"] .zpimage-container figure img { width: 1110px ; height: 337.34px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ol9Hq7qBmrg9fGjY_B1lpg"] .zpimage-container figure img { width:723px ; height:219.72px ; } } @media (max-width: 767px) { [data-element-id="elm_ol9Hq7qBmrg9fGjY_B1lpg"] .zpimage-container figure img { width:415px ; height:126.12px ; } } [data-element-id="elm_ol9Hq7qBmrg9fGjY_B1lpg"].zpelem-image { border-radius:1px; margin-block-start:-3px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/platform-2.png" width="415" height="126.12" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_QZuGSx-9KZJSpPxvIrDTUA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_QZuGSx-9KZJSpPxvIrDTUA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">We have already covered&nbsp;<a href="https://www.gtconsult.com/blogs/post/powerapps-in-sharepoint" target="_blank" rel="">PowerApps in SharePoint</a>, and, in today’s blog, we will be looking at Power Automate in SharePoint. Let’s get into it.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_5y0r6yWoItGHbSmgE43wQw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_5y0r6yWoItGHbSmgE43wQw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_3K4X0Q4ZvPOiRDRwXN494g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_3K4X0Q4ZvPOiRDRwXN494g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_PDMIxn9hbTWSswS-E8l3lw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_PDMIxn9hbTWSswS-E8l3lw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_STIVPD5VDQotOABRIL-AQA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_STIVPD5VDQotOABRIL-AQA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:900;color:rgb(0, 27, 76);">What is Power Automate?</span><br></h2></div>
<div data-element-id="elm_4-42ISkfWFCbEgeR3hYvKg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_4-42ISkfWFCbEgeR3hYvKg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Power Automate, formerly known as Microsoft Flow, is a powerful cloud-based service that&nbsp; allows users to create automated workflows between their favorite apps and services to synchronize files, get notifications, collect data, and more, without requiring extensive programming knowledge.</p><p>&nbsp;</p><p>In essence, Power Automate enables users to automate repetitive tasks and business processes across a wide range of applications and services, both within the Microsoft ecosystem and external sources. It employs a low-code or no-code approach, meaning that users can build sophisticated workflows and automation processes using a visual interface without writing extensive lines of code.</p><p>&nbsp;</p><p>The platform offers a variety of connectors that enable integration with popular services such as SharePoint, Power BI, Outlook, Teams, Planner, Asana, Mailchimp, Twitter, Google Drive, and many others. These connectors allow users to trigger actions and responses across different platforms seamlessly.</p></div></div>
</div><div data-element-id="elm_4-UehLLtBi_7wkNJQAmBoA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_4-UehLLtBi_7wkNJQAmBoA"] .zpimage-container figure img { width: 1110px ; height: 516.77px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_4-UehLLtBi_7wkNJQAmBoA"] .zpimage-container figure img { width:723px ; height:336.60px ; } } @media (max-width: 767px) { [data-element-id="elm_4-UehLLtBi_7wkNJQAmBoA"] .zpimage-container figure img { width:415px ; height:193.21px ; } } [data-element-id="elm_4-UehLLtBi_7wkNJQAmBoA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Picture1%20Power%20Automate.png" width="415" height="193.21" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_hpRZxdeomDRoERxNZS6VGw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hpRZxdeomDRoERxNZS6VGw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Power Automate offers a wide range of capabilities within SharePoint, enabling users to automate workflows, streamline processes, enhance collaboration, and improve productivity across their organization. Whether it's automating document approvals, setting up notifications, synchronizing data, enforcing version control, integrating with Microsoft 365 apps, customizing business processes, or automating routine tasks, Power Automate provides organizations with the tools they need to unlock the full potential of SharePoint as a comprehensive platform for content management and teamwork.</p></div></div>
</div></div></div></div></div><div data-element-id="elm_4bV4dZOfVHgpU1KEX_ASmg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4bV4dZOfVHgpU1KEX_ASmg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8l2JBU25VvROlGA0EWfSFA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_8l2JBU25VvROlGA0EWfSFA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_kAsMNGTEFTJ2GzjwgpAGDQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_kAsMNGTEFTJ2GzjwgpAGDQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_tg2UedMPldLdMGCUI0ZunA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tg2UedMPldLdMGCUI0ZunA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><h2><span style="font-weight:900;color:rgb(0, 27, 76);">The key uses of Power Automate</span></h2></div></h2></div>
</div></div></div></div><div data-element-id="elm_nvyd7D4O0XmGHF9cckgoZA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-139 "><style type="text/css"> [data-element-id="elm_nvyd7D4O0XmGHF9cckgoZA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_flE00dXKFvnEHUWaDHvohQ" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_flE00dXKFvnEHUWaDHvohQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_6fFJNrD2kjFKbH7IkIEUEA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_SQ2VI1ZUXGLPKMxuAepdCw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SQ2VI1ZUXGLPKMxuAepdCw"] .zpimage-container figure img { width: 540px ; height: 359.44px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SQ2VI1ZUXGLPKMxuAepdCw"] .zpimage-container figure img { width:723px ; height:481.25px ; } } @media (max-width: 767px) { [data-element-id="elm_SQ2VI1ZUXGLPKMxuAepdCw"] .zpimage-container figure img { width:415px ; height:276.23px ; } } [data-element-id="elm_SQ2VI1ZUXGLPKMxuAepdCw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/standard-quality-control-collage-concept-2.jpg" width="415" height="276.23" loading="lazy" size="fit"/></picture></span></figure></div>
</div></div><div data-element-id="elm_ID8e6wWm6PVJoJFTOXE_Ow" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_LH0yL2x38bpsiK3kQqxDzw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_LH0yL2x38bpsiK3kQqxDzw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-type1 zpheading-align-left " data-editor="true">1. Document Approval Workflows</h3></div>
<div data-element-id="elm_5WCGEYWhnlOVukBUEhIvqQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_5WCGEYWhnlOVukBUEhIvqQ"] div.zpspacer { height:5px; } @media (max-width: 768px) { div[data-element-id="elm_5WCGEYWhnlOVukBUEhIvqQ"] div.zpspacer { height:calc(5px / 3); } } </style><div class="zpspacer " data-height="5"></div>
</div><div data-element-id="elm_bTVjr9iWZonpG0chJ8NCLw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bTVjr9iWZonpG0chJ8NCLw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Power Automate allows users to create sophisticated approval workflows for documents stored in SharePoint libraries. These workflows can be customized to fit specific organizational requirements. For instance, when a new document is uploaded to a SharePoint library, Power Automate can automatically trigger an approval process. Approvers receive notifications via email or Microsoft Teams, review the document directly within SharePoint, provide feedback, and approve or reject the document. Power Automate manages the entire approval lifecycle, ensuring that documents are processed efficiently and in accordance with organizational policies.</p></div>
<p><br></p></div></div></div></div><div data-element-id="elm_NXmjnCyT8Y6vFAuv2vdrRw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_NXmjnCyT8Y6vFAuv2vdrRw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_IbFzZeTkOODM2wW6dEEgpw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IbFzZeTkOODM2wW6dEEgpw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HPAhWVFaXXvpe8oSiPWQAw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_HPAhWVFaXXvpe8oSiPWQAw"] div.zpspacer { height:12px; } @media (max-width: 768px) { div[data-element-id="elm_HPAhWVFaXXvpe8oSiPWQAw"] div.zpspacer { height:calc(12px / 3); } } </style><div class="zpspacer " data-height="12"></div>
</div></div></div><div data-element-id="elm_AAeQlOFAShxQ0O_IATPN1g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_r-Nn0XxV-PxujD_q7i57mA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zscolumn-spacing zpalign-self- zplight-section zplight-section-bg "><style type="text/css"> [data-element-id="elm_r-Nn0XxV-PxujD_q7i57mA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_CBS0FZG7cA186wM2NNbS9g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HgaZngcIlrqQkcU-kZkZ2g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_zTn1IYQ843gz-QT4gpgcfg" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_zTn1IYQ843gz-QT4gpgcfg"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_DHP3AximeJ61GWTc1AuDpA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DHP3AximeJ61GWTc1AuDpA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">2. Notification and Alerts<br>​</h3></div>
<div data-element-id="elm_g39LrCtmQUmMvyRYo_y6DA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_g39LrCtmQUmMvyRYo_y6DA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Power Automate enables users to set up automated notifications and alerts within SharePoint. These notifications can be triggered by various events, such as document modifications, task assignments, or approaching deadlines. For example, when a document is modified, Power Automate can send notifications to relevant team members, notifying them of the change and prompting them to review the updated content. By automating notifications and alerts, Power Automate helps keep stakeholders informed and facilitates timely communication within the organization.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;"><br></span></p></div>
</div></div></div><div data-element-id="elm_jtvQLME0pNobWplt83_NCg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_dwIFqgug1WuEQ0-KK4NfOA" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dwIFqgug1WuEQ0-KK4NfOA"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; border-radius:1px; } </style><div data-element-id="elm_tJv3ZaYvD9YaFBXa1oAWRA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tJv3ZaYvD9YaFBXa1oAWRA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">3. Data Synchronization</span><br><span style="color:inherit;">​</span><br></h3></div>
<div data-element-id="elm_GkwkIaExp0z11woN7tRU1g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GkwkIaExp0z11woN7tRU1g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Power Automate facilitates seamless data synchronization between SharePoint and external systems or applications. Users can create workflows that automatically sync data between SharePoint lists and external databases, CRM systems, or cloud services. For instance, when new data is added to an external system, Power Automate can update corresponding records in SharePoint, ensuring data consistency across different platforms. By automating data synchronization, organizations can eliminate manual data entry errors and maintain accurate and up-to-date information.</p><p><br></p><p><br></p><p><br></p></div>
</div></div></div></div><div data-element-id="elm_ggrp4jpak5E-_Vb-WKpSRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_lkJq2_It6HBhnUz3hnU3oA" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_lkJq2_It6HBhnUz3hnU3oA"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; border-radius:1px; } </style><div data-element-id="elm_8Zt6Bq_6Sq_4yTyPoAu5DQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8Zt6Bq_6Sq_4yTyPoAu5DQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">4. Document Routing and Version Control</span></h3></div>
<div data-element-id="elm_8qoqMPcGI6n3JYAV5ehvrA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8qoqMPcGI6n3JYAV5ehvrA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Power Automate can automate the process of routing documents within SharePoint and enforcing version control policies. For instance, when a document is uploaded to SharePoint, Power Automate can automatically route it to designated reviewers or approvers based on predefined criteria. Additionally, Power Automate can manage document versioning by creating new versions of documents, tracking changes, and maintaining a complete audit trail of revisions. By automating document routing and version control, organizations can ensure that documents are reviewed, approved, and managed effectively, while maintaining compliance with regulatory requirements.</span></p></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_jhNxtgwNGU5Nsos7m7CdxQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-139 "><style type="text/css"> [data-element-id="elm_jhNxtgwNGU5Nsos7m7CdxQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yr6Tqyn67dKhlUrDEDxC7Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_xCGLJSgKnaVCB_s100eVzw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zscolumn-spacing zpalign-self- zplight-section zplight-section-bg "><style type="text/css"> [data-element-id="elm_xCGLJSgKnaVCB_s100eVzw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_AVxEkeECOnRuMTxsO2vYHw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_kzuz2laiKmegksiHQM3O6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_WVr2zBdT_jhFepG75GSJvQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_WVr2zBdT_jhFepG75GSJvQ"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; border-radius:1px; } </style><div data-element-id="elm_qvezwFbAWakk7E1HGd87Cg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qvezwFbAWakk7E1HGd87Cg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">5. Integration with Microsoft 365 Apps</span></h3></div>
<div data-element-id="elm_X7WYhOaVmF1r9uo0nPuk3g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_X7WYhOaVmF1r9uo0nPuk3g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Power Automate seamlessly integrates with other Microsoft 365 apps, such as Outlook, Teams, and Power BI. Users can create workflows that leverage these apps to automate various tasks and processes within SharePoint. For example, Power Automate can automate the process of sending emails, scheduling meetings, creating team channels, and generating reports—all within the context of SharePoint. By integrating with Microsoft 365 apps, Power Automate extends the capabilities of SharePoint and enables users to streamline collaboration and communication across the organization.</span><br></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;"><br></span></p></div>
</div></div></div><div data-element-id="elm_yQE4hNRTHnCgEqod5CUVZg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_yQE4hNRTHnCgEqod5CUVZg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_QKN-9y4lZtVFCjqcOKEyIw" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_QKN-9y4lZtVFCjqcOKEyIw"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_e9q3HhontXRHKI2IDtyvIw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_e9q3HhontXRHKI2IDtyvIw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">6. Custom Business Processes</span></h3></div>
<div data-element-id="elm_l0OBoOq7HpEbUMs-KXhGcg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_l0OBoOq7HpEbUMs-KXhGcg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Power Automate empowers users to design custom business processes and workflows tailored to their organization's specific needs. Whether it's automating HR processes, managing procurement requests, or tracking project milestones, Power Automate provides the flexibility to create workflows that align with unique business requirements. Users can leverage Power Automate's visual designer to define workflow logic, set up triggers and actions, and automate complex business processes within SharePoint. By customizing business processes with Power Automate, organizations can improve operational efficiency, enhance decision-making, and drive business growth.</span><br></p></div>
</div></div></div><div data-element-id="elm_BhyUQhGoGcDTcyc5Qnoeow" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_o1CxW761iT4P_qpig3qHlQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_o1CxW761iT4P_qpig3qHlQ"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_Vay48lbmBPgRBX-ptiPtLA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Vay48lbmBPgRBX-ptiPtLA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">7. Task Automation</span><br><span style="color:inherit;">​</span><br></h3></div>
<div data-element-id="elm_gwOc0xHlO0prCihFLvOSwg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gwOc0xHlO0prCihFLvOSwg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Power Automate can automate various routine tasks and processes within SharePoint, helping users save time and reduce manual effort. For example, Power Automate can automate tasks such as updating metadata, archiving documents, generating reports, and sending reminders. By automating these tasks, users can streamline their workflows, minimize errors, and focus on more strategic activities. Power Automate's flexible and intuitive interface makes it easy to create and manage automated tasks within SharePoint, enabling users to optimize their productivity and achieve better outcomes.</span><br></p><p><br></p><p><br></p></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_IC-HkxnrKQ9SQBVGu5L1gw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IC-HkxnrKQ9SQBVGu5L1gw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8ICu_Kv8cW0PoqFiNSS50g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_8ICu_Kv8cW0PoqFiNSS50g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_jM61TCKddmJi2Hmbkqs3jA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_jM61TCKddmJi2Hmbkqs3jA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_LEmcoayzgyWnpuHtMuS9iQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_LEmcoayzgyWnpuHtMuS9iQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><h2><span style="font-weight:900;color:rgb(0, 27, 76);">Types of flows in Power Automate</span></h2></div></h2></div>
<div data-element-id="elm_g8NCS-otYCNVluVfVrtq1A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_g8NCS-otYCNVluVfVrtq1A"] .zpimage-container figure img { width: 1110px ; height: 529.33px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_g8NCS-otYCNVluVfVrtq1A"] .zpimage-container figure img { width:723px ; height:344.78px ; } } @media (max-width: 767px) { [data-element-id="elm_g8NCS-otYCNVluVfVrtq1A"] .zpimage-container figure img { width:415px ; height:197.90px ; } } [data-element-id="elm_g8NCS-otYCNVluVfVrtq1A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Untitled-1.jpg" width="415" height="197.90" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_5i-PS4wp2movhKGd-06hTg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5i-PS4wp2movhKGd-06hTg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Flows in Power Automate are the fundamental building blocks used to automate workflows and processes across various applications and services. Essentially, flows represent sequences of actions and triggers that dictate how tasks are performed and how data moves between different systems.</span><br></p><p><span style="color:inherit;"><br></span></p></div>
</div></div></div></div></div><div data-element-id="elm_fdkHix5eRwP-OwD28KRTBg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_fdkHix5eRwP-OwD28KRTBg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_puPgoBKn5DM_YwgRPvn2hg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_puPgoBKn5DM_YwgRPvn2hg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_fUB7qhFWWN-RO4Phz05FYw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_fUB7qhFWWN-RO4Phz05FYw"].zpelem-col{ background-color:rgba(30,34,45,0.05); background-image:unset; border-radius:1px; } </style><div data-element-id="elm_y1KRO1b5im7mD1hxuUx9YQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_y1KRO1b5im7mD1hxuUx9YQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div><span style="font-family:Raleway, sans-serif;font-size:24px;">Key components of flows in Power Automate:</span></div></div><br><div><div><span style="font-weight:700;">Triggers:</span></div></div><br><div>Triggers are events that initiate the execution of a flow. They serve as the starting point for the flow and can be triggered by various occurrences, such as the creation of a new document, the receipt of an email, the submission of a form, or the updating of a record in a database. Triggers define when a flow should start executing and specify the conditions under which it should be activated.</div><br><div><div><span style="font-weight:700;">Actions:</span></div></div><br><div>Actions are the individual steps or operations performed within a flow. They represent specific tasks that need to be executed as part of the workflow. Actions can include sending an email, creating a new record in a database, updating a file in a cloud storage service, posting a message in a collaboration tool, or performing a calculation. Actions define the behavior and functionality of the flow and determine what tasks it should accomplish.</div><br><div><div><span style="font-weight:700;">Conditions and Control Logic:</span></div></div><br><div>Flows in Power Automate can include conditions and control logic to make decisions and guide the flow of execution. Conditional statements allow flows to evaluate data and perform different actions based on specified criteria. For example, a flow may include conditional logic to route documents for approval only if they meet certain criteria, or to send notifications to specific users based on the content of an email. Control logic enables flows to perform branching, looping, and error handling, ensuring that tasks are executed correctly and efficiently.</div><br><div><div><span style="font-weight:700;">Connectors:</span></div></div><br><div>Connectors are integration points that enable flows to interact with external applications, services, and data sources. Power Automate provides a wide range of connectors that allow flows to connect to popular apps, such as Microsoft 365, Salesforce, Google Drive, Twitter, and Dropbox, as well as custom APIs and web services. Connectors provide the necessary interfaces and protocols for flows to exchange data and perform actions across different systems.</div><div><br></div><div><div><span style="font-weight:700;">Templates:</span></div></div><br><div>Power Automate offers a library of pre-built templates that users can leverage to quickly create and deploy common workflows and processes. Templates provide a starting point for building flows and offer examples of how flows can be configured to automate specific tasks and scenarios. Users can customize templates to fit their unique requirements and integrate them into their own workflows seamlessly.</div><div><br></div><div>By defining triggers, actions, conditions, and connectors, users can create powerful and efficient workflows that enhance productivity, improve collaboration, and drive digital transformation within their organization.</div></div></div>
</div></div></div></div></div><div data-element-id="elm_Rxvq6RXqNKVnB9sR72oaVg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Rxvq6RXqNKVnB9sR72oaVg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_gdaa39cMUwO1Q6YI5-Oh7A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_gdaa39cMUwO1Q6YI5-Oh7A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_D9jzNIgZKRon4GXNRwiusg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_D9jzNIgZKRon4GXNRwiusg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_aAuKgcntMrr2Cz9F4Lqzqw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_aAuKgcntMrr2Cz9F4Lqzqw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-family:Raleway, sans-serif;font-size:20px;">Power Automate has three primary types of flows:</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_yJO7gO58gM6LoU--PVKPTw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_yJO7gO58gM6LoU--PVKPTw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WWsGDUdOezZ-e_gC10Yshg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_WWsGDUdOezZ-e_gC10Yshg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_IDcN8IWOuiiPkxDonroW5w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IDcN8IWOuiiPkxDonroW5w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_PuOwwsmF4GvNrTbOOV2Q5g" data-element-type="tabs" class="zpelement zpelem-tabs "><style> @media (max-width: 767px) { } @media all and (min-width: 768px) and (max-width:991px){ } </style><div class="zptabelem-inner-container zptabs-style-01 zptab-type-02 zptabs-align-left zptabicon-align-left zptabicon-size-sm zptabicon-disable "><div class="zptabs-container"><div data-element-id="elm_vcl0KrK1-AVVnXzPZue5OA" data-element-type="tabheader" data-tab-name="Cloud Flows" data-content-id="elm_OhdckZLNvk5vwD-dRqb-dQ" class="zpelement zptab " style="margin-top:0px;" tabindex="0" role="button" aria-label="Cloud Flows"><span class="zptabicon"><svg viewBox="0 0 256 237" xmlns="http://www.w3.org/2000/svg"><path d="M128,0.289999962 L134.690909,6.68999996 L255.709091,127.708182 L242.327273,141.09 L230.4,129.162727 L230.4,227.49 L230.4,236.799091 L221.090909,236.799091 L155.927273,236.799091 L146.618182,236.799091 L146.618182,227.49 L146.618182,143.708182 L109.381818,143.708182 L109.381818,227.49 L109.381818,236.799091 L100.072727,236.799091 L34.9090909,236.799091 L25.6,236.799091 L25.6,227.49 L25.6,129.162727 L13.6727273,141.09 L0.290909091,127.708182 L121.309091,6.68999996 L128,0.289999962 Z M128,26.7627272 L44.2181818,110.544545 L44.2181818,218.180909 L90.7636364,218.180909 L90.7636364,134.399091 L90.7636364,125.09 L100.072727,125.09 L155.927273,125.09 L165.236364,125.09 L165.236364,134.399091 L165.236364,218.180909 L211.781818,218.180909 L211.781818,110.544545 L128,26.7627272 Z" fill-rule="evenodd"></path></svg></span><div><span class="zptab-name">Cloud Flows</span></div>
