{"appState":{"pageLoadApiCallsStatus":true},"categoryState":{"relatedCategories":{"headers":{"timestamp":"2025-04-29T08:01:06+00:00"},"categoryId":33512,"data":{"title":"Technology","slug":"technology","image":{"src":"https://www.dummies.com/wp-content/uploads/technology-category.jpg","width":643,"height":1286},"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512}],"parentCategory":{"categoryId":0,"title":null,"slug":null,"_links":null},"childCategories":[{"categoryId":35241,"title":"Virtual Reality","slug":"virtual-reality","_links":{"self":"https://dummies-api.dummies.com/v2/categories/35241"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":5,"bookCount":2},{"categoryId":33513,"title":"Computers","slug":"computers","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33513"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":1394,"bookCount":57},{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33537"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":62,"bookCount":14},{"categoryId":33538,"title":"Digital Audio & Radio","slug":"digital-audio-radio","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33538"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":131,"bookCount":5},{"categoryId":33543,"title":"Electronics","slug":"electronics","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33543"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":1757,"bookCount":46},{"categoryId":33572,"title":"Information Technology","slug":"information-technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":816,"bookCount":69},{"categoryId":33587,"title":"Internet Basics","slug":"internet-basics","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33587"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":86,"bookCount":3},{"categoryId":33588,"title":"Notable Websites","slug":"notable-websites","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33588"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":188,"bookCount":4},{"categoryId":33592,"title":"Programming & Web Design","slug":"programming-web-design","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33592"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":1396,"bookCount":102},{"categoryId":33611,"title":"Social Media","slug":"social-media","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33611"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":386,"bookCount":21},{"categoryId":33618,"title":"Software","slug":"software","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33618"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":3196,"bookCount":194}],"description":"Technology. It makes the world go 'round. And whether you're a self-confessed techie or a total newbie, you'll find something to love among our hundreds of technology articles and books.","relatedArticles":{"self":"https://dummies-api.dummies.com/v2/articles?category=33512&offset=0&size=5"},"hasArticle":true,"hasBook":true,"articleCount":9418,"bookCount":517},"_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"}},"relatedCategoriesLoadedStatus":"success"},"listState":{"list":{"count":10,"total":9437,"items":[{"headers":{"creationTime":"2025-04-28T15:32:31+00:00","modifiedTime":"2025-04-28T15:32:31+00:00","timestamp":"2025-04-28T18:01:10+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Cybersecurity","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33537"},"slug":"cybersecurity","categoryId":33537}],"title":"The Business Benefits of Prioritizing Identity Security","strippedTitle":"the business benefits of prioritizing identity security","slug":"the-business-benefits-of-prioritizing-identity-security","canonicalUrl":"","seo":{"metaDescription":"Learn how prioritizing identity security can enhance your organization's defenses, improve employee experience, and drive significant business benefits.","noIndex":0,"noFollow":0},"content":"Today, applications can run anywhere — on-premises or in the cloud — and users can access them from anywhere, on virtually any device. Modern business trends including remote and hybrid work, distributed and extended workforces (such as contractors, partners, vendors, and other third parties), and the proliferation of cloud-hosted applications have led to the emergence of a new security perimeter: identity.\r\n<p class=\"article-tips remember\">An <em>identity</em> includes attributes such as user (or account) name, password (or passphrase or secret key), roles, access privileges, and historical context. This information identifies an individual or entity (such as a service, device, or application) in an organization’s systems and networks.</p>\r\nAs attackers increasingly target identities, organizations must stay ahead by implementing a comprehensive identity security program. In this article, we explain how the right approach to identity security can enhance your organization’s security posture, improve the employee experience, and deliver significant business benefits.\r\n<p class=\"article-tips warning\">Rather than developing exploits for system or application vulnerabilities, attackers can simply log in with stolen credentials. According to the 2024 <em>Verizon Business Data Breach Investigations Report</em> (DBIR), 68 percent of breaches are the result of credential theft (that is, the “human element”) from vectors including social engineering techniques (such as phishing, smishing, business email compromise, and pretexting) and brute-force dictionary attacks.</p>\r\n\r\n<h2 id=\"tab1\" >A strong security posture is good for business</h2>\r\nWhen an organization falls victim to a ransomware attack or a data breach, normal business operations grind to a halt. It’s never “business as usual” when your employees, partners, and customers can’t access your critical applications and data because of a cyberattack.\r\n\r\nBy improving network security and account hygiene, an identity security program can help organizations prevent breaches before they occur and respond quickly when compromised accounts are discovered, thus reducing the impact of any potential breaches.\r\n<h2 id=\"tab2\" >Don’t be the weak link in your supply chain security posture</h2>\r\nIn our modern interconnected world, no business is an island, and the weakest link in your security posture may be one of your supply chain partners. According to research from BlueVoyant, more than four-fifths of organizations (81 percent) were impacted by supply chain attacks in 2024. Of course, supply chain attacks aren’t new — the 2013 Target data breach was the result of a compromised account belonging to a third-party maintenance vendor — but they have become more prevalent. More recently, the Change Healthcare (a subsidiary of UnitedHealth Group) attack in February 2024 cost nearly $9 billion in response efforts and assistance to affected healthcare providers.\r\n\r\nEvery business has a supply chain and is a part of the supply chain itself — whether as an upstream supplier, downstream customer, or both. Third-party risk management has taken on renewed importance and can be a competitive differentiator when selecting new partnerships or renewing existing relationships. Yet many organizations struggle to manage third-party access to their systems and data. A strong identity security program can help an organization better manage guest accounts and monitor third-party activities, reducing the risk of data breaches caused by third-party access.\r\n<h2 id=\"tab3\" >Security is only strong if it is adopted</h2>\r\nWhile the login experience isn’t likely to top your employees’ list of factors impacting job satisfaction, it is a routine part of their daily work lives, and a poor experience can quickly cause user frustration. Struggling to remember different passwords, answering numerous multi-factor authentication (MFA) prompts, or calling the help desk to unlock their account — all before they’ve had their first cup of coffee — isn’t a great way to start the workday.\r\n\r\nEmployees can benefit from an identity security program that provides quick and seamless access to their applications and devices, increasing productivity and reducing user frustration. A well-designed identity security program can also increase operational efficiency and decrease resource strain on IT and help desk teams by streamlining identity and access management (IAM) workflows such as account provisioning, permissions management, MFA enrollment, password resets, and reporting. It’s a win-win for everyone.\r\n<p class=\"article-tips tip\">By defining clear objectives and tying them to known business drivers and risks, organizations can ensure a strong identity security program that delivers measurable business value. To learn more about identity security and its business benefits, visit <a href=\"https://duo.com/\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">https://duo.com/</a> and download a free copy of <em>Identity Security For Dummies</em>.</p>","description":"Today, applications can run anywhere — on-premises or in the cloud — and users can access them from anywhere, on virtually any device. Modern business trends including remote and hybrid work, distributed and extended workforces (such as contractors, partners, vendors, and other third parties), and the proliferation of cloud-hosted applications have led to the emergence of a new security perimeter: identity.\r\n<p class=\"article-tips remember\">An <em>identity</em> includes attributes such as user (or account) name, password (or passphrase or secret key), roles, access privileges, and historical context. This information identifies an individual or entity (such as a service, device, or application) in an organization’s systems and networks.</p>\r\nAs attackers increasingly target identities, organizations must stay ahead by implementing a comprehensive identity security program. In this article, we explain how the right approach to identity security can enhance your organization’s security posture, improve the employee experience, and deliver significant business benefits.\r\n<p class=\"article-tips warning\">Rather than developing exploits for system or application vulnerabilities, attackers can simply log in with stolen credentials. According to the 2024 <em>Verizon Business Data Breach Investigations Report</em> (DBIR), 68 percent of breaches are the result of credential theft (that is, the “human element”) from vectors including social engineering techniques (such as phishing, smishing, business email compromise, and pretexting) and brute-force dictionary attacks.</p>\r\n\r\n<h2 id=\"tab1\" >A strong security posture is good for business</h2>\r\nWhen an organization falls victim to a ransomware attack or a data breach, normal business operations grind to a halt. It’s never “business as usual” when your employees, partners, and customers can’t access your critical applications and data because of a cyberattack.\r\n\r\nBy improving network security and account hygiene, an identity security program can help organizations prevent breaches before they occur and respond quickly when compromised accounts are discovered, thus reducing the impact of any potential breaches.\r\n<h2 id=\"tab2\" >Don’t be the weak link in your supply chain security posture</h2>\r\nIn our modern interconnected world, no business is an island, and the weakest link in your security posture may be one of your supply chain partners. According to research from BlueVoyant, more than four-fifths of organizations (81 percent) were impacted by supply chain attacks in 2024. Of course, supply chain attacks aren’t new — the 2013 Target data breach was the result of a compromised account belonging to a third-party maintenance vendor — but they have become more prevalent. More recently, the Change Healthcare (a subsidiary of UnitedHealth Group) attack in February 2024 cost nearly $9 billion in response efforts and assistance to affected healthcare providers.\r\n\r\nEvery business has a supply chain and is a part of the supply chain itself — whether as an upstream supplier, downstream customer, or both. Third-party risk management has taken on renewed importance and can be a competitive differentiator when selecting new partnerships or renewing existing relationships. Yet many organizations struggle to manage third-party access to their systems and data. A strong identity security program can help an organization better manage guest accounts and monitor third-party activities, reducing the risk of data breaches caused by third-party access.\r\n<h2 id=\"tab3\" >Security is only strong if it is adopted</h2>\r\nWhile the login experience isn’t likely to top your employees’ list of factors impacting job satisfaction, it is a routine part of their daily work lives, and a poor experience can quickly cause user frustration. Struggling to remember different passwords, answering numerous multi-factor authentication (MFA) prompts, or calling the help desk to unlock their account — all before they’ve had their first cup of coffee — isn’t a great way to start the workday.\r\n\r\nEmployees can benefit from an identity security program that provides quick and seamless access to their applications and devices, increasing productivity and reducing user frustration. A well-designed identity security program can also increase operational efficiency and decrease resource strain on IT and help desk teams by streamlining identity and access management (IAM) workflows such as account provisioning, permissions management, MFA enrollment, password resets, and reporting. It’s a win-win for everyone.\r\n<p class=\"article-tips tip\">By defining clear objectives and tying them to known business drivers and risks, organizations can ensure a strong identity security program that delivers measurable business value. To learn more about identity security and its business benefits, visit <a href=\"https://duo.com/\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">https://duo.com/</a> and download a free copy of <em>Identity Security For Dummies</em>.</p>","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33537"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"/articles/299133"}}],"inThisArticle":[{"label":"A strong security posture is good for business","target":"#tab1"},{"label":"Don’t be the weak link in your supply chain security posture","target":"#tab2"},{"label":"Security is only strong if it is adopted","target":"#tab3"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":302743,"title":"Modern DSPM and the Importance of Discovering and Classifying Sensitive Data","slug":"modern-dspm-and-the-importance-of-discovering-and-classifying-sensitive-data","categoryList":["technology","cybersecurity"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/302743"}},{"articleId":302507,"title":"What Is Zero Risk Application Security and How Can It Align with Compliance Frameworks?","slug":"what-is-zero-risk-application-security-and-how-can-it-align-with-compliance-frameworks","categoryList":["technology","cybersecurity"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/302507"}},{"articleId":302201,"title":"SAP Application Security: Get Clean, Stay Clean, and Optimize","slug":"sap-application-security-get-clean-stay-clean-and-optimize","categoryList":["technology","cybersecurity"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/302201"}},{"articleId":301649,"title":"Takeaways about Extended Detection and Response (XDR)","slug":"takeaways-about-extended-detection-and-response-xdr","categoryList":["technology","cybersecurity"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/301649"}},{"articleId":301654,"title":"Nine Ways to Protect Against Advanced Email Threats","slug":"nine-ways-to-protect-against-advanced-email-threats","categoryList":["technology","cybersecurity"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/301654"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;cybersecurity&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-680fc26723dc9\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;cybersecurity&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-680fc2672577f\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by Cisco Duo","brandingLink":"https://duo.com/","brandingLogo":{"src":"https://www.dummies.com/wp-content/uploads/cisco-duo-logo-web.png","width":201,"height":98},"sponsorAd":"","sponsorEbookTitle":"Identity Security For Dummies, Cisco Duo Special Edition","sponsorEbookLink":"https://duo.com/","sponsorEbookImage":{"src":"https://www.dummies.com/wp-content/uploads/identity-security-for-dummies-cisco-duo-162x255.jpg","width":162,"height":255}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2025-04-29T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[{"adPairKey":"sponsored","adPairValue":"customsolutions"}]},"status":"publish","visibility":"public","articleId":302887},{"headers":{"creationTime":"2025-04-28T14:54:25+00:00","modifiedTime":"2025-04-28T14:54:25+00:00","timestamp":"2025-04-28T15:01:07+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Programming & Web Design","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33592"},"slug":"programming-web-design","categoryId":33592},{"name":"General Programming & Web Design","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33610"},"slug":"general-programming-web-design","categoryId":33610}],"title":"Why Local Environments Hold Your Developers Back","strippedTitle":"why local environments hold your developers back","slug":"why-local-environments-hold-your-developers-back","canonicalUrl":"","seo":{"metaDescription":"Discover how local development environments hinder your developers. Learn why cloud development environments can boost innovation and efficiency.","noIndex":0,"noFollow":0},"content":"For enterprises whose growth depends on the innovation of their developers and data scientists, success moves at the speed of their development environments. Efficiency, effectiveness, and the ability to build without friction — that’s what sets the pace.\r\n\r\nThe question is simple enough: Do your developers and data scientists work their magic in cloud development environments (CDEs), or is their work bogged down by a legacy development environment? Read on to find out why local development environments and other traditional solutions may be holding back your developers, and how cloud development environments can set them free.\r\n<h2 id=\"tab1\" >How traditional development environments are lacking</h2>\r\nWhat are some of the ways the wrong development environment may be making your company’s progress sluggish?\r\n<ul>\r\n \t<li><strong>Local development environments:</strong> This was yesterday’s standard, with all developers managing their own environments on their own machines. All that local control gets in the way of getting ahead. It’s complicated and time-consuming to configure tools and dependencies on each individual environment. You wind up with inconsistencies that slow things down. And don’t even think about scaling this approach.</li>\r\n \t<li><strong>Virtual desktop infrastructures (VDIs):</strong> VDIs help to centralize environments, but they’re often not really workable for development. They’re expensive and complicated to maintain. They also tend to suffer from sluggish performance, and that’s no way to keep developers happy.</li>\r\n \t<li><strong>Shadow virtual machines (VMs):</strong> Developers may get around these issues with ad hoc VMs, but they end up creating different problems. “Shadow” solutions may be lacking in governance and are often overprovisioned. That makes them potential security risks, not to mention wasteful of resources.</li>\r\n</ul>\r\n<h2 id=\"tab2\" >How cloud development environments can help</h2>\r\nA fully managed environment is the answer to the challenges of these more disjointed solutions from yesteryear. The CDE may be hosted in the cloud or via on-premises infrastructure, and it brings together all the necessary tools, libraries, and infrastructure needed for efficient development.\r\n\r\nIt’s a development workspace that can be accessed from anywhere, not tied to a specific location or machine. It’s great for remote work, and because of its centralized infrastructure, it’s a lot more secure than storing code and data on developers’ laptops. Developers and data scientists can easily tap into it for coding applications and training machine learning (ML) models, getting up and running in minutes.\r\n\r\nProvisioning is automatic, so everything developers need is right there and ready to go. It can all be controlled from a centralized interface by authorized team members, ensuring only the right people can access code and data. And the compute and storage resources are easily scalable.\r\n<h2 id=\"tab3\" >How CDEs make developers more productive</h2>\r\nTraditional local development environments tend to be frustratingly slow when it comes to onboarding new developers or moving developers to new projects (and developers tend to take on new projects multiple times a year, of course). Provisioning environments can take days or even weeks, thanks to all the complexities of dependencies and the need for approvals.\r\n\r\nMeanwhile, if developers are off working in their own local environments, that also leads to problems requiring time-consuming troubleshooting. Mismatched environments are the enemy of success. What’s more, resource constraints can be a hangup in local development environments.\r\n\r\nCDEs, on the other hand, can be preconfigured, so developers just log in and get to work. Platform engineers can make global updates and ensure consistencies across the CDE. Configuration drift is no longer a problem.\r\n\r\nAs for resource constraints, the cloud can fix that with high-performance resources that scale as needed. Developers can set up resource-intensive tasks such as ML model training in the cloud, and use their local laptops to get other work done in the meantime.\r\n<h2 id=\"tab4\" >Why cloud development environments provide better security</h2>\r\nLocal development environments and various noncentralized alternatives can pose security threats, due to a lack of adequate governance and a hard-to-manage attack surface. Working with intellectual property and other sensitive data on developer laptops or unapproved VMs is risky. If developers need to pull sensitive data to their laptops for such things as ML model training, you’re tempting fate, because security problems don’t just hold developers back — they can set back the entire organization.\r\n\r\nCDEs, on the other hand, can live in a cloud environment or be centralized in on-premises infrastructure. They can be air-gapped if need be. Source code and data can stay in secure cloud or on-premise locations, along with any compute resources needed for dealing with them, so sensitive data never needs to leave the safety of home.\r\n\r\nCompliance teams aren’t fond of local environments because they’re tricky to monitor. CDEs, on the other hand, offer better monitoring and auditing capabilities, without getting in the way of the developers’ work.\r\n<h2 id=\"tab5\" >How CDEs save both money and time</h2>\r\nFace it — local development environments can be costly. Local hardware isn’t cheap, especially the high-end hardware needed for resource-intensive processes. But if your enterprise tries to trim those costs, developers are likely to be displeased.\r\n\r\nThe reality is, CDEs not only provide a better developer experience and greater security, they also save money and time. Developers can use most cost-effective machines that are less powerful and longer-lasting, because the heavy lifting is happening in the CDE, not on the local machine.\r\n\r\nWhat’s more, CDEs can tap into automation to optimize resource utilization. Auto-start and auto-stop features mean unused environments aren’t sitting there wasting money. Bin-packing multiple developer workspaces onto a single VM can reduce infrastructure costs, too.\r\n\r\nAnd once again, helping developers be more efficient — by easing onboarding and transitioning, while banishing sluggish equipment — saves money, too. Time is, after all, money. If you can save hours and days and weeks of wasted developer time, you’ll get a whole lot more out of the money you’re paying them.\r\n\r\nTo learn more about the benefits of CDEs, <a href=\"https://coder.com/ebooks-and-reports/ebooks/cloud-development-environments-for-dummies-coder-special-edition\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">download your free <em>Cloud Development Environments For Dummies, </em>CoderTechnologies, Inc. Special Edition e-book</a>.","description":"For enterprises whose growth depends on the innovation of their developers and data scientists, success moves at the speed of their development environments. Efficiency, effectiveness, and the ability to build without friction — that’s what sets the pace.\r\n\r\nThe question is simple enough: Do your developers and data scientists work their magic in cloud development environments (CDEs), or is their work bogged down by a legacy development environment? Read on to find out why local development environments and other traditional solutions may be holding back your developers, and how cloud development environments can set them free.\r\n<h2 id=\"tab1\" >How traditional development environments are lacking</h2>\r\nWhat are some of the ways the wrong development environment may be making your company’s progress sluggish?\r\n<ul>\r\n \t<li><strong>Local development environments:</strong> This was yesterday’s standard, with all developers managing their own environments on their own machines. All that local control gets in the way of getting ahead. It’s complicated and time-consuming to configure tools and dependencies on each individual environment. You wind up with inconsistencies that slow things down. And don’t even think about scaling this approach.