We believe it is important for you to know that in response to the April 7th’s disclosure of CVE-2014-016 aka Heartbleed, we have conducted a comprehensive security review.
JaRay runs in a secure Famhost server farm with continuous safeguards and monitoring in place. Data like phone call recordings, photos, scans, video and other files are stored in the AWS cloud and linked.
No user or connection to the cloud has direct access to JaRay files and since we started hosting JaRay in 1999, no user credentials have ever been compromised. I know that it can be frustrating when you get locked out of JaRay or we need to do unscheduled reboots to apply updates but sometimes we get too cautious. For years, many of our customers have requested mobile apps.
Our mobile bridge security and driver login algorithms are now in place so we will soon offer access without requiring a full JaRay license. We won’t compromise on security. Almost 25% of our operating budget is spent on keeping your data safe.
Watch for the many new apps on Android, iOS, and Windows for your managers, drivers, owners, and even customers.
You may have noticed some changes in the caller-id (BizYak) screen. We have been testing the two-way texting for quite some time and are putting the final touches on it. More to come!
You can set up a BizYak number as a Tech to customer Number. When the tech calls the T2C number, the JaRay system recognizes the tech’s
phone number and redirects it to the last customer that they were dispatched to.
The tech doesn’t need to know the customer’s phone number and can simply select the T2C number as a speed dial number. The same BizYak T2C number is used for all techs for each company (dispatch board) that you have.
When you dispatch the job, the system points the Tech’s mobile number listed in the employee file (from main menu 2,U,8) to the customer’s number that you put into the scheduling screen when you scheduled the job. It is going to call the “Phone # to use” and should be manually entered when you schedule to make sure that the customer can be reached. You may need to enter the area code.
When the tech calls the T2C number, the customer sees the caller-id of the office, not the Tech’s cell phone. The call is automatically recorded and a link is created to the call in the customer record. The call is logged and the dispatcher or answering service can see that the tech called the customer and what time the call was made.
To stay in compliance with HIPAA, PCI, and other new identity protection rulings, we’ve changed the login process.
There a number of benefits to your company as a result and we believe that your users will love them. The biggest change is that when they log in to the Famhost server, they will log in with all the rights that you set up for them when you determine their security access levels and which applications they can run in the Employee setup menu at 6N. They will no longer need to log into JaRay with a username and password each time they open a new screen.
Each user will receive their own personalized navigational bar at the top of the screen which can be moved around or even minimized. When they click on an application, the application will automatically open without requiring another username and password.
There are no restrictions and you can open as many windows as you need on each monitor. You can use any screen resolution and can run one monitor for your mapping system another for dispatching, another for Linkwriter or proposals, customer records or any other combination of screens or multiple windows. You can see that the applications open very fast.
The only additional cost is the monitor and you may need to add additional ports on your computer. Since all the processing happens on the server side, very little resources or bandwidth is required on the client side. That is very important as we move into wireless devices because it affects bandwidth, speed and data costs. Because nothing is cached on the user’s device, the system is very secure. If a user loses or has a laptop stolen, for example, the thief can’t get any of your company’s information.
Another benefit for your management staff is that you can now use the system on almost any device that is capable of accessing the Internet. So you can run the application at your office on a pc, your home on your Apple computer, at a restaurant on your cell phone and on a flight or in your car with an iPad or Android device. There are no additional Famhost fees as long as you don’t exceed the number of user licenses. You may need to purchase an inexpensive 3rdparty client depending on the type of device you are running.
To be brutally honest, I feel that I am being dragged into social networking. I’m much more comfortable working on R&D, a work flow process or graphical interfaces. But I am excited about this new venue and am looking forward to using it to share new features and processes and help you grow your businesses profitably.
Whether we like it or not, business is changing. The Internet has made the world very small – an understatement for sure. Something can become “viral” in just a few hours and make or break a company over night. Major brands are disappearing and this new playing field favors the company that has its finger on the pulse of the community it serves.
My wife asked me to pick up some chili from Wendy’s on my way home from work tonight. I noticed that the bag had an unusual website printed in a very large font:www.tellwendys.com. I doubt that Wendy’s really wanted people who were happy to call and pat them on the back. They wanted people who have problems and are angry about their service to vent with them and not with the rest of the world. They know that they need to take a proactive stance and solve problems while they are still small.
Companies have learned sometimes the hard way, that customers are demanding more personalized services and they have begun to monitor social networks to aid them in protecting their good name and to do damage control. There is also an opportunity to encourage loyalty and good will. The traditional marketing strategies are no longer providing a good ROI. Change has come.
Social networking sites have emerged as powerful influences on how businesses are perceived. So far, few businesses have leveraged sources such as Twitter, Facebook and YouTube as an important part of their marketing strategy. Consumers are expecting much more information and Social Networking sites encourage them to ask their peers for references before they purchase. It has helped consumers and businesses “friend” each other.
Please offer suggestions and comments on how you do things. Of course, my focus will be on helping our current customers learn how to get the most out of the system that they already are paying for. However, I believe that any business will be able to benefit by understanding the principles that have caused our applications to evolve. We are humbled by the confidence you have placed in our service. Let’s begin the journey.