</div><div data-element-id="elm_vB1w6CrVm89FhA69hXGylQ" data-element-type="tabheader" data-tab-name="Desktop Flows" data-content-id="elm_iaoNrv42h6CcP4EqSYnkkw" class="zpelement zptab " style="margin-top:0px;" tabindex="0" role="button" aria-label="Desktop Flows"><span class="zptabicon"><svg viewBox="0 0 256 237" xmlns="http://www.w3.org/2000/svg"><path d="M128,0.289999962 L134.690909,6.68999996 L255.709091,127.708182 L242.327273,141.09 L230.4,129.162727 L230.4,227.49 L230.4,236.799091 L221.090909,236.799091 L155.927273,236.799091 L146.618182,236.799091 L146.618182,227.49 L146.618182,143.708182 L109.381818,143.708182 L109.381818,227.49 L109.381818,236.799091 L100.072727,236.799091 L34.9090909,236.799091 L25.6,236.799091 L25.6,227.49 L25.6,129.162727 L13.6727273,141.09 L0.290909091,127.708182 L121.309091,6.68999996 L128,0.289999962 Z M128,26.7627272 L44.2181818,110.544545 L44.2181818,218.180909 L90.7636364,218.180909 L90.7636364,134.399091 L90.7636364,125.09 L100.072727,125.09 L155.927273,125.09 L165.236364,125.09 L165.236364,134.399091 L165.236364,218.180909 L211.781818,218.180909 L211.781818,110.544545 L128,26.7627272 Z" fill-rule="evenodd"></path></svg></span><div><span class="zptab-name">Desktop Flows</span></div>
</div><div data-element-id="elm_dVEwHolPmm02P_xLpZFsLw" data-element-type="tabheader" data-tab-name="Business Process Flows" data-content-id="elm_35FAF8Hn7IcH0JV47-Sp0A" class="zpelement zptab " style="margin-top:0px;" tabindex="0" role="button" aria-label="Business Process Flows"><span class="zptabicon"><svg viewBox="0 0 256 237" xmlns="http://www.w3.org/2000/svg"><path d="M128,0.289999962 L134.690909,6.68999996 L255.709091,127.708182 L242.327273,141.09 L230.4,129.162727 L230.4,227.49 L230.4,236.799091 L221.090909,236.799091 L155.927273,236.799091 L146.618182,236.799091 L146.618182,227.49 L146.618182,143.708182 L109.381818,143.708182 L109.381818,227.49 L109.381818,236.799091 L100.072727,236.799091 L34.9090909,236.799091 L25.6,236.799091 L25.6,227.49 L25.6,129.162727 L13.6727273,141.09 L0.290909091,127.708182 L121.309091,6.68999996 L128,0.289999962 Z M128,26.7627272 L44.2181818,110.544545 L44.2181818,218.180909 L90.7636364,218.180909 L90.7636364,134.399091 L90.7636364,125.09 L100.072727,125.09 L155.927273,125.09 L165.236364,125.09 L165.236364,134.399091 L165.236364,218.180909 L211.781818,218.180909 L211.781818,110.544545 L128,26.7627272 Z" fill-rule="evenodd"></path></svg></span><div><span class="zptab-name">Business Process Flows</span></div>
</div></div><div class="zptabs-content-container"><div data-element-id="elm_vcl0KrK1-AVVnXzPZue5OA" data-element-type="tabheader" data-tab-name="Cloud Flows" data-content-id="elm_OhdckZLNvk5vwD-dRqb-dQ" class="zpelement zptab " style="margin-top:0px;" tabindex="0" role="button" aria-label="Cloud Flows"><span class="zptabicon"><svg viewBox="0 0 256 237" xmlns="http://www.w3.org/2000/svg"><path d="M128,0.289999962 L134.690909,6.68999996 L255.709091,127.708182 L242.327273,141.09 L230.4,129.162727 L230.4,227.49 L230.4,236.799091 L221.090909,236.799091 L155.927273,236.799091 L146.618182,236.799091 L146.618182,227.49 L146.618182,143.708182 L109.381818,143.708182 L109.381818,227.49 L109.381818,236.799091 L100.072727,236.799091 L34.9090909,236.799091 L25.6,236.799091 L25.6,227.49 L25.6,129.162727 L13.6727273,141.09 L0.290909091,127.708182 L121.309091,6.68999996 L128,0.289999962 Z M128,26.7627272 L44.2181818,110.544545 L44.2181818,218.180909 L90.7636364,218.180909 L90.7636364,134.399091 L90.7636364,125.09 L100.072727,125.09 L155.927273,125.09 L165.236364,125.09 L165.236364,134.399091 L165.236364,218.180909 L211.781818,218.180909 L211.781818,110.544545 L128,26.7627272 Z" fill-rule="evenodd"></path></svg></span><div><span class="zptab-name">Cloud Flows</span></div>
</div><div data-element-id="elm_OhdckZLNvk5vwD-dRqb-dQ" data-element-type="tabcontainer" data-header-id="elm_vcl0KrK1-AVVnXzPZue5OA" class="zpelement zptab-content " style="margin-top:0px;"><div class="zptab-element-container"><div data-element-id="elm_7KaD_X6_NGUPnXQHXSitHw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_7KaD_X6_NGUPnXQHXSitHw"].zprow{ border-radius:1px; } </style><div data-element-id="elm__ZFNycoT_TkcZaxrQS5V0g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_SHe8Mfg058-h3u1qS09lXg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SHe8Mfg058-h3u1qS09lXg"] .zpimage-container figure img { width: 198px ; height: 177.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SHe8Mfg058-h3u1qS09lXg"] .zpimage-container figure img { width:198px ; height:177.00px ; } } @media (max-width: 767px) { [data-element-id="elm_SHe8Mfg058-h3u1qS09lXg"] .zpimage-container figure img { width:198px ; height:177.00px ; } } [data-element-id="elm_SHe8Mfg058-h3u1qS09lXg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Asset%207.png" width="198" height="177.00" loading="lazy" size="small"/></picture></span></figure></div>
</div></div><div data-element-id="elm_fPpK4YomjhuVBKU2a2RxhA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_LWCNIvQjjl2ykVPP45q4cA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_LWCNIvQjjl2ykVPP45q4cA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud Flows</h3></div>
<div data-element-id="elm_dj4dcooxiboDOBAVcnDj9g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dj4dcooxiboDOBAVcnDj9g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">These allow users to automate workflows between modern (API) cloud-based services. Cloud flows can be automated based on specific triggers, such as the arrival of an email or the creation of a new document in SharePoint.</span><br></p></div>
</div></div></div><div data-element-id="elm_VMzhRuegKSh3xD453AxW5w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_VMzhRuegKSh3xD453AxW5w"].zprow{ border-radius:1px; margin-block-start:12px; } </style><div data-element-id="elm_s3T41DOwrXjS9GRViJ6dig" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_s3T41DOwrXjS9GRViJ6dig"].zpelem-col{ border-radius:1px; margin-block-start:-7px; } </style><div data-element-id="elm__LSHI3vQk_2YQvoeeUgLyA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm__LSHI3vQk_2YQvoeeUgLyA"] div.zpspacer { height:5px; } @media (max-width: 768px) { div[data-element-id="elm__LSHI3vQk_2YQvoeeUgLyA"] div.zpspacer { height:calc(5px / 3); } } </style><div class="zpspacer " data-height="5"></div>
</div></div></div><div data-element-id="elm_DIgPq3wAlVECKMga1oiVCA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_DIgPq3wAlVECKMga1oiVCA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_RtPUhXqjkix0Bbu50WRwqg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_RtPUhXqjkix0Bbu50WRwqg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_R8nVgZO45NdgIK3jty_Y5g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_R8nVgZO45NdgIK3jty_Y5g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:900;color:rgb(0, 27, 76);">Practical Examples</span></h2></div>
<div data-element-id="elm_YvozszUTu71a7I6M7ur3fg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_YvozszUTu71a7I6M7ur3fg"] div.zpspacer { height:13px; } @media (max-width: 768px) { div[data-element-id="elm_YvozszUTu71a7I6M7ur3fg"] div.zpspacer { height:calc(13px / 3); } } </style><div class="zpspacer " data-height="13"></div>
</div></div></div></div></div><div data-element-id="elm_vB1w6CrVm89FhA69hXGylQ" data-element-type="tabheader" data-tab-name="Desktop Flows" data-content-id="elm_iaoNrv42h6CcP4EqSYnkkw" class="zpelement zptab " style="margin-top:0px;" tabindex="0" role="button" aria-label="Desktop Flows"><span class="zptabicon"><svg viewBox="0 0 256 237" xmlns="http://www.w3.org/2000/svg"><path d="M128,0.289999962 L134.690909,6.68999996 L255.709091,127.708182 L242.327273,141.09 L230.4,129.162727 L230.4,227.49 L230.4,236.799091 L221.090909,236.799091 L155.927273,236.799091 L146.618182,236.799091 L146.618182,227.49 L146.618182,143.708182 L109.381818,143.708182 L109.381818,227.49 L109.381818,236.799091 L100.072727,236.799091 L34.9090909,236.799091 L25.6,236.799091 L25.6,227.49 L25.6,129.162727 L13.6727273,141.09 L0.290909091,127.708182 L121.309091,6.68999996 L128,0.289999962 Z M128,26.7627272 L44.2181818,110.544545 L44.2181818,218.180909 L90.7636364,218.180909 L90.7636364,134.399091 L90.7636364,125.09 L100.072727,125.09 L155.927273,125.09 L165.236364,125.09 L165.236364,134.399091 L165.236364,218.180909 L211.781818,218.180909 L211.781818,110.544545 L128,26.7627272 Z" fill-rule="evenodd"></path></svg></span><div><span class="zptab-name">Desktop Flows</span></div>
</div><div data-element-id="elm_iaoNrv42h6CcP4EqSYnkkw" data-element-type="tabcontainer" data-header-id="elm_vB1w6CrVm89FhA69hXGylQ" class="zpelement zptab-content " style="margin-top:0px;"><div class="zptab-element-container"><div data-element-id="elm_V0ZZe15wVzGk7kYN4lYs1A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_V0ZZe15wVzGk7kYN4lYs1A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ebdE_lAOErjt-FseRz8HbA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_YOsWAxZvG-3zGn0y2yJFwA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_YOsWAxZvG-3zGn0y2yJFwA"] .zpimage-container figure img { width: 171.6px !important ; height: 149px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_YOsWAxZvG-3zGn0y2yJFwA"] .zpimage-container figure img { width:171.6px ; height:149px ; } } @media (max-width: 767px) { [data-element-id="elm_YOsWAxZvG-3zGn0y2yJFwA"] .zpimage-container figure img { width:171.6px ; height:149px ; } } [data-element-id="elm_YOsWAxZvG-3zGn0y2yJFwA"].zpelem-image { border-radius:1px; margin-block-start:16px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Asset%206.png" width="171.6" height="149" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div><div data-element-id="elm_dHrL8QyTqRb00R6k7E7XyA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_xiW6grtfK5vzCCwz-nZYjQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_xiW6grtfK5vzCCwz-nZYjQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Desktop Flows</h3></div>
<div data-element-id="elm_xFFmw35HHjmCc-8hR2ymbA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_xFFmw35HHjmCc-8hR2ymbA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Desktop flows enable users to automate workflows between modern (API) cloud-based services and legacy (non-API) systems. They utilize robotic process automation (RPA) to automate user interface interactions on the desktop or web.</span><br></p></div>
</div></div></div><div data-element-id="elm_qCY-tI3ws2njToBVwo5FVg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_qCY-tI3ws2njToBVwo5FVg"].zprow{ border-radius:1px; margin-block-start:12px; } </style><div data-element-id="elm_J_cLiYmovPrHC2TKSoLXjA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_J_cLiYmovPrHC2TKSoLXjA"].zpelem-col{ border-radius:1px; margin-block-start:15px; } </style><div data-element-id="elm_EQR4RI9FXFq4NnsmWIjJsw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_EQR4RI9FXFq4NnsmWIjJsw"] div.zpspacer { height:5px; } @media (max-width: 768px) { div[data-element-id="elm_EQR4RI9FXFq4NnsmWIjJsw"] div.zpspacer { height:calc(5px / 3); } } </style><div class="zpspacer " data-height="5"></div>
</div></div><div data-element-id="elm_2GwEt4_6H0mzVuMmvY8oMw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_2GwEt4_6H0mzVuMmvY8oMw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_2gdOdxbC1nfhDQiUWOyiHw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2gdOdxbC1nfhDQiUWOyiHw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:900;color:rgb(0, 27, 76);">Practical Examples</span></h2></div>
<div data-element-id="elm_Bz1VtIcRkxXghzu5_HUr0w" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_Bz1VtIcRkxXghzu5_HUr0w"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_Bz1VtIcRkxXghzu5_HUr0w"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div><div data-element-id="elm_dVEwHolPmm02P_xLpZFsLw" data-element-type="tabheader" data-tab-name="Business Process Flows" data-content-id="elm_35FAF8Hn7IcH0JV47-Sp0A" class="zpelement zptab " style="margin-top:0px;" tabindex="0" role="button" aria-label="Business Process Flows"><span class="zptabicon"><svg viewBox="0 0 256 237" xmlns="http://www.w3.org/2000/svg"><path d="M128,0.289999962 L134.690909,6.68999996 L255.709091,127.708182 L242.327273,141.09 L230.4,129.162727 L230.4,227.49 L230.4,236.799091 L221.090909,236.799091 L155.927273,236.799091 L146.618182,236.799091 L146.618182,227.49 L146.618182,143.708182 L109.381818,143.708182 L109.381818,227.49 L109.381818,236.799091 L100.072727,236.799091 L34.9090909,236.799091 L25.6,236.799091 L25.6,227.49 L25.6,129.162727 L13.6727273,141.09 L0.290909091,127.708182 L121.309091,6.68999996 L128,0.289999962 Z M128,26.7627272 L44.2181818,110.544545 L44.2181818,218.180909 L90.7636364,218.180909 L90.7636364,134.399091 L90.7636364,125.09 L100.072727,125.09 L155.927273,125.09 L165.236364,125.09 L165.236364,134.399091 L165.236364,218.180909 L211.781818,218.180909 L211.781818,110.544545 L128,26.7627272 Z" fill-rule="evenodd"></path></svg></span><div><span class="zptab-name">Business Process Flows</span></div>
</div><div data-element-id="elm_35FAF8Hn7IcH0JV47-Sp0A" data-element-type="tabcontainer" data-header-id="elm_dVEwHolPmm02P_xLpZFsLw" class="zpelement zptab-content " style="margin-top:0px;"><div class="zptab-element-container"><div data-element-id="elm_-jUMGC7UlM886ZugBFfKgQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_-jUMGC7UlM886ZugBFfKgQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_tp2qR_S_9KbA1Kd2XDvQVw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_35KGsDQLf2_23Uw-M_n9hw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_35KGsDQLf2_23Uw-M_n9hw"] .zpimage-container figure img { width: 241.44px !important ; height: 150px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_35KGsDQLf2_23Uw-M_n9hw"] .zpimage-container figure img { width:241.44px ; height:150px ; } } @media (max-width: 767px) { [data-element-id="elm_35KGsDQLf2_23Uw-M_n9hw"] .zpimage-container figure img { width:241.44px ; height:150px ; } } [data-element-id="elm_35KGsDQLf2_23Uw-M_n9hw"].zpelem-image { border-radius:1px; margin-block-start:26px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Asset%208.png" width="241.44" height="150" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div><div data-element-id="elm_XJEmKyyMWao6rmc_99EkxA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XJEmKyyMWao6rmc_99EkxA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_BpmTxFiIppMJRqArLBNSDA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_BpmTxFiIppMJRqArLBNSDA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Business Process Flows</h3></div>
<div data-element-id="elm_kTClkvEHCywrTvFBxqrJwg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kTClkvEHCywrTvFBxqrJwg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">These enable the automation of multistep, guided processes within an organization, ensuring consistency and efficiency in operations. They can be integrated with Microsoft Power Apps to create visual, guided experiences for users.</span><br></p></div>
</div></div></div><div data-element-id="elm_fnt32EQdE026NdW9j_zbPg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_fnt32EQdE026NdW9j_zbPg"].zprow{ border-radius:1px; margin-block-start:12px; } </style><div data-element-id="elm_IVEU_o9VuQSaHc2fMuuosA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IVEU_o9VuQSaHc2fMuuosA"].zpelem-col{ border-radius:1px; margin-block-start:15px; } </style><div data-element-id="elm_m9iohi32PX7x7uvrOU6Edg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_m9iohi32PX7x7uvrOU6Edg"] div.zpspacer { height:5px; } @media (max-width: 768px) { div[data-element-id="elm_m9iohi32PX7x7uvrOU6Edg"] div.zpspacer { height:calc(5px / 3); } } </style><div class="zpspacer " data-height="5"></div>
</div></div><div data-element-id="elm_YdcsxLJlmpMu6YpRpHcdrQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_YdcsxLJlmpMu6YpRpHcdrQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_b1Y4RzA_mnUn7lPq8QPIcw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_b1Y4RzA_mnUn7lPq8QPIcw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:900;color:rgb(0, 27, 76);">Practical Examples</span></h2></div>
<div data-element-id="elm_OBQaWzCJTg-hU2ljB1i6YQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_OBQaWzCJTg-hU2ljB1i6YQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_OBQaWzCJTg-hU2ljB1i6YQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div></div></div></div></div></div></div></div><div data-element-id="elm_xraUi6Iye1IhMgUI5CHi1g" data-element-type="section" class="zpsection zpdark-section zpdark-section-bg zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " style="background-image:linear-gradient(to bottom, rgba(47, 62, 89, 0.9), rgba(47, 62, 89, 0.9)), url(https://static.zohocdn.com/sites/stock-images/images/zpstock-image-32.jpg);"><style type="text/css"> [data-element-id="elm_xraUi6Iye1IhMgUI5CHi1g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_DUoHJAWLxkKOKWiozKF6QQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_DUoHJAWLxkKOKWiozKF6QQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_6hiRl4zBEsoiur2Mg7_F3g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_6hiRl4zBEsoiur2Mg7_F3g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_CmKB3GD2D4f4unKl3MrQMw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_CmKB3GD2D4f4unKl3MrQMw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Example 1: Automatically Archiving Email Attachments</h2></div>
<div data-element-id="elm_8duDcToKc-0gU3DVQ_FRCg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8duDcToKc-0gU3DVQ_FRCg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">When attachments related to a client are sent, Power Automate can automatically archive them into the appropriate SharePoint folder. This streamlined process saves valuable time otherwise spent searching through emails, ensuring that documents are stored within the correct document library for easy retrieval.</span><br></p></div>
</div><div data-element-id="elm_4zFwcFeRHhVomIjsM_ceMA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_4zFwcFeRHhVomIjsM_ceMA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;">Set up the flow:</p></div>
</div><div data-element-id="elm_zr0_A8BdGICcqaqmephUDQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_zr0_A8BdGICcqaqmephUDQ"] .zpimage-container figure img { width: 602px !important ; height: 403px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_zr0_A8BdGICcqaqmephUDQ"] .zpimage-container figure img { width:602px ; height:403px ; } } @media (max-width: 767px) { [data-element-id="elm_zr0_A8BdGICcqaqmephUDQ"] .zpimage-container figure img { width:602px ; height:403px ; } } [data-element-id="elm_zr0_A8BdGICcqaqmephUDQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Picture1%20Email.png" width="602" height="403" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_HHXY8sr9-rNIpsZHNp3Adw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HHXY8sr9-rNIpsZHNp3Adw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;">Test the flow:</p></div>
</div><div data-element-id="elm_imsqkkVWvriDDFeUoAR30Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_imsqkkVWvriDDFeUoAR30Q"] .zpimage-container figure img { width: 602px !important ; height: 290px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_imsqkkVWvriDDFeUoAR30Q"] .zpimage-container figure img { width:602px ; height:290px ; } } @media (max-width: 767px) { [data-element-id="elm_imsqkkVWvriDDFeUoAR30Q"] .zpimage-container figure img { width:602px ; height:290px ; } } [data-element-id="elm_imsqkkVWvriDDFeUoAR30Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Picture2%20Email.png" width="602" height="290" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_MFVIKz58eQljp4JHqjY6Eg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MFVIKz58eQljp4JHqjY6Eg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;">Run the flow:</p></div>
</div><div data-element-id="elm_mRriXvXkZItfFdDx448iKQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_mRriXvXkZItfFdDx448iKQ"] .zpimage-container figure img { width: 602px !important ; height: 201px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_mRriXvXkZItfFdDx448iKQ"] .zpimage-container figure img { width:602px ; height:201px ; } } @media (max-width: 767px) { [data-element-id="elm_mRriXvXkZItfFdDx448iKQ"] .zpimage-container figure img { width:602px ; height:201px ; } } [data-element-id="elm_mRriXvXkZItfFdDx448iKQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Picture3%20Email.png" width="602" height="201" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_nag5oi9reAc5f5Z5GLVTzw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nag5oi9reAc5f5Z5GLVTzw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;">Power Automate also displays approval details:</p></div>
</div><div data-element-id="elm_s3pPLGbabbXQWLuH3sMa4A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_s3pPLGbabbXQWLuH3sMa4A"] .zpimage-container figure img { width: 602px !important ; height: 238px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_s3pPLGbabbXQWLuH3sMa4A"] .zpimage-container figure img { width:602px ; height:238px ; } } @media (max-width: 767px) { [data-element-id="elm_s3pPLGbabbXQWLuH3sMa4A"] .zpimage-container figure img { width:602px ; height:238px ; } } [data-element-id="elm_s3pPLGbabbXQWLuH3sMa4A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Picture4%20Email.png" width="602" height="238" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_iHiUKQ01EPMUDtJpBwtzfQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_iHiUKQ01EPMUDtJpBwtzfQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><h2>Example 2: Streamlining Holiday Requests and Approvals</h2></div></blockquote></blockquote></blockquote></blockquote></h2></div>
<div data-element-id="elm_BLzXKObvR0qupxkgANmz1A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BLzXKObvR0qupxkgANmz1A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>To efficiently manage employee time off, automating the approval process is essential. Power Automate facilitates this by automatically sending leave requests to managers and notifying them of responses. In our organization, we've implemented a Microsoft Power App to manage employee holidays, seamlessly integrating Power Automate for the request and approval process.</p></div></div>
</div><div data-element-id="elm_MFKu5JHYULkUAbbWJW2QXA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_MFKu5JHYULkUAbbWJW2QXA"] .zpimage-container figure img { width: 607.1px !important ; height: 255px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_MFKu5JHYULkUAbbWJW2QXA"] .zpimage-container figure img { width:607.1px ; height:255px ; } } @media (max-width: 767px) { [data-element-id="elm_MFKu5JHYULkUAbbWJW2QXA"] .zpimage-container figure img { width:607.1px ; height:255px ; } } [data-element-id="elm_MFKu5JHYULkUAbbWJW2QXA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Screenshot%202024-03-12%20110951.png" width="607.1" height="255" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_ma-k5X_W_Ji8vMOB7FnqSQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ma-k5X_W_Ji8vMOB7FnqSQ"] .zpimage-container figure img { width: 607.68px !important ; height: 167px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ma-k5X_W_Ji8vMOB7FnqSQ"] .zpimage-container figure img { width:607.68px ; height:167px ; } } @media (max-width: 767px) { [data-element-id="elm_ma-k5X_W_Ji8vMOB7FnqSQ"] .zpimage-container figure img { width:607.68px ; height:167px ; } } [data-element-id="elm_ma-k5X_W_Ji8vMOB7FnqSQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Screenshot%202024-03-12%20111306.png" width="607.68" height="167" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_t_Kloy6ycAoocIezIze2DA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_t_Kloy6ycAoocIezIze2DA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><h2>Example 3: Document Approval and Team Notification via Teams</h2></div></blockquote></blockquote></blockquote></blockquote></h2></div>
<div data-element-id="elm_77EmF12ekGPFCyDTj4PdZg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_77EmF12ekGPFCyDTj4PdZg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:12pt;">Critical documents often require approval before dissemination, a process that can be tedious and time-consuming. With Power Automate, document approval workflows can be automated within SharePoint. When a new document is uploaded, an approval request is initiated, and team members are notified via Microsoft Teams. For instance, at the project's outset, various documents may need approval before progress can proceed. Power Automate can streamline this process by automatically notifying relevant team members via Teams, ensuring timely approvals and project momentum.</span></span><br></p></div>
</div><div data-element-id="elm_gG7ny8rG_menB0oI1lTsuA" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_gG7ny8rG_menB0oI1lTsuA"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="315" src="//www.youtube.com/embed/CHqQz9Azfm8?enablejsapi=1" frameborder="0" allowfullscreen id=youtube-video-1 data-api=youtube></iframe></div>
</div><div data-element-id="elm_xJnpFuW3fKj4BTen9_Y9pQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_xJnpFuW3fKj4BTen9_Y9pQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div style="color:inherit;"><h2>Example 4: Info Mailers</h2></div></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></h2></div>
<div data-element-id="elm_j-Vya6xPln8etrJpWMkQBg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_j-Vya6xPln8etrJpWMkQBg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">At GT we have Info Mailers hard at work in the Morning Report which is sent daily at 8AM to the entire company.&nbsp;</span><span style="color:inherit;">With the GT Morning Report everyone in the company regardless of location knows all the important info before they start their day. The Support staff can react to open calls, The Project managers can resource plan in case of ill staff, and finance can choose when to make international payments based on the exchange rate. This mailer helps make the staff more proactive, more educated and more informed with data to assist them navigate their day.</span><br></p></div>