</li>\r\n \t<li><strong>Virtual desktop infrastructures (VDIs):</strong> VDIs help to centralize environments, but they’re often not really workable for development. They’re expensive and complicated to maintain. They also tend to suffer from sluggish performance, and that’s no way to keep developers happy.</li>\r\n \t<li><strong>Shadow virtual machines (VMs):</strong> Developers may get around these issues with ad hoc VMs, but they end up creating different problems. “Shadow” solutions may be lacking in governance and are often overprovisioned. That makes them potential security risks, not to mention wasteful of resources.</li>\r\n</ul>\r\n<h2 id=\"tab2\" >How cloud development environments can help</h2>\r\nA fully managed environment is the answer to the challenges of these more disjointed solutions from yesteryear. The CDE may be hosted in the cloud or via on-premises infrastructure, and it brings together all the necessary tools, libraries, and infrastructure needed for efficient development.\r\n\r\nIt’s a development workspace that can be accessed from anywhere, not tied to a specific location or machine. It’s great for remote work, and because of its centralized infrastructure, it’s a lot more secure than storing code and data on developers’ laptops. Developers and data scientists can easily tap into it for coding applications and training machine learning (ML) models, getting up and running in minutes.\r\n\r\nProvisioning is automatic, so everything developers need is right there and ready to go. It can all be controlled from a centralized interface by authorized team members, ensuring only the right people can access code and data. And the compute and storage resources are easily scalable.\r\n<h2 id=\"tab3\" >How CDEs make developers more productive</h2>\r\nTraditional local development environments tend to be frustratingly slow when it comes to onboarding new developers or moving developers to new projects (and developers tend to take on new projects multiple times a year, of course). Provisioning environments can take days or even weeks, thanks to all the complexities of dependencies and the need for approvals.\r\n\r\nMeanwhile, if developers are off working in their own local environments, that also leads to problems requiring time-consuming troubleshooting. Mismatched environments are the enemy of success. What’s more, resource constraints can be a hangup in local development environments.\r\n\r\nCDEs, on the other hand, can be preconfigured, so developers just log in and get to work. Platform engineers can make global updates and ensure consistencies across the CDE. Configuration drift is no longer a problem.\r\n\r\nAs for resource constraints, the cloud can fix that with high-performance resources that scale as needed. Developers can set up resource-intensive tasks such as ML model training in the cloud, and use their local laptops to get other work done in the meantime.\r\n<h2 id=\"tab4\" >Why cloud development environments provide better security</h2>\r\nLocal development environments and various noncentralized alternatives can pose security threats, due to a lack of adequate governance and a hard-to-manage attack surface. Working with intellectual property and other sensitive data on developer laptops or unapproved VMs is risky. If developers need to pull sensitive data to their laptops for such things as ML model training, you’re tempting fate, because security problems don’t just hold developers back — they can set back the entire organization.\r\n\r\nCDEs, on the other hand, can live in a cloud environment or be centralized in on-premises infrastructure. They can be air-gapped if need be. Source code and data can stay in secure cloud or on-premise locations, along with any compute resources needed for dealing with them, so sensitive data never needs to leave the safety of home.\r\n\r\nCompliance teams aren’t fond of local environments because they’re tricky to monitor. CDEs, on the other hand, offer better monitoring and auditing capabilities, without getting in the way of the developers’ work.\r\n<h2 id=\"tab5\" >How CDEs save both money and time</h2>\r\nFace it — local development environments can be costly. Local hardware isn’t cheap, especially the high-end hardware needed for resource-intensive processes. But if your enterprise tries to trim those costs, developers are likely to be displeased.\r\n\r\nThe reality is, CDEs not only provide a better developer experience and greater security, they also save money and time. Developers can use most cost-effective machines that are less powerful and longer-lasting, because the heavy lifting is happening in the CDE, not on the local machine.\r\n\r\nWhat’s more, CDEs can tap into automation to optimize resource utilization. Auto-start and auto-stop features mean unused environments aren’t sitting there wasting money. Bin-packing multiple developer workspaces onto a single VM can reduce infrastructure costs, too.\r\n\r\nAnd once again, helping developers be more efficient — by easing onboarding and transitioning, while banishing sluggish equipment — saves money, too. Time is, after all, money. If you can save hours and days and weeks of wasted developer time, you’ll get a whole lot more out of the money you’re paying them.\r\n\r\nTo learn more about the benefits of CDEs, <a href=\"https://coder.com/ebooks-and-reports/ebooks/cloud-development-environments-for-dummies-coder-special-edition\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">download your free <em>Cloud Development Environments For Dummies, </em>CoderTechnologies, Inc. Special Edition e-book</a>.","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33610,"title":"General Programming & Web Design","slug":"general-programming-web-design","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33610"}},"secondaryCategoryTaxonomy":{"categoryId":33584,"title":"Cloud Computing","slug":"cloud-computing","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33584"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"/articles/299133"}}],"inThisArticle":[{"label":"How traditional development environments are lacking","target":"#tab1"},{"label":"How cloud development environments can help","target":"#tab2"},{"label":"How CDEs make developers more productive","target":"#tab3"},{"label":"Why cloud development environments provide better security","target":"#tab4"},{"label":"How CDEs save both money and time","target":"#tab5"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":301736,"title":"Building DIY Websites For Dummies Cheat Sheet","slug":"building-diy-websites-for-dummies-cheat-sheet","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/301736"}},{"articleId":299575,"title":"HTML, CSS, & JavaScript All-in-One For Dummies Cheat Sheet","slug":"html-css-javascript-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/299575"}},{"articleId":265680,"title":"Using DevOps To Improve Engineering","slug":"tips-for-improving-engineering-performance-with-devops","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/265680"}},{"articleId":265675,"title":"How To Automate DevOps in the Cloud","slug":"make-more-of-your-cloud-tools-automating-devops-in-the-cloud","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/265675"}},{"articleId":265672,"title":"How To Choose a Cloud Service Provider for DevOps","slug":"choosing-the-best-cloud-service-provider-features-and-tools-for-devops","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/265672"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;programming-web-design&quot;,&quot;general-programming-web-design&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-680f98348d9fa\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;programming-web-design&quot;,&quot;general-programming-web-design&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-680f98348f157\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by Coder","brandingLink":"https://coder.com/","brandingLogo":{"src":"https://www.dummies.com/wp-content/uploads/coder-logo-transparent-strip-black.png","width":200,"height":44},"sponsorAd":"&nbsp;\r\n\r\n&nbsp;","sponsorEbookTitle":"Cloud Development Environments For Dummies, CoderTechnologies, Inc. Special Edition","sponsorEbookLink":"https://coder.com/ebooks-and-reports/ebooks/cloud-development-environments-for-dummies-coder-special-edition","sponsorEbookImage":{"src":"https://www.dummies.com/wp-content/uploads/cloud-development-environments-fd-coder-160x255.jpg","width":160,"height":255}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2025-04-29T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[{"adPairKey":"sponsored","adPairValue":"customsolutions"}]},"status":"publish","visibility":"public","articleId":302882},{"headers":{"creationTime":"2025-04-10T20:51:05+00:00","modifiedTime":"2025-04-11T12:39:37+00:00","timestamp":"2025-04-11T15:01:06+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Software","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33618"},"slug":"software","categoryId":33618},{"name":"Microsoft Products","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33642"},"slug":"microsoft-products","categoryId":33642},{"name":"General Microsoft","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33652"},"slug":"general-microsoft","categoryId":33652}],"title":"Microsoft Power Platform For Dummies Cheat Sheet","strippedTitle":"microsoft power platform for dummies cheat sheet","slug":"microsoft-power-platform-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Unlock the potential of Microsoft Power Platform! Our cheat sheet covers Dataverse, Power Apps, Power Pages, Power BI, and Power Automate.","noIndex":0,"noFollow":0},"content":"The Microsoft Power Platform is a suite of applications that offers low-code and no-code development tools organizations can use to streamline and automate business processes. Collectively (and when integrated properly), the Power Platform suite of applications works together to support business transformation. Following is a description of the applications contained in the Power Platform, and some details about how each application functions as part of the suite:\r\n<ul>\r\n \t<li><strong>Dataverse: </strong>Starting your journey with each of the Power Platform applications requires one essential element: data. At the heart of the Power Platform is Dataverse, the common data service for storing and structuring relational data. Dataverse serves as the backbone for capturing and retaining user inputs across the platform's apps.</li>\r\n \t<li><strong>Power Apps: </strong>The first step in the low-code/no-code journey to business automation is to create a mechanism for data entry. You can begin, for example, by using Power Apps to build an application that collects and manages data. Power Apps is often the primary tool businesses use to design custom applications that are tailored to their needs.</li>\r\n \t<li><strong>Power Pages: </strong>Sometimes, you want the data entered with your Power Apps applications to be available for everyone to see, not just a few users. This is when you use Power Pages to design secure, data-driven external websites. The sites you create with Power Pages can display and collect information directly from Dataverse. Power Pages presents this data in a tabular format or as embedded reports and other media objects.</li>\r\n \t<li><strong>Power BI: </strong>For data analysis, you use Power BI to transform data collected through custom apps created with Power Apps into interactive reports and insightful dashboards.</li>\r\n \t<li><strong>Power Automate:</strong> You can use Power Automate to automate tasks and processes based on the data in Dataverse, which enhances productivity and efficiency across your organization.</li>\r\n</ul>","description":"The Microsoft Power Platform is a suite of applications that offers low-code and no-code development tools organizations can use to streamline and automate business processes. Collectively (and when integrated properly), the Power Platform suite of applications works together to support business transformation. Following is a description of the applications contained in the Power Platform, and some details about how each application functions as part of the suite:\r\n<ul>\r\n \t<li><strong>Dataverse: </strong>Starting your journey with each of the Power Platform applications requires one essential element: data. At the heart of the Power Platform is Dataverse, the common data service for storing and structuring relational data. Dataverse serves as the backbone for capturing and retaining user inputs across the platform's apps.</li>\r\n \t<li><strong>Power Apps: </strong>The first step in the low-code/no-code journey to business automation is to create a mechanism for data entry. You can begin, for example, by using Power Apps to build an application that collects and manages data. Power Apps is often the primary tool businesses use to design custom applications that are tailored to their needs.</li>\r\n \t<li><strong>Power Pages: </strong>Sometimes, you want the data entered with your Power Apps applications to be available for everyone to see, not just a few users. This is when you use Power Pages to design secure, data-driven external websites. The sites you create with Power Pages can display and collect information directly from Dataverse. Power Pages presents this data in a tabular format or as embedded reports and other media objects.</li>\r\n \t<li><strong>Power BI: </strong>For data analysis, you use Power BI to transform data collected through custom apps created with Power Apps into interactive reports and insightful dashboards.</li>\r\n \t<li><strong>Power Automate:</strong> You can use Power Automate to automate tasks and processes based on the data in Dataverse, which enhances productivity and efficiency across your organization.</li>\r\n</ul>","blurb":"","authors":[{"authorId":34674,"name":"Jack A. Hyman","slug":"jack-hyman","description":"<b>Jack Hyman </b>is the founder and principal of IT consulting firm HyerTek, providing services to federal, state, local, and educational institutions. In that role, he helps organizations implement leading cloud platforms and analytics tools. Jack has authored several For Dummies titles, including <i>Microsoft Power BI For Dummies</i>.","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/34674"}}],"primaryCategoryTaxonomy":{"categoryId":33652,"title":"General Microsoft","slug":"general-microsoft","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33652"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"/articles/299133"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":302691,"title":"Microsoft Copilot For Dummies Cheat Sheet","slug":"microsoft-copilot-for-dummies-cheat-sheet","categoryList":["technology","software","microsoft-products","general-microsoft"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/302691"}},{"articleId":294664,"title":"Windows 365 For Dummies Cheat Sheet","slug":"windows-365-for-dummies-cheat-sheet","categoryList":["technology","software","microsoft-products","general-microsoft"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/294664"}},{"articleId":291623,"title":"Office 2021 For Macs For Dummies Cheat Sheet","slug":"office-2021-for-macs-for-dummies-cheat-sheet","categoryList":["technology","software","microsoft-products","general-microsoft"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/291623"}},{"articleId":290233,"title":"Microsoft 365 For Dummies Cheat Sheet","slug":"microsoft-365-for-dummies-cheat-sheet","categoryList":["technology","software","microsoft-products","general-microsoft"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290233"}},{"articleId":290196,"title":"Office 2021 All-in-One For Dummies Cheat Sheet","slug":"office-2021-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","software","microsoft-products","general-microsoft"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290196"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":302527,"slug":"microsoft-power-platform-for-dummies","isbn":"9781394277001","categoryList":["technology","software","microsoft-products","general-microsoft"],"amazon":{"default":"https://www.amazon.com/gp/product/1394277008/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1394277008/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1394277008-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1394277008/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1394277008/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/microsoft-power-platform-for-dummies-cover-9781394277001-203x255.jpg","width":203,"height":255},"title":"Microsoft Power Platform For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b>Jack Hyman </b>is the founder and principal of IT consulting firm HyerTek, providing services to federal, state, local, and educational institutions. In that role, he helps organizations implement leading cloud platforms and analytics tools. Jack has authored several For Dummies titles, including <i>Microsoft Power BI For Dummies</i>.</p>","authors":[{"authorId":35507,"name":"Jack A. Hyman","slug":"jack-a-hyman","description":" <p><b>Jack Hyman </b>is the founder and principal of IT consulting firm HyerTek, providing services to federal, state, local, and educational institutions. In that role, he helps organizations implement leading cloud platforms and analytics tools. Jack has authored several For Dummies titles, including <i>Microsoft Power BI For Dummies</i>. ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/35507"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;software&quot;,&quot;microsoft-products&quot;,&quot;general-microsoft&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394277001&quot;]}]\" id=\"du-slot-67f92eb347096\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;software&quot;,&quot;microsoft-products&quot;,&quot;general-microsoft&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394277001&quot;]}]\" id=\"du-slot-67f92eb347fc6\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/"}}],"content":[{"title":"Choosing a Power Automate Cloud Flow type","thumb":null,"image":null,"content":"<p>Power Automate is Microsoft’s low-code workflow automation solution within the Power Platform. The product allows users to automate repetitive tasks, reducing the number of steps it takes to complete an activity. Power Automate offers three flow types: Cloud Flow, Desktop Flow, and Business Process Flow.</p>\n<p>The purpose of each flow is as follows:</p>\n<ul>\n<li><strong>Cloud Flows</strong>: These workflows run in the cloud and can be triggered in several ways depending on the use case. Cloud Flows operate based on predefined triggers and can execute automatically, instantly based on user interaction, or according to a set schedule.</li>\n<li><strong>Desktop Flows</strong>: Commonly associated with Robotic Process Automation (RPA), Desktop Flows run on the Desktop. These flows depend on user intervention (attended) or execution by an agent (unattended). Allowing Desktop Flows to run virtually requires Power Automate Premium, as a virtual agent (bot) must execute the flow. This product is separate from Power Automate.</li>\n<li><strong>Business Process Flows (BPF)</strong>: Primarily used with model-driven apps, a BPF in Power Automate guides users through a sequence of stages and steps to complete a business task. The BPF helps ensure that users follow a structured process, such as qualifying a lead or resolving a case, leading to a clear, concluding action.</li>\n</ul>\n<p><strong>[begin Tip box]</strong></p>\n<p>Unlike Cloud or Desktop Flows, Business Process Flows focus on user interaction and can be customized based on role-based access using Dataverse. This means different users see only the steps relevant to their responsibilities. This customization ensures that the workflow adapts to the organization&#8217;s needs and provides a clear path for each user, helping to ensure consistency and compliance across business processes.</p>\n<p><strong>[end Tip box]</strong></p>\n<p>Of all the flow types, you’ll likely use Cloud Flows most often—and for good reason. Microsoft supports the integration of hundreds of connectors, providing access to third-party data sources and applications within Power Automate. The key difference among the Cloud Flows lies in the automation target and the task that must be completed.</p>\n<ul>\n<li><strong>Automated Cloud Flows</strong>: These flows use connectors for cloud or on-premises applications to connect to specific user accounts. Once connected, the connector will communicate with the data source when triggered. For example, an automated cloud flow might send a user a text message (SMS) when a new file is added to a folder.</li>\n<li><strong>Instant Flows</strong>: These flows are triggered when a user presses a button to initiate the action. Instead of a user having to complete a task that may take ten steps manually, pressing the button triggers a sequence of events that handles the repetitive activity. Instant flows are often used for approving or rejecting a document in Teams or SharePoint.</li>\n<li><strong>Scheduled Flows</strong>: These are executed based on a known date and time to trigger an event. Examples include uploading all the files from a folder to another online site, such as SharePoint, or sending out a weekly notification to remind a team to submit their timecards.</li>\n</ul>\n<p>So, which type of flow is the best to use? For most users, Automated Cloud Flows offer the most opportunities for automation in conjunction with other Power Platform applications, as they run without manual intervention. Automated Cloud Flows have an added benefit: they can instantly react to changes in data or events, streamlining processes and saving time across organizations, which other flows cannot necessarily support without manual modifications.</p>\n"},{"title":"Building optimized entities in Dataverse","thumb":null,"image":null,"content":"<p>Dataverse is no different than any other data-driven solution regarding data quality. If the data is not optimized for the environment, your applications and reports won’t perform as you’d like. Each <em>entity</em> (table) in Dataverse can be associated with one or more forms, views, charts, and dashboards. To ensure optimal performance across each of the Power Platform applications, entities must be structured efficiently. Each entity must focus on using appropriate relationships among entities (think 1:1, 1:N, N:N), data types (strings, numbers, currency, and so on), and indexes. When designing your entities, consider their global purpose as well as how they will be used by each of the Power Platform applications. The following table breaks down the key considerations by application.</p>\n<table>\n<tbody>\n<tr>\n<td width=\"228\">Application</td>\n<td width=\"396\">Considerations</td>\n</tr>\n<tr>\n<td width=\"228\">Power Apps</td>\n<td width=\"396\">When designing your entity for a Power App application, your business objective is to focus on how the application fetches, displays, and manipulates data. Address the following to achieve optimization for a Power App with Dataverse:</p>\n<ul>\n<li><strong>Limit the use of calculated or roll-up fields:</strong> While they can be helpful, these field types can impact performance.</li>\n<li><strong>Index frequently:</strong> If fields are queried frequently, you should index them, especially when using field data for lookup and filters.</li>\n<li><strong>Look up relationships:</strong> Don’t reinvent the data wheel. Create a table once and then use it across many entities. Such a strategy focuses data quality, eliminates data redundancy, and ensures referential data integrity.</li>\n</ul>\n</td>\n</tr>\n<tr>\n<td width=\"228\">Power BI</td>\n<td width=\"396\">Power BI uses Dataverse to produce report and dashboard outputs, in most cases for real-time reporting. But when the datasets are not well designed, performance will suffer. As you consider reporting requirements, address the following:</p>\n<ul>\n<li><strong>Efficient relationships: </strong>Relationships between entities must be clearly defined to avoid ambiguity. That means entities should maintain a common naming convention, especially for key-based relationships. For example, you wouldn’t want one entity to have a column called State Capitals and the other to be referred to as simply Capitals. If the data has a common objective, naming consistency is critical.</li>\n<li><strong>Filtered views: </strong>Don’t import an entire entity data when only a small subset of records is applicable. Hence, you’ll take a performance hit if you download one million records versus one thousand. Instead, create filtered views that focus on targeted columns, and filter those columns with as many conditions to ensure the data is limited to just the necessary records.</li>\n<li><strong>Data aggregation: </strong>Aggregate data sources within Dataverse, don’t aggregate the data once running the reports. The result of real-time data aggregation will be poor performance for reporting, especially if the dataset contains many calculations.</li>\n<li><strong>Less DAX yields better performance: </strong>Using complex DAX formulas (Power BI’s low-code formula language, called Data Expression Language) as part of a report will slow the output of data. Instead, the calculations should be part of Dataverse. Pre-calculating outputs using Dataverse speeds up the delivery of report outputs.