</div><div data-element-id="elm_l75Tp_DYJAW71fw2MXBFqA" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_l75Tp_DYJAW71fw2MXBFqA"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="315" src="https://www.youtube.com/embed/uUFXoOjvFmM?si=N_4UKUHG_UosVmUW" frameborder="0" allowfullscreen></iframe></div>
</div><div data-element-id="elm_oJ10jvxbuW6QsWlwIZtHGA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oJ10jvxbuW6QsWlwIZtHGA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>These are not the only examples, t<span style="font-size:16px;color:inherit;">he application of Power Automate presents a multitude of uses. It has the potential to elevate productivity and simplify cumbersome tasks for organizations of all sizes.</span></p></div>
</div><div data-element-id="elm_D49VfKm_8zoUFWJHf2l3_Q" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_D49VfKm_8zoUFWJHf2l3_Q"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_D49VfKm_8zoUFWJHf2l3_Q"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div><div data-element-id="elm_evyTk54S6Q-Di_Hz9zAd4g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_evyTk54S6Q-Di_Hz9zAd4g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_whixPMr-IVMmxEMWs8WyVQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_5zuKTDMq0i2kOzjJtRpC4Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_27gliGxfvj8eogL13Su6Iw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_27gliGxfvj8eogL13Su6Iw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="font-weight:900;color:rgb(0, 27, 76);">In Conclusion</span></h2></div>
<div data-element-id="elm_KjYyQChJxyBp2QE3zfWRFg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-center " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_egq5kDqJ_gn9iaa-jJrOgg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_egq5kDqJ_gn9iaa-jJrOgg"].zpelem-col{ border-radius:1px; margin-block-start:-27px; } </style><div data-element-id="elm_URRz2Eg9jfPhzctUbHrnhQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width10 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_fmtyBtoQNojn0avn8RQJBw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_fmtyBtoQNojn0avn8RQJBw"] div.zpspacer { height:3px; } @media (max-width: 768px) { div[data-element-id="elm_fmtyBtoQNojn0avn8RQJBw"] div.zpspacer { height:calc(3px / 3); } } </style><div class="zpspacer " data-height="3"></div>
</div></div></div></div></div><div data-element-id="elm_mPWiAFE5qP2LGM4mJAN8WA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_J96NsWy9a4rPslzGlGl9Mg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_J96NsWy9a4rPslzGlGl9Mg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_-BRuqIZ64rVC0FA7mM2WSg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-BRuqIZ64rVC0FA7mM2WSg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Power Automate stands as a transformative tool within SharePoint, revolutionizing how organizations manage workflows, automate processes, and enhance collaboration. Through its intuitive interface and robust functionality, Power Automate empowers users to streamline document management, automate approval workflows, and integrate with a myriad of external applications and services seamlessly.</div><br><div>By harnessing the power of Power Automate, organizations can unlock new levels of agility, productivity, and innovation. Whether it's automating repetitive tasks, enforcing compliance, or accelerating decision-making processes, Power Automate enables organizations to stay ahead in today's fast-paced digital landscape.</div><br><div>As organizations continue to embrace digital transformation, the integration of Power Automate with SharePoint emerges as a strategic imperative. By leveraging the synergies between these platforms, organizations can drive operational excellence, foster collaboration, and propel business growth.</div><br><div>In essence, Power Automate in SharePoint represents a paradigm shift in how organizations leverage technology to streamline processes, maximize productivity, and achieve their business objectives. As we look towards the future, the possibilities with Power Automate are limitless, empowering organizations to redefine what's possible in the realm of workflow automation and collaboration.</div></div>
</div></div><div data-element-id="elm_PEitEStFyO9CooFu8jqxjw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_PEitEStFyO9CooFu8jqxjw"] div.zpspacer { height:0px; } @media (max-width: 768px) { div[data-element-id="elm_PEitEStFyO9CooFu8jqxjw"] div.zpspacer { height:calc(0px / 3); } } </style><div class="zpspacer " data-height="0"></div>
</div></div></div><div data-element-id="elm_a4QOuiZSMKGlyolHyFLWCA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_a4QOuiZSMKGlyolHyFLWCA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_iH98eUNfO0barXc_hZH-Mg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_iH98eUNfO0barXc_hZH-Mg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HU1aELG6QFyN19FKLGEz-w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_HU1aELG6QFyN19FKLGEz-w"] .zpimagetext-container figure img { width: 139px !important ; height: 152.3px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_HU1aELG6QFyN19FKLGEz-w"] .zpimagetext-container figure img { width:139px ; height:152.3px ; } } @media (max-width: 767px) { [data-element-id="elm_HU1aELG6QFyN19FKLGEz-w"] .zpimagetext-container figure img { width:139px ; height:152.3px ; } } [data-element-id="elm_HU1aELG6QFyN19FKLGEz-w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/GT_icon_gr-1.png" width="139" height="152.3" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">At GTconsult, we specialize in empowering organizations to harness the full potential of Power Automate and SharePoint integration. Our team of experts is dedicated to helping you unleash the transformative power of automation, optimize collaboration, and drive business growth.</span><br></p><p>&nbsp;&nbsp;&nbsp;&nbsp;</p><p>Ready to revolutionize your workflows and unlock new levels of efficiency? Contact GTconsult today to discover how our tailored solutions and expertise can propel your organization towards digital excellence. Together, let's embark on a journey of innovation, efficiency, and success with Power Automate and SharePoint.</p></div></div>
</div></div><div data-element-id="elm_A-fSTkDImS6pDND-s0Qpsg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_A-fSTkDImS6pDND-s0Qpsg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/contact" target="_blank" title="Contact us"><span class="zpbutton-content">Let's Talk!</span></a></div>
</div></div></div><div data-element-id="elm_Qlq4JuobC2cAPwEgr4TKXQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-center " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_yK6d23Rfg_1Rk58KLOLyng" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Bawf-1NkIE8AGpEd7jKEwQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_Bawf-1NkIE8AGpEd7jKEwQ"] div.zpspacer { height:22px; } @media (max-width: 768px) { div[data-element-id="elm_Bawf-1NkIE8AGpEd7jKEwQ"] div.zpspacer { height:calc(22px / 3); } } </style><div class="zpspacer " data-height="22"></div>
</div></div></div></div></div><div data-element-id="elm_n4OWGTq2JDdf3VeDaPb9oA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " style="background-image:linear-gradient(to bottom, rgba(30, 34, 45, 0.8), rgba(30, 34, 45, 0.8)), url(https://static.zohocdn.com/sites/stock-images/images/zpstock-image-08.jpg);"><style type="text/css"> [data-element-id="elm_n4OWGTq2JDdf3VeDaPb9oA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_nc1qdDsuMy21zM_2TZyCPA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_nc1qdDsuMy21zM_2TZyCPA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_rMPe1FADspqQcv4USYC0EA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_rMPe1FADspqQcv4USYC0EA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_sWA9cUNP3NVOYs1W6F7GSA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sWA9cUNP3NVOYs1W6F7GSA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:28px;font-weight:700;color:rgb(255, 255, 255);font-family:&quot;Noto Sans&quot;, sans-serif;">Keep Reading</span></p><p style="text-align:center;"><span style="font-weight:400;color:rgb(255, 255, 255);font-family:Nunito;">Check out our other blogs below:</span><br></p></div>
</div><div class="zpelement zpelem-carousel " data-element-id="elm_8JG_mPGHeCHwtm0_3kyYGQ" data-element-type="carousel" data-currentslide-index="0" data-transition="slide_left" data-slider-interval="5000" data-zs-autoslide="true" data-zs-slidepause-option="false" data-zs-slider="min-height-el: zpcarousel-content-container;arrow-cont: zpcarousel-arrows-container; active-controller: zpcarousel-controller-active; controller-cont: zpcarousel-controller-container; controller: zpcarousel-controller; right-arrow: zpcarousel-arrow-right; left-arrow: zpcarousel-arrow-left;active-slide:zpcarousel-content-active; slide: zpcarousel-content; slides-cont: zpcarousel-content-container;content-cont : zpcarousel-content-inner; background: false;slide-pause-btn:zpcarousel-pause-btn;slide-play-btn:zpcarousel-play-btn;"><div class="zpcarousel-container zpcarousel-style-01"><style></style><div class="zpcarousel-content-container"><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_RHWONVhxQAhY2JBEhugujA" data-slide-name="Slide 1"><div class="zpcarousel-content-inner"><div data-element-id="elm_emnSIVOZ1Xx16lgu00APwg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_emnSIVOZ1Xx16lgu00APwg"].zprow{ border-radius:1px; } </style><div data-element-id="elm__DKXvQ2Mfxn1rlU2GirQ9g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm__DKXvQ2Mfxn1rlU2GirQ9g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_3rGVQnzHakaSYh4j14LIDw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_3rGVQnzHakaSYh4j14LIDw"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_3rGVQnzHakaSYh4j14LIDw"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_3rGVQnzHakaSYh4j14LIDw"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_3rGVQnzHakaSYh4j14LIDw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/sharepoint-intranets-an-overview" target="_blank" title="SharePoint Intranet" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/SharePoint%20Intranets.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">SharePoint Intranets: An Overview</span></p></div>
</div></div></div><div data-element-id="elm_gVuh-01K6eUBHawQP-40ag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_gVuh-01K6eUBHawQP-40ag"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1MUFdoKMK7LdZp2HUBtIAg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_1MUFdoKMK7LdZp2HUBtIAg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_1MUFdoKMK7LdZp2HUBtIAg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_1MUFdoKMK7LdZp2HUBtIAg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_1MUFdoKMK7LdZp2HUBtIAg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/creating-a-knowledge-base-in-sharepoint-your-complete-guide" target="_blank" title="Creating a knowledge base in SharePoint" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Knowledge%20base.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Creating a knowledge base in SharePoint</span></p></div>
</div></div></div><div data-element-id="elm_CeDV6n7FrWE6hsx32PqtGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_CeDV6n7FrWE6hsx32PqtGA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_pUWJbf2zTfKBPM8MPNcxaA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_pUWJbf2zTfKBPM8MPNcxaA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_pUWJbf2zTfKBPM8MPNcxaA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_pUWJbf2zTfKBPM8MPNcxaA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_pUWJbf2zTfKBPM8MPNcxaA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank" title="SharePoint Permissions" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Permissions%202.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Let's talk SharePoint permissions</span><br></p></div>
</div></div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_YaypUieH55krn5YXb1x7ig" data-slide-name="Slide 2"><div class="zpcarousel-content-inner"><div data-element-id="elm_78_C12p_L7VwjMTJFZ2mDQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_78_C12p_L7VwjMTJFZ2mDQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_WdFlMQ67bwNBk4XD1wUxOw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_WdFlMQ67bwNBk4XD1wUxOw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_7_KFbCpBBdRCCa_K_jON1w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_7_KFbCpBBdRCCa_K_jON1w"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_7_KFbCpBBdRCCa_K_jON1w"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_7_KFbCpBBdRCCa_K_jON1w"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_7_KFbCpBBdRCCa_K_jON1w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Chair%20Write%20Up.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;"><a href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" title="Micro-moments, Macro-impact&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;" target="_blank" rel="" style="color:rgb(255, 255, 255);">Micro-moments, Macro-impact</a><a href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" title="Micro-moments, Macro-impact&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;" target="_blank" rel=""><span style="color:rgb(255, 255, 255);">&nbsp;</span><span style="color:inherit;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></a><span style="color:inherit;">&nbsp; &nbsp; &nbsp; &nbsp;</span></span><br></p></div>
</div></div></div><div data-element-id="elm_eCIDpNW0MjY03g0BZsvJtA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_eCIDpNW0MjY03g0BZsvJtA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_KdR1D5hpS3iuxEHBiodQ6A" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_KdR1D5hpS3iuxEHBiodQ6A"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_KdR1D5hpS3iuxEHBiodQ6A"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_KdR1D5hpS3iuxEHBiodQ6A"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_KdR1D5hpS3iuxEHBiodQ6A"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/Expert-Insights-Why-and-How-to-Migrate-to-SharePoint-SE" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Migration%20Write%20Up%20Thumbnail%202.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Expert insights: Why and how to migrate to SharePoint SE</span></p></div>
</div></div></div><div data-element-id="elm_07M8f2KsjW-ByqxPBwU3VA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_07M8f2KsjW-ByqxPBwU3VA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Z8-jVO8O2zWQFNXiVB3juQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_Z8-jVO8O2zWQFNXiVB3juQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_Z8-jVO8O2zWQFNXiVB3juQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_Z8-jVO8O2zWQFNXiVB3juQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_Z8-jVO8O2zWQFNXiVB3juQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/powerapps-in-sharepoint" target="_blank" title="PowerApps" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Power%20Apps.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">PowerApps in SharePoint</span><br></p></div>
</div></div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_bOsbP-5DLeEplStt6jyhwA" data-slide-name="Slide 3"><div class="zpcarousel-content-inner"><div data-element-id="elm_VINKxcdqCXS_3cAngeS8Tw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_VINKxcdqCXS_3cAngeS8Tw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_nN9pzsT-FbTVaWOLzM4LwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nN9pzsT-FbTVaWOLzM4LwQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_edF_FUV11FcuUWqSEw7u5w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_edF_FUV11FcuUWqSEw7u5w"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_edF_FUV11FcuUWqSEw7u5w"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_edF_FUV11FcuUWqSEw7u5w"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_edF_FUV11FcuUWqSEw7u5w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/gtconsult-your-trusted-microsoft-solutions-partner-for-modern-work" target="_blank" title="Microsoft Partner" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Microsft%20Partner%20Thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">GTconsult: Your trusted Microsoft<a href="https://www.gtconsult.com/blogs/post/gtconsult-your-trusted-microsoft-solutions-partner-for-modern-work" title="Microsoft partner" target="_blank" rel=""></a> Solutions Partner for Modern Work&nbsp;</span><br></p></div>
</div></div></div><div data-element-id="elm_QDMqTOJJN4Ly0hqkgQmWRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_QDMqTOJJN4Ly0hqkgQmWRQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_lugI_T-6GkpvEQ1E7RsH-Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_lugI_T-6GkpvEQ1E7RsH-Q"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_lugI_T-6GkpvEQ1E7RsH-Q"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_lugI_T-6GkpvEQ1E7RsH-Q"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_lugI_T-6GkpvEQ1E7RsH-Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/sharepoint-migration-checklist" target="_blank" title="Migration Check list" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Checklist%2016%20by%209.png" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><p><span style="font-size:20px;color:rgb(255, 255, 255);">SharePoint Migration Checklist<a href="https://www.gtconsult.com/sharepoint-migration-checklist" title="Migration Check list" target="_blank" rel=""></a></span><br></p><div style="color:inherit;"><span style="font-size:20px;"><br></span></div></div></div>
</div></div></div><div data-element-id="elm_55si0YqnLFYwk-Ru3J05Jw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_55si0YqnLFYwk-Ru3J05Jw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_iSkn7GegaOSf0dt6OqxFFg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_iSkn7GegaOSf0dt6OqxFFg"] .zpimagetext-container figure img { width: 307px ; height: 172.57px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_iSkn7GegaOSf0dt6OqxFFg"] .zpimagetext-container figure img { width:723px ; height:406.40px ; } } @media (max-width: 767px) { [data-element-id="elm_iSkn7GegaOSf0dt6OqxFFg"] .zpimagetext-container figure img { width:415px ; height:233.27px ; } } [data-element-id="elm_iSkn7GegaOSf0dt6OqxFFg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/cci-case-study" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/CCI%20Case%20Study.png" width="415" height="233.27" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">CCI Case Study</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div></div></div></div></div></div><div class="zpcarousel-arrows-container zpcarousel-arrow-type-01" data-arrow-style="2"><div class="zpcarousel-arrow-left" tabindex="0" role="button" aria-label="Previous"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path d="M0,16c0,0.3,0.1,0.5,0.3,0.7l9.9,10c0.4,0.4,1,0.4,1.4,0c0.4-0.4,0.4-1,0-1.4L3.4,17H31 c0.6,0,1-0.5,1-1s-0.4-1-1-1H3.4l8.2-8.3c0.4-0.4,0.4-1,0-1.4c-0.4-0.4-1-0.4-1.4,0l-9.9,10C0.1,15.5,0,15.7,0,16z"></path></svg></div>
<div class="zpcarousel-arrow-right" tabindex="0" role="button" aria-label="Next"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path id="arrow-right-style2-Arrow_Forward" d="M32,16c0-0.3-0.1-0.5-0.3-0.7l-9.9-10c-0.4-0.4-1-0.4-1.4,0c-0.4,0.4-0.4,1,0,1.4 l8.2,8.3H1c-0.6,0-1,0.5-1,1s0.4,1,1,1h27.6l-8.2,8.3c-0.4,0.4-0.4,1,0,1.4c0.4,0.4,1,0.4,1.4,0l9.9-10C31.9,16.5,32,16.3,32,16z"></path></svg></div>
</div><div class="zpcarousel-controller-container zpcarousel-controller-type-01"><svg class="zpcarousel-pause-btn" tabindex="0" role="button" aria-label="Pause" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M3.85.53C3.6.5 3.34.5 3.07.5 1.68.5.95 1.09.95 2.18V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01ZM11.43.53C11.18.5 10.92.5 10.65.5c-1.39 0-2.12.59-2.12 1.68V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01Z"/></svg><svg class="zpcarousel-play-btn" tabindex="0" role="button" aria-label="Play" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M.59 7.02C.57 5.33.57 3.63.51 1.94.45.63 1.72-.17 2.9.45c3.2 1.68 6.42 3.32 9.64 4.96.59.3.95.76.96 1.43 0 .66-.34 1.11-.91 1.43-3.18 1.75-6.35 3.5-9.52 5.25-1.2.66-2.39-.04-2.41-1.41C.63 10.42.61 8.72.59 7.03Z"/></svg><div class="zpcarousel-controller zpcarousel-controller-active" data-slide-index="0"></div>
<div class="zpcarousel-controller " data-slide-index="1"></div><div class="zpcarousel-controller " data-slide-index="2"></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 12 Mar 2024 12:40:58 +0000</pubDate></item><item><title><![CDATA[Sujata Excels in MS 900 Exam!]]></title><link>https://www.gtconsult.com/blogs/post/sujata-excels-in-ms-900-exam</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Sujata Thumbnail.jpg"/>With six years of experience in testing and quality control, Sujata has become highly skilled and knowledgeable in her field. Her tenure at GT for nea ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_0qtso2nASkeaKV11QKiimQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PGlbe2GHRq-8MdioXn_yAg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_BUoaXPGuT6a4wQoivZ2KhQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qLtAQfTvTyW_qfPP8SQXMw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qLtAQfTvTyW_qfPP8SQXMw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p align="center"><span style="font-size:22.5pt;">Sujata&nbsp;Excels in MS 900 Exam!&nbsp;</span></p></div></div></h2></div>
<div data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"] .zpimagetext-container figure img { width: 435px !important ; height: 613.5px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"] .zpimagetext-container figure img { width:435px ; height:613.5px ; } } @media (max-width: 767px) { [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"] .zpimagetext-container figure img { width:435px ; height:613.5px ; } } [data-element-id="elm_SbrNyRcUM7BnEXhxKV6xcw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/The%20Team/sujata-gtconsult.com.jpg" width="435" height="613.5" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="font-size:12px;"><p><span style="font-size:11pt;">With six years of experience in testing and quality control, Sujata has become highly skilled and knowledgeable in her field. Her tenure at GT for nearly two years has demonstrated her immense value as an asset to the team.&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">Driven by her desire to enhance her skills, Sujata recently embarked on a journey to improve herself further by taking the MS 900 Microsoft Fundamentals exam.&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">The MS 900 exam is specifically designed for individuals seeking to demonstrate their foundational understanding of cloud-based solutions that enhance productivity and collaboration in various settings, including on-site, at home, or a combination of both.&nbsp;</span></p></div><div style="font-size:12px;"><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div style="font-size:12px;"><p><a href="https://learn.microsoft.com/en-us/certifications/exams/ms-900/" target="_blank" rel="noreferrer noopener"><span style="font-size:11pt;">https://learn.microsoft.com/en-us/certifications/exams/ms-900/</span></a><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:11pt;"><br></span></p><div style="color:inherit;"><div><p><span style="font-size:11pt;">You might be wondering how Sujata fared in this exam. Well, it would be rather awkward if we were to write about an exam she didn't pass, wouldn't it? Fortunately, not only did she pass, but she did so with flying colors!&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">When asked about her motivation to pursue this certification, Sujata expressed her belief that it would enable her to better serve clients.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">“If a client asks me anything about SharePoint, I can answer them smartly and confidently. Previously, I was a little bit confused when it came to the differences and the functionalities under SharePoint. Now, I know it better.”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">She also emphasized how the certification has benefited her testing process, particularly in understanding requirements and finding improved ways to optimize SharePoint.&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><div style="color:inherit;"><div><p><span style="font-size:11pt;">Sujata's commitment to achieving her goal was evident in her rigorous exam preparation. She attributed her success to the comprehensive 500-page book &quot;Microsoft 365 Fundamentals&quot; by Craig Zacker, noting that studying this resource helped her gain a deeper understanding and ultimately pass the exam.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">“Because I’m a tester, I don’t work in the back end, so I don’t know the coding and other stuff. That’s why this book was really helpful.”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Sujata also expressed gratitude towards her colleagues for their contributions to her success, including recommending study materials, offering study strategies, and providing encouragement.&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Upon learning of her results, Sujata described her elation, admitting to feeling a bit nervous before the exam, unsure of what to expect.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">“When I finished, I closed my eyes, opened them a little and saw, OK, I passed. I was literally dancing. And then I realized, OK, the camera is still on, they are still recording.”&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Sujata's unwavering dedication to her work and constant pursuit of self-improvement are truly commendable. It is no surprise that she already has her sights set on the next certification, which we will undoubtedly be eager to share here.&nbsp;</span></p></div><div><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div><div><p><span style="font-size:11pt;">Sujata, your hard work, and commitment to excellence are truly inspiring. Keep shining brightly! We eagerly anticipate witnessing your future accomplishments.&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div></div></div></div></div></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 01 Jun 2023 09:06:48 +0000</pubDate></item><item><title><![CDATA[To leave or not to leave.... what are the alternatives? ]]></title><link>https://www.gtconsult.com/blogs/post/to-leave-or-not-to-leave....-what-are-the-alternatives</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.comhttps://images.unsplash.com/photo-1522033601-8c44cd8cb261?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MXw0NTc5N3wwfDF8c2VhcmNofDV8fGVub3VnaHxlbnwwfHx8&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Whatsapp caused the first controversy of 2021. What would a fragmented messaging industry look like? are you prepared to chat to all of your current Whatsapp contacts across multiple platforms? What are your options come February 8?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_dt5BF_VCSm-SRWf_gcbbew" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hhbkLy5DSTOeMSLwSbfYfw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_h_2hNFsYRg2a3R5Vzafe5Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_fxXjK8IYS2aQN0CTzLrHzA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Whatsapp has caused the first controversy of 2021. What alternatives do you have come February 8?</h2></div>
<div data-element-id="elm_goW3nDIjRdCaaHokzTAXCw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1599382103240-5f2a57137d28?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=MXw0NTc5N3wwfDF8c2VhcmNofDJ8fHdoYXRzYXBwfGVufDB8fHw&ixlib=rb-1.2.1&q=80&w=1080"><span><br></span></p><p style="text-align:left;"><span><br></span></p><p style="text-align:left;"><span>The dust has barely settled from the New Years celebrations and we are already into our first drama of 2021. Whatsapp has decided to update its privacy statement which apparently allows it to sell certain information to Facebook. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Predictably, this has left a sour taste in many peoples mouths with a significant number of Whatsapp users exiting stage left. The world is being run by data and we are very protective of our privacy. So, what are the alternatives to Whatsapp and are they any better? Let us unpack this debate. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Go back to the beginning</span></b></p><p style="text-align:left;"><span>To fully appreciate the issue, we need to start at the beginning. I read an interview on Moneyweb where Moneyweb journalist, Dudu Ramela, spoke to Arthur Goldstuck, CEO of World Wide Worx, to unpack the issue. The written transcript of the interview, as well as an audio version, <a href="https://www.moneyweb.co.za/moneyweb-radio/safm-market-update/updated-policy-results-in-mass-exodus-of-whatsapp-users/">can be found here</a>.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: What is it that one needs to know to make an informed decision about whether to stay or to go?</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Thank you, Dudu. The first thing to know is that, if you do go, it means that you will not be able to keep in contact with most of your connections – family, friends, contacts – using WhatsApp as the main communication channel. If you use email primarily, if you use SMS or voice, or even Facebook Messenger for that matter, you will find that WhatsApp in South Africa is used by more than half the population. So, you have got to consider that before looking at all the other issues.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There are two main issues that people are concerned about. The one is that people think this means Facebook would have access to the content of the chat – and that is not true. Facebook cannot access the content of any WhatsApp chat because it is encrypted. There are exceptions if you are involved in criminal activity, or [authorities] believe that you are a suspect or a person of interest in a terrorism case. Then they have the right to use various tools and techniques to access those messages. But besides those extreme circumstances, the contents of your messaging are completely secure.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The real issue here is that they are going to allow Facebook and WhatsApp to combine information about usage of the apps and your smartphone. So, if you use WhatsApp, for example, it automatically has access to your entire contacts list. And, in effect, that is what Facebook is telling you to share – from WhatsApp to Facebook – so they can target you more accurately based on how many people you are in touch with, what kinds of communication you have with those people, not what is in it. But the fact that you are involved in video communication, for example, could be used to target advertising at you.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>But, generally speaking, they can access your location data, the speed of your phone, or the battery level of your phone, to tell you are the kind of person who often lets your phone run down, for example, or who your real mobile operator is. All of that kind of information starts adding up to create a profile that allows their advertisers to target you more precisely.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Is it just WhatsApp, or are there plenty of other applications that actually do this? Dies it really matter.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: If you consider the extent to which you have been giving permission to Google over the years, then you could say that it does not make a difference because, if you use an Android phone, really Google has access to all your phone information and your current behaviour – not the contents, but certainly the activity. And then if you combine that with Google Search, for example, and Gmail and Google Maps and YouTube, suddenly they have a vast picture of who you are, what you search for, and what you buy. That is where you have really given up your privacy. So, it is the same situation that applies now with Facebook and WhatsApp and Instagram, combining all the data on you so they start taking a big picture.&nbsp; So, to avoid that, you have got to go to a completely independent messaging app.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Facebook has been hacked on a number of occasions. A lot of people are also worried about privacy in terms of security.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Security of the contents of your messages tends not to be an issue. It is the security of your personal data that becomes an issue. Facebook has not plugged the hole that allowed hackers, for example, to send you a link pretending, for example, that it is a video that includes something about you, or something embarrassing about you. You click on that link and what you really do is give permission to access your account, and that then starts giving access to deeper levels of information about you. Ultimately, they are looking for bank-account information and the ability to access your financial data as well as the actual money.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: What are the alternatives?</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Of two alternatives on the market at the moment the best known one is Telegram, which was started by Russian developers and in fact is not what you might call a pro-Russian app, because the Russian authorities banned it for two years because they refused to co-operate with them. That is perhaps the most widely used of the more secure apps. It does not share your information with any other application, so it does not allow any advertisers to build up a profile about you. You also have a desktop version of it, for example. So that is a little trick that WhatsApp introduced not too long ago.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The other big one is Signal. Signal was developed by, among others, the person who created WhatsApp, so he understands what it takes to create this kind of application, but also what the issues were. The reason that he left Facebook was because he disagreed with the direction of WhatsApp. And Signal is partly in response to that. So Signal is probably the most secure and the least likely to share your information or make your information available to any other application.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Who is regulating all of these social media platforms in terms of making sure that users’ data is not abused, if you will.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Here is the real problem. Regulators have been asleep at the wheel because it is technology and regulators tend to be the establishment’s real old-timers, even running governments around the world. They tend to have the courts behind the times in terms of the significance of these apps and also how widespread their use is. Only now, for example, are American antitrust authorities starting to look at the issue of whether Facebook should be allowed to integrate Instagram into its services. Because Instagram goes way back to 2011, at that stage the transaction was approved because the regulators had no idea of its significance.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The same with WhatsApp in 2014. So, Facebook is now arguing, hey, this is a moot issue because you already gave us approval back then. The difference is back then they had no idea of the extent to which so much information could be aggregated across all of these apps.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Interesting. It has got a lot of people talking, and we will see what happens come February 8, whether people will leave or stay with WhatsApp.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Greener pastures?</span></b></p><p style="text-align:left;"><span>So where to from here? It does sound a bit dodgy that Facebook does not want to read your messages but wants to access our personal information such as contact lists and geolocations. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>So, what are the alternatives? There are two that seem to be very popular in South Africa, and one that may prove to be popular going forward. A <a href="https://indianexpress.com/article/technology/techook/whatsapp-alternatives-signal-telegram-viber-faq-and-features-7138298/">recent article by the Indian Express</a> discussed these in detail. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Signal</span></b></p><p style="text-align:left;"><span>The article points out that, currently, the best alternative to WhatsApp if one were to consider the security features and the fact that this is run by a non-profit firm.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Security Features. It has end-to-end encryption based on the Signal protocol, built by American cryptographer Moxie Marlinspike, who is also the CEO of Signal. It means no third-party or even Signal can read your messages. The Signal protocol is open source, which is another good thing. Signal does not support third-party backups either, which is actually a good thing. All data remains stored locally on the device, and if you do lose access to the device and try to set up Signal on another phone, your previous chat history is lost;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Cross-Platform. Yes, the private messaging app can be used across platforms from Android, iOS, iPad, Mac, Windows and Linux as well. Signal is quite easy to use. The app shows the name of the contacts that are on Signal, which makes it easy for you to connect;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Free or paid? Ads? Signal is totally free. The app is run by a non-profit. Former WhatsApp co-founder Brian Acton helped found the Signal foundation along with Marlinspike, and has also poured in $50 million to fund the app. It does not sell your data or monetise it and does not have advertisements;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Groups, video, and audio calls. Yes, it supports Group features with a maximum of 150 members. It has recently added Group video calls. The app also supports regular video and audio calls, which are also end-to-end encrypted;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Disappearing Messages. Yes, you can turn on disappearing messages for each chat, which is great. The time can be set by you ranging from five seconds to one week;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Screen Lock, Other features. Yes, there is a screen lock feature. You can also set a PIN to the Signal account to keep your account secure. There is also an incognito keyboard option, which basically does not allow your keyboard to save what you are typing. Other features include fingerprint lock, read Receipts, location sharing, relay calls, archive chats, and more. There is also a feature called Message Requests, which gives you the option to block, delete, or accept messages from an unknown person. Signal lets you react to any message with emojis. You also get the option to not allow a user to take chat screenshots. In order to add anyone in a group, the individual will be required to accept the group invitation, unlike WhatsApp. The storage management of the app is really good and quite similar to WhatsApp. You can clear messages, remove videos or images, and check different files in the storage management tool;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Data collected. The key priority of Signal is user privacy, which is why the app does not collect any user data, as per the privacy labels provided on the App Store. The app only stores your phone number or contact information.&nbsp; When it comes to data collection, this is one of the most minimal apps out there. You can learn more about the Signal app here.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Telegram</span></b></p><p style="text-align:left;"><span>The Indian Express article adds that Telegram is another popular alternative Whatsapp and you will likely find a lot of your friends there. A user will not really find it difficult to switch to this app as it is simple to use and has most of the WhatsApp users. In fact, some of the Telegram features are not present in WhatsApp.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Security features. Telegram is encrypted, and it is open source, though in the past issues have been raised about its encryption. While normal chats are not end-to-end encrypted, as they are on Signal and WhatsApp, if you start a secret chat on Telegram, it is secured and does not get saved. You can also set a timer to destruct these secret chat messages. To protect the data that is not covered by end-to-end encryption, the company uses a distributed infrastructure. Regarding the issue over end-to-end encryption, Telegram CEO Pavel Durov wrote in a blog, “We rely on our own distributed cross-jurisdictional encrypted cloud storage which we believe is much more protected,” compared to say Apple or Google;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Cross-platform. Yes, it is a cross-platform app, which is available on Android, iOS, Mac, Windows. Given it relies on its own cloud backup, Telegram ensures that when you set up the app on a different device, the entire chat history is retained;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Free or paid? Ads? Telegram is free. It is an ad-free service for now. But Telegram recently announced its monetisation plans as the company says the project of this “size needs at least a few hundred million dollars per year to keep going.” The service also confirmed that the advertisement interface will be user-friendly, and it will respect user’s privacy, which means no data will be taken. As per Telegram, it will soon launch premium features for business or power users. The current features will remain free for all the Telegram users, but the new ones might fall in the premium plan. The company will also add ads in massive public channels. Note that one-on-one and private group chats will not have ads;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Groups, video, and audio calls. Telegram is really popular for groups and allows more than 200,000 users in a group. It also supports audio and video calls as well. Interestingly all video calls are end-to-end encrypted;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Disappearing Messages. Disappearing messages are part of the Secret Chat feature and you can set a timer for messages. The time range offered is one second to one week;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Screen Lock, Other Features. The best part about Telegram is it is a cloud service, which is why you do not need to worry about backing up chats to other servers to restore them on a new device. With Telegram, you can access your data from any of your devices as the data is synchronised across all your registered devices through cloud-based service. The good part about Telegram is you can send up to 1.5GB of files, create channels, add up to 2 lakh users in a group, forward files without downloading them, schedule messages, archive chats, and more. Telegram allows users to find anyone by username or phone number. Further users can edit messages as well. Telegram even displays the name of the original source from where you have forwarded a message and once you tap on it, you will be redirected to that group or channel. Telegram supports Picture-in-Picture mode, which means that you can video call while using other apps like Instagram. On Telegram, a group admin can set different permissions for every user. Telegram offers really cool and fun animated stickers, which you will not find on any other messaging app. In order to create an account, you just need to provide your mobile number and some basic information;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Data collected. The data collected by Telegram includes name, phone number, contacts, and user ID, according to the privacy label on the Apple App Store.</span></p><p style="text-align:left;"><br></p><p style="text-align:left;"><b><span>Viber</span></b></p><p style="text-align:left;"><span>Viber is the wild card in the South African market as it has not received massive amount of airtime in terms of an attractive alternative to Whatsapp. However, the Indian Express article points out that it may be more attractive than we think. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Security Features. This is yet another privacy messenger app, which supports end-to-end encryption. All types of messages, photos, videos, voice and video calls and group chats are encrypted. The company says that everyone will have to make sure that they are using the latest version of Viber to get maximum protection. Similar to WhatsApp, all your chats can be backed up to Google Drive, from where you can restore your chats. Viber says that once you upload your chats to Google, it will not be responsible for your data protection and privacy will depend on Google’s policy;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Cross-Platform. Yes, Viber can be used across platforms from Android, iOS, and Windows as well;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Free or paid? Ads? Like all the other apps, Viber is also free. However, you will witness a few ads in the popular messaging app. The company says, “Showing you these tailored and relevant offers help us keep the app free for you to use.” “Since we do not have access to your chats, neither advertising providers nor brands can access your chats. The content of your chats stays in your chats always and never will be used for showing your relevant ads,” Viber said in a blog post;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Groups, video, and audio calls. Yes, it supports Group features with up to 250 members. One can only add members by sending an invitation to a Viber user. This feature works similar to Signal. The app also supports regular video and audio calls that are also end-to-end encrypted;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Disappearing Messages. Similar to Telegram, you get a secret chat mode here too. You can set the timer, and screenshot/forwarding feature is disabled. The time can be set by you ranging from one second to one week;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Screen Lock, Other features. The screen lock feature is available, but not for the mobile version. You can send stickers and GIFs, delete, or edit messages, share location, voice messages, and share files. You can create your own GIF, search, and send YouTube videos in the app itself and do a lot of other things. However, the privacy features that Signal offers are not present in both Telegram and Viber;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>What data does Viber collect? Viber collects location and device ID identifiers. It also collects device ID identifiers. It collects phone numbers, user ID, product interaction, purchase history, other contact information such as email ID, name, and contacts.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>In the end, privacy matters</span></b></p><p style="text-align:left;"><span>Privacy does matter. We want to be able to use these social media platforms confident that we can do so without any concerns about where Big Brother is watching. Privacy does matter. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There are a few interesting questions that need to be asked at this juncture. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The first is, can we live without Facebook and other social media platforms in the modern age? While there are a lot of people in the world without a social media presence at all, there is a reason why Facebook has so many users. If Facebook were a country, it would be the third most populous country in the world. Facebook is mostly used to communicate with people in far flung corners of the world, to provide people with a platform to publicise their lives (vomit), and for people to consume news. It is also increasingly being used for people to do business and to connect with small businesses. If this is the case, why does Facebook have such an obsession with a free user model. Let us answer this. Facebooks current user base is 2,7 billion users. If Facebook charged its users $0.50 a year, it would generate an annual income of close to $1,3 billion. This is significantly less than what it made from advertising revenue in 2019, which was $69 billion. To get close to the last benchmark, Facebook would either have to reach 7 billion users, which is impossible considering that the world population is 8 billion (as of 2020), or it would have to charge its 2,7 billion users about $25/year. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Therefore, the advertising model is significantly more profitable. So how long will Facebook get away with this. In order to get more advertising revenue, advertising needs to be more relevant. In order for it to be more relevant, it needs to be targeted. In order for it to be targeted, it needs data. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Facebook could just ask people about what their expectations are when it comes to advertising. But would they get a genuine answer? No. They only way to guarantee proper data is to use the methods discussed earlier in the blog. So, when will Facebook finally stop this? When the US will finally catches up with the rest of the world and entrenches the right of privacy as a Constitutional Right thereby forcing Facebook to take data privacy seriously. The UK led this with the GDPR, and many countries followed in its wake. By entrenching this right into the constitution, you are guaranteeing that companies cannot take advantage of the public’s right to privacy and it is punishable by law. Companies who do not comply with the GDPR face massive fines and a restraint of trade that is debilitating. A <a href="https://www.theverge.com/2020/12/15/22176008/twitter-gdpr-fine-protected-tweets-ireland-data-protection-commission">recent report</a> showed that Ireland’s Data Protection Commission (DPC) has fined Twitter €450 000 (around $546 000) over a data breach it disclosed back in January 2019, the regulator announced today. The security flaw exposed some supposedly private tweets from the service’s Android users for over four years. Twitter was found to have violated the EU’s General Data Protection Regulation (GDPR) because it failed to notify the regulator within 72 hours of discovering the breach, The Wall Street Journal reports.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The fine is notable because it is the first time a US tech giant has been hit with a GDPR fine in a cross-border case, meaning one in which the Irish regulator consulted its EU counterparts as part of the decision. The investigation was headed by Ireland’s DPC because Ireland is where Twitter’s international headquarters are based.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>The major problem</span></b></p><p style="text-align:left;"><span>There are a few problems which sees Facebook, and Whatsapp, sitting in the pound seats. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The first is that Whatsapp are technically not doing anything wrong. Whatsapp is owned by Facebook and until the US has privacy laws which governs what companies can do with private data, companies will do what they like because they are not breaking any laws. Further, Whatsapp is telling you that this is happening and that you have to agree to these new updates (opt in), failure to do so will see you deleted from Whatsapp (forcibly opted out). This is taking compliance to a new level. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The second problem is that almost half of the world’s population uses Whatsapp. Teleporting all of your contacts to a single platform is going to be a mission. The strength of Whatsapp – and they know this – is that the public has proven that Whatsapp is the best messaging software in the market, and until another platform can make same claim, the userbase will be fragmented in terms of multiplatform as opposed to the current single platform we see now. People also do not like having to communicate with half of their contacts on platform and half on another, so we will probably see a lot of people accepting the new terms come February 8. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>What is the fuss about? </span></b></p><p style="text-align:left;"><span>What is Facebook going to try and do with this information? Sell you stuff? Put more adverts on your timeline for stuff that you never told Facebook you were looking for? I have been doing some research for my wife on my birthday present for this year and guess what, Facebook placed adverts for those items on my timeline. So, Facebook does not need Whatsapp to spy on people. People would also like to think that their data is not being used in advertising. The spoiler alert here is that Facebook and Google are using your data for targeted ads. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>People are also waiting in anticipation for smart devices that help you live your life. Run out of milk, your fridge will send you a message about this and will inform you about all of the specials that grocery stores are having regarding milk. Will these devices not be using your data for targeted advertising purposes? Will it be ok for these advertisements to be targeted but others not? MMMMM…</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;"><span>Data is running the world. It is what is making technology smarter, more convenient and life changing. Yes, companies will be chomping at the bit to get hold of this kind of data, and that may not be a bad thing. Would you rather see 100 worthless advertisements on your Facebook timeline of items that you do not actually want, or would you rather see 10 advertisements about things that you want and will make a difference in your life? And if you have such an issue with how Facebook uses your data, delete Facebook. Whatsapp is just doing what its owner is telling it to do.&nbsp;</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 12 Jan 2021 11:11:23 +0000</pubDate></item><item><title><![CDATA[Made in China 2025: where to now? ]]></title><link>https://www.gtconsult.com/blogs/post/made-in-china-2025-where-to-now</link><description><![CDATA[China's influence on the world is growing daily. What has happened to their Made in China 2025 programme?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_B4K16ISvRzmzCwSMQqH2gw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2ygB0y3lRxCwsUvCwCI6bg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Rk8Lepp3TQqqGHAzJqJ40g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ZePq_aBhSuC-lFUQLfYgdg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">China's influence on the world is growing daily</h2></div>