</li>\n</ul>\n</td>\n</tr>\n<tr>\n<td width=\"228\">Power Pages</td>\n<td width=\"396\">Power Pages relies on Dataverse to display dynamic content on external-facing web pages. Example content includes structured tables and Power BI-type reporting. To optimize page load, consider the following when using Dataverse entities:</p>\n<ul>\n<li><strong>Limit Dataverse output:</strong> While all data for Power Pages is stored in the Dataverse, more data output isn’t necessarily a good thing. Limit your output to only those fields that are necessary.</li>\n<li><strong>Don’t overcomplicate formatting:</strong> As with data output, overcomplicating formatting of your Dataverse output impacts performance.</li>\n<li><strong>Cache static data:</strong> If your site will use content often, focus on caching strategies, including the use of Content Delivery Networks, so that data that isn’t accessed often becomes a priority, as this improves load time.</li>\n<li><strong>Apply role-based security:</strong> Don’t give all users access to all data. Instead, apply role-based security enforcement. This limits the records users can see to only those datasets that they can see and edit based on permissions.</li>\n</ul>\n</td>\n</tr>\n<tr>\n<td width=\"228\"><strong>Power Automate</strong></td>\n<td width=\"396\">Workflows are heavily reliant on Dataverse performance, especially when having to scour large, complex datasets. Be extra careful when it comes to querying too much data at once or instituting too many workflow triggers for the following reasons:</p>\n<ul>\n<li><strong>Batch records:</strong> Fewer queries to a Dataverse instance speed up performance; therefore, focus on batching records for updates. If you process records individually, you are bound to have slow data performance (like a traffic jam on a multi-lane highway)</li>\n<li><strong>Trigger when necessary:</strong> Create trigger conditions that minimize constant querying of the Dataverse instance. Instead, implement as many conditions as possible to a Workflow so that performance is optimized to just those events that require Dataverse interaction.</li>\n<li><strong>Minimize the use of actions:</strong> Using too many <em>actions</em> (what triggers a workflow) will reduce Dataverse performance. Only use actions with flows when necessary, and when you do use actions, avoid complex actions. That means, little to no nested loops that will keep cycling unnecessarily through a dataset.</li>\n</ul>\n</td>\n</tr>\n</tbody>\n</table>\n<p>&nbsp;</p>\n<p>You don’t have to figure out what works and what needs fixing in Dataverse alone. Microsoft provides you with monitoring and performance tools to review and tune your Dataverse environment. And don’t forget data that is no longer useful should be archived because less data being queried means faster ongoing performance.</p>\n<p>By now, you should notice a few key themes across each of the applications: data quality, data integrity, and focusing on performance are essential to implementing Dataverse. If an organization focuses on how its entities handle business rules, validation, and relationships, then it is conceivable to deliver ongoing performance success with Dataverse.</p>\n"},{"title":"Visualizing data with Power BI reports and dashboards","thumb":null,"image":null,"content":"<p>Power BI reports and dashboards are visualization outputs that you make available to users. Here’s how Power BI distinguishes these visualizations:</p>\n<ul>\n<li>A<strong> Power BI report</strong> is a single or multi-page output that contains one or more data visualizations. Each page in a report includes a combination of tables, graphs, charts, and other media objects (including third-party sources such as photos or videos). Power BI reports are highly interactive, allowing users to drill down and focus on specific data points for deeper analysis. Reports often pull data from various data sources, including Dataverse, Excel, Access, or SQL Server. The key to successful report design is how the data is organized and presented to tell a story.</li>\n<li>A <strong>Power BI dashboard</strong> combines your most important reports and brings them together to tell a story about an aspect of your data in a visual format. You might have many reports that show different facets of a story, but the dashboard brings all those facets together on a single page. An example of a dashboard might be sales performance across all regions for an organization, while a Power BI report tells the story of a specific geography.</li>\n</ul>\n<p>Figure 1 shows an example of a well-designed Power BI dashboard. Each of the items displayed in the dashboard is a separate report. Pinning reports to a dashboard presents a holistic picture. From the dashboard shown in Figure 1, for example, you can ascertain the total amount of spend for Microsoft SharePoint Services across the U.S. Federal Government in Fiscal Year 2023 and Fiscal Year 2024, based on filtered parameters.</p>\n<p><strong>[insert figure csfg01]</strong></p>\n<p><strong>Figure 1:</strong> A well-designed Power BI dashboard.</p>\n<p><strong>[begin Remember box]</strong></p>\n<p>Dashboards provide a concise, at-a-glance view of your data, making it easier to monitor trends, identify opportunities, and track key performance indicators (KPIs). Dashboards offer less depth and interaction compared to Power BI reports. A Power BI Dashboard is meant to provide a summarized overview of your story for those who need to understand the whole picture, not just a subset of it.</p>\n"},{"title":"Design tips for Power BI dashboards and reports","thumb":null,"image":null,"content":"<p>To create meaningful dashboards and reports in Power BI, you need to be thoughtful about how you design them. Here are some key considerations:</p>\n<ul>\n<li><strong>Choose the right visuals.</strong></li>\n<li>The Power BI Visualization pane offers 20+ visualization options (see Figure 2). Keep in mind that not all your data should be displayed as a bar, column, line, or pie chart. Think about the story you are trying to tell. Sometimes you want to share a discrete value; other times, you may need a table to boost the level of detail and promote understanding.\n<ul>\n<li><strong>&lt;csfg02 &gt;</strong></li>\n<li><strong>Figure 2:</strong> Visualization pane visual options.</li>\n</ul>\n</li>\n<li><strong>Use filters and slicers.</strong></li>\n<li>Don’t be afraid to incorporate filters and slicers so that you can drill down into the data. It’s great to see the big picture, but the most effective dashboards allow you to view a subset of data. When creating a dashboard, use filters and slicers to filter all visuals, not just one. Figure 3 shows an example of a slicer that helps narrow down the result set based on a specific classification code called a NAICS.\n<ul>\n<li><strong>&lt;csfg03 &gt;</strong></li>\n<li><strong>Figure 3:</strong> A slicer that helps filter a dataset.</li>\n</ul>\n</li>\n<li><strong>Tell a story with your data.</strong></li>\n<li>Your visualizations, and more importantly the data in the visualization, should tell a concise story. What is the key message you want your audience to learn about from the dashboard? Focusing on discrete metrics can help users focus on the most important insights.</li>\n<li>In the Dashboard shown in Figure 1, the focus is Fiscal Year 2023 and 2024 SharePoint Service Sales. The visualizations used consider the buyers (agencies and amount spent), contract types the sales were issued under, the geographical distribution of sales during the period, and the total amount spent across several targeted metrics. If you want to drill down into a specific purchasing code to see finer grained details, you can use the slicer to get laser focused.</li>\n<li><strong>Make it accessible.</strong></li>\n<li>Power BI supports creating reports and dashboards that are Section 508 compliant, ensuring those users who have a visual disability including color blindness can now interpret the data. Consider design elements like color contrast, the use of tooltips, text size, and the use of alt text for images and charts.</li>\n</ul>\n<p>Power BI is a versatile and powerful tool for transforming raw data into actionable, interactive insights. If you understand the difference between reports and dashboards and can incorporate the interactive capabilities available from Power BI, your ability to create compelling visualizations will drive informed decision-making.</p>\n"},{"title":"Which Power App type is right for you?","thumb":null,"image":null,"content":"<p>Power Apps brings together a suite of services, namely low-code application tools and data connectors. It allows users to build applications that capture data, create rich business logic, and display relevant reports in a single location, eliminating the need for multiple tools. With Power Apps, you can develop apps in one of two ways: canvas or model-driven applications.</p>\n<p>Canvas and model-driven apps each have distinct purposes and business advantages. The one common factor between both is their reliance on data. Based on your business requirements, it is crucial to determine which type is the best fit. Sometimes, you may need to create a hybrid application — combining the best of both worlds to meet user requirements.</p>\n<h2>Gathering requirements</h2>\n<p>When you create an application, you should start by addressing two considerations: (a) the type of data that will be stored and displayed in the app and (b) the business process automation required to meet user needs successfully. When you gather requirements, ask these questions:</p>\n<ul>\n<li>Is there a specific type of data source the application must use?</li>\n<li>Is a custom user experience and user interface (UI) more critical, or is data quality and reliability the priority?</li>\n<li>How often do you intend to make changes to the application?</li>\n<li>What level of reporting is needed, and how should that reporting be presented?</li>\n<li>How comfortable are developers with using custom code to update the user interface?</li>\n<li>Does the application require the creation of custom controls, including Power Apps Component Framework (PCF) controls, to support visualization enhancements, such as buttons, sliders, and check boxes?</li>\n<li>Will the business rely on a complex workflow requiring Power Automate, or can the app utilize business process flows readily available within Power Apps?</li>\n</ul>\n<h2>Factoring in your use of data</h2>\n<p>Your use of data is often a key factor in deciding which application format to choose. Ask yourself where the data resides and how complex it is. Canvas apps can pull data from many sources and display those sources in a highly graphical, customizable manner, as shown in Figure 4. Model-driven apps are designed to work with Dataverse, which provides a more rigid method of handling data and user experience, as shown in Figure 5.</p>\n<p><strong>&lt;insert CSfg04&gt;</strong></p>\n<p><strong>Figure 4</strong>: A simple canvas app (Data Entry view).</p>\n<p><strong>&lt;insert CSfg05&gt;</strong></p>\n<p><strong>Figure 5</strong>: A model-driven app (view and form).</p>\n<p>Using Dataverse is ideal when complex data modeling requirements, including role-based access security requirements. If Dataverse is required, then you are likely to use model-driven applications. On the other hand, if your application does not rely on Dataverse and interface customization is more important, then Canvas applications are a better fit.</p>\n<h2>Considering the user interface (UI)</h2>\n<p>If a custom user interface (UI) is a priority, you’ll want to use a canvas app, as model-driven apps are not flexible when creating a custom look and feel. Model-driven apps provide a consistent, data-rich experience and a user interface familiar to most users, as they mirror the design of many Microsoft applications. On the other hand, canvas apps allow you to create virtually any look and feel you desire. The following table compares the aspects of canvas and model-driven apps to consider before you choose an app type.</p>\n<p>Table: Comparing Canvas vs. Model-Driven Apps</p>\n<table>\n<tbody>\n<tr>\n<td width=\"208\"></td>\n<td width=\"208\">Canvas Apps</td>\n<td width=\"208\">Model-Driven Apps</td>\n</tr>\n<tr>\n<td width=\"208\">Interface experience</td>\n<td width=\"208\">Custom user interface. Not limiting.</td>\n<td width=\"208\">Data-driven interface. Limiting unless you heavily program and update the application.</td>\n</tr>\n<tr>\n<td width=\"208\">Data sources</td>\n<td width=\"208\">You can use just about any data source, including Dataverse.</td>\n<td width=\"208\">Dataverse exclusively.</td>\n</tr>\n<tr>\n<td width=\"208\">Design constraints</td>\n<td width=\"208\">A blank canvas with unlimited interface customization options when using controls properly. The app will not need to appear as a Microsoft-based app.</td>\n<td width=\"208\">It is based on a predefined set of templates with limited customization. Customizing the templates requires advanced programming skills. The user experience is consistent with most Microsoft apps.</td>\n</tr>\n<tr>\n<td width=\"208\">Page and design flexibility</td>\n<td width=\"208\">Each screen (page) can have its own look and feel.</td>\n<td width=\"208\">Each screen follows standard design conventions, with limited options to update the configuration.</td>\n</tr>\n<tr>\n<td width=\"208\">Cost to implement</td>\n<td width=\"208\">It can be costly and time-consuming, depending on the complexity of the design and the level of customization among the controls used.</td>\n<td width=\"208\">It can be faster and more affordable to develop so long as the user interface customization is limited and the application limits the customization of the data model. This often requires more training for end users.</td>\n</tr>\n<tr>\n<td width=\"208\">Accessibility and compliance</td>\n<td width=\"208\">The developer must address accessibility and compliance independent of app development.</td>\n<td width=\"208\">Microsoft handles your accessibility and responsive design requirements.</td>\n</tr>\n</tbody>\n</table>\n<p>&nbsp;</p>\n<h2>Adopting a hybrid approach</h2>\n<p>Hybrid development is most certainly a possibility. Often, users want the best features from both app types, so selecting the implementation approach isn’t always straightforward. Once you start developing, you can’t simply flip a switch and go between both development modes. You must pick the app format that accommodates your solution&#8217;s needs.</p>\n<p>If you know you’ll need both application development approaches (effectively hybrid), you should develop a model-driven application. Then you can add canvas screens to the model-driven app. A common approach is to use a model-driven app for the primary business process and then use canvas apps for specific tasks that can’t be accomplished with rigid data user experience needs.</p>\n<p>Figure 6 shows a performance management calculator built using canvas app principles, but the application is incorporated into a model-driven app. This example accommodates a variety of user needs, all in one application.</p>\n<p><strong>&lt;insert CSfg06&gt;</strong></p>\n<p><strong>Figure 6:</strong> A canvas-based performance review calculator inside a model driven app.</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2024-12-09T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":302831},{"headers":{"creationTime":"2018-11-12T23:22:33+00:00","modifiedTime":"2025-04-10T20:21:06+00:00","timestamp":"2025-04-10T21:01:08+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Software","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33618"},"slug":"software","categoryId":33618},{"name":"Microsoft Products","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33642"},"slug":"microsoft-products","categoryId":33642},{"name":"Access","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33643"},"slug":"access","categoryId":33643}],"title":"Access For Dummies Cheat Sheet","strippedTitle":"access for dummies cheat sheet","slug":"access-2019-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Keep this Cheat Sheet for a handy reference to the Access 2021 ribbon icons, key tips, and keyboard shortcuts.","noIndex":0,"noFollow":0},"content":"Access makes managing data easy, enabling you to set up a database quickly, enter records into that database, and then use the data however you like. With Access, you can organize data into tables, design forms for editing and reports for presenting, and create queries for finding information!","description":"Access makes managing data easy, enabling you to set up a database quickly, enter records into that database, and then use the data however you like. With Access, you can organize data into tables, design forms for editing and reports for presenting, and create queries for finding information!","blurb":"","authors":[{"authorId":17329,"name":"Laurie A. Ulrich","slug":"laurie-a-ulrich","description":" <p><b>Laurie Ann Ulrich</b> has trained more than 20,000 people to make better, more creative use of their computers. She has created online courses and written more than 30 books.<p> <p><b>Ken Cook</b> built and manages a computer consulting business that has helped users for over 20 years. He&#39;s an expert at creating Microsoft Office and Access database solutions and teaches online Access courses.</b> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/17329"}},{"authorId":9047,"name":"Ken Cook","slug":"ken-cook","description":" <p><b>Laurie Ann Ulrich</b> has trained more than 20,000 people to make better, more creative use of their computers. She has created online courses and written more than 30 books.<p> <p><b>Ken Cook</b> built and manages a computer consulting business that has helped users for over 20 years. He&#39;s an expert at creating Microsoft Office and Access database solutions and teaches online Access courses.</b> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/9047"}}],"primaryCategoryTaxonomy":{"categoryId":33643,"title":"Access","slug":"access","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33643"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"/articles/299133"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":258112,"title":"Field Types and Uses in Access 2019 Databases","slug":"field-types-and-uses-in-access-2019-databases","categoryList":["technology","software","microsoft-products","access"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/258112"}},{"articleId":258108,"title":"How to Use Access 2019 ScreenTips","slug":"how-to-use-access-2019-screentips","categoryList":["technology","software","microsoft-products","access"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/258108"}},{"articleId":258103,"title":"How to Work with Onscreen Tools in Access 2019","slug":"how-to-work-with-onscreen-tools-in-access-2019","categoryList":["technology","software","microsoft-products","access"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/258103"}},{"articleId":258100,"title":"How to Navigate the Access 2019 Opening Workspace","slug":"how-to-navigate-the-access-2019-opening-workspace","categoryList":["technology","software","microsoft-products","access"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/258100"}},{"articleId":258096,"title":"How Access 2019 Works and How You Work with It","slug":"how-access-2019-works-and-how-you-work-with-it","categoryList":["technology","software","microsoft-products","access"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/258096"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":288931,"slug":"access-for-dummies","isbn":"9781394295654","categoryList":["technology","software","microsoft-products","access"],"amazon":{"default":"https://www.amazon.com/gp/product/1394295650/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1394295650/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1394295650-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1394295650/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1394295650/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/microsoft-365-access-for-dummies-cover-9781394295654-203x255.jpg","width":203,"height":255},"title":"Microsoft 365 Access For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b>Laurie Ann Ulrich</b> has trained more than 20,000 people to make better, more creative use of their computers. She has created online courses and written more than 30 books.<p> <p><b><b data-author-id=\"9047\">Ken Cook</b></b> built and manages a computer consulting business that has helped users for over 20 years. He&#39;s an expert at creating Microsoft Office and Access database solutions and teaches online Access courses.</b> <p><b>Laurie Ann Ulrich</b> has trained more than 20,000 people to make better, more creative use of their computers. She has created online courses and written more than 30 books.<p> <p><b>Ken Cook</b> built and manages a computer consulting business that has helped users for over 20 years. He&#39;s an expert at creating Microsoft Office and Access database solutions and teaches online Access courses.</b></p>","authors":[{"authorId":9047,"name":"Ken Cook","slug":"ken-cook","description":" <p><b>Laurie Ann Ulrich</b> has trained more than 20,000 people to make better, more creative use of their computers. She has created online courses and written more than 30 books.<p> <p><b>Ken Cook</b> built and manages a computer consulting business that has helped users for over 20 years. He&#39;s an expert at creating Microsoft Office and Access database solutions and teaches online Access courses.</b> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/9047"}},{"authorId":17329,"name":"Laurie A. Ulrich","slug":"laurie-a-ulrich","description":" <p><b>Laurie Ann Ulrich</b> has trained more than 20,000 people to make better, more creative use of their computers. She has created online courses and written more than 30 books.<p> <p><b>Ken Cook</b> built and manages a computer consulting business that has helped users for over 20 years. He&#39;s an expert at creating Microsoft Office and Access database solutions and teaches online Access courses.</b> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/17329"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;software&quot;,&quot;microsoft-products&quot;,&quot;access&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394295654&quot;]}]\" id=\"du-slot-67f831951f0c3\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;software&quot;,&quot;microsoft-products&quot;,&quot;access&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394295654&quot;]}]\" id=\"du-slot-67f8319520617\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":257182,"title":"Navigating the Access 2019 Ribbon with Key Tips","slug":"navigating-the-access-2019-ribbon-with-key-tips","categoryList":["technology","software","microsoft-products","access"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/257182"}},{"articleId":257187,"title":"Handy Access 2019 Keyboard Shortcuts","slug":"handy-access-2019-keyboard-shortcuts","categoryList":["technology","software","microsoft-products","access"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/257187"}}],"content":[{"title":"Navigating the Access ribbon with key tips","thumb":null,"image":null,"content":"<p>If you like keyboard shortcuts when you’re working with software, Access has a Key Tips feature that can help make entering data move more quickly. The following section describes how to use it:</p>\n<ol>\n<li><strong>Press the Alt key</strong>. When you want to switch tabs and issue commands with the keyboard in Access (rather than with the mouse), press the Alt key. As shown in the following figure, pressing Alt causes numbers and letters to appear in small squares on the Quick Access Toolbar and the Ribbon’s tabs.<img loading=\"lazy\" class=\"alignnone wp-image-288952 size-full\" src=\"https://www.dummies.com/wp-content/uploads/Access-ribbon-tool-bar-png-1.png\" alt=\"Access ribbon and tool bar\" width=\"630\" height=\"473\" /></li>\n<li><strong>Press a Key Tip</strong> to set the focus to that item (like C in this case for the Create tab). Key Tips appear for the item, as shown in the following figure. <img loading=\"lazy\" class=\"alignnone wp-image-288953 size-full\" src=\"https://www.dummies.com/wp-content/uploads/Access-key-tips-png.png\" alt=\"Access key tips\" width=\"630\" height=\"473\" /></li>\n<li><strong>Press a Key Tip</strong> (like TN to create a new table). When you press one of the characters on your keyboard, the command assigned to the Key Tip runs.</li>\n</ol>\n"},{"title":"Handy Access keyboard shortcuts","thumb":null,"image":null,"content":"<p>The following keyboard shortcuts are especially useful in Access. Some keystrokes work anywhere in Access, whereas others work only in specific views, as noted below.