<div data-element-id="elm__a_2v0qmSjK2GGKOX6C2CQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1591189309340-323e78efaee0?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"><span><br></span></p><p style="text-align:left;"><span><br></span></p><p style="text-align:left;"><span>About a year in Donald Trumps Presidency, he found himself embroiled in a major war of attrition with China. While no violence was committed, relations between the two countries was precariously balanced on a knife edge with major allegations (from Trump) that China was embarking on a major espionage campaign that was being driven by Huawei. Later, there were allegations of coordinated cyber attacks from Beijing that affected high level US targets. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Chinese President, Xi Jinping, denied all of Trumps accusations saying that the reason behind the war of attrition is vastly different from the presented facts. Xi pointed out that the war of attrition was over China’s <i>Made in China 2025 </i>programme. At this stage, China had become the worlds second biggest economy and the country laid out a growth plan that would sustain the economy’s growth. Part of this plan was that 80% of the worlds technology would be produced and distributed by Chinese companies by 2025. This obviously has major ramifications for Silicon Valley which is a significant driver of the US economy. Xi went on to add that Huawei was being targeted because it was pioneering tech that Apple and Samsung were not; the fact that the company faced opposition in Australia and New Zealand over its 5G expansion plans suggests that Xi was not far off the mark. Would Apple or Samsung have faced similar opposition had they been the pioneers? </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>US sanctions aside, the Chinese economic beast is large enough to be self sustaining and Chinese companies have the whole of Asia as a possible market to drive its ambitions. Where to now for the Made in China 2025 programme?</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Shadow games</span></b></p><p style="text-align:left;"><span>One of the ways that China is approaching its world domination is through subliminal influencing. Changing behaviours and making it acceptable is almost a passive way of asserting your dominance and not drawing attention to the fact that you are influencing the global market. I recently <a href="https://www.bbc.com/future/article/20201117-how-china-social-media-apps-are-changing-technology">read an article</a> by the BBC which showed how this is taking place. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that for more than 30 years, a small parcel of land covering about 45 square miles (116sqkm) has had an outsized impact on the way we work, live and play.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>California’s Silicon Valley shapes our lives. From the websites where we do our household shopping to the video-streaming services we watch to the companies which provide our email, almost all are based in this corner of the United States.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds, until recently, that is. The rise of TikTok, an app whose parent company is the Chinese firm ByteDance, has struck at the heart of Silicon Valley’s supremacy. Along with other digital products coming out of China, TikTok has the potential to reshape the future of technology – a future in which the culture, and the interests, of Shanghai or Beijing could mould the industry more than that of San Francisco Bay.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>It’s hard to overstate just how much of a switch this is.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“The narrative previously was about China coming up with its own versions of [Western] digital products,” Elaine Jing Zhao, Senior Lecturer in the School of the Arts and Media at the University of New South Wales in Australia told the BBC.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“Nowadays, you see the narrative shift towards how Western social media platforms are learning from Chinese social media platforms.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>And Chinese apps, platforms and services currently look quite different from those in the West.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>The rise of Chinese tech</span></b></p><p style="text-align:left;"><span>The BBC article points out that the most famous, of course, is TikTok – which has 690 million monthly active users worldwide, 100 million of whom are in the United States and a further 100 million in Europe.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Like other apps of Chinese origin, TikTok’s owners have tried to downplay the app’s background. “They want to give international users the impression they are not Chinese platforms, but global platforms,”&nbsp; Jian Lin, Assistant Professor at&nbsp; the University of Groningen in the Netherlands told the BBC, an author of multiple books on the Chinese influencer industry and technology platforms. “They really want to transmit this impression to the public that they’re not necessarily Chinese. They’re just like others, a global platform.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that their fear of backlash has been borne out by the hard stance US President Donald Trump has taken against the app, who claimed without significant evidence it’s a national security risk. Other countries to oppose TikTok include India, where the app was banned in June 2020, and Pakistan, which banned it for 10 days in October.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>But these challenges seem unlikely to dissuade other Chinese tech companies from following TikTok’s lead, Lin told the BBC. “I do believe Chinese companies will become even more ambitious and stronger in the coming years,” he says.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that he also expects these companies to increase their global ambitions: since the Chinese domestic tech market is highly saturated, with strong levels of competition, they may see more opportunities coming from the overseas market.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Changing Western tech</span></b></p><p style="text-align:left;"><span>The article points out that, already, the way Chinese-launched apps interact with users, and the services they offer within the apps, are influencing Western platforms. One example: the “superapp”.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“In China it’s very common to become a superapp, where you do a lot of different things within the same app,” Fabian Ouwehand, Founder of Many, a Dutch social marketing agency that advises companies and influencers on how to use TikTok and its Chinese version, Douyin told the BBC.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Perhaps the most popular combination? Social media and commerce. “In China people are used to the commercialised version of social media entertainment, and do a lot of ecommerce and business through their apps,” says Lin.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that, on Douyin, for example, users can buy products directly from the app as they watch the shortform videos that creators post onto the platform – something TikTok in the West is mimicking through the introduction of integration with online shopping platform Shopify, launched in October 2020. WeChat, which is often described solely as a chat app, is far more: it’s also a payment platform and a way to keep up to date with friends.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The reason superapps have become so popular in China is simple, says Zhao. “People feel it’s really convenient to have every part of their life organised by social media platforms and superapps,” she says. “From shopping online to hailing taxis, socialising with friends and meeting up with strangers, everything you can do within one app.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>This kind of approach requires handing over more data to link up disparate systems into a single, convenient place for users – something that not everyone might be comfortable with. But experts believe that the demographics are on the side of app developers. “Younger users will accept it quicker than the older generations, who are a little bit wary,” says Ouwehand. “They value convenience over privacy.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that western companies are taking note. Platforms like Facebook have begun to bring various features and services under a single umbrella: in recent years, Facebook has integrated online video (Facebook Watch) and shopping (Facebook Marketplace) into its core social network. Instagram, owned by Facebook, has added TikTok-like shortform repeating videos, called Instagram Reels, in recent months, and also has a connection with Shopify so fans of influencers can buy products their favourites wear directly in the app..</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“I’m seeing more and more companies trying to add more features into their apps,” Rui Ma, a Chinese Tech Expert based in Silicon Valley told the BBC. “That’s probably the biggest overt move that looks a little bit more like Chinese tech.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Enhanced moderation</span></b></p><p style="text-align:left;"><span>The article points out that, behind the scenes, there are other differences that could also make meaningful change.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>TikTok has been criticised for its approaches to disabled and overweight creators, whose videos it has been alleged to de-prioritise – a legacy of moderation policies drawn up by staff in China. The app says it has since redrawn its policies on moderation to accommodate a more open, less censorious Western taste and culture. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that, despite localising its content moderation policies, TikTok remains much more proactive than Western social platforms in intervening where it sees potentially troubling content. The company’s September 2020 transparency report shows that, of the 104 million videos removed from TikTok in the first half of 2020, 90.3% were removed before they received any views – and 96.4% were taken down by the app itself, before being alerted to infringing content by another user.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Compare that to the content moderation policies of, say, YouTube. Until the coronavirus crisis compelled YouTube to rely far more on automated moderation rather than human intervention, the app lagged a little behind TikTok on its proactive takedowns of videos. In the three months between April and June 2020, the most recent data available, 95% of videos were taken down by “automated flagging”, though only 42% had no views before they were removed.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Algorithmic recommendations</span></b></p><p style="text-align:left;"><span>The article points out that another way in which Chinese social media platforms are influencing Western ones is in how they present and filter information.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>While Facebook and Twitter recommend posts based on what your friends are posting and sharing on your news feed, TikTok and other Chinese apps like it try to learn as much as it can about you, and then direct content to you they think you’ll like. “In China you see a lot of different platforms coming up that are way more focused on exploration, and here it’s a lot on your social circle,” says Ouwehand.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that this model understands our preferences based on prior behaviour with videos we’ve already seen, rather than assuming our interests based on those we interact with or via our past search terms. It’s a meaningful difference that is shaping the way we consume information, and changes the economics of those creating the content.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Under the Chinese model of algorithmic exploration and recommendation, users are less beholden to the individual content creators they follow. On YouTube, for examples, big personalities have become celebrities because of their ability to build a loyal fanbase. But on TikTok, anyone can become a star overnight because of a single video that proves popular with the app’s algorithm – and that fame can disappear almost as quickly when the next big video is surfaced through the app’s code.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that, given how popular that strategy has been, it could signal a broader change among other social media platforms, as well.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>The future of tech</span></b></p><p style="text-align:left;"><span>The article adds that if Chinese companies continue to play an increasingly influential role in tech, our online world could look very different by, say, 2030.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>For one, it could be much more diversified than the Silicon Valley standard we still, largely, see now. And while Chinese apps are best-known right now, that could change. “It’s not just Chinese companies, but other companies in Asia,” says Zhao. “These regional giants might want to have a slice of the global market pie as well. We’re seeing Facebook and Google competing for a slice of the Asian market, but at the same time local giants are entering the US market as well.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that we might also see apps having an increased emphasis on localisation, something we already see with TikTok. “If you want to be a global company, you’re serving different consumers with different cultural tastes,” Zhao told the BBC.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>And we may see Western products taking more of a lead from successful strategies or services out of China, and the rest of Asia. “That’s where the West is going to copy a lot,” says Ouwehand. “In terms of functionalities and the expansion of their own apps to do more.”</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that the future of technology in the next decade will certainly look a lot less like the Silicon Valley-designed ideal we’ve been used to in the last 20 years. But it seems likely it will evolve through small steps and minor influences – as evidenced through the way TikTok differs from Douyin, and the lag in changes in the Chinese version of the app making their way to the Western one.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>This is, after all, how a globalised world works, Zhao told thew BBC. “It’s an example of cross pollination. Doing business is always about drawing inspiration from each other,” she says.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>More insight</span></b></p><p style="text-align:left;"><span>What more can we expect form this plan? An <a href="https://www.aljazeera.com/economy/2020/10/30/five-questions-about-chinas-latest-five-year-plan">article by Al Jazeera</a> provided some additional insight. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Dual circulation; the Al Jazeera article pointed out that this is a concept Xi first mentioned in May, and has now become part of the plan for the next five years.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>In essence, Beijing is saying it wants its future growth to be based mostly on internal cycles of production, consumption and distribution of goods and services.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article added that, faced with a punishing trade war with the US and a government that wants to contain the rise of Chinese technology giants like Huawei – the global leader in the latest generation mobile telecommunications equipment – it is little surprise that China is turning inwards for its economic progress. With a middle class of about 400 million people, it can afford to do so.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article pointed out that it acknowledged that China now faces a “complicated international situation”, something that is unlikely to change whoever wins the US presidential election on November 3.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>But China is also keen to stress that it is not turning its back on the outside world and that it wants to continue to engage in international trade, the now de-emphasised, less well-defined second part of the dual-circulation strategy.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Technology</span></b></p><p style="text-align:left;"><span>The article added that a cornerstone of the current 13th plan has been “Made in China 2025”, a push to nurture and develop high-tech industries.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The new plan calls for a continuation of that strategy, putting innovation at the heart of China’s modernisation drive.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“Making major breakthroughs in core technologies in key areas, China will become a global leader in innovation,” Xinhua said.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article pointed out that developing homegrown technologies such as robotics and artificial intelligence is at the heart of China’s shift towards greater self-reliance [File: Aly Song/Reuters]According to analysts at global banking giant HSBC, the 14th plan will aim to strengthen industrial supply chains that were disrupted during the early stages of the pandemic, using technology to become more self-reliant in this respect.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>“In our view, this means there will be more of a policy push for higher [research and development] spending in the coming years, especially in strategically emerging sectors such as biotechnology, semiconductors and new energy vehicles,” Qu Hongbin, chief China economist at HSBC, said in a research note sent to Al Jazeera.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>A new frontier</span></b></p><p style="text-align:left;"><span>If we are being honest, Chinese tech has already taken over the majority of the world and is having a major influence on the way that we do things and live our lives. In this space, China has achieved its goal and we will use Chinese tech if it is safe, well made and comparable to tech that is produced elsewhere in the world. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>So where does China go next? I recently <a href="https://www.caixinglobal.com/2020-11-12/china-wants-self-driving-tech-in-half-of-new-cars-by-2025-101626619.html">read an article</a> which points out that Beijing is targeting the automotive sector.&nbsp; </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that China aims to have vehicles with partial self-driving technology account for 50% of all new-auto sales by 2025, double its previous goal, as the country encourages local companies to pull ahead of the U.S. in the field.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Under a plan released Wednesday, new vehicles with &quot;level 2&quot; or &quot;level 3&quot; automation are to make up 70% of sales by 2030. Level 2 assists the driver with steering, acceleration and braking, while level 3 means vehicles drive themselves under certain conditions such as on highways.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that China in 2017 called for level 2 and 3 vehicles to make up 25% of new-car sales in the world's largest auto market by 2025. Beijing considered raising the target to 30% last year, but is hitting the gas pedal now as China positions autonomous and &quot;new energy&quot; vehicles as a strategic emerging industry.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>About 10% of new vehicles sold in China during the first half of 2020 carry level 2 automation, local media report.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The new plan also seeks to have level 4 autonomous vehicles, which require no human input except in emergencies, on the market by 2025 and account for 20% of sales in 2030. China looks to expand use of high-level self-driving technology nationwide by 2035 and integrate such vehicles into so-called smart cities.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article points out that China will enact policies and legislation based on this road map, released by the National Innovation Center of Intelligent and Connected Vehicles at the direction of the Ministry of Industry and Information Technology.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Beijing is counting on Chinese tech companies to make this vision a reality.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Search engine company Baidu has received state support for its Apollo self-driving technology project, launched in 2017. Trials of an autonomous taxi service are underway in Hunan and Hebei provinces and parts of Beijing. Didi Chuxing, China's largest ride-hailing company, is testing a similar service in Shanghai.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Tech names ranging from startups like Pony.ai to giants such as Alibaba Group Holding and Tencent Holdings are increasing development in the field.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The article adds that though Tesla and Toyota Motor have led the way among automakers, Chinese players such as Geely Automobile Holdings, part of the group that owns Sweden-based Volvo Cars, are pushing into the fray as well. Nearly 100 new models with level 2 technology reportedly were rolled out in the first nine months of 2020, according to Chinese media.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>On the regulatory side, with the commercialization of level 3 vehicles on the horizon, China is considering easing rules as early as next year to allow self-driving vehicles on public roads.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p><span style="color:inherit;"></span></p><p style="text-align:left;"><span>The reason why the US went to war in Vietnam, and the reason that it engaged in the Cold War, was that it was vehemently opposed to communism. For that, the US was seen by many as a beacon of hope and freedom. Is this not influence?&nbsp; Throughout history, there have been international influencers that have shaped the way that we live. Perhaps it is China’s turn.&nbsp;</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 24 Nov 2020 08:52:11 +0000</pubDate></item><item><title><![CDATA[Accelerated change in the way we work]]></title><link>https://www.gtconsult.com/blogs/post/Accelerated-change-in-the-way-we-work</link><description><![CDATA[Work, as we know it, is set for major disruption. We can either fight it or we can embrace it.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rBX6IKTXSYKtzpndGemY8A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_rE32yKjHRHCPzj09sOzaqA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__3VCw9JrSbaVfLpJ15A5OQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Tivdds0OSsWStgh0cDyvRw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Work, as we know it, is set for major disruption.&nbsp;</h2></div>