</p>\n<table>\n<tbody>\n<tr>\n<td width=\"123\">Keystroke</td>\n<td width=\"495\">Function</td>\n</tr>\n<tr>\n<td width=\"123\">F1</td>\n<td width=\"495\">Opens the Help window</td>\n</tr>\n<tr>\n<td width=\"123\">Alt+F</td>\n<td width=\"495\">Opens the File tab</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+N</td>\n<td width=\"495\">Creates a new blank database</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+O</td>\n<td width=\"495\">Opens an existing database</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+P</td>\n<td width=\"495\">Opens the Print dialog box</td>\n</tr>\n<tr>\n<td width=\"123\">F11</td>\n<td width=\"495\">Shows/hides the Navigation pane</td>\n</tr>\n<tr>\n<td width=\"123\">F6</td>\n<td width=\"495\">Cycles through different areas of the program window</td>\n</tr>\n<tr>\n<td width=\"123\">Alt+H</td>\n<td width=\"495\">Displays the Home tab on the Ribbon</td>\n</tr>\n<tr>\n<td width=\"123\">Alt+C</td>\n<td width=\"495\">Displays the Create tab on the Ribbon</td>\n</tr>\n<tr>\n<td width=\"123\">Alt+X</td>\n<td width=\"495\">Displays the External Data tab on the Ribbon</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+S</td>\n<td width=\"495\">Saves the current object in Design mode</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+C</td>\n<td width=\"495\">Copies the selection to the Clipboard</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+V</td>\n<td width=\"495\">Pastes the selection from the Clipboard</td>\n</tr>\n<tr>\n<td width=\"123\">F12</td>\n<td width=\"495\">Opens the Save As dialog box</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+F4</td>\n<td width=\"495\">Closes the active document window</td>\n</tr>\n<tr>\n<td width=\"123\">Alt+F4</td>\n<td width=\"495\">Closes the active application window</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+Z</td>\n<td width=\"495\">Undoes the last operation</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+;</td>\n<td width=\"495\">Inserts the current date</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+:</td>\n<td width=\"495\">Inserts the current time</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+&#8217;</td>\n<td width=\"495\">Copies the same field data from the previous record</td>\n</tr>\n<tr>\n<td width=\"123\">F2</td>\n<td width=\"495\">Toggles selecting all data in the field or placing the cursor in edit mode</td>\n</tr>\n<tr>\n<td width=\"123\">F9</td>\n<td width=\"495\">Recalculates fields on a form or refreshes a lookup combo or list box</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+Enter</td>\n<td width=\"495\">Inserts a line break in Datasheet and Form view</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+Enter</td>\n<td width=\"495\">Opens the selected object from Navigation pane in Design view</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+ +</td>\n<td width=\"495\">Inserts a new record</td>\n</tr>\n<tr>\n<td width=\"123\">Ctrl+-</td>\n<td width=\"495\">Deletes the current record</td>\n</tr>\n<tr>\n<td width=\"123\">Right Arrow</td>\n<td width=\"495\">Moves the selected control to the right in Design or Layout view</td>\n</tr>\n<tr>\n<td width=\"123\">Left Arrow</td>\n<td width=\"495\">Moves the selected control to the left in Design or Layout view</td>\n</tr>\n<tr>\n<td width=\"123\">Down Arrow</td>\n<td width=\"495\">Moves the selected control down in Design or Layout view</td>\n</tr>\n<tr>\n<td width=\"123\">Up Arrow</td>\n<td width=\"495\">Moves the selected control up in Design or Layout view</td>\n</tr>\n<tr>\n<td width=\"123\">Shift+Right Arrow</td>\n<td width=\"495\">Increases the selected control width in Design or Layout view</td>\n</tr>\n<tr>\n<td width=\"123\">Shift+Left Arrow</td>\n<td width=\"495\">Decreases the selected control width in Design or Layout view</td>\n</tr>\n<tr>\n<td width=\"123\">Shift+Down Arrow</td>\n<td width=\"495\">Increases the selected control height in Design or Layout<br />\nview</td>\n</tr>\n<tr>\n<td width=\"123\">Shift+Up Arrow</td>\n<td width=\"495\">Decreases the selected control height in Design or Layout<br />\nview</td>\n</tr>\n<tr>\n<td width=\"123\">F4</td>\n<td width=\"495\">Toggles the property sheet window in Design view</td>\n</tr>\n<tr>\n<td width=\"123\">Shift+F2</td>\n<td width=\"495\">Zooms in on the current field in Datasheet and Form view</td>\n</tr>\n</tbody>\n</table>\n<p>&nbsp;</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2025-01-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":257190},{"headers":{"creationTime":"2025-04-08T17:11:12+00:00","modifiedTime":"2025-04-08T17:11:12+00:00","timestamp":"2025-04-08T18:01:04+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Social Media","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33611"},"slug":"social-media","categoryId":33611},{"name":"General Social Media","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33617"},"slug":"general-social-media","categoryId":33617}],"title":"Bluesky For Dummies Cheat Sheet","strippedTitle":"bluesky for dummies cheat sheet","slug":"bluesky-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Master Bluesky with our handy cheat sheet! Get quick access to posting rules, community guidelines, and tips for sharing text, images, and videos.","noIndex":0,"noFollow":0},"content":"<p class=\"Body\">Some readers like to thumb through a book and flag pages that they think are important. If that’s not you, we have you covered with this handy-dandy cheat sheet! This sheet contains all the important stuff you need to know about posting on Bluesky: rules for posting text, images, and videos and Bluesky’s community guidelines so your posts contribute to a healthy community.</p>","description":"<p class=\"Body\">Some readers like to thumb through a book and flag pages that they think are important. If that’s not you, we have you covered with this handy-dandy cheat sheet! This sheet contains all the important stuff you need to know about posting on Bluesky: rules for posting text, images, and videos and Bluesky’s community guidelines so your posts contribute to a healthy community.</p>","blurb":"","authors":[{"authorId":10889,"name":"Eric Butow","slug":"eric-butow","description":" <p> <b>Marc R. Butler</b> is a highly experienced financial services executive who currently works as an advisor and consultant in the financial services world, with a focus on wealth management, organizational operation, and startup success. <b>Eric Butow</b> is the owner of Butow Communications Group in Jackson, California, and is the coauthor of <i>Instagram for Business For Dummies </i>and <i>Digital Etiquette For Dummies</i>. ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10889"}},{"authorId":35573,"name":"Rebecca Bollwitt","slug":"rebecca-bollwitt","description":"<strong>Rebecca Bollwitt</strong> is a social media and digital publishing strategist.","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/35573"}}],"primaryCategoryTaxonomy":{"categoryId":33617,"title":"General Social Media","slug":"general-social-media","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33617"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"/articles/299133"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":297377,"title":"How to Pick a Mastodon Server","slug":"how-to-choose-a-server-on-mastodon","categoryList":["technology","social-media","general-social-media"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/297377"}},{"articleId":297324,"title":"How to Find Your Twitter Followers on Mastodon","slug":"how-to-find-your-friends-on-mastodon","categoryList":["technology","social-media","general-social-media"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/297324"}},{"articleId":297311,"title":"How Is Mastodon Different from Twitter?","slug":"how-is-mastodon-different-from-twitter","categoryList":["technology","social-media","general-social-media"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/297311"}},{"articleId":297062,"title":"Mastodon For Dummies Cheat Sheet","slug":"mastodon-for-dummies-cheat-sheet","categoryList":["technology","social-media","general-social-media"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/297062"}},{"articleId":270462,"title":"Top 10 Essentials for Discord","slug":"top-10-essentials-for-discord","categoryList":["technology","social-media","general-social-media"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/270462"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":302805,"slug":"bluesky-for-dummies","isbn":"9781394350162","categoryList":["technology","social-media","general-social-media"],"amazon":{"default":"https://www.amazon.com/gp/product/1394350163/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1394350163/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1394350163-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1394350163/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1394350163/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/bluesky-for-dummies-9781394350162-170x255.jpg","width":170,"height":255},"title":"Bluesky For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p> <b>Marc R. Butler</b> is a highly experienced financial services executive who currently works as an advisor and consultant in the financial services world, with a focus on wealth management, organizational operation, and startup success. <b><b data-author-id=\"10889\">Eric Butow</b></b> is the owner of Butow Communications Group in Jackson, California, and is the coauthor of <i>Instagram for Business For Dummies </i>and <i>Digital Etiquette For Dummies</i>. <strong><b data-author-id=\"35573\">Rebecca Bollwitt</b></strong> is a social media and digital publishing strategist.</p>","authors":[{"authorId":10889,"name":"Eric Butow","slug":"eric-butow","description":" <p> <b>Marc R. Butler</b> is a highly experienced financial services executive who currently works as an advisor and consultant in the financial services world, with a focus on wealth management, organizational operation, and startup success. <b>Eric Butow</b> is the owner of Butow Communications Group in Jackson, California, and is the coauthor of <i>Instagram for Business For Dummies </i>and <i>Digital Etiquette For Dummies</i>. ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10889"}},{"authorId":35573,"name":"Rebecca Bollwitt","slug":"rebecca-bollwitt","description":"<strong>Rebecca Bollwitt</strong> is a social media and digital publishing strategist.","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/35573"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;social-media&quot;,&quot;general-social-media&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394350162&quot;]}]\" id=\"du-slot-67f56460efea1\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;social-media&quot;,&quot;general-social-media&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394350162&quot;]}]\" id=\"du-slot-67f56460f1b11\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/"}}],"content":[{"title":"Adhering to the Guidelines","thumb":null,"image":null,"content":"<h3>Text limits</h3>\n<p>The text limit for posts is 300 characters, including spaces.</p>\n<h3>Image limits</h3>\n<ul>\n<li><strong>Image format:</strong> You can upload images in JPEG, PNG, and WebP formats.</li>\n<li><strong>Image file size:</strong> The maximum file size for an image is 1MB. If the image you upload is larger than 1MB, Bluesky will compress it for you, but you should ensure that the compressed image still looks the way you want.</li>\n<li><strong>Number of images in a post:</strong> You can upload as many as four images in a post.</li>\n<li><strong>Animated GIF file size:</strong> GIFs can be up to 50MB.</li>\n<li><strong>Profile photo size:</strong> Your profile photo should be 400 x 400 pixels to look the way you expect.</li>\n<li><strong>Profile banner size:</strong> Your profile banner should be 1500 pixels wide by 500 pixels high for the best results.</li>\n</ul>\n<h3>Video requirements</h3>\n<p>Bluesky introduced video sharing in September 2024. You can add one video to each post. Here are the other particulars you need to know:</p>\n<ul>\n<li><strong>Video formats:</strong> Bluesky supports .mp4, .mpeg, .webm, and .mov formats.</li>\n<li><strong>Video length:</strong> A video can be no longer than 60 seconds.</li>\n<li><strong>Number of videos in a post:</strong></li>\n<li><strong>Video file size:</strong> The maximum file size for a video is 50MB.</li>\n<li><strong>Number of videos daily:</strong> You can upload 25 videos or a maximum of 10 GB of video per day.</li>\n</ul>\n"},{"title":"Pointing You in the Right Direction","thumb":null,"image":null,"content":"<p>Bluesky has created guidelines for users to create vibrant communities on the platform, and those guidelines are built upon three principles:</p>\n<ul>\n<li>Allow users to choose the algorithms that power their feeds and use their own apps.</li>\n<li>Create a welcoming environment where people feel safe and enjoy participating on the platform.</li>\n<li>Regularly review and update these guidelines as circumstances change and always be transparent about policy changes.</li>\n</ul>\n<p>Based on these principles, Bluesky has two steadfast rules. Rule #1: Don’t use Bluesky to break the law or cause harm to others. Rule #2: Treat others with respect.</p>\n<p>Rule #2 is straightforward. With Rule #1, here’s how to not cause harm to others:</p>\n<ul>\n<li>Do not spam, phish, or operate multiple accounts that interact similarly. Your goal should be to add value to the network through your content.</li>\n<li>Do not use or distribute others’ private personal information without their permission. The antispam and privacy rules and laws established in your country, state, or province apply on Bluesky as well.</li>\n<li>Do not infringe other’s copyrights, trademarks, or other intellectual property. If you or your business do not own the rights to distribute an image or likeness, do not publish that photo or video on Bluesky.</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Explore","lifeExpectancy":"One year","lifeExpectancySetFrom":"2025-04-21T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":302809},{"headers":{"creationTime":"2025-03-03T21:45:28+00:00","modifiedTime":"2025-03-03T21:49:05+00:00","timestamp":"2025-03-04T00:01:11+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Cybersecurity","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33537"},"slug":"cybersecurity","categoryId":33537}],"title":"Modern DSPM and the Importance of Discovering and Classifying Sensitive Data","strippedTitle":"modern dspm and the importance of discovering and classifying sensitive data","slug":"modern-dspm-and-the-importance-of-discovering-and-classifying-sensitive-data","canonicalUrl":"","seo":{"metaDescription":"Discover the importance of modern DSPM in identifying and classifying sensitive data. Learn about challenges and solutions for effective data security.","noIndex":0,"noFollow":0},"content":"In this article you will learn:\r\n<ul>\r\n \t<li><a href=\"#necessity\">The necessity of discovering and classifying all sensitive data</a></li>\r\n \t<li><a href=\"#challenges\">Challenges of modern DSPM tools</a></li>\r\n \t<li><a href=\"#solutions\">Solutions that DSPM tools provide</a></li>\r\n</ul>\r\nData is often shared and copied across multiple locations, making your most valuable business asset a security nightmare. It’s in your organization’s best interests to keep data as secure as possible, away from prying eyes, no matter where it resides.\r\n\r\nDoing so requires a structured and strong data security program backed by a powerful data security posture management (DSPM) solution. Modern DSPM is the next generation of data security technology, designed for the complexities of the hybrid cloud environments by tapping into the power of artificial intelligence (AI) and machine learning (ML) to continuously discover data and automate classification of sensitive information across known and unknown environments.\r\n<div id=\"necessity\"></div>\r\n<h2 id=\"tab1\" >The necessity of discovering and classifying all sensitive data</h2>\r\nYour sensitive data can’t be fully secure unless you’re able to effectively discover and classify every bit and byte of it, quickly and continually, and at scale, across your entire data footprint. That’s what modern DSPM excels at.\r\n\r\nEssential visibility — what data your enterprise has, how sensitive it is, and where it resides — is the key to security. Gaps in that visibility will stand in the way of a strong security posture.\r\n\r\nAs data is discovered, modern DSPM classifies it automatically and precisely using AI and ML with advanced large language models. Modern DSPM solutions can discover and classify data types that are specific to your organization without any custom tuning.\r\n\r\nWith data discovered and classified, you can then apply the appropriate security controls for keeping that data secure and keeping your organization in compliance with data protection regulations.\r\n<p class=\"article-tips remember\">Modern DSPM excels in both discovery and classification, which is why it’s critical for your data security program’s success.</p>\r\n\r\n<div id=\"challenges\"></div>\r\n<h2 id=\"tab2\" >Challenges of modern DSPM tools</h2>\r\nToday’s data volumes and advanced technologies makes protecting your data a challenge, meaning legacy tools can’t keep up. You’ll find these problems when using a tool that’s not optimized for these challenges:\r\n<ul>\r\n \t<li><strong>Partially classified data:</strong> Legacy tools are designed with out-of-the-box classifiers, set up to only find what it’s looking for. Modern DSPM solutions find what you might not even know you should be looking for, such as unstructured sensitive documents specific to your organization.</li>\r\n \t<li><strong>Discovery</strong><strong> is slow: </strong>Data security requires rapid information, but legacy tools can’t keep up the pace. Scanning can take a long time because legacy tools don’t benefit from the AI and ML scanning techniques that a modern DSPM tool provides.</li>\r\n \t<li><strong>Inaccurate classifications: </strong>Outdated tools tend to rely mainly on regular expressions and other older techniques to classify data. As a result, you need dedicated resources to manually write rules, tune the tools, and make sure classifications are accurate.</li>\r\n \t<li><strong>Difficult to manage: </strong>With legacy tools, lots of agents and dedicated resources are needed to connect to datastores. That requires tons of work, and it is a monumental task to maintain.</li>\r\n</ul>\r\n<div id=\"solutions\"></div>\r\n<h2 id=\"tab3\" >Solutions that DSPM tools provide</h2>\r\nDSPM, on the other hand, is made for modern data security challenges:\r\n<ul>\r\n \t<li><strong>Precision in classification and context: </strong>A modern DSPM solution applies AI and ML not only to detect common patterns, such as personal identifiers and financial data, but also to recognize proprietary, unstructured, or business-specific data with high precision.</li>\r\n \t<li><strong>Scale and speed for today’s data environments</strong>: Precision alone isn’t enough for data that’s fast-moving and dispersed across SaaS, IaaS, and on-prem systems. Speed and scalability are essential. Modern DSPM tools operate agentlessly, scanning datastores quickly without disrupting business operations, providing rapid results, even across vast ecosystems.</li>\r\n \t<li><strong>Actionable insights for remediation:</strong> Detecting risks is only the beginning. A powerful DSPM solution goes beyond visibility, offering actionable insights to address identified risks.</li>\r\n</ul>\r\n<p class=\"article-tips remember\">Modern DSPM is the core that ties everything together and helps ensure the confidentiality, integrity, and availability of your data. You really can’t run a modern data security program without it.</p>\r\nTo learn more about modern DSPM solutions that support your business needs, download <a href=\"https://www.cyera.io/ebooks/modern-dspm-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">Modern DSPM For Dummies, Cyera Special Edition</a>.","description":"In this article you will learn:\r\n<ul>\r\n \t<li><a href=\"#necessity\">The necessity of discovering and classifying all sensitive data</a></li>\r\n \t<li><a href=\"#challenges\">Challenges of modern DSPM tools</a></li>\r\n \t<li><a href=\"#solutions\">Solutions that DSPM tools provide</a></li>\r\n</ul>\r\nData is often shared and copied across multiple locations, making your most valuable business asset a security nightmare. It’s in your organization’s best interests to keep data as secure as possible, away from prying eyes, no matter where it resides.\r\n\r\nDoing so requires a structured and strong data security program backed by a powerful data security posture management (DSPM) solution. Modern DSPM is the next generation of data security technology, designed for the complexities of the hybrid cloud environments by tapping into the power of artificial intelligence (AI) and machine learning (ML) to continuously discover data and automate classification of sensitive information across known and unknown environments.\r\n<div id=\"necessity\"></div>\r\n<h2 id=\"tab1\" >The necessity of discovering and classifying all sensitive data</h2>\r\nYour sensitive data can’t be fully secure unless you’re able to effectively discover and classify every bit and byte of it, quickly and continually, and at scale, across your entire data footprint. That’s what modern DSPM excels at.\r\n\r\nEssential visibility — what data your enterprise has, how sensitive it is, and where it resides — is the key to security. Gaps in that visibility will stand in the way of a strong security posture.\r\n\r\nAs data is discovered, modern DSPM classifies it automatically and precisely using AI and ML with advanced large language models. Modern DSPM solutions can discover and classify data types that are specific to your organization without any custom tuning.\r\n\r\nWith data discovered and classified, you can then apply the appropriate security controls for keeping that data secure and keeping your organization in compliance with data protection regulations.\r\n<p class=\"article-tips remember\">Modern DSPM excels in both discovery and classification, which is why it’s critical for your data security program’s success.</p>\r\n\r\n<div id=\"challenges\"></div>\r\n<h2 id=\"tab2\" >Challenges of modern DSPM tools</h2>\r\nToday’s data volumes and advanced technologies makes protecting your data a challenge, meaning legacy tools can’t keep up. You’ll find these problems when using a tool that’s not optimized for these challenges:\r\n<ul>\r\n \t<li><strong>Partially classified data:</strong> Legacy tools are designed with out-of-the-box classifiers, set up to only find what it’s looking for. Modern DSPM solutions find what you might not even know you should be looking for, such as unstructured sensitive documents specific to your organization.</li>\r\n \t<li><strong>Discovery</strong><strong> is slow: </strong>Data security requires rapid information, but legacy tools can’t keep up the pace. Scanning can take a long time because legacy tools don’t benefit from the AI and ML scanning techniques that a modern DSPM tool provides.</li>\r\n \t<li><strong>Inaccurate classifications: </strong>Outdated tools tend to rely mainly on regular expressions and other older techniques to classify data. As a result, you need dedicated resources to manually write rules, tune the tools, and make sure classifications are accurate.</li>\r\n \t<li><strong>Difficult to manage: </strong>With legacy tools, lots of agents and dedicated resources are needed to connect to datastores. That requires tons of work, and it is a monumental task to maintain.</li>\r\n</ul>\r\n<div id=\"solutions\"></div>\r\n<h2 id=\"tab3\" >Solutions that DSPM tools provide</h2>\r\nDSPM, on the other hand, is made for modern data security challenges:\r\n<ul>\r\n \t<li><strong>Precision in classification and context: </strong>A modern DSPM solution applies AI and ML not only to detect common patterns, such as personal identifiers and financial data, but also to recognize proprietary, unstructured, or business-specific data with high precision.</li>\r\n \t<li><strong>Scale and speed for today’s data environments</strong>: Precision alone isn’t enough for data that’s fast-moving and dispersed across SaaS, IaaS, and on-prem systems. Speed and scalability are essential. Modern DSPM tools operate agentlessly, scanning datastores quickly without disrupting business operations, providing rapid results, even across vast ecosystems.</li>\r\n \t<li><strong>Actionable insights for remediation:</strong> Detecting risks is only the beginning. A powerful DSPM solution goes beyond visibility, offering actionable insights to address identified risks.</li>\r\n</ul>\r\n<p class=\"article-tips remember\">Modern DSPM is the core that ties everything together and helps ensure the confidentiality, integrity, and availability of your data. You really can’t run a modern data security program without it.