<div data-element-id="elm_aLWeTNFJT7SDTl-tjjMZFA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p><img src="https://images.unsplash.com/photo-1574689049340-bedc8373daa3?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"><br></p><p><br></p><p style="text-align:left;">If we go back over the centuries, the biggest impact of the various industrial revolutions that the world has been through is that there has been a significant change in the workplace. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Technology enables productivity but also creates various opportunities that were not present in the past. This has been at the heart of the Fourth Industrial Revolution (4IR) and its impact has only been enhanced by the Covid-19 Pandemic. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Changing landscape</b></p><p style="text-align:left;">If we go back to the industrial revolution, many skeptics were unconvinced that inventions such as the car and the printing press would replace horse drawn carriages and conventional forms of media. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Industrialization saw the mass printing of newspapers and books and the mass production of motor vehicles. This caused unemployment for many who filled these rolls in the past. While technology enables productivity, it also is a catalyst for social change. Many of the jobs that exist today will not exist 20 years from now. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While there will be significant social change, the role of humans will never totally disappear. While technology is becoming more self-governing, it will not be independent. Humans still need to govern the process. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">So, what does the future of the workplace hold? </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Accelerated change</b></p><p style="text-align:left;">I recently <a href="https://www.businesslive.co.za/fm/features/2020-10-29-the-future-of-work/">read an article</a> which pointed out that the automation and digitization of the workforce has accelerated, partly due to Covid-19, but new jobs are coming and may be more accessible than you think.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that workers around the world are facing &quot;double disruption&quot;: not only is the global workforce automating faster than expected, but the Covid-induced global recession has reversed employment gains, making it even harder for workers, especially those already disadvantaged, to make the transition to new types of jobs.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This is the core message of the World Economic Forum’s (WEF) 2020 Future of Jobs report, a survey of mostly big, white-collar companies across 26 countries.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Hitting the breaks</b></p><p style="text-align:left;">According to the report, the bad news is that, in contrast with previous years, job creation is slowing while job destruction is accelerating.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">By 2025, the so-called robot revolution is set to disrupt 85-million jobs globally, according to the report. By then the average employer expects to divide tasks roughly equally between humans and machines.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Referencing the report, the article points out that, astonishingly, even half of the lucky ones who retain their jobs will need reskilling. Fortunately, the report finds that 73% of South African firms would look to retrain current staff to meet their changing requirements.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;Of course, it depends on the choices we make today,&quot; notes WEF MD Saadia Zahidi. &quot;It depends on the kinds of investments governments make today and the investments workers make in terms of their own time. And it depends on the choices that business leaders make when it comes to retaining and protecting jobs vs shorter-term decisions that are more focused on quarterly results.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that the report warns that in the absence of support from governments and employers, inequality is likely to worsen because of the double whammy of technology and the pandemic, which has disproportionately affected millions of low-skilled workers.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Key investment</b></p><p style="text-align:left;">The article points out that improving access to online learning is an investment all countries should be making. According to US online learning provider Coursera, there has been a fivefold increase since the start of the pandemic in employers offering online learning to their workers, and a nine fold increase in people accessing it through government programmes, including in developing countries.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">In Costa Rica, for example, the government has worked with employers to identify the skills in demand, partnered with Coursera to build the required online learning programmes, and helped match graduates of these programmes to available jobs.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;No matter what prediction you believe about jobs and skills, what is bound to be true is [a] heightened intensity and frequency of career transitions, especially for those already most vulnerable and marginalised,&quot; says Hamoon Ekhtiari, CEO of FutureFit AI, a Canadian reskilling firm that contributed to the report.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>New roles</b></p><p style="text-align:left;">Refencing the report, the article points out that the good news is that 97-million new roles are expected to emerge over the next five years in existing fields such as the care sector, as well as in newer industries such as those involving big data, artificial intelligence, the green economy, cloud computing and product development.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;We think the future of work is digital, but it’s also human,&quot; said LinkedIn chief economist Karin Kimbrough at the report’s launch. Kimbrough believes the world will increasingly value tasks that involve collaboration, managing and caring. In fact, the pandemic has taught society to revalue in-person, frontline services such as nursing.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Moreover, getting into new digital fields isn’t as difficult as people may think. According to LinkedIn data, about half of all people making career shifts into these new industries come from unrelated fields.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;So, you can come from just about anywhere and manage the transition,&quot; says Kimbrough.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Advanced skills not necessary</b></p><p style="text-align:left;">The article points out that you also don’t need advanced levels of digital literacy to make the jump, which is important for a country such as SA where, according to the report, less than 30% of the population has digital skills.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Coursera’s head of data science, Emily Glassberg Sands, points out that, for those without university degrees, there are still lots of opportunities in administering technology, including, for instance, as Google IT support specialists (who are employed by thousands of firms to help debug Google every day).</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article added that it takes just six to eight months to train online as one, she says, and is a useful stepping-stone to unlocking more formal IT qualifications over time. &quot;It’s difficult and requires support, but it’s less the exception than we think.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Kimbrough says if policymakers could identify the small clusters of skills with an outsized effect on opening more sustainable career paths, it could make a real difference to reducing global unemployment.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">But the window of opportunity for managing this change is closing fast, Zahidi warns. &quot;In the future, we will see the most competitive businesses are the ones that have invested heavily in their human capital — the skills and competencies of their employees.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Enhanced thinking</b></p><p style="text-align:left;">When James Cameron brought us <i>The Terminator</i> in 1984, we thought that giving machines the power of enhanced thinking was a bad idea. It really was not a good portrayal of the benefits of technology. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">However, <a href="https://www.techrepublic.com/article/forrester-ai-and-automation-will-help-organizations-rethink-the-future-of-work/">a recent article</a>, referencing a report by Forrester, points out that its not all bad news though. I read an article which points out that artificial intelligence (AI) and automation will help organizations rethink the future of work.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Automation, not surprisingly, is aimed at the employee experience. In 2021, digital transformation initiatives in more than three-quarters of enterprises will focus on automation, the firm said.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;The 'great lockdown' of 2020 will make the drive for automation in 2021 both inevitable and irreversible,'' according to Forrester's Predictions 2021. &quot;Remote work, new digital muscles, and pandemic constraints will create millions of pragmatic automations in 2021; document extraction, RPA (robotic process automation) from anywhere, drones, and various employee robots will proliferate; and, as expected, the mad dash to automate will bring trouble.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Driving efficiency and elasticity</b></p><p style="text-align:left;">The article points out that, while AI didn't predict the pandemic, it will help businesses rethink the future of work; drive more efficiency, elasticity, and scale in operations; and reimagine customer and employee experiences, Forrester said. AI is driving the growth of automated processes, helping them become smarter. Companies that adopt machine learning, a subset of AI, &quot;will massively multiply their number of AI use cases, including for employee augmentation and automation,'' the firm said.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Forrester expects &quot;hypergrowth in AI, along with the proliferation of artificial data and the beginnings of a Blockchain-based approach to data trust.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">AI adoption grew 15 percentage points in the past year, and maturity is rising as firms move past small, incremental deployments, according to Forrester. &quot;In 2021, the grittiest of companies will push AI to new frontiers, such as holographic meetings for remote work and on-demand personalized manufacturing. They will gamify strategic planning, build simulations in the boardroom, and move into intelligent edge experiences.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that Forrester also believes there are many deterrents to AI success: A lack of trust, poor data quality, data paucity, a lack of imagination, and a dearth of the right power tools to scale.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&quot;But 2021 will see companies tackle these head on, not because they want to or suddenly have the wherewithal to overcome these in this unprecedented year--but because they have to,'' Forrester maintained. &quot;They have to rebuild their businesses not for today or even next year but to prepare to compete in an AI-driven future. 2020 has given leaders the impetus, born out of necessity, and coincidence to embrace AI, with all its blemishes.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Don’t shy away</b></p><p style="text-align:left;">The article points out that Forrester advises firms not to shy away from AI. &quot;Plan to quadruple your investment next year. Build your internal AI team, engage consultancies to implement domain-specific solutions, and upgrade your data, analytics, and machine learning platforms to rethink how you use AI.&quot;</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Automation is also a top priority now, and thanks to the pandemic, it is aimed at the employee experience, Forrester said. In 2021, digital transformation initiatives in more than three-quarters of enterprises will focus on automation—whether for core records, customer operations, or engagement, the firm said. Advances in AI, changes to work patterns as a result of the pandemic, and a fierce global recession have made this drive for automation inevitable—and irreversible, according to Forrester.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that other predictions Forrester is making in AI and automation in 2021:</p><p style="text-align:left;">- No-code automated machine learning (AutoML) will be used to implement more use cases. AutoML can dramatically accelerate ML model development versus the traditional coding approach. In 2021, lucky laggards will use AutoML to implement 5, 50, or 500 AI use cases faster, leapfrogging their competitors. AutoML lets data scientists configure parameters and run hundreds or even thousands of experiments in one go. With AutoML, Forrester estimates that these teams can implement eight times the number of use cases aimed at operational efficiency or personalized customer experience—and greatly amplify the impact of digital transformation;</p><p style="text-align:left;">- A fifth of enterprises will expand investment in intelligent document extraction. Even before the pandemic, there was strong investment in intelligent document extraction platforms (IDEP) as firms wanted to use it to classify many types of documents. Combining computer vision with advances in machine learning has made platforms more valuable and easier to build and maintain;</p><p style="text-align:left;">- A notable failure will occur as a result of the rush to automation. The pandemic accelerated investment in various forms of business process and IT automation. Two-thirds of enterprise organizations that encountered broken processes during the pandemic were pressured to patch in automation solutions. But rushed and haphazard automation exposes systems and the business to serious risk. This can lead to monumental failures that not only damage a company's reputation and customer trust but also limit broader public trust in automation (specifically AI) as a result of media scrutiny. In 2021, up to 30% of organizations will ramp up their focus on quality by better planning and testing automation before deploying it to production or exposing it to employees;</p><p style="text-align:left;">- Intelligent automation suites will provide a quarter of all RPA solutions. Commoditization, major enterprise software acquisitions, new entrants, specialization, and public market ambitions are resulting in a diverse RPA market. Like machine learning, RPA will become an embedded feature of many platforms by the end of 2021;</p><p style="text-align:left;">- A fifth of enterprises will use commercial drones to automate business operations. Recent rapid growth in the consumer drones industry has sparked momentum in the commercial drone market. While social distancing is a factor in drone usage, two forces will accelerate adoption in 2021. First, governments are crafting better regulations to facilitate drone adoption and commercialization. Second, the rapid evolution of computer vision and 5G will enable real-time drone intelligence over ultra-reliable, low-latency communications; and</p><p style="text-align:left;">- Intelligent automation will advance to support one in four home workers. Three times as many information workers will work from home all or most of the time, while many companies will institute hybrid models. As a result of the pandemic, new forms of automation will support one in four remote workers either directly or indirectly by 2022. Direct support in the form of giving a bot to individual workers to support their daily journey will be rare. But indirect support will blossom, with intelligent automation handling employee benefits, questions, and supporting documents, customer service, and line-of-business tasks that are often invisible to the home worker.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Another <a href="https://www.citrix.com/content/dam/citrix/en_us/documents/analyst-report/work-2035.pdf">report</a>, which was the result of a joint study by Citrix, futurist consultancy Oxford Analytica, and business research specialist Coleman Parkes, &nbsp;revealed the expectations of over 500 C-Suite leaders and 1,000 employees.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The report pointed out that:</p><p style="text-align:left;">- Three-quarters (74 per cent) believe that in fifteen years, artificial intelligence (AI) will significantly speed up the decision-making process and make workers more productive;</p><p style="text-align:left;">- New jobs will be created, including roles such as: Robot / AI Trainer, Virtual Reality Manager, and Advanced Data Scientist;</p><p style="text-align:left;">- Work will be more flexible and fuelled by technology. 75% of the study’s respondents believe that tech platforms will provide instant access to highly specialized, on-demand talent;</p><p style="text-align:left;">- 57% of respondents believe AI has the potential to make the majority of business decisions by 2035 and potentially eliminate the need for traditional senior management teams; and</p><p style="text-align:left;">- “AI-ngels” – digital assistants driven by AI – will draw on personal and workplace data to help employees prioritize their tasks and time and ensure mental and physical wellness.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Efficiency is key</b></p><p style="text-align:left;">One of the advantages of technology replacing human skills (according to employers) is efficiency. Robots are programmed to carry out a task and can do so without error, provided that the inputs are correct. Further, these tasks are carried out more efficiently and technology does not take leave days. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">However, as pointed out at numerous points in this article, human skills will never be fully replaced. This was reinforced in a recent article by the World Economic Forum. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that, to do this, we must mobilize the best of human capabilities, technologies, innovative policies, and market forces in service of a new vision.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Moral and economic imperatives</b></p><p style="text-align:left;">The article points out that, to imagine the future of work, we must start with defining how human beings can adapt and grow.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Every person has the right to a productive life. Every person has the right not just to work, but to realize their purpose so they can participate fully in society. Every business has the moral and economic responsibility to help protect people’s livelihoods, even when they cannot always protect the jobs they do.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that you cannot have a healthy business in a sick world. For businesses to thrive, society must also thrive: from employees, to consumers, to suppliers, shareholders and other stakeholders. When you leave some people to fall through the cracks, you lose all the benefits they bring to society, from their skills and talents, to their experience and unique understanding. And yes, their buying power too.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">It isn’t just a moral imperative, it’s also an economic one. Take gender equality. McKinsey estimates that if no action is taken, global GDP growth could be $1 trillion lower in 2030. Conversely, immediate action to advance gender equality could add $13 trillion to global GDP in 2030.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Re-imagining work</b></p><p style="text-align:left;">The article points out that, to reimagine the working landscape we need to attempt something that seems almost impossible: we must imagine not just what the world of work is going to look like in 10, 15, 20 years, but what we want it to look like. We must imagine what it will look like if human beings are thriving.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This means involving people as part of the solution rather than as a problem to be solved. Only by doing all this can we continue to build a better business and a better world - for everyone.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Actionable change</b></p><p style="text-align:left;">The article points out that there are three actions that businesses can take to facilitate this change. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">- Support people to find their own sense of purpose and realize their full potential by working with them to develop a purpose-led, future-fit development plan. This is more than just running reskilling programmes. This is &nbsp;about equipping people to lead the change, rather than having change done to them;</p><p style="text-align:left;">- Pioneer new forms of employment to provide flexibility with security. This is about enabling people to choose how they want to work depending on their life stage. A socially responsible alternative to the gig economy; and </p><p style="text-align:left;">- Putting mental health and wellbeing at the forefront of preparing for the <i>Future of Work</i> with meaningful action (not just ‘raising awareness’ campaigns’). This is about providing practical support and coaching to people as they figure out their future options.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that, while the jobs of tomorrow may be resetting, people are not. People are not widgets; they are the soul of any successful business. Businesses can help people to follow reskilling and other career pathways by: putting them at the heart of the future of work; ensuring they understand their own personal purpose; providing the support they need to feel happy and healthy; and giving them a sense of belonging.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This will ensure that people are able to thrive, adapt and grow as they are empowered to proactively shape the future of work.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Where does GTconsult fit in? </b></p><p style="text-align:left;">“GTconsult has been at the forefront of innovation and embracing enhancing productivity through technology. GTconsult started off as a small company with a big heart and grew because we knew where the future of tech was heading, and the impact that it would have on society. We continuously strive to drive change and focus on how trends impact our journey,” says Craig Tarr, Co-Founder of GTconsult and newly appointed CEO. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;">GTconsult has always focused on how technology can drive change and is involved in a number of projects which are helping clients improve efficiency and productivity. Stay tuned to find out more about these exciting projects.&nbsp;</p></div>
</div><div data-element-id="elm_-6Xcen-oT2y6Jhdtz-Bplw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 10 Nov 2020 09:38:42 +0000</pubDate></item><item><title><![CDATA[Is cyber security still just a fad?]]></title><link>https://www.gtconsult.com/blogs/post/Is-cyber-security-still-just-a-fad</link><description><![CDATA[g&nbsp; This is the last week of Cyber Security Awareness Month, and hopefully you have navigated it with any incident. &nbsp; Risk management plays an i ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_2L32EXdTQgKydpDzmAbWXQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yHK4fP1qQByOjroTd4VAOg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ZUzXvOZmTbu3Zx-ua0bNag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_yhBEDDFMRVGUm-3UIJM1yA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"></h2></div>
<div data-element-id="elm_2VXzld2qSxOhHxpeUScgSQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1586772002345-339f8042a777?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ">g&nbsp;</p><p style="text-align:left;">This is the last week of Cyber Security Awareness Month, and hopefully you have navigated it with any incident.<br></p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Risk management plays an important role in the financial services industry. Insurers and credit providers take a serious look at risk and invest a lot of time and capital in developing models that will address the identified risk. It gives them an idea of where they are and where they need to be. Its true benefit can be seen in achieving identified deliverables. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Risk management also plays a significant role in the technology industry. However, because of the nature of the evolution of this risk, models need to be fluid and have to be extremely adaptable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Serious complexity </b></p><p style="text-align:left;">Let’s revisit the financial services industry for a second. The reason why risk management plays an important role in this industry is that it is an effective way to address risk. This is only true because the risks that the industry faces haven’t changed much over the past ten years. The reason why risk management in the technology space becomes a challenge is because cyber security is <a href="https://www.forbes.com/sites/elenakvochko/2020/10/25/why-cyber-security-is-still-so-complex/#4bffb47ef974">seriously complex</a>. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that consumers, businesses, and entire systems all over the world are under threat on a daily basis. Valuable personal and financial information is exposed and ready for the taking. Simple tasks like using a credit card, a phone, or a computer provide an opportunity to take our money, our identities, and your ways of life. Data breaches are capable of rendering large, powerful companies vulnerable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">As the world evolved and became more technological, attacks evolved along with the new developments. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>A new window to climb through</b></p><p style="text-align:left;">The article points out that when humans learned to domesticate animals and grow food, larger settlements were established and societies started to flourish in multiple locations across the world. </p><p style="text-align:left;">Sedentary societies then placed value not only in food and clothing, but in things such as cattle, crops, land, houses, and machinery. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Commerce was created, value was placed on a new concept - money. Goods were then exchanged for precious metals such as gold, silver, and bronze in the form of coins and paper money years later. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that the value of money prompted societies to create impenetrable fortresses and sophisticated vaults to keep valuables away from the hands of criminals.&nbsp; As societies became more complex, both crime and remediation efforts evolved along with them. Before the rise of computers, trespasses were much easier to prevent. All we had to do was keep a door locked. The internet has given a new window to climb through for digital assets.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This tells us that security has also evolved alongside attacks to give rise to holistic security. Today, digital assets have the highest value. Our neighbourhood is now the entire globe. In response to this new type of cyber criminal, organizations have developed an equally evolved security system. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Be prepared!</b></p><p style="text-align:left;">The article points out that, because of our daily interaction with connected devices, computers, smartphones, and tablets, it’s important that everyone - from the CEO and software developers to suppliers and employees - to be aware. Everyone can play an important part in keeping information safe. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that ransomware has become a headache for businesses and individuals alike. This type of attack can hold data hostage via encryption, which is the process of converting data into unreadable code to prevent access, until the victim pays a large amount of money to get the description keys. Organizations can fall victim to ransomware through drive-by downloads and phishing emails. Millions of people around the world reported encounters with ransomware.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While attackers are finding new, innovative ways to threaten the security of an organization, holistic and complete security will give enterprises a chance to fight against any attack and protect their data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that everyone in the company should have the following questions in mind:</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>CEOs; how secure is your company? What risks are you exposed to?</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Technical Teams; how can you make data easy and accessible to your team without compromising security?</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Product Owners; at what stage do you integrate security? And </p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Employees; what is your role in cybersecurity? What can you do to protect your company’s data?</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that it is important for cybersecurity to be a company-wide approach - a combination of people, processes and tools. Organizations should develop security operation centres, which are intelligence-led and are focused on creating high-level defence, cyber hygiene, education, and awareness.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The goal? To stress-test your systems, identify, contain and remediate the negative impact fast.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cyber literacy</b></p><p style="text-align:left;">When my parents were at school, my mom had to do typing lessons as a school subject. It was the same for me when I was at school where a module of Computer Literacy Classes focused on typing. Spoiler alert, I still type with a single finger on each hand looking at the keyboard the whole time. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">We digress. There is a significant push for subject matter such as coding and cyber security to be included in computer literacy classes in classrooms around the world. Cyber risk literacy should be <a href="https://www.helpnetsecurity.com/2020/10/27/cyber-risk-literacy/">part of every defensive strategy</a>.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that while almost 95% of cybersecurity issues can be traced back to human error, such as accidentally clicking on a malicious link, most governments have not invested enough to educate their citizens about the risks, according to a report from the Oliver Wyman Forum.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cyber risk literacy of the population</b></p><p style="text-align:left;">The article adds that cyber literacy, along with financial literacy, is a new 21<sup>st </sup>century priority for governments, educational institutions, and businesses.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Cyberattacks are now one of the fastest growing crimes globally and are expected to cost organizations more than $600 billion dollars a year by 2021,” Paul Mee of the Oliver Wyman Forum told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“The situation has become even more pressing during the pandemic as our reliance on the internet has grown. Yet many citizens still lack the basic skills to keep themselves, their communities, and their employers safe.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Fifty geographies were assessed, including the European Union, on the present cyber risk literacy of its population, and the nature of related education and training available to promote and enable future cyber risk literacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that the index measures five key drivers of cyber risk literacy and education: the public’s motivation to practice good cybersecurity hygiene; government policies to improve cyber literacy; how well cyber risks are addressed by education systems; how well businesses are raising their employees cyber skills, and the degree to which digital access and skills are shared broadly within the population.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>How are assessed countries doing?</b></p><p style="text-align:left;">The article added that Switzerland, Singapore and the UK topped the list because of their strong government policies, education systems and training, practical follow through and metrics as well as population motivation to reduce risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Switzerland, the number one ranked country, has a comprehensive implementation document that lays out specific responsibilities along with what national or provincial legislation is required. Specific milestones are set, and timelines are assigned to ensure accountability regardless of who oversees the government.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Singapore, which is ranked second, has prioritized cybersecurity education efforts from early childhood to retirees. It established the Cyber Security Agency of Singapore to keep its cyberspace safe and secure. Its cyber wellness courses occur over multiple grades and focus on social and practical safety tips such as understanding cyber bullying.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that The UK ranked third, has the most integrated cyber system because it incorporates cyber risk into both primary and secondary education. The UK’s National Cyber Security Strategy of 2016-2021 is also one of the strongest plans globally. The US ranked 10th.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Countries that rank lower lack an overall national strategy and fail to emphasize cyber risk in schools. Some countries in emerging markets are only beginning to identify cybersecurity as a national concern.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Governments that want to improve the cyber risk literacy of their citizens can use the index to strengthen their strategy by way of adopting new mindsets, trainings, messaging, accessibility and best practices,” Mee told helpnetsecurity.com. “With most children using the internet by the age of four, it is never too early to start teaching your citizens to protect themselves.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Problematic issues</b></p><p style="text-align:left;">Another article by helpnetsecurity.com pointed out that cybersecurity <a href="https://www.helpnetsecurity.com/2020/10/23/cybersecurity-is-failing-due-to-ineffective-technology/">is failing due to ineffective technology</a>.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">A failing cybersecurity market is contributing to ineffective performance of cybersecurity technology, a Debate Security research reveals.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that, based on over 100 comprehensive interviews with business and cybersecurity leaders from large enterprises, together with vendors, assessment organizations, government agencies, industry associations and regulators, the research shines a light on why technology vendors are not incentivized to deliver products that are more effective at reducing cyber risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The report supports the view that efficacy problems in the cybersecurity market are primarily due to economic issues, not technological ones. The research addresses three key themes and ultimately arrives at a consensus for how to approach a new model.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cybersecurity technology is not as effective as it should be</b></p><p style="text-align:left;">The article pointed out that 90% of participants reported that cybersecurity technology is not as effective as it should be when it comes to protecting organizations from cyber risk. Trust in technology to deliver on its promises is low, and yet when asked how organizations evaluate cybersecurity technology efficacy and performance, there was not a single common definition.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Pressure has been placed on improving people and process related issues, but ineffective technology has become accepted as normal – and shamefully – inevitable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>The underlying problem is one of economics, not technology</b></p><p style="text-align:left;">The article added that 92% of participants reported that there is a breakdown in the market relationship between buyers and vendors, with many seeing deep-seated information asymmetries.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Outside government, few buyers today use detailed, independent cybersecurity efficacy assessment as part of their cybersecurity procurement process, and not even the largest organizations reported having the resources to conduct all the assessments themselves.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">As a result, vendors are incentivized to focus on other product features, and on marketing, deprioritizing cybersecurity technology efficacy – one of several classic signs of a “market for lemons”.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Coordinated action between stakeholders only achieved through regulation</b></p><p style="text-align:left;">The article pointed out that, unless buyers demand greater efficacy, regulation may be the only way to address the issue. Overcoming first-mover disadvantages will be critical to fixing the broken cybersecurity technology market.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Many research participants believe that coordinated action between all stakeholders can only be achieved through regulation – though some hold out hope that coordination could be achieved through sectoral associations.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article added that, in either case, 70% of respondents feel that independent, transparent assessment of technology would help solve the market breakdown. Setting standards on technology assessment rather than on technology itself could prevent stifling innovation.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Defining cybersecurity technology efficacy</b></p><p style="text-align:left;">The article pointed out that participants in this research broadly agree that four characteristics are required to comprehensively define cybersecurity technology efficacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">To be effective, cybersecurity solutions need to have the capability to deliver the stated security mission (be fit-for-purpose), have the practicality that enterprises need to implement, integrate, operate and maintain them (be fit-for-use), have the quality in design and build to avoid vulnerabilities and negative impact, and the provenance in the vendor company, its people and supply chain such that these do not introduce additional security risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“In cybersecurity right now, trust doesn’t always sell, and good security doesn’t always sell and isn’t always easy to buy. That’s a real problem,” Ciaran Martin, Advisory Board Member at Garrison Technology told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Why we’re in this position is a bit of a mystery. This report helps us understand it. Fixing the problem is harder. But our species has fixed harder problems and we badly need the debate this report calls for, and industry-led action to follow it up.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Company boards are well aware that cybersecurity poses potentially existential risk, but are generally not well equipped to provide oversight on matters of technical detail,” John Cryan, Chairman Man Group told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Boards are much better equipped when it comes to the issues of incentives and market dynamics revealed by this research. Even if government regulation proves inevitable, I would encourage business leaders to consider these findings and to determine how, as buyers, corporates can best ensure that cybersecurity solutions offered by the market are fit for purpose.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“As a technologist and developer of cybersecurity products, I really feel for cybersecurity professionals who are faced with significant challenges when trying to select effective technologies,” said Henry Harrison, CSO of Garrison Technology told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“We see two noticeable differences when selling to our two classes of prospects. For security-sensitive government customers, technology efficacy assessment is central to buying behaviour – but we rarely see anything similar when dealing with even the most security-sensitive commercial customers. We take from this study that in many cases this has less to do with differing risk appetites and more to do with structural market issues.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Be cyber smart</b></p><p style="text-align:left;">Cyber security is advancing at a rapid rate. Companies are no longer able to keep a constant eye on their employees and offer the protection that they need. a measure of this responsibility rests on the shoulders of <a href="https://www.dqindia.com/5-cybersecurity-tips-secure-data-become-cybersmart/">those below board level</a>. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Use a strong password</b></p><p style="text-align:left;">The article points out that having to manage a large number of applications and software, the easiest option for most users would be to pick a password that is easy to remember, and then apply it across the board. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While this might be a convenient option, it is definitely not the safest. Cybercriminals these days use tools that sniff out passwords reused on other sites to make their work easier and to make the stolen passwords and data more lucrative on the dark web. Hence, it is recommended that you choose strong passwords, using different alpha-numerical combinations, as well as change them periodically.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Opt for two factor authentication</b></p><p style="text-align:left;">The article adds that the rule of thumb should be when creating any digital account, always set up two-factor authentication (2FA). </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">It’s a common practice to login to accounts using multiple devices, most often of colleagues, or people we trust. Just trusting the person is never enough. It is their machines that you must trust. In case, you have logged into a network on a PC with malware, you are essentially letting cybercriminals access your data. In such cases, having 2FA, helps to prevent egregious attacks where a cybercriminal tries to login to your account and steal your data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Safeguard your entry points</b></p><p style="text-align:left;">The article points out that all it takes is one weak entry point, to allow a cybercriminal access to your entire network. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">By forgetting to close down the access points that are not being used, this can be an open door for hackers to enter, and place malware on to your network.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Lookout for signs of a scam</b></p><p style="text-align:left;">The article points out that phishing attacks have become increasingly common these days, and are using several tactics to target vulnerable users. At the same time, there are often several tell-tale signs of a scam in the making, which you can easily spot, if you keep a sharp lookout for them. For example, emails with improper grammar, and spelling mistakes are one of the biggest giveaways. Additionally, links that promise freebies and then request you to enter card details too are illegitimate.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Frequently update your system</b></p><p style="text-align:left;">The article adds that inexpensive home internet devices are prime targets for hackers. A best practice is to update these frequently, and apply all security patches quickly. In the case of older devices, which no longer receive firmware updates, they should be immediately switched out for newer models, to prevent hackers from controlling traffic through routers, and implementing various attacks.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Cybercrime is advancing at a rate which we can no longer afford to take lightly, or ignore. No organization or user today can be considered too small to be a potential victim, hence there is a strong need to create awareness on phishing or targeted attacks. Furthermore, the increased dependence on technology to stay connected, and ensure business continuity, has opened the floodgates to a whole new set of potential cybersecurity vulnerabilities that users must be conscious of. By practising these simple tips and maintaining good IT hygiene, we can be cybersmart, and safe on the internet.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">There are other helpful, yet simple, <a href="https://whnt.com/news/online-safety-tips-for-national-cyber-security-awareness-month/">tips to follow</a>: </p><p style="text-align:left;">- increase your online privacy. Protect your online accounts by implementing multifactor authentication and using strong passwords, which consist of letters, numbers and special characters. Individuals should also refrain from accessing banking information or making online purchases when connected to an unsecured public network;</p><p style="text-align:left;">- stay secure while you work. As more employees work virtually during the COVID-19 crisis, they should be more vigilant about internet scams and online fraud. Business and personal information should be treated with the same care; avoid sharing it with unfamiliar parties or over unsecured networks. It is important to keep the security software on your business devices up to date, because only one employee needs to be compromised for an entire organization to experience a data breach;</p><p style="text-align:left;">- use social media responsibly. Social media is a great way to connect with friends and family, but it can also allow scammers and cybercriminals to target you. Only accept friend requests from people you trust, avoid clicking links in messages from strangers, and refrain from posting your personal information online. Remember to be careful about what you share. Remember, there is no “delete” button online.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><span style="color:inherit;"><span style="font-size:11pt;">“The responsibility to fight cyber crime is upon all of us. We cannot stand back and say that it should be an issue that needs to be tackled at board level. We are all exposed and we can all take a stand against this. Simple interventions, and being aware, can definitely go a long way to address this. Are you going to play an active role?” asks Craig Tarr, CEO of GTconsult.&nbsp;</span></span><br></p></div>
</div><div data-element-id="elm_0nA7lU8VRRKuqFetk31NYQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 27 Oct 2020 08:38:59 +0000</pubDate></item><item><title><![CDATA[A place for everything in cyber security]]></title><link>https://www.gtconsult.com/blogs/post/a-place-for-everything-in-cyber-security</link><description><![CDATA[When faced with two challenges, it important to know the difference between the two so that you can devise an appropriate strategy to address them. ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_qmThPrXzR3anFMB1BvfgWw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_T-qvmJJWScG2hIfMC35Hzg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Utwpsu_PTliHmqPMbM1l8A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Ak_V0QsKQgyrj7m1BHCLZQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Ak_V0QsKQgyrj7m1BHCLZQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">The face of the moon was in shadow</h2></div>