</p>\r\nTo learn more about modern DSPM solutions that support your business needs, download <a href=\"https://www.cyera.io/ebooks/modern-dspm-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">Modern DSPM For Dummies, Cyera Special Edition</a>.","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33537"}},"secondaryCategoryTaxonomy":{"categoryId":34244,"title":"Data Management","slug":"data-management","_links":{"self":"https://dummies-api.dummies.com/v2/categories/34244"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"/articles/299133"}}],"inThisArticle":[{"label":"The necessity of discovering and classifying all sensitive data","target":"#tab1"},{"label":"Challenges of modern DSPM tools","target":"#tab2"},{"label":"Solutions that DSPM tools provide","target":"#tab3"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":302507,"title":"What Is Zero Risk Application Security and How Can It Align with Compliance Frameworks?","slug":"what-is-zero-risk-application-security-and-how-can-it-align-with-compliance-frameworks","categoryList":["technology","cybersecurity"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/302507"}},{"articleId":302201,"title":"SAP Application Security: Get Clean, Stay Clean, and Optimize","slug":"sap-application-security-get-clean-stay-clean-and-optimize","categoryList":["technology","cybersecurity"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/302201"}},{"articleId":301649,"title":"Takeaways about Extended Detection and Response (XDR)","slug":"takeaways-about-extended-detection-and-response-xdr","categoryList":["technology","cybersecurity"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/301649"}},{"articleId":301654,"title":"Nine Ways to Protect Against Advanced Email Threats","slug":"nine-ways-to-protect-against-advanced-email-threats","categoryList":["technology","cybersecurity"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/301654"}},{"articleId":301585,"title":"Risk-Based Cybersecurity with Managed Detection and Response (MDR)","slug":"risk-based-cybersecurity-with-managed-detection-and-response-mdr","categoryList":["technology","cybersecurity"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/301585"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;cybersecurity&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-67c642c84ca4a\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;cybersecurity&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-67c642c84e796\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by Cyera","brandingLink":"https://www.cyera.io/","brandingLogo":{"src":"https://www.dummies.com/wp-content/uploads/cyera-logo.jpg","width":200,"height":60},"sponsorAd":"","sponsorEbookTitle":"Modern DSPM For Dummies, Cyera Special Edition","sponsorEbookLink":"https://www.cyera.io/ebooks/modern-dspm-for-dummies","sponsorEbookImage":{"src":"https://www.dummies.com/wp-content/uploads/modern-dspm-for-dummies-cyera-special-edition-cover-9781394308200-165x255.jpg","width":165,"height":255}},"primaryLearningPath":"Solve","lifeExpectancy":"One year","lifeExpectancySetFrom":"2025-03-04T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":302743},{"headers":{"creationTime":"2025-02-20T21:11:45+00:00","modifiedTime":"2025-02-20T21:11:45+00:00","timestamp":"2025-02-21T00:01:07+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"AI","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33574"},"slug":"ai","categoryId":33574},{"name":"Generative AI","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33576"},"slug":"general-ai","categoryId":33576}],"title":"The Benefits of a Unified Data Management Approach","strippedTitle":"the benefits of a unified data management approach","slug":"the-benefits-of-a-unified-data-management-approach","canonicalUrl":"","seo":{"metaDescription":"Discover how a unified data management approach enhances AI deployment, ensuring data is well-managed, secure, and ready for effective model training.","noIndex":0,"noFollow":0},"content":"Artificial intelligence (AI) offers a lot of promise to companies, but deploying AI can be complex with many considerations and pitfalls. Data is the necessary asset to make AI work, and your organization is probably swimming in it.\r\n\r\nBut how well-managed is your data? The answer hinges on whether your company will be successful in its AI efforts.\r\n\r\nData management is the behind-the scenes workhorse that makes AI work. A robust management program allows data to be ingested from everywhere it needs to be, cleaned and transformed to enable AI model training, made easily available to users, and meticulously governed to ensure security, privacy, and compliance.\r\n\r\nIn this article, we’ll explore several ways a data management platform can help with your AI efforts.\r\n<p class=\"article-tips tip\">Although these applications may differ, effective data management is always the necessary first step on which these solutions are built.</p>\r\n\r\n<h2 id=\"tab1\" >Proprietary AI</h2>\r\nAs your business scales, the number of receipts, invoices, contracts, and other printed documents scale, too. And when all those documents aren’t digitized, think of the number of hours it will take an employee to catalog it.\r\n\r\nIt’s possible to use AI to automate this process. A proprietary engine scans and processes documents, extracts meaning from them, and outputs the data in a format that’s handy for reports, dashboards, and business intelligence apps.\r\n\r\nSome benefits of using proprietary AI to scan and process documents are:\r\n<ul>\r\n \t<li>It can translate multiple languages. A large language model (LLM) can be trained to make sense of any specific document formats that your company may have.</li>\r\n \t<li>Accurate data helps with decision-making. Data can be extracted from third-party platforms, enrich it, validate it, and output it to dashboards accessible throughout the company.</li>\r\n \t<li>Identify issues with customers earlier. Algorithms aggregate and analyze user data, spotlighting any issues with customers early on to prevent customer churn. Or to spotlight when a loyal customer is ready to grow with your company.</li>\r\n</ul>\r\n<h2 id=\"tab2\" >Retrieval augmented generation</h2>\r\nThings that work well in a controlled environment with a carefully curated data sample don’t always work in a real-world environment. One such situation is with retrieval augmented generation (RAG), the engine that LLMs rely on to give accurate facts. But if RAG is relying on legacy data that wasn’t prepared adequately, your AI solution is going to underperform.\r\n\r\nA data management program makes sure the basic, but vitally important, tasks are covered — data is cleaned, engineered, structured, and complete. Some tasks it can do are:\r\n<ul>\r\n \t<li>Implement meta-intent branching for handling different types of queries.</li>\r\n \t<li>Develop verified quotes and see-it-in-source features for transparency.</li>\r\n \t<li>Monitor and balance token consumption.</li>\r\n \t<li>Improve data quality through semantic data scrubbing.</li>\r\n</ul>\r\n<h2 id=\"tab3\" >Research and development</h2>\r\nTraditional research and development methods can be time consuming and expensive. Applying AI to the process can help reduce the cost and release products to the market faster. Reliable products help retain customers, boost the company’s reputation, and grow profit margin.\r\n\r\nHigh-quality data is needed to make it all work. A data management program can help with the following tasks:\r\n<ul>\r\n \t<li>Automate manual processes. Automating helps to lower errors and inefficiencies, and accelerates quantitative research by navigating unstructured data. Business decisions get made faster.</li>\r\n \t<li>Verify and vet output. One system can generate formulas or prototypes for new products; a secondary one can automatically evaluate, compare, and check them for compatibility and other parameters.</li>\r\n</ul>\r\nEnhance new network implementations and diagnostics. AI can create potential scenarios for the design and deployment of new systems. It can create hypotheses to pinpoint problems and suggest solutions.\r\n<h2 id=\"tab4\" >About the Book</h2>\r\nWiley has recently published <a class=\"bookSponsor-btn\" href=\"https://www.keboola.com/blog/ai-data-management-for-dummies-keboola-special-edition\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">AI Data Management For Dummies, Keboola Special Edition</a>. It includes insights from <a href=\"https://www.snowflake.com/en/\" target=\"_blank\" rel=\"noopener\">Snowflake</a> and <a href=\"https://www.capgemini.com/us-en/\" target=\"_blank\" rel=\"noopener\">Capgemini</a> that will help your organization integrate best practices and advanced technologies into your data strategy, what the future of AI development looks like, and more use cases.\r\n\r\nDownload <a href=\"https://www.keboola.com/blog/ai-data-management-for-dummies-keboola-special-edition\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">AI Data Management For Dummies, Keboola Special Edition</a> by Andy Mott, Dan O’Riordan, and Rithesh Makkena to open the door to AI success.","description":"Artificial intelligence (AI) offers a lot of promise to companies, but deploying AI can be complex with many considerations and pitfalls. Data is the necessary asset to make AI work, and your organization is probably swimming in it.\r\n\r\nBut how well-managed is your data? The answer hinges on whether your company will be successful in its AI efforts.\r\n\r\nData management is the behind-the scenes workhorse that makes AI work. A robust management program allows data to be ingested from everywhere it needs to be, cleaned and transformed to enable AI model training, made easily available to users, and meticulously governed to ensure security, privacy, and compliance.\r\n\r\nIn this article, we’ll explore several ways a data management platform can help with your AI efforts.\r\n<p class=\"article-tips tip\">Although these applications may differ, effective data management is always the necessary first step on which these solutions are built.</p>\r\n\r\n<h2 id=\"tab1\" >Proprietary AI</h2>\r\nAs your business scales, the number of receipts, invoices, contracts, and other printed documents scale, too. And when all those documents aren’t digitized, think of the number of hours it will take an employee to catalog it.\r\n\r\nIt’s possible to use AI to automate this process. A proprietary engine scans and processes documents, extracts meaning from them, and outputs the data in a format that’s handy for reports, dashboards, and business intelligence apps.\r\n\r\nSome benefits of using proprietary AI to scan and process documents are:\r\n<ul>\r\n \t<li>It can translate multiple languages. A large language model (LLM) can be trained to make sense of any specific document formats that your company may have.</li>\r\n \t<li>Accurate data helps with decision-making. Data can be extracted from third-party platforms, enrich it, validate it, and output it to dashboards accessible throughout the company.</li>\r\n \t<li>Identify issues with customers earlier. Algorithms aggregate and analyze user data, spotlighting any issues with customers early on to prevent customer churn. Or to spotlight when a loyal customer is ready to grow with your company.</li>\r\n</ul>\r\n<h2 id=\"tab2\" >Retrieval augmented generation</h2>\r\nThings that work well in a controlled environment with a carefully curated data sample don’t always work in a real-world environment. One such situation is with retrieval augmented generation (RAG), the engine that LLMs rely on to give accurate facts. But if RAG is relying on legacy data that wasn’t prepared adequately, your AI solution is going to underperform.\r\n\r\nA data management program makes sure the basic, but vitally important, tasks are covered — data is cleaned, engineered, structured, and complete. Some tasks it can do are:\r\n<ul>\r\n \t<li>Implement meta-intent branching for handling different types of queries.</li>\r\n \t<li>Develop verified quotes and see-it-in-source features for transparency.</li>\r\n \t<li>Monitor and balance token consumption.</li>\r\n \t<li>Improve data quality through semantic data scrubbing.</li>\r\n</ul>\r\n<h2 id=\"tab3\" >Research and development</h2>\r\nTraditional research and development methods can be time consuming and expensive. Applying AI to the process can help reduce the cost and release products to the market faster. Reliable products help retain customers, boost the company’s reputation, and grow profit margin.\r\n\r\nHigh-quality data is needed to make it all work. A data management program can help with the following tasks:\r\n<ul>\r\n \t<li>Automate manual processes. Automating helps to lower errors and inefficiencies, and accelerates quantitative research by navigating unstructured data. Business decisions get made faster.</li>\r\n \t<li>Verify and vet output. One system can generate formulas or prototypes for new products; a secondary one can automatically evaluate, compare, and check them for compatibility and other parameters.</li>\r\n</ul>\r\nEnhance new network implementations and diagnostics. AI can create potential scenarios for the design and deployment of new systems. It can create hypotheses to pinpoint problems and suggest solutions.\r\n<h2 id=\"tab4\" >About the Book</h2>\r\nWiley has recently published <a class=\"bookSponsor-btn\" href=\"https://www.keboola.com/blog/ai-data-management-for-dummies-keboola-special-edition\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">AI Data Management For Dummies, Keboola Special Edition</a>. It includes insights from <a href=\"https://www.snowflake.com/en/\" target=\"_blank\" rel=\"noopener\">Snowflake</a> and <a href=\"https://www.capgemini.com/us-en/\" target=\"_blank\" rel=\"noopener\">Capgemini</a> that will help your organization integrate best practices and advanced technologies into your data strategy, what the future of AI development looks like, and more use cases.\r\n\r\nDownload <a href=\"https://www.keboola.com/blog/ai-data-management-for-dummies-keboola-special-edition\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">AI Data Management For Dummies, Keboola Special Edition</a> by Andy Mott, Dan O’Riordan, and Rithesh Makkena to open the door to AI success.","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33576,"title":"Generative AI","slug":"general-ai","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33576"}},"secondaryCategoryTaxonomy":{"categoryId":34244,"title":"Data Management","slug":"data-management","_links":{"self":"https://dummies-api.dummies.com/v2/categories/34244"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"/articles/299133"}}],"inThisArticle":[{"label":"Proprietary AI","target":"#tab1"},{"label":"Retrieval augmented generation","target":"#tab2"},{"label":"Research and development","target":"#tab3"},{"label":"About the Book","target":"#tab4"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":302523,"title":"How to Write Effective AI Prompts for Different Real World Uses","slug":"how-to-write-effective-prompts-for-different-real-world-uses","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/302523"}},{"articleId":302379,"title":"Generative AI For Dummies Cheat Sheet","slug":"generative-ai-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/302379"}},{"articleId":302176,"title":"Improving CLM with Generative AI: Key Use Cases","slug":"improving-clm-with-generative-ai-key-use-cases","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/302176"}},{"articleId":301980,"title":"Enterprise Generative AI: Transforming Your Business","slug":"enterprise-generative-ai-transforming-your-business","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/301980"}},{"articleId":301240,"title":"Five Ways Machine Health Delivers Real Business Value","slug":"five-ways-machine-health-delivers-real-business-value","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/301240"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;,&quot;general-ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-67b7c24468e31\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;,&quot;general-ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-67b7c2446a91d\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by Keboola","brandingLink":"https://www.keboola.com/","brandingLogo":{"src":"https://www.dummies.com/wp-content/uploads/keebola-logo.png","width":185,"height":50},"sponsorAd":"","sponsorEbookTitle":"AI Data Management For Dummies, Keboola Special Edition","sponsorEbookLink":"https://www.keboola.com/blog/ai-data-management-for-dummies-keboola-special-edition","sponsorEbookImage":{"src":"https://www.dummies.com/wp-content/uploads/ai-data-management-for-dummies-keboola-special-edition-161x255.jpg","width":161,"height":255}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2025-02-20T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[{"adPairKey":"sponsored","adPairValue":"customsolutions"}]},"status":"publish","visibility":"public","articleId":302697},{"headers":{"creationTime":"2017-11-28T05:09:21+00:00","modifiedTime":"2025-02-19T18:22:21+00:00","timestamp":"2025-02-19T21:01:14+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Social Media","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33611"},"slug":"social-media","categoryId":33611},{"name":"Instagram","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33613"},"slug":"instagram","categoryId":33613}],"title":"Instagram For Business For Dummies Cheat Sheet","strippedTitle":"instagram for business for dummies cheat sheet","slug":"instagram-business-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Discover essential tips and tricks for using Instagram to boost your business. Learn the lingo, avoid spammy behaviors, and optimize your content.","noIndex":0,"noFollow":0},"content":"Before you start using Instagram to promote your business, you may want to learn the lingo that Instagrammers use. Instagram doesn't like accounts that act spammy or over-engage in certain behaviors, so you need to become familiar with a number of restrictions as well as the appropriate image or video size to showcase your products and services. When you follow other <a href=\"/article/technology/social-media/instagram/taking-advantage-instagram-business-profile-upgrade-249591/\" target=\"_blank\" rel=\"noopener\">Instagram profiles</a>, you can share posts and even entire profiles in a direct message to another Instagram user.\r\n\r\n[caption id=\"attachment_275766\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-275766\" src=\"https://www.dummies.com/wp-content/uploads/instagram-business-concept.jpg\" alt=\"Instagram for business\" width=\"556\" height=\"556\" /> © karnoff / Shutterstock.com[/caption]","description":"Before you start using Instagram to promote your business, you may want to learn the lingo that Instagrammers use. Instagram doesn't like accounts that act spammy or over-engage in certain behaviors, so you need to become familiar with a number of restrictions as well as the appropriate image or video size to showcase your products and services. When you follow other <a href=\"/article/technology/social-media/instagram/taking-advantage-instagram-business-profile-upgrade-249591/\" target=\"_blank\" rel=\"noopener\">Instagram profiles</a>, you can share posts and even entire profiles in a direct message to another Instagram user.\r\n\r\n[caption id=\"attachment_275766\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-275766\" src=\"https://www.dummies.com/wp-content/uploads/instagram-business-concept.jpg\" alt=\"Instagram for business\" width=\"556\" height=\"556\" /> © karnoff / Shutterstock.com[/caption]","blurb":"","authors":[{"authorId":10889,"name":"Eric Butow","slug":"eric-butow","description":" <p> <b>Marc R. Butler</b> is a highly experienced financial services executive who currently works as an advisor and consultant in the financial services world, with a focus on wealth management, organizational operation, and startup success. <b>Eric Butow</b> is the owner of Butow Communications Group in Jackson, California, and is the coauthor of <i>Instagram for Business For Dummies </i>and <i>Digital Etiquette For Dummies</i>. ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10889"}},{"authorId":11257,"name":"Corey Walker","slug":"corey-walker","description":" <p><b>Jenn Herman</b>, a social media consultant and world-renowned Instagram expert, pens a top-rated social media blog, Jenn's Trends.</p> <p><b>Corey Walker</b> offers social media strategy, content, ad management, and analytics focused on Instagram and Facebook.</p> <p><b>Eric Butow</b> provides website design, online marketing, and technical documentation services to businesses.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/11257"}}],"primaryCategoryTaxonomy":{"categoryId":33613,"title":"Instagram","slug":"instagram","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33613"}},"secondaryCategoryTaxonomy":{"categoryId":34243,"title":"Marketing","slug":"marketing","_links":{"self":"https://dummies-api.dummies.com/v2/categories/34243"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"/articles/299133"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":285507,"title":"How IGTV Works","slug":"how-igtv-works","categoryList":["technology","social-media","instagram"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/285507"}},{"articleId":285484,"title":"How to Use Instagram's Help","slug":"how-to-use-instagrams-help","categoryList":["technology","social-media","instagram"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/285484"}},{"articleId":249796,"title":"How to Upload Multiple Photos to One Instagram Post","slug":"upload-multiple-photos-one-instagram-post","categoryList":["technology","social-media","instagram"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/249796"}}],"fromCategory":[{"articleId":285507,"title":"How IGTV Works","slug":"how-igtv-works","categoryList":["technology","social-media","instagram"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/285507"}},{"articleId":285484,"title":"How to Use Instagram's Help","slug":"how-to-use-instagrams-help","categoryList":["technology","social-media","instagram"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/285484"}},{"articleId":266651,"title":"How to Send a Direct Message on Instagram","slug":"how-to-send-a-direct-message-on-instagram","categoryList":["technology","social-media","instagram"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/266651"}},{"articleId":266643,"title":"How to Make Instagram Video Edits","slug":"how-to-make-instagram-video-edits","categoryList":["technology","social-media","instagram"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/266643"}},{"articleId":266633,"title":"How to Use Instagram Filters","slug":"how-to-use-instagram-filters","categoryList":["technology","social-media","instagram"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/266633"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":282706,"slug":"instagram-for-business-for-dummies-2nd-edition","isbn":"9781394279623","categoryList":["business-careers-money","business","marketing"],"amazon":{"default":"https://www.amazon.com/gp/product/1394279620/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1394279620/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1394279620-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1394279620/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1394279620/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/instagram-for-business-for-dummies-3e-cover-9781394279623-203x255.jpg","width":203,"height":255},"title":"Instagram For Business For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p> <b>Marc R. Butler</b> is a highly experienced financial services executive who currently works as an advisor and consultant in the financial services world, with a focus on wealth management, organizational operation, and startup success. <b><b data-author-id=\"10889\">Eric Butow</b></b> is the owner of Butow Communications Group in Jackson, California, and is the coauthor of <i>Instagram for Business For Dummies </i>and <i>Digital Etiquette For Dummies</i>. <p><b>Jenn Herman</b>, a social media consultant and world-renowned Instagram expert, pens a top-rated social media blog, Jenn's Trends.</p> <p><b><b data-author-id=\"11257\">Corey Walker</b></b> offers social media strategy, content, ad management, and analytics focused on Instagram and Facebook.</p> <p><b>Eric Butow</b> provides website design, online marketing, and technical documentation services to businesses.</p>","authors":[{"authorId":10889,"name":"Eric Butow","slug":"eric-butow","description":" <p> <b>Marc R. Butler</b> is a highly experienced financial services executive who currently works as an advisor and consultant in the financial services world, with a focus on wealth management, organizational operation, and startup success. <b>Eric Butow</b> is the owner of Butow Communications Group in Jackson, California, and is the coauthor of <i>Instagram for Business For Dummies </i>and <i>Digital Etiquette For Dummies</i>. ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10889"}},{"authorId":11257,"name":"Corey Walker","slug":"corey-walker","description":" <p><b>Jenn Herman</b>, a social media consultant and world-renowned Instagram expert, pens a top-rated social media blog, Jenn's Trends.</p> <p><b>Corey Walker</b> offers social media strategy, content, ad management, and analytics focused on Instagram and Facebook.</p> <p><b>Eric Butow</b> provides website design, online marketing, and technical documentation services to businesses.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/11257"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;social-media&quot;,&quot;instagram&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394279623&quot;]}]\" id=\"du-slot-67b6469a50daa\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;social-media&quot;,&quot;instagram&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394279623&quot;]}]\" id=\"du-slot-67b6469a51962\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":247400,"title":"Mastering Instagram Lingo","slug":"mastering-instagram-lingo","categoryList":["technology","social-media","instagram"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/247400"}},{"articleId":247402,"title":"Knowing Your Limits on Instagram","slug":"knowing-limits-instagram","categoryList":["technology","social-media","instagram"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/247402"}},{"articleId":247404,"title":"Image and Video Sizes on Instagram","slug":"image-video-sizes-instagram","categoryList":["technology","social-media","instagram"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/247404"}},{"articleId":247406,"title":"Sharing Instagram Posts and Profiles Directly","slug":"sharing-instagram-posts-profiles-directly","categoryList":["technology","social-media","instagram"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/247406"}}],"content":[{"title":"Mastering Instagram lingo","thumb":null,"image":null,"content":"<p>Getting familiar with Instagram is a whole lot easier when you understand the language. A few funny phrases or words may confuse you at first. This list of common Instagram terms will have you sounding like a pro in no time!