<div data-element-id="elm_nokAdMq3Q-uxYQrfD0RI1A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nokAdMq3Q-uxYQrfD0RI1A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><img src="https://images.unsplash.com/photo-1543248939-4296e1fea89b?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"><br></p><p><br></p><p>When faced with two challenges, it important to know the difference between the two so that you can devise an appropriate strategy to address them. </p><p>&nbsp;&nbsp;</p><p>We are into the third week of Cyber Security Awareness Month and we are presented with the challenge of differentiating between cyber security and cyber resilience. Most companies confuse the two and then come up with these hybrid strategies which are mostly ineffective.</p><p>&nbsp;&nbsp;</p><p>Acknowledging that these strategies are separate, and <a href="https://www.forbes.com/sites/bernardmarr/2020/10/14/the-important-difference-between-cybersecurity-and-cyber-resilience-and-why-you-need-both/#30bb98ca1721">equally important to companies</a>, is the first step towards effective protection. </p><p>&nbsp;&nbsp;</p><p>The article pointed out that cyber threats like hacking, phishing, ransomware, and distributed denial-of-service (DDoS) attacks have the potential to cause enormous problems for organizations. Not only can companies suffer serious service disruption and reputational damage, but the loss of personal data can also result in huge fines from regulators.</p><p>&nbsp;&nbsp;</p><p>Take British Airways as an example. In 2019, the airline was fined more than £183m by the UK's Information Commissioner's Office (ICO) after customer data was compromised in a cyber-attack. Customer details, including name, address, logins, and payment card, were harvested by hackers – affecting half a million customers in total. The fine, which amounts to around 1.5% of British Airways’ global 2018 turnover, was the first proposed by the ICO under the new General Data Protection Regulation (GDPR).</p><p>&nbsp;&nbsp;</p><p>The article adds that cyberattacks like this are hitting the headlines with increasing frequency. But while a company the size of British Airways can, in theory, swallow such a huge fine and cope with the aftermath, for other businesses, the effects of a cyber-attack can be permanent and devastating. This is why all companies need to invest in cybersecurity and cyber resilience.</p><p>&nbsp;&nbsp;</p><p><b>What’s the difference between the two?</b></p><p>In a nutshell, cybersecurity describes a company's ability to protect against and avoid the increasing threat from cybercrime. Meanwhile, cyber resilience refers to a company's ability to mitigate damage (damage to systems, processes, and reputation), and carry on once systems or data have been compromised. Cyber resilience covers adversarial threats (such as hackers and other malicious actors), as well as non-adversarial threats (for example, simple human error).</p><p>&nbsp;&nbsp;</p><p>The article pointed out that one way of thinking about the difference is that cyber resilience involves accepting the fact that no cybersecurity solution is perfect or capable of protecting against every possible form of cyber threat. This is why every company needs both aspects. The cybersecurity strategy is designed to minimize the risk of attacks getting through. But when they inevitably do, the cyber resilience strategy is there to minimize the impact.</p><p>&nbsp;&nbsp;</p><p><b>What does all this mean in practice?</b></p><p>The article adds that practical cybersecurity steps are perhaps more immediately obvious than those for cyber resilience. At the very least, cybersecurity involves ensuring:</p><p>&nbsp;&nbsp;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>All your devices are running the most up-to-date firmware;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>That firewalls, VPNs, and antivirus/malware protection is running and up-to-date;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>That all software and tools are fixed with the latest patches; and</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>That employees at all levels of the business are educated on the potential threats and how their actions help to defend the organization.</p><p>&nbsp;&nbsp;</p><p>The article points out that cyber resilience steps will vary from business to business, but a good starting point is to work out where cyber events and incidents could have the most damaging effects on the business. Drawing up a list of where your operations are reliant on technology, as well as where sensitive and valuable data is stored and used, will help you to gain an overall understanding of how continuity of service could be affected. This is where the concept of a “digital twin” can play an important role in cyber resilience. A digital, simulated model of your organization or its processes can help you understand the impact on overall output and efficiency.</p><p>&nbsp;&nbsp;</p><p>Having gained an understanding of how core functions could be affected, cyber resilience involves putting in place measures to mitigate the damage as best as possible in the event of an attack. For example, you might develop offline emergency processes to keep essential functions such as customer service, quality assurance, finance, and security running as well as possible until the breach can be fixed.</p><p>&nbsp;&nbsp;</p><p>The article adds that, in addition, you’ll need a solid cyber incident response plan to clarify:</p><p>&nbsp;&nbsp;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>&nbsp;What needs to be done in the event of a failure or breach;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>Who is responsible for taking those steps;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>How to communicate the incident to stakeholders (customer services will have a core role to play here);</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>How failures should be reported to regulators (which may be a regulatory requirement in your jurisdiction);</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>How to assess and report the impact of resilience measures;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>How to get back to normal operations as quickly as possible; and</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>How to recover data, if data has been lost or accidentally erased (cyber resilience promotes the idea that it’s impossible to certify that any piece of data is totally “safe,” even if the data is backed up, and therefore steps should be in place to recover it when it is lost).</p><p>&nbsp;&nbsp;</p><p>To help put this plan into action in the event of an incident, many organizations find it helps to create a response team, with representatives from every business department who are responsible for declaring a “state of emergency” and coordinating first responses.</p><p>&nbsp;&nbsp;</p><p>The article points out that technology brings incredible new opportunities and business advantages, but it also brings unprecedented new threats. Cybersecurity and resilience both require an investment in time, resources, and education, but that investment will be repaid many times over once you’ve withstood your first cyber-attack.</p><p>&nbsp;&nbsp;</p><p><b>Accelerated focus</b></p><p>What is encouraging to see is that there is an accelerated focus on cyber security adoption. Recent studies show that 83% of enterprises <a href="https://www.forbes.com/sites/louiscolumbus/2020/10/18/83-of-enterprises-transformed-their-cybersecurity-in-2020/#30bbb8a937c8">transformed their cybersecurity in 2020</a>. </p><p>&nbsp;&nbsp;</p><p>The article points out that this, and many other insights are from a recent survey of IT leaders completed by CensusWide and sponsored by Centrify. The survey's objectives on understanding how the dynamics of IT investments, operations and spending have shifted over the last six months. The study finds that the larger the enterprise, the more important it is to secure remote access to critical infrastructure to IT admin teams. Remote access and updating privacy policies and notices are two of the highest priorities for mid-size organizations to enterprises today. The methodology is based on interviews with 215 IT leaders located in the U.S.&nbsp; </p><p>&nbsp;&nbsp;</p><p>Some of the key highlights of the study include:</p><p>&nbsp;&nbsp;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>73% of enterprises (over 500 employees) accelerated their cloud migration plans to support the shift to remote working across their organizations due to the pandemic;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>81% of enterprises accelerated their IT modernization processes due to the pandemic;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>48% of all companies surveyed have accelerated their cloud migration plans, 49% have sped up their IT modernization plans because of Covid-19;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>32% of large-scale enterprises, over 500 employees, are implementing more automation using artificial intelligence-based tools this year.</p><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><b>SMB adoption</b></p><p>The article points out that the overwhelming majority of enterprises have transformed their cybersecurity approach over the last six months, with 83% of large-scale enterprises leading all organizations. It's encouraging to see small and medium-sized businesses adjusting and improving their approach to cybersecurity. </p><p>&nbsp;&nbsp;</p><p>Reflecting how digitally-driven many small and medium businesses are, cybersecurity adjustments begin in organizations with 10 to 49 employees. 60% adjusted their cloud security postures as a result of distributed workforces. </p><p>&nbsp;&nbsp;</p><p><b>Leading the way</b></p><p>The article adds that 48% of all organizations had to accelerate cloud migration due to the pandemic, with larger enterprises leading the way. </p><p>&nbsp;&nbsp;</p><p>Enterprises with over 500 employees are the most likely to accelerate cloud migration plans due to the pandemic. 73.5% of enterprises with more than 500 employees accelerated cloud migration plans to support their employees' remote working arrangements, leading all organization categories. </p><p>&nbsp;&nbsp;</p><p>This finding reflects how cloud-first the largest enterprises have become this year. It's also consistent with many other surveys completed in 2020, reflecting how much the cloud has solidly won the enterprise. </p><p>&nbsp;&nbsp;</p><p><b>Modernization</b></p><p>The article points out that 49% of all organizations and 81% of large-scale enterprises had to accelerate their IT modernization process due to the pandemic. </p><p>&nbsp;&nbsp;</p><p>For the largest enterprises, IT modernization equates to digitizing more processes using cloud-native services (59%), maintaining flexibility and security for a partially remote workforce (57%) and revisiting and adjusting their cybersecurity stacks (40%).</p><p>&nbsp;&nbsp;</p><p><b>Highest priority</b></p><p>The article adds that 51% of enterprises with 500 employees or more are making remote, secure access their highest internal priority. In contrast, 27% of all organizations' IT leaders say that providing secure, granular access to IT admin teams, outsourced IT and third-party vendors is a leading priority. </p><p>&nbsp;&nbsp;</p><p>The larger the enterprise, the more important remote access becomes. The survey also found organizations with 250 – 500 employees are most likely to purchase specific cybersecurity tools and applications to meet compliance requirements. </p><p>&nbsp;&nbsp;</p><p><b>Lesson learning</b></p><p>The article points out that IT leaders are quickly using the lessons learned from the pandemic as a crucible to strengthen cloud transformation and IT modernization strategies. One of every three IT leaders interviewed, 34%, say their budgets have increased during the pandemic. In large-scale enterprises with over 500 employees, 59% of IT leaders have seen their budgets increase.</p><p>&nbsp;&nbsp;</p><p>All organizations are also keeping their IT staff in place. 63% saw little to no impact on their teams, indicating that the majority of organizations will have both the budget and resources to maintain or grow their cybersecurity programs. 25% of IT leaders indicated that their company plans to keep their entire workforce 100% remote.</p><p>&nbsp;&nbsp;</p><p>The article adds that it's encouraging to see IT leaders getting the support they need to achieve their cloud transformation and IT modernization initiatives going into next year. With every size of organization spending on cybersecurity tools, protecting cloud infrastructures needs to be a priority. Controlling administrative access risk in the cloud and DevOps is an excellent place to start with a comprehensive, modern Privileged Access Management solution. Leaders in this field, including Centrify, whose cloud-native architecture and flexible deployment and management options, deliver deep expertise in securing cloud environments.</p><p>&nbsp;&nbsp;</p><p><b>The bottom line</b></p><p>The bottom line is that it’s time for a <a href="https://gcn.com/articles/2020/10/19/security-optimization.aspx">better approach to cybersecurity</a>. You may be sufficiently covered and up to speed with the latest industry trends. The fact of the matter is that this industry is constantly evolving, and at a pace that is much quicker than most companies can cope with. </p><p>&nbsp;&nbsp;</p><p>The role of chief security officer has never been easy, especially in the complex bureaucracies of the federal government. Stakes are high, IT infrastructure is sprawling and Congressional oversight could lead to a hearing in an instant. Additionally, nation-states and criminals are increasing their attacks against government agencies, shifting from disruptive and destructive tactics to large-scale social manipulation through disinformation operations.</p><p>&nbsp;&nbsp;</p><p>The article points out that security teams are tasked with defending U.S. government critical assets against cyberthreats, yet they often lack insight into the effectiveness of their security controls.&nbsp; Unless they are exercised regularly, security controls fail through misconfiguration or user mistakes. Security leaders can help solve this problem by focusing their teams on the threats that matter most and by shifting their approach to a data-driven strategy with performance effectiveness at the center. </p><p>&nbsp;&nbsp;</p><p>The need for increased security effectiveness is clear. Today government agencies face elevating cyberthreats since the onset of COVID-19 and heightened tensions in American society, particularly in advance of the 2020 presidential election. Unemployment and civil unrest provide nation-state groups with preconditions for operations, as a recent Harvard University study on disinformation outlined. The FBI and Department of Homeland Security recently warned against Chinese and other state-sponsored attackers increasing malicious operations amidst the pandemic. Within government, the pandemic has strained workforces, leaving them ill-equipped to address the increasing number of threats. With Gartner forecasting global government IT spending will decline 0.6% in 2020, it’s unclear how agencies can remain secure on a leaner budget.</p><p>&nbsp;&nbsp;</p><p><b>How to do more with less</b></p><p>The article adds that government IT managers need a way to optimize their security strategy by continuously validating their networks and gauging the effectiveness of current controls to ensure their investments work as intended.</p><p>&nbsp;&nbsp;</p><p>Security optimization is the management practice of maximizing the efficiency and effectiveness of an organization’s total security program by ensuring that existing control investments are measured, monitored and modified continuously from a threat-informed perspective. Security optimization is not about cost cutting; it is about programmatically aligning security and risk services within the organization.</p><p>&nbsp;&nbsp;</p><p>The article points out that It all comes down to data. To achieve efficiency and effectiveness across a security program, government agencies must shift from a project-centric to a program-oriented mindset with performance data at the center.</p><p>&nbsp;&nbsp;</p><p><b>Nuts and bolts</b></p><p>What would that program look like? First, it would be underpinned by the MITRE ATT&amp;CK framework. Second, it would include automated testing, pitting cyberdefenses against known threats. Third, it would use automated testing to generate real data about the security team’s operational performance.</p><p>&nbsp;&nbsp;</p><p>The article points out that this is a shift in security program strategy. By organizing teams around a shared view of threats, automation and performance data, security leaders can make programmatic improvements in people, process and technology to gain the best return on investment. </p><p>&nbsp;&nbsp;</p><p>Traditionally, “blue team” network defenders focus their operations on meeting baseline cybersecurity best-practices: correcting misconfigurations, administering patches and deploying best-in-class commercial products. If defenses are not oriented toward the most important threats, however, those resources are wasted. If they are not tested actively against probable threats, they are likely to fail when challenged by the adversary, letting the attacker slip past. </p><p>&nbsp;&nbsp;</p><p>The article adds that security organizations typically turn to “red teams” and penetration testing to help secure the enterprise. Red teaming is the process of testing technologies, policies, systems and assumptions by adopting an adversary’s approach.&nbsp; Although red teams often discover faults in cyberdefense programs, red-team testing is notoriously sporadic, under-resourced and ineffective in validating security controls continuously and at scale to achieve real security effectiveness. </p><p>&nbsp;&nbsp;</p><p><b>Purple teams</b></p><p>The article points out that one way to improve the efficiency of this approach is by having blue- and red-focused teams adopt a purple team mindset for cyberdefense operations. </p><p>&nbsp;&nbsp;</p><p>Purple team doctrine ensures that organizations optimize their cybersecurity continuously by validating their controls against a library of known attack methods. Purple teams focus on the overarching threat landscape. They understand their security technologies, their organization and its operational attributes. When combined with automation, security teams can test these operations at scale, across the organization, and discover ways to improve security efficiency and effectiveness. The Defense Department has conducted purple team operations to achieve cybersecurity effectiveness for military networks. Other government agencies should adopt a threat-informed, purple team mindset to improve their cybersecurity effectiveness at a programmatic level.&nbsp; </p><p>&nbsp;&nbsp;</p><p>By ensuring that existing security investments are measured, monitored and modified continuously from a threat-informed perspective, senior security leaders can use performance data to make sound investment decisions, improve the cybersecurity of government agencies and better protect Americans’ data.</p><p>&nbsp;&nbsp;</p><p><b>Important tips</b></p><p>In the modern age, small and medium businesses contribute a lot towards economic development. However, these are the companies who are most vulnerable to cyber attacks. </p><p>&nbsp;&nbsp;</p><p>Here are <a href="https://www.webtitan.com/blog/10-cybersecurity-tips-for-small-businesses/">some important tips</a> for these companies to follow:</p><p>&nbsp;&nbsp;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>Implement a Robust Firewall. A firewall is a cybersecurity solution that sits between a small business network and the outside world and prevents unauthorized individuals from gaining access to the network and stored data. Not all firewalls are created equal. Extra investment in a next generation firewall is money well spent. Don’t forget to also protect remote workers. Ensure that they are also protected by a firewall;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>Create and Enforce Password Policies. You should implement password policies that require all users to set strong, secure passwords. A strong, unique password should be used for all systems. Passwords should include capitals, lower-case letters, a number, and a special character, and should be at least 10 digits long. Teach employees how to create secure passwords and enforce your password policies. Consider using a password manager so passwords do not need to be remembered.&nbsp; Consult NIST for the latest password guidance;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>Security Awareness Training. Make sure you provide the workforce with regular security awareness training. This is the only way that you can create a culture of cybersecurity. Be sure to cover the security basics, safe Internet use, how to handle sensitive data, creation of passwords, and mobile device security. You should provide training to help employees avoid phishing attacks and consider phishing simulation exercises to test the effectiveness of your training program;</p><p style="text-indent:0in;">-<span style="font-size:7pt;">&nbsp; &nbsp; </span>Backups. It is essential to have a good backup policy. In the event of disaster, such as a ransomware attack, you need to be able to recover critical data. Backups must also be tested to make sure files can be recovered. Don’t wait until disaster strikes to test whether data can be recovered. A good strategy is the 3-2-1 approach. Three backup copies, on two different types of media, with one copy stored securely offsite.</p><p>&nbsp;&nbsp;</p><p><b>So where does GT fit in?</b></p><p>GTconsult has a long history of assisting companies with their cybersecurity and cyber resilience. A lot of our clients are large companies; however, we specialise in SMBs as that is where our A Team can give focused advice and assistance. </p><p>&nbsp;&nbsp;</p><p><span style="color:inherit;"></span></p><p>GTconsult offers a range of cyber security services that will ensure that you are protected against any threats. We also have our A Team which will assist you with any concerns you have. Contact us today to find out more.</p></div>
</div><div data-element-id="elm_qNpvkFi6SmWMlPB_gVAb1Q" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 22 Oct 2020 10:16:10 +0000</pubDate></item><item><title><![CDATA[SharePoint Performance Tricks: Optimizing SQL]]></title><link>https://www.gtconsult.com/blogs/post/sharepoint-performance-sql</link><description><![CDATA[Our CEO and co-founder, Brad Geldenhuys, has shared some tips and tricks for optimizing SQL. We love when Brad lets loose with&nbsp;his technical chop ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_acF00UCHSxe2rYHJaSF_eg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_KkzNIQUqT0K-ilsyCOQ8WQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_wwfcYmL9ReOv_1a6iLZPPg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_UU61wYyLR6yl6mNA5uT2LQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p><strong>Our CEO and co-founder, Brad Geldenhuys, has shared some tips and tricks for optimizing SQL. We love when Brad lets loose with&nbsp;his technical chops, and so will you!</strong></p><p>=======</p><p>I work with SharePoint for a living, we have a number of clients ranging across the board from mining to professional services, retail to automotive and everything in between.&nbsp; In my earlier years as a SharePoint consultant, the solution was the most important part of requirement for me and over time I have come to realize that while the solution is the end goal. If the performance of that solution is not acceptable the solution will fail.&nbsp; This concept applies to all clients big and small and to everyone involved in the solution from SharePoint consultant to client.</p><p>In my experience there are 4 key items which lay the foundation of SharePoint Performance.</p><ol><li>Infrastructure</li><li>Operating System</li><li>SQL</li><li>SharePoint Architecture</li></ol><p>Any of the above key fundamentals are missing SharePoint will either not perform at all or very slowly, either of which is not desirable.</p><p>Today we are going to unpack SQL tricks to improve SharePoint performance, and not only that, we are going to measure the performance increase with <a href="https://www.gtconsult.com/portfolio-item/umlindi/">Umlindi </a>to get real-time results.</p><h1 id="thebenchmark">The Benchmark</h1><p>I am using a free download of <a href="https://www.gtconsult.com/portfolio-item/umlindi/">Umlindi SharePoint Protector</a> to monitor my SharePoint environment and the current score is 40 with a page load of 281 milliseconds.</p><p><img src="/wp-content/uploads/2020/06/UmlindiHighScore.png" alt="UmlindiHighScore"></p><p>We need to get that down to as close to 0 as possible.</p><h2 id="parallelism">Parallelism</h2><p>Parallelism is important and explained very well in this video <a href="https://www.youtube.com/watch?v=QkymlR4ZdIE">https://www.youtube.com/watch?v=QkymlR4ZdIE</a> By Brent Ozar</p><p>First things first, let’s Open the Advanced Tab in SQL Studio Manager and check to see what those defaults are set to and see if we can optimize there.</p><p><img src="/wp-content/uploads/2020/06/SQLParral-1024x889.png" alt="SQLParral"></p><p>To cut a long story short we are going to up Cost Threshold for Parallelism to 50 and Max Degree of Parallelism to 4 because we have 4 cores on our DB server.</p><p>The default value for Cost Threshold is too low and the default value for Max Degree is too high so we tweak them to be just right.</p><h2 id="fillfactor">Fill Factor</h2><p>We are also going to change the Default index fill factor to 80 to reduce overall fragmentation’s of our databases.&nbsp; We set this to 80.</p><p><img src="/wp-content/uploads/2020/06/fillfactor.png" alt="fillfactor"></p><p>I know this is a very sticky area and there are many blogs and opinions out there as to what to do for this area. However from our testing and a number of expert opinions this is great settings for SharePoint.</p><p>Benjemin Matthews on Fill Factor – <a href="http://www.benjaminathawes.com/2012/01/23/sharepoint-sql-server-fill-factor-and-index-rebuilds-a-correction/">http://www.benjaminathawes.com/2012/01/23/sharepoint-sql-server-fill-factor-and-index-rebuilds-a-correction/</a></p><h2 id="addbackupcompression">Add backup compression</h2><p>In the words of Brent Ozar &nbsp;<a href="https://www.brentozar.com/archive/2013/09/five-sql-server-settings-to-change/">https://www.brentozar.com/archive/2013/09/five-sql-server-settings-to-change/</a></p><p><img src="/wp-content/uploads/2020/06/compressbackup.png" alt="compressbackup"></p><p><em>“Free compression! If you’re using SQL Server starting with SQL Server 2008R2, you can flip a check box and get yourself some backup compression. This is a no brainer, really – backups are smaller, they take less time, and the restores even take less time. What’s not to love?”</em></p><h2 id="instantfileinitialization">Instant File Initialization</h2><p>You won’t find a setting for Instant File Initialization in Studio Manager</p><p>Instead SQL detects whether or not the service account it’s running under has the <strong>Perform Volume Maintenance Tasks</strong>&nbsp;permission in the Windows Security Policy. You can find and edit this policy by running&nbsp;<strong>secpol.msc</strong>&nbsp;(Local Security Policy) in Windows. Then:</p><ol><li>Expand the Local Policies Folder</li><li>Click on User Rights Assignment</li><li>Go down to the “Perform Volume Maintenance Tasks” option and double click it</li><li>Add your SQL Server Service account, and click OK out of the dialog.</li></ol><p><img src="/wp-content/uploads/2020/06/localsecurity.png" alt="localsecurity"></p><p>More from Brent Ozar the SQL Master, but bottom line here is shaving off bits of performance where possible.&nbsp;<a href="https://www.brentozar.com/blitz/instant-file-initialization/">https://www.brentozar.com/blitz/instant-file-initialization/</a></p><p>Now after all those changes we reboot the SQL box and lets see what happens to the SharePoint Umlindi Score if it has made any difference.</p><h1 id="theresult">The&nbsp;Result</h1><p><img src="/wp-content/uploads/2020/06/umlindigood.png" alt="umlindigood"></p><p>Excellent our Umlindi scores is now down to just 20 and on 89 millisecond page load time.&nbsp; That’s a huge saving and an overall gain to our users on the SharePoint environment.</p><p>I have already made significant improvements to this environment with Infrastructure, OS and SharePoint tips and tricks, I will post those findings soon for you guys so stay tuned.</p><p>Get your free download of <a href="https://www.gtconsult.com/portfolio-item/umlindi/">Umlindi SharePoint Protector</a> and start improving monitoring and improving your SharePoint environment today.</p><p>=======</p><p>Want more info on the benefits of Umlindi? Check out this video!</p><a href="https://www.youtube.com/embed/kD_dmVznUHA" target="_blank">https://www.youtube.com/embed/kD_dmVznUHA</a></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 10 Feb 2016 13:14:27 +0000</pubDate></item></channel></rss>