</p>\n<ul>\n<li><strong>App: </strong>Short for The Instagram app is downloaded to a mobile device to provide access.</li>\n<li><strong>Archive: </strong>A feature you can use to hide but not delete an Instagram post as well as access previous stories. Tap the three-dot button on any of your posts to access the Archive option. Review and revive archived posts by tapping the three-line button on your profile and choosing Archive from the menu options.</li>\n<li><strong>Bio:</strong> The description in your profile that details who you are.</li>\n<li><strong>Caption: </strong>The description of the post that appears directly beneath the image or video.</li>\n<li><strong>Collab: </strong>The alternative term for</li>\n<li><strong>Collaboration: </strong>A strategic partnership between two parties on Instagram.</li>\n<li><strong>DM: </strong>Short for <em>direct message.</em> A DM is a private messaging function on Instagram.</li>\n<li><strong>Explore: </strong>The search function in Instagram. You can access the Explore tab by tapping the magnifying glass in the bottom navigation panel.</li>\n<li><strong>Feed: </strong>The collection of current posts shared by those you follow, designated by the house icon on the bottom navigation panel. The feed may also be referred to as the <em>home feed.</em></li>\n<li><strong>Filter: </strong>An editing feature that you can apply to your post to enhance features and colors.</li>\n<li><strong>Followers: </strong>The people who follow an Instagram user.</li>\n<li><strong>Following: </strong>The people whom an Instagram user follows.</li>\n<li><strong>Gallery: </strong>On Android devices, the tab in the camera feature where images from your phone’s Gallery are located.</li>\n<li><strong>Geo-tag: </strong>A location tag that allows a post to appear on a map that users can search.</li>\n<li><strong>Handle:</strong> An alternative term for</li>\n<li><strong>Hashtag: </strong>The # symbol placed in front of a key word or phrase that is used to categorize the post. Hashtags are searchable on Instagram.</li>\n<li><strong>Home: </strong>The screen denoted by the house icon in the bottom navigation panel that shows the posts of everyone you’re following. Also referred to as the</li>\n<li><strong>Instagrammers: </strong>Instagram users. A collective term used to refer to people who use Instagram.</li>\n<li><strong>Instameet:</strong> A gathering or meeting of Instagrammers whose purpose is to take Instagram photos.</li>\n<li><strong>Library: </strong>In iOS, the tab in the camera feature where images from your phone’s Camera Roll are located.</li>\n<li><strong>Like:</strong> The measure of appreciation of a post documented. A like is represented by a heart icon. You can like a post by double-tapping the image or tapping the heart icon below the image.</li>\n<li><strong>Live:</strong> A feature on Instagram that allows users to broadcast real-time video to their followers. Viewers can interact by liking and commenting during the livestream, fostering direct engagement. Once the live session ends, the video can be saved to the user’s camera roll, shared to their profile/feed and shared to the user’s Instagram Stories.</li>\n<li><strong>Mention: </strong>When an account mentions another account on Instagram. The @ symbol, along with the username of the account, is used to hyperlink to that account. You can do this in post captions or comments.</li>\n<li><strong>Newsfeed:</strong> The alternative term for</li>\n<li><strong>Notification:</strong> An alert you receive when someone interacts with your content or profile. A red pop-up screen appears at the bottom of your Instagram account when you log in, showing how many and what type of notifications you’ve received.</li>\n<li><strong>Post:</strong> Any visual content uploaded to Instagram.</li>\n<li><strong>Profile:</strong> Your account information, consisting of your name, username, profile photo, bio description, and gallery. You can view the profile of any Instagram account by tapping the account’s profile photo in the feed. You can view your own profile by tapping your profile photo in the bottom navigation toolbar.</li>\n<li><strong>Reel:</strong> A short-form video content format that allows you to create and share videos from 3 to 90 seconds long. Upload content via the Reels platform by swiping right from the home page screen and then taking your video from Instagram or uploading it from the Camera Roll on your mobile device.</li>\n<li><strong>Story:</strong> Short-form content (photos or videos) that remains on a user’s profile for only 24 hours. The content is uploaded via the story platform (swipe right from the home feed screen) or by tapping on your image with the + symbol in the bottom banner of the home feed. Your current stories and the stories created by those you follow appear in circles across the top banner of the home feed.</li>\n<li><strong>Tag: </strong>A way to indicate the subject of a photo or communicate with an Instagram user or both in a post. An account should be tagged only if it’s included in the post content, such as a person in the image, a location where the photo was taken, or a product from a brand shown in the photo. When uploading a post to Instagram, you can tag another user in the post by choosing the Tag People option and selecting the account to tag. A post that includes tagged accounts will include a notification on your post that accounts are referenced; tapping the photo will display the tagged accounts. The tagged accounts will also receive a notification.</li>\n<li><strong>Username:</strong> The name an account uses on Instagram to define its profile address. The Instagram URL for any user is www.instagram.com/<em>username</em><em>.</em> All comments, engagement, and profile interactions are documented as being conducted by the account’s username (not the name or other profile component). Instagram generates the username with an @ symbol in front when typing the person’s username on Instagram.</li>\n</ul>\n"},{"title":"Knowing your limits on Instagram","thumb":null,"image":null,"content":"<p>For all the fun you can have on Instagram, you need to be aware of a number of restrictions. Instagram doesn’t approve of accounts that act spammy or that over-engage in certain behaviors that appear to have motives other than natural interactions. While you have good intentions and you, or someone in your business, will personally interact with others on Instagram, believe it or not, there are many people out there who don’t. People who use automated software to rapidly follow other accounts, comment on posts, or like other account posts are violating Instagram’s terms of use. The following limits are meant to help reduce that automated activity and ensure more authentic engagement from users on Instagram.</p>\n<p>Following is a list of the most common and current restrictions on Instagram:</p>\n<ul>\n<li>Number of characters you can use in a username: 30</li>\n<li>Number of characters you can use in your bio: 150</li>\n<li>Number of characters you can use in a caption: 2200</li>\n<li>Number of accounts you can follow: 7500</li>\n<li>Number of accounts that can follow you: unlimited</li>\n<li>Number of posts you can like per hour: 350</li>\n<li>Number of posts you can share: unlimited</li>\n<li>Number of notifications that can appear in the activity log of the Notifications tab: 100</li>\n<li>Number of hashtags you can include per post: 30</li>\n<li>Number of people you can tag in a post: 20</li>\n</ul>\n"},{"title":"Image and video sizes on Instagram","thumb":null,"image":null,"content":"<p>When using Instagram for business, it’s important that you use the appropriate image or video size to showcase your products and services. Nothing looks worse than a photo cut off on one side or pixelated. Read on for the currently recommended image sizes for Instagram.</p>\n<h3>Instagram profile picture</h3>\n<p>Remember that your profile picture will be placed in a circle when displayed. You may need to adjust the image if it is square or rectangular.</p>\n<ul>\n<li>Recommended size: 110 x 110 pixels</li>\n<li>Maximum size: 180 x 180 pixels</li>\n<li>Image format: .jpg or .png</li>\n</ul>\n<h3>Instagram newsfeed</h3>\n<h4>Single image or carousel</h4>\n<ul>\n<li>Recommended size: 1080 x 1080 pixels (square), 1080 x 566 pixels (landscape), or 1080 x 1350 pixels (portrait)</li>\n<li>Image format: .jpg or .png</li>\n<li>Maximum file size: 30MB</li>\n</ul>\n<h4>Video</h4>\n<ul>\n<li>Recommended size: 600 x 600 pixels (square), 600 x 315 pixels (landscape), or 1080 x 1920 pixels (Reels portrait video)</li>\n<li>Aspect ratio: 1:1 (square) or 1.91:1 (rectangle), or 9:16 (Reels portrait video)</li>\n<li>Minimum resolution: 720 x 720 pixels</li>\n<li>Maximum resolution: 1080 x 1920 pixels</li>\n<li>Minimum length: 3 seconds</li>\n<li>Maximum length: 60 minutes</li>\n<li>File type: .MP4 or .mov</li>\n<li>Maximum file size: 3.6GB</li>\n</ul>\n<h3>Instagram stories</h3>\n<h4>Single image</h4>\n<ul>\n<li>Recommended size: 1080 x 1920 pixels</li>\n<li>Aspect ratio: 9:16</li>\n<li>Image format: .jpg or .png</li>\n</ul>\n<h4>Video</h4>\n<ul>\n<li>Recommended size: 1080 x 1920 pixels</li>\n<li>Aspect ratio: 9:16</li>\n<li>Minimum resolution: 720 x 1280 pixels</li>\n<li>Minimum length: 1 second</li>\n<li>Maximum length: 60 seconds</li>\n<li>File type: .MP4 or .mov</li>\n<li>Maximum file size: 4GB</li>\n</ul>\n"},{"title":"Sharing posts and profiles directly","thumb":null,"image":null,"content":"<p>As you follow the Instagram feeds of your business partners and competitors (you are, aren’t you?), you can share a post from a feed in a private, direct message with someone else in your company (say, your sales director) along with your own note. Or if you think a business partner should start following another Instagram user, you can send a link to that user’s profile in a direct message to your partner.</p>\n<p>When you find a post you like and want to share, do the following:</p>\n<ol>\n<li><strong>Below the photo or video, tap the direct message (DM) icon directly below the post, next to the heart and comment bubble icons. </strong>The icon looks like a bifurcated arrow (or a paper airplane).</li>\n<li><strong>In the row of contacts in the Send To box, swipe up and down.</strong></li>\n<li><strong>Tap the profile photos of your recipients (iOS) or tap Send (Android). </strong>Android: If you want to include a message with your shared post, you must add that message in the Write a Message box before selecting a person. iOS device: A blue checkmark is highlighted to the right of the user’s name. If you need to search for a recipient, tap or click the Search icon and type the username or the name of the recipient in the Search box. The usernames that match your search terms appear below the Search box. Tap the username when you see it below the Search box. The selected name has a checkmark to the right of the username, and the cursor appears in the Write a Message box.</li>\n<li><strong>If necessary, tap or click in the Write a Message box.</strong></li>\n<li><strong>Type your message, and then tap Send. </strong>The Sent notification appears at the top of the screen for a few seconds. The recipients receive a notification that they have a new direct message. The message that your recipients see on the Instagram Direct screen contains the post photo, the username and profile person of the poster, any comment from the poster, and any message you included.</li>\n</ol>\n<p>It’s also easy to share profile information directly with recipients so they can decide if they want to follow that user. Here’s how:</p>\n<ol>\n<li><strong>In the feed screen, tap the username directly above the photo or video.</strong></li>\n<li><strong>On the user’s profile page, tap the menu icon (three dots) in the upper-right corner of the screen.</strong></li>\n<li><strong>Tap or click Share This Profile.</strong></li>\n<li><strong>Follow Step 3 in the preceding list.</strong></li>\n<li><strong>Return to the feed screen by tapping the Home icon in the lower-left corner of the screen.</strong> The message that your recipients see contains the person’s name, profile username, and photo, as well as the six most recent photos or videos in the profile. Any message you send with the profile link appears below the profile message. The recipient can view the profile on the screen by tapping or clicking the message.</li>\n</ol>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-02-22T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":247408},{"headers":{"creationTime":"2025-02-19T14:50:14+00:00","modifiedTime":"2025-02-19T14:53:52+00:00","timestamp":"2025-02-19T15:01:06+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Software","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33618"},"slug":"software","categoryId":33618},{"name":"Microsoft Products","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33642"},"slug":"microsoft-products","categoryId":33642},{"name":"General Microsoft","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33652"},"slug":"general-microsoft","categoryId":33652}],"title":"Microsoft Copilot For Dummies Cheat Sheet","strippedTitle":"microsoft copilot for dummies cheat sheet","slug":"microsoft-copilot-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Discover how Microsoft Copilot enhances productivity across various applications. Explore our cheat sheet for insights and tips on maximizing its capabilities.","noIndex":0,"noFollow":0},"content":"Whether you're drafting text in Word, designing presentations in PowerPoint, analyzing data in Excel, or managing your inbox in Outlook, Microsoft Copilot can assist you every step of the way. With this cheat sheet, you'll have a handy reference to quickly understand how Copilot can enhance your productivity and streamline your tasks across various Microsoft 365 programs.","description":"Whether you're drafting text in Word, designing presentations in PowerPoint, analyzing data in Excel, or managing your inbox in Outlook, Microsoft Copilot can assist you every step of the way. With this cheat sheet, you'll have a handy reference to quickly understand how Copilot can enhance your productivity and streamline your tasks across various Microsoft 365 programs.","blurb":"","authors":[{"authorId":9070,"name":"Chris Minnick","slug":"chris-minnick","description":" <p><b>Chris Minnick</b> is an accomplished author, teacher, and programmer. Minnick has authored or coauthored over 20 books, including titles in the <i>For Dummies</i> series. He has developed video courses for online training providers, and he teaches programming and machine learning to professional developers at leading companies globally. He is author of <i>Coding with AI For Dummies</i> and <i>JavaScript All-in-One For Dummies</i>. ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/9070"}}],"primaryCategoryTaxonomy":{"categoryId":33652,"title":"General Microsoft","slug":"general-microsoft","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33652"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"/articles/299133"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":294664,"title":"Windows 365 For Dummies Cheat Sheet","slug":"windows-365-for-dummies-cheat-sheet","categoryList":["technology","software","microsoft-products","general-microsoft"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/294664"}},{"articleId":291623,"title":"Office 2021 For Macs For Dummies Cheat Sheet","slug":"office-2021-for-macs-for-dummies-cheat-sheet","categoryList":["technology","software","microsoft-products","general-microsoft"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/291623"}},{"articleId":290233,"title":"Microsoft 365 For Dummies Cheat Sheet","slug":"microsoft-365-for-dummies-cheat-sheet","categoryList":["technology","software","microsoft-products","general-microsoft"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290233"}},{"articleId":290196,"title":"Office 2021 All-in-One For Dummies Cheat Sheet","slug":"office-2021-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","software","microsoft-products","general-microsoft"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290196"}},{"articleId":289688,"title":"Office 2021 For Seniors For Dummies Cheat Sheet","slug":"office-2021-for-seniors-for-dummies-cheat-sheet","categoryList":["technology","software","microsoft-products","general-microsoft"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/289688"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":302649,"slug":"microsoft-copilot-for-dummies","isbn":"9781394314942","categoryList":["technology","software","microsoft-products","general-microsoft"],"amazon":{"default":"https://www.amazon.com/gp/product/1394314949/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1394314949/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1394314949-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1394314949/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1394314949/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/microsoft-copilot-for-dummies-cover-9781394314942-203x255.jpg","width":203,"height":255},"title":"Microsoft Copilot For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b><b data-author-id=\"9070\">Chris Minnick</b></b> is an accomplished author, teacher, and programmer. Minnick has authored or coauthored over 20 books, including titles in the <i>For Dummies</i> series. He has developed video courses for online training providers, and he teaches programming and machine learning to professional developers at leading companies globally. He is author of <i>Coding with AI For Dummies</i> and <i>JavaScript All-in-One For Dummies</i>.</p>","authors":[{"authorId":9070,"name":"Chris Minnick","slug":"chris-minnick","description":" <p><b>Chris Minnick</b> is an accomplished author, teacher, and programmer. Minnick has authored or coauthored over 20 books, including titles in the <i>For Dummies</i> series. He has developed video courses for online training providers, and he teaches programming and machine learning to professional developers at leading companies globally. He is author of <i>Coding with AI For Dummies</i> and <i>JavaScript All-in-One For Dummies</i>. ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/9070"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;software&quot;,&quot;microsoft-products&quot;,&quot;general-microsoft&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394314942&quot;]}]\" id=\"du-slot-67b5f2331417a\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;software&quot;,&quot;microsoft-products&quot;,&quot;general-microsoft&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394314942&quot;]}]\" id=\"du-slot-67b5f233157d4\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/"}}],"content":[{"title":"Microsoft 365 Programs with Copilot Capabilities","thumb":null,"image":null,"content":"<p>Microsoft 365 is a vast productivity platform, consisting of more than 20 core applications and services. Copilot has been integrated into many of them already, and more integrations are in the works. With so many different programs, it’s hard to keep track of everything that’s possible with Microsoft 365 Copilot. The following table lists each Microsoft 365 program that’s been integrated with Copilot, along with a description of what you can use Copilot for in that program and the chapter of <em>Microsoft Copilot For Dummies </em>where you can find out more.</p>\n<table>\n<tbody>\n<tr>\n<th>Microsoft Program</th>\n<th>Description</th>\n</tr>\n<tr>\n<td>Word</td>\n<td>Draft text about any topic, generate outlines, and enhance your writing with suggestions for grammar, style, and tone. Covered in Chapter 6.</td>\n</tr>\n<tr>\n<td>PowerPoint</td>\n<td>Design and deliver presentations, get help with slide layouts, and generate engaging visuals. Covered in Chapter 8.</td>\n</tr>\n<tr>\n<td>Excel</td>\n<td>Analyze data, create complex spreadsheets, and get insights with automated data analysis and visualization tools. Covered in Chapter 7.</td>\n</tr>\n<tr>\n<td>Outlook</td>\n<td>Draft emails and responses and organize your inbox with smart suggestions. Covered in Chapter 9.</td>\n</tr>\n<tr>\n<td>Teams</td>\n<td>Enhance collaboration with generated meeting notes, task management, and real-time assistance during meetings. Covered in Chapter 10.</td>\n</tr>\n<tr>\n<td>Loop</td>\n<td>Collaborate on shared documents, spreadsheets, and presentations with real-time updates and suggestions. Covered in Chapter 10.</td>\n</tr>\n<tr>\n<td>OneNote</td>\n<td>Take notes, organize your thoughts, and get suggestions for structuring your notes. Not covered in the book.</td>\n</tr>\n<tr>\n<td>OneDrive</td>\n<td>Organize and manage your files, get recommendations for file organization, and access intelligent search features. Covered throughout the book.</td>\n</tr>\n<tr>\n<td>Planner</td>\n<td>Plan and track projects, get task suggestions, and collaborate with team members. Covered in Chapter 12.</td>\n</tr>\n<tr>\n<td>To Do</td>\n<td>Manage your tasks and to-do lists, get personalized suggestions, and integrate with other Microsoft 365 apps. Not covered in the book.</td>\n</tr>\n<tr>\n<td>Viva</td>\n<td>Manage insights and feedback from co-workers and drive productivity and engagement within your organization. Not covered in the book.</td>\n</tr>\n<tr>\n<td>SharePoint</td>\n<td>Facilitate document management, team collaboration, and content sharing with intelligent organization and search capabilities. Not covered in the book.</td>\n</tr>\n<tr>\n<td>Copilot Studio</td>\n<td>Develop custom AI solutions, integrate with Microsoft Copilot to automate tasks, and enhance productivity across applications. Covered in Chapters 13 and 14.</td>\n</tr>\n</tbody>\n</table>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2025-02-19T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":302691},{"headers":{"creationTime":"2021-10-01T15:43:13+00:00","modifiedTime":"2025-01-13T18:52:53+00:00","timestamp":"2025-01-13T21:01:10+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Electronics","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33543"},"slug":"electronics","categoryId":33543},{"name":"Cell Phones","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33544"},"slug":"cell-phones","categoryId":33544},{"name":"iPhones","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33547"},"slug":"iphones","categoryId":33547}],"title":"iPhone for Seniors For Dummies Cheat Sheet","strippedTitle":"iphone for seniors for dummies cheat sheet","slug":"iphone-for-seniors-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"Check out the best tips and app recommendations to help you customize your iPhone and make the most of Siri, your virtual assistant.","noIndex":0,"noFollow":0},"content":"This cheat sheet gives you a rundown of some of the most useful features and apps so you can find what you need to customize your iPhone’s behavior. See how to get the most out of Siri (your iPhone’s virtual assistant), review some favorite apps for news and weather, and discover several of the most popular apps for multimedia.","description":"This cheat sheet gives you a rundown of some of the most useful features and apps so you can find what you need to customize your iPhone’s behavior. See how to get the most out of Siri (your iPhone’s virtual assistant), review some favorite apps for news and weather, and discover several of the most popular apps for multimedia.","blurb":"","authors":[{"authorId":9260,"name":"Dwight Spivey","slug":"dwight-spivey","description":" <p><b>Dwight Spivey</b> has been an Apple expert for over two decades. He&#39;s the widely&#45;known author behind the most recent editions of <i>iPad For Seniors For Dummies</i>. He&#39;s also the Educational Technology Administrator at Spring Hill College in Mobile, Alabama. ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/9260"}}],"primaryCategoryTaxonomy":{"categoryId":33547,"title":"iPhones","slug":"iphones","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33547"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"/articles/299133"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":296463,"title":"How to Use the iPhone's Multi-Touch Screen","slug":"how-to-use-the-iphones-multi-touch-screen","categoryList":["technology","electronics","cell-phones","iphones"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/296463"}},{"articleId":296455,"title":"How to Choose the Right iPhone 14 for You","slug":"how-to-choose-the-right-iphone-14-for-you","categoryList":["technology","electronics","cell-phones","iphones"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/296455"}},{"articleId":296452,"title":"Discover iPhone 14 Models and iOS 16","slug":"discover-the-newest-iphones-and-ios-16","categoryList":["technology","electronics","cell-phones","iphones"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/296452"}},{"articleId":277545,"title":"How to Delete and Organize iPhone Apps","slug":"how-to-delete-and-organize-iphone-apps","categoryList":["technology","electronics","cell-phones","iphones"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/277545"}},{"articleId":277540,"title":"How to Translate Text or Speech on an iPhone with iOS 14","slug":"how-to-translate-text-or-speech-on-an-iphone","categoryList":["technology","electronics","cell-phones","iphones"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/277540"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":282692,"slug":"iphone-for-seniors-for-dummies-updated-for-iphone-12-models-and-ios-14","isbn":"9781394290246","categoryList":["technology","electronics","cell-phones","iphones"],"amazon":{"default":"https://www.amazon.com/gp/product/1394290241/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1394290241/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1394290241-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1394290241/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1394290241/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/iphone-for-seniors-for-dummies-2025-edition-cover-9781394290246-203x255.jpg","width":203,"height":255},"title":"iPhone For Seniors For Dummies, 2025 Edition","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b><b data-author-id=\"9260\">Dwight Spivey</b></b> has been an Apple expert for over two decades. He&#39;s the widely&#45;known author behind the most recent editions of <i>iPad For Seniors For Dummies</i>. He&#39;s also the Educational Technology Administrator at Spring Hill College in Mobile, Alabama.</p>","authors":[{"authorId":9260,"name":"Dwight Spivey","slug":"dwight-spivey","description":" <p><b>Dwight Spivey</b> has been an Apple expert for over two decades. He&#39;s the widely&#45;known author behind the most recent editions of <i>iPad For Seniors For Dummies</i>. He&#39;s also the Educational Technology Administrator at Spring Hill College in Mobile, Alabama. ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/9260"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;electronics&quot;,&quot;cell-phones&quot;,&quot;iphones&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394290246&quot;]}]\" id=\"du-slot-67857f170661e\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;electronics&quot;,&quot;cell-phones&quot;,&quot;iphones&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394290246&quot;]}]\" id=\"du-slot-67857f17071b0\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/"}}],"content":[{"title":"Working with Siri commands","thumb":null,"image":null,"content":"<p>You can use Siri in several ways to make life with your iPhone and iOS 18 a bit simpler and better.</p>\n<p>Following, are examples of using Siri for everyday things, some you may have already thought of, and others that might be new to you:</p>\n<ul>\n<li>If you own an iPhone 6s or newer, you can simply say “Hey, Siri” followed by a command to make Siri work for you. Your iPhone doesn’t have to be connected to power.</li>\n<li>To enable the ability to speak commands to Siri, go to Settings → Siri → Listen for “Hey Siri” and toggle the switch on (green).</li>\n<li>Be reminded about an event or a task. For example, if you’re viewing a Calendar event, engage Siri and say “remind me about this” and it gets added to your Reminders app. You can also tell Siri when to remind you, if you’d like to set a specific time.</li>\n<li><span class=\"NormalTextRun SCXW199206799 BCX0\" data-ccp-parastyle=\"Bullet Item\">Check out sports scores by asking Siri how your team did. You can ask “How did </span><span class=\"NormalTextRun SCXW199206799 BCX0\" data-ccp-parastyle=\"Bullet Item\">Chelsea</span><span class=\"NormalTextRun SCXW199206799 BCX0\" data-ccp-parastyle=\"Bullet Item\"> do yesterday?” or “</span><span class=\"NormalTextRun SCXW199206799 BCX0\" data-ccp-parastyle=\"Bullet Item\">What were last night’s NBA highlights</span><span class=\"NormalTextRun SCXW199206799 BCX0\" data-ccp-parastyle=\"Bullet Item\">?” Siri will give you the scores. You can even find rankings, what time and on what channel a sporting event is appearing, and more. Just ask!</span></li>\n<li>Let Siri end your calls for you; it comes in handy if you’re using headphones or earbuds and your phone is in your pocket. When you’re ready to end the call, simply say, “Hey, Siri, hang up” and you’re done. The only caveat is that the people you’re on the call with will hear you issue the command to Siri, but I don’t think they’ll mind.</li>\n<li>Open an app with a simple command. For example, say “Open Netflix.” The Netflix app will open (if it’s installed, of course).</li>\n<li>Convert measurements on the go. Ask something like “How many liters are in a gallon?” or “How many millimeters is 5.5 meters?” The inimitable Siri tells you in an instant.</li>\n<li>Tell Siri which song or artist you’d like to listen to, and it’ll happen. Say “Play Purple Rain” or “I’d like to listen to Fleetwood Mac.” The song or artist will begin playing. You could also say “Stop playing music” to pause the song.</li>\n<li>Siri can help you determine how much of a tip to leave your server. Say “How much is an 18 percent tip for a $34.36 bill?” Siri will promptly tell you to give $6.18.</li>\n</ul>\n<p>There is much, much more that Siri can do. Try asking real-world questions whenever you get the chance so you can see the neat tricks Siri can perform.</p>\n"},{"title":"News and weather apps for your iPhone","thumb":null,"image":null,"content":"<p>The News and Weather apps in iOS 18 for the iPhone are both good, but may not suit your needs, or you may prefer the way some third-party apps works.</p>\n<h3>News apps</h3>\n<p>Numerous third-party news apps are news aggregators (pulling articles from several sources) or are developed by specific news outlets exclusively for their own content.</p>\n<h4>Flipboard</h4>\n<p><a href=\"https://apps.apple.com/us/app/flipboard-the-social-magazine/id358801284\" target=\"_blank\" rel=\"noopener\">Flipboard</a> is an all-in-one app for accessing news and information based on your personal interests. Cultivate the stories to your liking and soon Flipboard will populate with articles that tend to interest you. <span class=\"TextRun SCXW167890531 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW167890531 BCX0\">Learn more about Flipboard and download it from the </span></span><a class=\"Hyperlink SCXW167890531 BCX0\" href=\"https://apps.apple.com/us/app/flipboard-the-social-magazine/id358801284\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW167890531 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW167890531 BCX0\" data-ccp-charstyle=\"Hyperlink\">App Store</span></span></a><span class=\"TextRun SCXW167890531 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW167890531 BCX0\">.</span><span class=\"NormalTextRun SCXW167890531 BCX0\"> </span></span><span class=\"EOP SCXW167890531 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559685&quot;:1022,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></p>\n<h4>NYTimes</h4>\n<p>If you subscribe to <em>The</em> <em>New York Times,</em> you can also access your subscription through your iPhone by downloading the <a href=\"https://apps.apple.com/us/app/the-new-york-times/id284862083\" target=\"_blank\" rel=\"noopener\">NY Times app</a>. The app will provide non-subscribers with up to ten articles per month for free, but anything beyond that requires a subscription. The NY Times app gives you breaking news alerts, international editions, and much more.</p>\n<h4>Reuters News</h4>\n<p><span class=\"TextRun SCXW27404309 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW27404309 BCX0\">Reuters is one of the most trusted sources for news on the planet, and now you can access their excellent content right on your iPhone with the </span></span><a class=\"Hyperlink SCXW27404309 BCX0\" href=\"https://apps.apple.com/us/app/reuters-news/id602660809\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW27404309 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW27404309 BCX0\" data-ccp-charstyle=\"Hyperlink\">Reuters News app</span></span></a><span class=\"TextRun SCXW27404309 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW27404309 BCX0\">. Breaking news appears under the Top News tab, and you can find today&#8217;s goings-on by going to the </span><span class=\"NormalTextRun SCXW27404309 BCX0\">Wire tab. </span></span><span class=\"EOP SCXW27404309 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559685&quot;:1022,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></p>\n<h4>SmartNews</h4>\n<p><a href=\"https://itunes.apple.com/us/app/id579581125\" target=\"_blank\" rel=\"noopener\">SmartNews</a> is a well-received news aggregator. At over 50 million downloads as of this writing, SmartNews is a popular app for finding your news quickly and without clutter.</p>\n<h4>USA Today</h4>\n<p><span class=\"TextRun SCXW222346387 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW222346387 BCX0\">You&#8217;ve</span><span class=\"NormalTextRun SCXW222346387 BCX0\"> seen </span></span><span class=\"TextRun SCXW222346387 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW222346387 BCX0\">USA Today</span></span><span class=\"TextRun SCXW222346387 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW222346387 BCX0\"> in newsstands, hotel rooms, and the coin-operated newspaper racks that used to be on every street in the neighborhood. Today, you can see the newspaper&#8217;s famous graphics and charts via the </span></span><a class=\"Hyperlink SCXW222346387 BCX0\" href=\"https://apps.apple.com/us/app/usa-today-us-breaking-news/id504631398\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW222346387 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW222346387 BCX0\" data-ccp-charstyle=\"Hyperlink\">USA Today app</span></span></a><span class=\"TextRun SCXW222346387 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW222346387 BCX0\"> for iPhone. All the sections you love are</span><span class=\"NormalTextRun SCXW222346387 BCX0\"> there, including Life, Money, and Sports. </span></span><span class=\"EOP SCXW222346387 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559685&quot;:1022,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></p>\n<h3>Weather apps</h3>\n<p>The Weather app in iOS 18 has really stepped up its game from previous versions, but the third-party apps listed here may provide a bit more in-depth information that some weather enthusiasts prefer.</p>\n<h4>AccuWeather</h4>\n<p><a href=\"https://itunes.apple.com/us/app/accuweather-weather-for-life/id300048137?mt=8\" target=\"_blank\" rel=\"noopener\">AccuWeather</a> is an excellent app for digging deep into the latest weather news. You can see as little or as much as you like with this app; simply check the current conditions or watch maps of the local area and see extremely detailed forecasts. The MinuteCast feature will even tell you when you can expect precipitation over the next couple of hours in your current location. You’ll be frequently surprised at its accuracy.</p>\n<h4>Weather Underground</h4>\n<p><a href=\"https://apps.apple.com/us/app/weather-underground-local-map/id486154808\" target=\"_blank\" rel=\"noopener\">Weather Underground</a> boasts a network of more than 200,000 personal weather stations that serve make your local forecasts extremely accurate.</p>\n"},{"title":"Multimedia apps for your iPhone","thumb":null,"image":null,"content":"<p>When it comes to multimedia, your new iPhone has a great group of apps that already come with iOS 18, such as TV, Music, and Podcasts. However, other apps on the market may help you handle your multimedia needs in ways that better suit your tastes and needs.</p>\n<h3>Paramount+</h3>\n<p><span class=\"TextRun SCXW145935842 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW145935842 BCX0\">Paramount</span> <span class=\"NormalTextRun SCXW145935842 BCX0\">has a vast library of video files, most of which can be streamed via </span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW145935842 BCX0\">their</span> </span><a class=\"Hyperlink SCXW145935842 BCX0\" href=\"https://apps.apple.com/us/app/paramount/id530168168\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW145935842 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW145935842 BCX0\" data-ccp-charstyle=\"Hyperlink\">Paramount+ app</span></span></a><span class=\"TextRun SCXW145935842 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW145935842 BCX0\">. </span><span class=\"NormalTextRun SCXW145935842 BCX0\">You also have the </span><span class=\"NormalTextRun SCXW145935842 BCX0\">option</span><span class=\"NormalTextRun SCXW145935842 BCX0\"> of adding Showtime to your subscription for just a few bucks more</span><span class=\"NormalTextRun SCXW145935842 BCX0\">.</span><span class=\"NormalTextRun SCXW145935842 BCX0\"> Plus, if you </span><span class=\"NormalTextRun SCXW145935842 BCX0\">can’t</span><span class=\"NormalTextRun SCXW145935842 BCX0\"> get enough Star Trek</span><span class=\"NormalTextRun SCXW145935842 BCX0\"> (who can?)</span><span class=\"NormalTextRun SCXW145935842 BCX0\">, </span><span class=\"NormalTextRun SCXW145935842 BCX0\">you’ll</span><span class=\"NormalTextRun SCXW145935842 BCX0\"> find it all right here on the Paramount+ app.</span></span><span class=\"EOP SCXW145935842 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559685&quot;:1022,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></p>\n<h3>Netflix</h3>\n<p><span class=\"TextRun SCXW33019549 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW33019549 BCX0\">From their humble beginnings as a DVD-rental-by-mail company, Netflix has become one of the largest players in the entertainment business today. If you have a </span></span><a class=\"Hyperlink SCXW33019549 BCX0\" href=\"https://itunes.apple.com/us/app/netflix/id363590051?mt=8\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW33019549 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW33019549 BCX0\" data-ccp-charstyle=\"Hyperlink\">Netflix</span></span></a><span class=\"TextRun SCXW33019549 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW33019549 BCX0\"> subscription, you can play the </span><span class=\"NormalTextRun SCXW33019549 BCX0\">entire collection</span><span class=\"NormalTextRun SCXW33019549 BCX0\"> of videos that </span><span class=\"NormalTextRun SCXW33019549 BCX0\">you’ve</span><span class=\"NormalTextRun SCXW33019549 BCX0\"> saved in your list, find </span><span class=\"NormalTextRun SCXW33019549 BCX0\">new content</span><span class=\"NormalTextRun SCXW33019549 BCX0\">, and even use </span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW33019549 BCX0\">AirPlay</span><span class=\"NormalTextRun SCXW33019549 BCX0\"> to play your video on your television via </span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW33019549 BCX0\">AppleTV</span><span class=\"NormalTextRun SCXW33019549 BCX0\">. </span></span></p>\n<h3>Overcast</h3>\n<p>Apple’s Podcasts app in iOS 18 is good for downloading and listening to podcasts, but the <a href=\"https://itunes.apple.com/us/app/overcast-podcast-player/id888422857?mt=8\">Overcast app</a> outshines it in ease-of-use and with intuitive settings. Overcast even lets you apply settings, such as playback speed and voice boost, to individual podcasts, maintaining different setting combinations for each.</p>\n<h3>Pandora</h3>\n<p><a href=\"https://itunes.apple.com/us/app/pandora-free-music-radio/id284035177?mt=8\">Pandora</a>, one of the most popular music-streaming services for iOS, has been around almost since the first iPhone. Pandora allows you to create and customize your own radio stations, so you can play music of the same genre or by the same artist. You can also purchase any music you like with a direct link to the iTunes Store.</p>\n<h3>SoundCloud</h3>\n<p><a href=\"https://itunes.apple.com/us/app/soundcloud-music-audio/id336353151?mt=8\">SoundCloud</a> claims to be the world’s largest music streaming service, boasting a catalogue of more than 135 million audio tracks. SoundCloud is a great service, but much of the catalogue is made up of up-and-coming (or completely unknown) artists. Don’t let that deter you. You can find some great music in the most unexpected places. SoundCloud also lets you see the music that your favorite artists like, which can lead you to discover wonderful tunes you might never have discovered otherwise.</p>\n<h3>Snapseed</h3>\n<p><a href=\"https://itunes.apple.com/us/app/snapseed/id439438619?mt=8&amp;ign-mpt=uo%3D8\">Snapseed</a> is a must-have tool for photographers of any level. It’s an editor that’s easy enough to be used by rookies, yet powerful enough that professional photographers won’t be caught without it.</p>\n<h3>YouTube</h3>\n<p>YouTube used to be the best app around for watching silly cat videos and people falling down, but it’s now one of the most popular, and important, means of accessing video and musical entertainment on the web. Documentaries, full-length movies, music videos, and silly cat videos are waiting to be discovered when you download the <a href=\"https://itunes.apple.com/us/app/youtube/id544007664?mt=8\">YouTube app for iOS</a>.</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Explore","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2023-10-31T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":288640}],"_links":{"self":{"self":"https://dummies-api.dummies.com/v2/categories/33512/categoryArticles?sortField=time&sortOrder=1&size=10&offset=0"},"next":{"self":"https://dummies-api.dummies.com/v2/categories/33512/categoryArticles?sortField=time&sortOrder=1&size=10&offset=10"},"last":{"self":"https://dummies-api.dummies.com/v2/categories/33512/categoryArticles?sortField=time&sortOrder=1&size=10&offset=9427"}}},"objectTitle":"","status":"success","pageType":"article-category","objectId":"33512","page":1,"sortField":"time","sortOrder":1,"categoriesIds":[],"articleTypes":[],"filterData":{"categoriesFilter":[{"itemId":0,"itemName":"All Categories","count":9418},{"itemId":33513,"itemName":"Computers","count":1394},{"itemId":33537,"itemName":"Cybersecurity","count":62},{"itemId":33538,"itemName":"Digital Audio & Radio","count":131},{"itemId":33543,"itemName":"Electronics","count":1757},{"itemId":33572,"itemName":"Information Technology","count":816},{"itemId":33587,"itemName":"Internet Basics","count":86},{"itemId":33588,"itemName":"Notable Websites","count":188},{"itemId":33592,"itemName":"Programming & Web Design","count":1396},{"itemId":33611,"itemName":"Social Media","count":386},{"itemId":33618,"itemName":"Software","count":3196},{"itemId":33512,"itemName":"Technology","count":1},{"itemId":35241,"itemName":"Virtual Reality","count":5}],"articleTypeFilter":[{"articleType":"All Types","count":9418},{"articleType":"Articles","count":8253},{"articleType":"Cheat Sheet","count":315},{"articleType":"Step by Step","count":762},{"articleType":"Videos","count":88}]},"filterDataLoadedStatus":"success","pageSize":10},"adsState":{"pageScripts":{"headers":{"timestamp":"2025-04-29T05:50:01+00:00"},"adsId":0,"data":{"scripts":[{"pages":["all"],"location":"header","script":"<!--Optimizely Script-->\r\n<script src=\"https://cdn.optimizely.com/js/10563184655.js\"></script>","enabled":false},{"pages":["all"],"location":"header","script":"<!-- comScore Tag -->\r\n<script>var _comscore = _comscore || [];_comscore.push({ c1: \"2\", c2: \"15097263\" });(function() {var s = document.createElement(\"script\"), el = document.getElementsByTagName(\"script\")[0]; s.async = true;s.src = (document.location.protocol == \"https:\" ? \"https://sb\" : \"http://b\") + \".scorecardresearch.com/beacon.js\";el.parentNode.insertBefore(s, el);})();</script><noscript><img src=\"https://sb.scorecardresearch.com/p?c1=2&c2=15097263&cv=2.0&cj=1\" /></noscript>\r\n<!-- / comScore Tag -->","enabled":true},{"pages":["all"],"location":"footer","script":"<!--BEGIN QUALTRICS WEBSITE FEEDBACK SNIPPET-->\r\n<script type='text/javascript'>\r\n(function(){var g=function(e,h,f,g){\r\nthis.get=function(a){for(var a=a+\"=\",c=document.cookie.split(\";\"),b=0,e=c.length;b<e;b++){for(var d=c[b];\" \"==d.charAt(0);)d=d.substring(1,d.length);if(0==d.indexOf(a))return d.substring(a.length,d.length)}return null};\r\nthis.set=function(a,c){var b=\"\",b=new Date;b.setTime(b.getTime()+6048E5);b=\"; expires=\"+b.toGMTString();document.cookie=a+\"=\"+c+b+\"; path=/; \"};\r\nthis.check=function(){var a=this.get(f);if(a)a=a.split(\":\");else if(100!=e)\"v\"==h&&(e=Math.random()>=e/100?0:100),a=[h,e,0],this.set(f,a.join(\":\"));else return!0;var c=a[1];if(100==c)return!0;switch(a[0]){case \"v\":return!1;case \"r\":return c=a[2]%Math.floor(100/c),a[2]++,this.set(f,a.join(\":\")),!c}return!0};\r\nthis.go=function(){if(this.check()){var a=document.createElement(\"script\");a.type=\"text/javascript\";a.src=g;document.body&&document.body.appendChild(a)}};\r\nthis.start=function(){var t=this;\"complete\"!==document.readyState?window.addEventListener?window.addEventListener(\"load\",function(){t.go()},!1):window.attachEvent&&window.attachEvent(\"onload\",function(){t.go()}):t.go()};};\r\ntry{(new g(100,\"r\",\"QSI_S_ZN_5o5yqpvMVjgDOuN\",\"https://zn5o5yqpvmvjgdoun-wiley.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_5o5yqpvMVjgDOuN\")).start()}catch(i){}})();\r\n</script><div id='ZN_5o5yqpvMVjgDOuN'><!--DO NOT REMOVE-CONTENTS PLACED HERE--></div>\r\n<!--END WEBSITE FEEDBACK SNIPPET-->","enabled":false},{"pages":["all"],"location":"header","script":"<!-- Hotjar Tracking Code for http://www.dummies.com -->\r\n<script>\r\n (function(h,o,t,j,a,r){\r\n h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)};\r\n h._hjSettings={hjid:257151,hjsv:6};\r\n a=o.getElementsByTagName('head')[0];\r\n r=o.createElement('script');r.async=1;\r\n r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv;\r\n a.appendChild(r);\r\n })(window,document,'https://static.hotjar.com/c/hotjar-','.js?sv=');\r\n</script>","enabled":false},{"pages":["article"],"location":"header","script":"<!-- //Connect Container: dummies --> <script src=\"//get.s-onetag.com/bffe21a1-6bb8-4928-9449-7beadb468dae/tag.min.js\" async defer></script>","enabled":true},{"pages":["homepage"],"location":"header","script":"<meta name=\"facebook-domain-verification\" content=\"irk8y0irxf718trg3uwwuexg6xpva0\" />","enabled":true},{"pages":["homepage","article","category","search"],"location":"footer","script":"<!-- Facebook Pixel Code -->\r\n<noscript>\r\n<img height=\"1\" width=\"1\" src=\"https://www.facebook.com/tr?id=256338321977984&ev=PageView&noscript=1\"/>\r\n</noscript>\r\n<!-- End Facebook Pixel Code -->","enabled":true}]}},"pageScriptsLoadedStatus":"success"},"navigationState":{"navigationCollections":[{"collectionId":287568,"title":"BYOB (Be Your Own Boss)","hasSubCategories":false,"url":"/collection/for-the-entry-level-entrepreneur-287568"},{"collectionId":293237,"title":"Be a Rad Dad","hasSubCategories":false,"url":"/collection/be-the-best-dad-293237"},{"collectionId":295890,"title":"Career Shifting","hasSubCategories":false,"url":"/collection/career-shifting-295890"},{"collectionId":294090,"title":"Contemplating the Cosmos","hasSubCategories":false,"url":"/collection/theres-something-about-space-294090"},{"collectionId":287563,"title":"For Those Seeking Peace of Mind","hasSubCategories":false,"url":"/collection/for-those-seeking-peace-of-mind-287563"},{"collectionId":287570,"title":"For the Aspiring Aficionado","hasSubCategories":false,"url":"/collection/for-the-bougielicious-287570"},{"collectionId":291903,"title":"For the Budding Cannabis Enthusiast","hasSubCategories":false,"url":"/collection/for-the-budding-cannabis-enthusiast-291903"},{"collectionId":299891,"title":"For the College Bound","hasSubCategories":false,"url":"/collection/for-the-college-bound-299891"},{"collectionId":291934,"title":"For the Exam-Season Crammer","hasSubCategories":false,"url":"/collection/for-the-exam-season-crammer-291934"},{"collectionId":301547,"title":"For the Game Day Prepper","hasSubCategories":false,"url":"/collection/big-game-day-prep-made-easy-301547"}],"navigationCollectionsLoadedStatus":"success","navigationCategories":{"books":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/books/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/books/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/books/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/books/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/books/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/books/level-0-category-0"}},"articles":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/articles/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/articles/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/articles/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/articles/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/articles/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/articles/level-0-category-0"}}},"navigationCategoriesLoadedStatus":"success"},"searchState":{"searchList":[],"searchStatus":"initial","relatedArticlesList":[],"relatedArticlesStatus":"initial"},"routeState":{"name":"ArticleCategory","path":"/category/articles/technology-33512/","hash":"","query":{},"params":{"category":"technology-33512"},"fullPath":"/category/articles/technology-33512/","meta":{"routeType":"category","breadcrumbInfo":{"suffix":"Articles","baseRoute":"/category/articles"},"prerenderWithAsyncData":true},"from":{"name":null,"path":"/","hash":"","query":{},"params":{},"fullPath":"/","meta":{}}},"profileState":{"auth":{},"userOptions":{},"status":"success"}}
Logo
  • Articles Open Article Categories
  • Books Open Book Categories
  • Collections Open Collections list
  • Custom Solutions

Article Categories

Book Categories

Collections

Explore all collections
BYOB (Be Your Own Boss)
Be a Rad Dad
Career Shifting
Contemplating the Cosmos
For Those Seeking Peace of Mind
For the Aspiring Aficionado
For the Budding Cannabis Enthusiast
For the College Bound
For the Exam-Season Crammer
For the Game Day Prepper
Log In
  • Home
  • Technology Articles

Technology Articles

Technology. It makes the world go 'round. And whether you're a self-confessed techie or a total newbie, you'll find something to love among our hundreds of technology articles and books.

Browse By Category

Virtual Reality

Virtual Reality

Computers

Computers

Cybersecurity

Cybersecurity

Digital Audio & Radio

Digital Audio & Radio

Electronics

Electronics

Information Technology

Information Technology

Internet Basics

Internet Basics

Notable Websites

Notable Websites

Programming & Web Design

Programming & Web Design

Social Media

Social Media

Software

Software

Previous slideNext slide
Virtual Reality

Virtual Reality

Computers

Computers

Cybersecurity

Cybersecurity

Digital Audio & Radio

Digital Audio & Radio

Electronics

Electronics

Information Technology

Information Technology

Internet Basics

Internet Basics

Notable Websites

Notable Websites

Programming & Web Design

Programming & Web Design

Social Media

Social Media

Software

Software

Articles From Technology

page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16
page 17
page 18
page 19
page 20
page 21
page 22
page 23
page 24
page 25
page 26
page 27
page 28
page 29
page 30
page 31
page 32
page 33
page 34
page 35
page 36
page 37
page 38
page 39
page 40
page 41
page 42
page 43
page 44
page 45
page 46
page 47
page 48
page 49
page 50
page 51
page 52
page 53
page 54
page 55
page 56
page 57
page 58
page 59
page 60
page 61
page 62
page 63
page 64
page 65
page 66
page 67
page 68
page 69
page 70
page 71
page 72
page 73
page 74
page 75
page 76
page 77
page 78
page 79
page 80
page 81
page 82
page 83
page 84
page 85
page 86
page 87
page 88
page 89
page 90
page 91
page 92
page 93
page 94
page 95
page 96
page 97
page 98
page 99
page 100
page 101
page 102
page 103
page 104
page 105
page 106
page 107
page 108
page 109
page 110
page 111
page 112
page 113
page 114
page 115
page 116
page 117
page 118
page 119
page 120
page 121
page 122
page 123
page 124
page 125
page 126
page 127
page 128
page 129
page 130
page 131
page 132
page 133
page 134
page 135
page 136
page 137
page 138
page 139
page 140
page 141
page 142
page 143
page 144
page 145
page 146
page 147
page 148
page 149
page 150
page 151
page 152
page 153
page 154
page 155
page 156
page 157
page 158
page 159
page 160
page 161
page 162
page 163
page 164
page 165
page 166
page 167
page 168
page 169
page 170
page 171
page 172
page 173
page 174
page 175
page 176
page 177
page 178
page 179
page 180
page 181
page 182
page 183
page 184
page 185
page 186
page 187
page 188
page 189
page 190
page 191
page 192
page 193
page 194
page 195
page 196
page 197
page 198
page 199
page 200
page 201
page 202
page 203
page 204
page 205
page 206
page 207
page 208
page 209
page 210
page 211
page 212
page 213
page 214
page 215
page 216
page 217
page 218
page 219
page 220
page 221
page 222
page 223
page 224
page 225
page 226
page 227
page 228
page 229
page 230
page 231
page 232
page 233
page 234
page 235
page 236
page 237
page 238
page 239
page 240
page 241
page 242
page 243
page 244
page 245
page 246
page 247
page 248
page 249
page 250
page 251
page 252
page 253
page 254
page 255
page 256
page 257
page 258
page 259
page 260
page 261
page 262
page 263
page 264
page 265
page 266
page 267
page 268
page 269
page 270
page 271
page 272
page 273
page 274
page 275
page 276
page 277
page 278
page 279
page 280
page 281
page 282
page 283
page 284
page 285
page 286
page 287
page 288
page 289
page 290
page 291
page 292
page 293
page 294
page 295
page 296
page 297
page 298
page 299
page 300
page 301
page 302
page 303
page 304
page 305
page 306
page 307
page 308
page 309
page 310
page 311
page 312
page 313
page 314
page 315
page 316
page 317
page 318
page 319
page 320
page 321
page 322
page 323
page 324
page 325
page 326
page 327
page 328
page 329
page 330
page 331
page 332
page 333
page 334
page 335
page 336
page 337
page 338
page 339
page 340
page 341
page 342
page 343
page 344
page 345
page 346
page 347
page 348
page 349
page 350
page 351
page 352
page 353
page 354
page 355
page 356
page 357
page 358
page 359
page 360
page 361
page 362
page 363
page 364
page 365
page 366
page 367
page 368
page 369
page 370
page 371
page 372
page 373
page 374
page 375
page 376
page 377
page 378
page 379
page 380
page 381
page 382
page 383
page 384
page 385
page 386
page 387
page 388
page 389
page 390
page 391
page 392
page 393
page 394
page 395
page 396
page 397
page 398
page 399
page 400
page 401
page 402
page 403
page 404
page 405
page 406
page 407
page 408
page 409
page 410
page 411
page 412
page 413
page 414
page 415
page 416
page 417
page 418
page 419
page 420
page 421
page 422
page 423
page 424
page 425
page 426
page 427
page 428
page 429
page 430
page 431
page 432
page 433
page 434
page 435
page 436
page 437
page 438
page 439
page 440
page 441
page 442
page 443
page 444
page 445
page 446
page 447
page 448
page 449
page 450
page 451
page 452
page 453
page 454
page 455
page 456
page 457
page 458
page 459
page 460
page 461
page 462
page 463
page 464
page 465
page 466
page 467
page 468
page 469
page 470
page 471
page 472
page 473
page 474
page 475
page 476
page 477
page 478
page 479
page 480
page 481
page 482
page 483
page 484
page 485
page 486
page 487
page 488
page 489
page 490
page 491
page 492
page 493
page 494
page 495
page 496
page 497
page 498
page 499
page 500
page 501
page 502
page 503
page 504
page 505
page 506
page 507
page 508
page 509
page 510
page 511
page 512
page 513
page 514
page 515
page 516
page 517
page 518
page 519
page 520
page 521
page 522
page 523
page 524
page 525
page 526
page 527
page 528
page 529
page 530
page 531
page 532
page 533
page 534
page 535
page 536
page 537
page 538
page 539
page 540
page 541
page 542
page 543
page 544
page 545
page 546
page 547
page 548
page 549
page 550
page 551
page 552
page 553
page 554
page 555
page 556
page 557
page 558
page 559
page 560
page 561
page 562
page 563
page 564
page 565
page 566
page 567
page 568
page 569
page 570
page 571
page 572
page 573
page 574
page 575
page 576
page 577
page 578
page 579
page 580
page 581
page 582
page 583
page 584
page 585
page 586
page 587
page 588
page 589
page 590
page 591
page 592
page 593
page 594
page 595
page 596
page 597
page 598
page 599
page 600
page 601
page 602
page 603
page 604
page 605
page 606
page 607
page 608
page 609
page 610
page 611
page 612
page 613
page 614
page 615
page 616
page 617
page 618
page 619
page 620
page 621
page 622
page 623
page 624
page 625
page 626
page 627
page 628
page 629
page 630
page 631
page 632
page 633
page 634
page 635
page 636
page 637
page 638
page 639
page 640
page 641
page 642
page 643
page 644
page 645
page 646
page 647
page 648
page 649
page 650
page 651
page 652
page 653
page 654
page 655
page 656
page 657
page 658
page 659
page 660
page 661
page 662
page 663
page 664
page 665
page 666
page 667
page 668
page 669
page 670
page 671
page 672
page 673
page 674
page 675
page 676
page 677
page 678
page 679
page 680
page 681
page 682
page 683
page 684
page 685
page 686
page 687
page 688
page 689
page 690
page 691
page 692
page 693
page 694
page 695
page 696
page 697
page 698
page 699
page 700
page 701
page 702
page 703
page 704
page 705
page 706
page 707
page 708
page 709
page 710
page 711
page 712
page 713
page 714
page 715
page 716
page 717
page 718
page 719
page 720
page 721
page 722
page 723
page 724
page 725
page 726
page 727
page 728
page 729
page 730
page 731
page 732
page 733
page 734
page 735
page 736
page 737
page 738
page 739
page 740
page 741
page 742
page 743
page 744
page 745
page 746
page 747
page 748
page 749
page 750
page 751
page 752
page 753
page 754
page 755
page 756
page 757
page 758
page 759
page 760
page 761
page 762
page 763
page 764
page 765
page 766
page 767
page 768
page 769
page 770
page 771
page 772
page 773
page 774
page 775
page 776
page 777
page 778
page 779
page 780
page 781
page 782
page 783
page 784
page 785
page 786
page 787
page 788
page 789
page 790
page 791
page 792
page 793
page 794
page 795
page 796
page 797
page 798
page 799
page 800
page 801
page 802
page 803
page 804
page 805
page 806
page 807
page 808
page 809
page 810
page 811
page 812
page 813
page 814
page 815
page 816
page 817
page 818
page 819
page 820
page 821
page 822
page 823
page 824
page 825
page 826
page 827
page 828
page 829
page 830
page 831
page 832
page 833
page 834
page 835
page 836
page 837
page 838
page 839
page 840
page 841
page 842
page 843
page 844
page 845
page 846
page 847
page 848
page 849
page 850
page 851
page 852
page 853
page 854
page 855
page 856
page 857
page 858
page 859
page 860
page 861
page 862
page 863
page 864
page 865
page 866
page 867
page 868
page 869
page 870
page 871
page 872
page 873
page 874
page 875
page 876
page 877
page 878
page 879
page 880
page 881
page 882
page 883
page 884
page 885
page 886
page 887
page 888
page 889
page 890
page 891
page 892
page 893
page 894
page 895
page 896
page 897
page 898
page 899
page 900
page 901
page 902
page 903
page 904
page 905
page 906
page 907
page 908
page 909
page 910
page 911
page 912
page 913
page 914
page 915
page 916
page 917
page 918
page 919
page 920
page 921
page 922
page 923
page 924
page 925
page 926
page 927
page 928
page 929
page 930
page 931
page 932
page 933
page 934
page 935
page 936
page 937
page 938
page 939
page 940
page 941
page 942
page 943
page 944

Filter Results

9,437 results
9,437 results
Cybersecurity The Business Benefits of Prioritizing Identity Security

Article / Updated 04-28-2025

Today, applications can run anywhere — on-premises or in the cloud — and users can access them from anywhere, on virtually any device. Modern business trends including remote and hybrid work, distributed and extended workforces (such as contractors, partners, vendors, and other third parties), and the proliferation of cloud-hosted applications have led to the emergence of a new security perimeter: identity. An identity includes attributes such as user (or account) name, password (or passphrase or secret key), roles, access privileges, and historical context. This information identifies an individual or entity (such as a service, device, or application) in an organization’s systems and networks. As attackers increasingly target identities, organizations must stay ahead by implementing a comprehensive identity security program. In this article, we explain how the right approach to identity security can enhance your organization’s security posture, improve the employee experience, and deliver significant business benefits. Rather than developing exploits for system or application vulnerabilities, attackers can simply log in with stolen credentials. According to the 2024 Verizon Business Data Breach Investigations Report (DBIR), 68 percent of breaches are the result of credential theft (that is, the “human element”) from vectors including social engineering techniques (such as phishing, smishing, business email compromise, and pretexting) and brute-force dictionary attacks. A strong security posture is good for business When an organization falls victim to a ransomware attack or a data breach, normal business operations grind to a halt. It’s never “business as usual” when your employees, partners, and customers can’t access your critical applications and data because of a cyberattack. By improving network security and account hygiene, an identity security program can help organizations prevent breaches before they occur and respond quickly when compromised accounts are discovered, thus reducing the impact of any potential breaches. Don’t be the weak link in your supply chain security posture In our modern interconnected world, no business is an island, and the weakest link in your security posture may be one of your supply chain partners. According to research from BlueVoyant, more than four-fifths of organizations (81 percent) were impacted by supply chain attacks in 2024. Of course, supply chain attacks aren’t new — the 2013 Target data breach was the result of a compromised account belonging to a third-party maintenance vendor — but they have become more prevalent. More recently, the Change Healthcare (a subsidiary of UnitedHealth Group) attack in February 2024 cost nearly $9 billion in response efforts and assistance to affected healthcare providers. Every business has a supply chain and is a part of the supply chain itself — whether as an upstream supplier, downstream customer, or both. Third-party risk management has taken on renewed importance and can be a competitive differentiator when selecting new partnerships or renewing existing relationships. Yet many organizations struggle to manage third-party access to their systems and data. A strong identity security program can help an organization better manage guest accounts and monitor third-party activities, reducing the risk of data breaches caused by third-party access. Security is only strong if it is adopted While the login experience isn’t likely to top your employees’ list of factors impacting job satisfaction, it is a routine part of their daily work lives, and a poor experience can quickly cause user frustration. Struggling to remember different passwords, answering numerous multi-factor authentication (MFA) prompts, or calling the help desk to unlock their account — all before they’ve had their first cup of coffee — isn’t a great way to start the workday. Employees can benefit from an identity security program that provides quick and seamless access to their applications and devices, increasing productivity and reducing user frustration. A well-designed identity security program can also increase operational efficiency and decrease resource strain on IT and help desk teams by streamlining identity and access management (IAM) workflows such as account provisioning, permissions management, MFA enrollment, password resets, and reporting. It’s a win-win for everyone. By defining clear objectives and tying them to known business drivers and risks, organizations can ensure a strong identity security program that delivers measurable business value. To learn more about identity security and its business benefits, visit https://duo.com/ and download a free copy of Identity Security For Dummies.

View Article
General Programming & Web Design Why Local Environments Hold Your Developers Back

Article / Updated 04-28-2025

For enterprises whose growth depends on the innovation of their developers and data scientists, success moves at the speed of their development environments. Efficiency, effectiveness, and the ability to build without friction — that’s what sets the pace. The question is simple enough: Do your developers and data scientists work their magic in cloud development environments (CDEs), or is their work bogged down by a legacy development environment? Read on to find out why local development environments and other traditional solutions may be holding back your developers, and how cloud development environments can set them free. How traditional development environments are lacking What are some of the ways the wrong development environment may be making your company’s progress sluggish? Local development environments: This was yesterday’s standard, with all developers managing their own environments on their own machines. All that local control gets in the way of getting ahead. It’s complicated and time-consuming to configure tools and dependencies on each individual environment. You wind up with inconsistencies that slow things down. And don’t even think about scaling this approach. Virtual desktop infrastructures (VDIs): VDIs help to centralize environments, but they’re often not really workable for development. They’re expensive and complicated to maintain. They also tend to suffer from sluggish performance, and that’s no way to keep developers happy. Shadow virtual machines (VMs): Developers may get around these issues with ad hoc VMs, but they end up creating different problems. “Shadow” solutions may be lacking in governance and are often overprovisioned. That makes them potential security risks, not to mention wasteful of resources. How cloud development environments can help A fully managed environment is the answer to the challenges of these more disjointed solutions from yesteryear. The CDE may be hosted in the cloud or via on-premises infrastructure, and it brings together all the necessary tools, libraries, and infrastructure needed for efficient development. It’s a development workspace that can be accessed from anywhere, not tied to a specific location or machine. It’s great for remote work, and because of its centralized infrastructure, it’s a lot more secure than storing code and data on developers’ laptops. Developers and data scientists can easily tap into it for coding applications and training machine learning (ML) models, getting up and running in minutes. Provisioning is automatic, so everything developers need is right there and ready to go. It can all be controlled from a centralized interface by authorized team members, ensuring only the right people can access code and data. And the compute and storage resources are easily scalable. How CDEs make developers more productive Traditional local development environments tend to be frustratingly slow when it comes to onboarding new developers or moving developers to new projects (and developers tend to take on new projects multiple times a year, of course). Provisioning environments can take days or even weeks, thanks to all the complexities of dependencies and the need for approvals. Meanwhile, if developers are off working in their own local environments, that also leads to problems requiring time-consuming troubleshooting. Mismatched environments are the enemy of success. What’s more, resource constraints can be a hangup in local development environments. CDEs, on the other hand, can be preconfigured, so developers just log in and get to work. Platform engineers can make global updates and ensure consistencies across the CDE. Configuration drift is no longer a problem. As for resource constraints, the cloud can fix that with high-performance resources that scale as needed. Developers can set up resource-intensive tasks such as ML model training in the cloud, and use their local laptops to get other work done in the meantime. Why cloud development environments provide better security Local development environments and various noncentralized alternatives can pose security threats, due to a lack of adequate governance and a hard-to-manage attack surface. Working with intellectual property and other sensitive data on developer laptops or unapproved VMs is risky. If developers need to pull sensitive data to their laptops for such things as ML model training, you’re tempting fate, because security problems don’t just hold developers back — they can set back the entire organization. CDEs, on the other hand, can live in a cloud environment or be centralized in on-premises infrastructure. They can be air-gapped if need be. Source code and data can stay in secure cloud or on-premise locations, along with any compute resources needed for dealing with them, so sensitive data never needs to leave the safety of home. Compliance teams aren’t fond of local environments because they’re tricky to monitor. CDEs, on the other hand, offer better monitoring and auditing capabilities, without getting in the way of the developers’ work. How CDEs save both money and time Face it — local development environments can be costly. Local hardware isn’t cheap, especially the high-end hardware needed for resource-intensive processes. But if your enterprise tries to trim those costs, developers are likely to be displeased. The reality is, CDEs not only provide a better developer experience and greater security, they also save money and time. Developers can use most cost-effective machines that are less powerful and longer-lasting, because the heavy lifting is happening in the CDE, not on the local machine. What’s more, CDEs can tap into automation to optimize resource utilization. Auto-start and auto-stop features mean unused environments aren’t sitting there wasting money. Bin-packing multiple developer workspaces onto a single VM can reduce infrastructure costs, too. And once again, helping developers be more efficient — by easing onboarding and transitioning, while banishing sluggish equipment — saves money, too. Time is, after all, money. If you can save hours and days and weeks of wasted developer time, you’ll get a whole lot more out of the money you’re paying them. To learn more about the benefits of CDEs, download your free Cloud Development Environments For Dummies, CoderTechnologies, Inc. Special Edition e-book.

View Article
General Microsoft Microsoft Power Platform For Dummies Cheat Sheet

Cheat Sheet / Updated 04-11-2025

The Microsoft Power Platform is a suite of applications that offers low-code and no-code development tools organizations can use to streamline and automate business processes. Collectively (and when integrated properly), the Power Platform suite of applications works together to support business transformation. Following is a description of the applications contained in the Power Platform, and some details about how each application functions as part of the suite: Dataverse: Starting your journey with each of the Power Platform applications requires one essential element: data. At the heart of the Power Platform is Dataverse, the common data service for storing and structuring relational data. Dataverse serves as the backbone for capturing and retaining user inputs across the platform's apps. Power Apps: The first step in the low-code/no-code journey to business automation is to create a mechanism for data entry. You can begin, for example, by using Power Apps to build an application that collects and manages data. Power Apps is often the primary tool businesses use to design custom applications that are tailored to their needs. Power Pages: Sometimes, you want the data entered with your Power Apps applications to be available for everyone to see, not just a few users. This is when you use Power Pages to design secure, data-driven external websites. The sites you create with Power Pages can display and collect information directly from Dataverse. Power Pages presents this data in a tabular format or as embedded reports and other media objects. Power BI: For data analysis, you use Power BI to transform data collected through custom apps created with Power Apps into interactive reports and insightful dashboards. Power Automate: You can use Power Automate to automate tasks and processes based on the data in Dataverse, which enhances productivity and efficiency across your organization.

View Cheat Sheet
Access Access For Dummies Cheat Sheet

Cheat Sheet / Updated 04-10-2025

Access makes managing data easy, enabling you to set up a database quickly, enter records into that database, and then use the data however you like. With Access, you can organize data into tables, design forms for editing and reports for presenting, and create queries for finding information!

View Cheat Sheet
General Social Media Bluesky For Dummies Cheat Sheet

Cheat Sheet / Updated 04-08-2025

Some readers like to thumb through a book and flag pages that they think are important. If that’s not you, we have you covered with this handy-dandy cheat sheet! This sheet contains all the important stuff you need to know about posting on Bluesky: rules for posting text, images, and videos and Bluesky’s community guidelines so your posts contribute to a healthy community.

View Cheat Sheet
Cybersecurity Modern DSPM and the Importance of Discovering and Classifying Sensitive Data

Article / Updated 03-03-2025

In this article you will learn: The necessity of discovering and classifying all sensitive data Challenges of modern DSPM tools Solutions that DSPM tools provide Data is often shared and copied across multiple locations, making your most valuable business asset a security nightmare. It’s in your organization’s best interests to keep data as secure as possible, away from prying eyes, no matter where it resides. Doing so requires a structured and strong data security program backed by a powerful data security posture management (DSPM) solution. Modern DSPM is the next generation of data security technology, designed for the complexities of the hybrid cloud environments by tapping into the power of artificial intelligence (AI) and machine learning (ML) to continuously discover data and automate classification of sensitive information across known and unknown environments. The necessity of discovering and classifying all sensitive data Your sensitive data can’t be fully secure unless you’re able to effectively discover and classify every bit and byte of it, quickly and continually, and at scale, across your entire data footprint. That’s what modern DSPM excels at. Essential visibility — what data your enterprise has, how sensitive it is, and where it resides — is the key to security. Gaps in that visibility will stand in the way of a strong security posture. As data is discovered, modern DSPM classifies it automatically and precisely using AI and ML with advanced large language models. Modern DSPM solutions can discover and classify data types that are specific to your organization without any custom tuning. With data discovered and classified, you can then apply the appropriate security controls for keeping that data secure and keeping your organization in compliance with data protection regulations. Modern DSPM excels in both discovery and classification, which is why it’s critical for your data security program’s success. Challenges of modern DSPM tools Today’s data volumes and advanced technologies makes protecting your data a challenge, meaning legacy tools can’t keep up. You’ll find these problems when using a tool that’s not optimized for these challenges: Partially classified data: Legacy tools are designed with out-of-the-box classifiers, set up to only find what it’s looking for. Modern DSPM solutions find what you might not even know you should be looking for, such as unstructured sensitive documents specific to your organization. Discovery is slow: Data security requires rapid information, but legacy tools can’t keep up the pace. Scanning can take a long time because legacy tools don’t benefit from the AI and ML scanning techniques that a modern DSPM tool provides. Inaccurate classifications: Outdated tools tend to rely mainly on regular expressions and other older techniques to classify data. As a result, you need dedicated resources to manually write rules, tune the tools, and make sure classifications are accurate. Difficult to manage: With legacy tools, lots of agents and dedicated resources are needed to connect to datastores. That requires tons of work, and it is a monumental task to maintain. Solutions that DSPM tools provide DSPM, on the other hand, is made for modern data security challenges: Precision in classification and context: A modern DSPM solution applies AI and ML not only to detect common patterns, such as personal identifiers and financial data, but also to recognize proprietary, unstructured, or business-specific data with high precision. Scale and speed for today’s data environments: Precision alone isn’t enough for data that’s fast-moving and dispersed across SaaS, IaaS, and on-prem systems. Speed and scalability are essential. Modern DSPM tools operate agentlessly, scanning datastores quickly without disrupting business operations, providing rapid results, even across vast ecosystems. Actionable insights for remediation: Detecting risks is only the beginning. A powerful DSPM solution goes beyond visibility, offering actionable insights to address identified risks. Modern DSPM is the core that ties everything together and helps ensure the confidentiality, integrity, and availability of your data. You really can’t run a modern data security program without it. To learn more about modern DSPM solutions that support your business needs, download Modern DSPM For Dummies, Cyera Special Edition.

View Article
Generative AI The Benefits of a Unified Data Management Approach

Article / Updated 02-20-2025

Artificial intelligence (AI) offers a lot of promise to companies, but deploying AI can be complex with many considerations and pitfalls. Data is the necessary asset to make AI work, and your organization is probably swimming in it. But how well-managed is your data? The answer hinges on whether your company will be successful in its AI efforts. Data management is the behind-the scenes workhorse that makes AI work. A robust management program allows data to be ingested from everywhere it needs to be, cleaned and transformed to enable AI model training, made easily available to users, and meticulously governed to ensure security, privacy, and compliance. In this article, we’ll explore several ways a data management platform can help with your AI efforts. Although these applications may differ, effective data management is always the necessary first step on which these solutions are built. Proprietary AI As your business scales, the number of receipts, invoices, contracts, and other printed documents scale, too. And when all those documents aren’t digitized, think of the number of hours it will take an employee to catalog it. It’s possible to use AI to automate this process. A proprietary engine scans and processes documents, extracts meaning from them, and outputs the data in a format that’s handy for reports, dashboards, and business intelligence apps. Some benefits of using proprietary AI to scan and process documents are: It can translate multiple languages. A large language model (LLM) can be trained to make sense of any specific document formats that your company may have. Accurate data helps with decision-making. Data can be extracted from third-party platforms, enrich it, validate it, and output it to dashboards accessible throughout the company. Identify issues with customers earlier. Algorithms aggregate and analyze user data, spotlighting any issues with customers early on to prevent customer churn. Or to spotlight when a loyal customer is ready to grow with your company. Retrieval augmented generation Things that work well in a controlled environment with a carefully curated data sample don’t always work in a real-world environment. One such situation is with retrieval augmented generation (RAG), the engine that LLMs rely on to give accurate facts. But if RAG is relying on legacy data that wasn’t prepared adequately, your AI solution is going to underperform. A data management program makes sure the basic, but vitally important, tasks are covered — data is cleaned, engineered, structured, and complete. Some tasks it can do are: Implement meta-intent branching for handling different types of queries. Develop verified quotes and see-it-in-source features for transparency. Monitor and balance token consumption. Improve data quality through semantic data scrubbing. Research and development Traditional research and development methods can be time consuming and expensive. Applying AI to the process can help reduce the cost and release products to the market faster. Reliable products help retain customers, boost the company’s reputation, and grow profit margin. High-quality data is needed to make it all work. A data management program can help with the following tasks: Automate manual processes. Automating helps to lower errors and inefficiencies, and accelerates quantitative research by navigating unstructured data. Business decisions get made faster. Verify and vet output. One system can generate formulas or prototypes for new products; a secondary one can automatically evaluate, compare, and check them for compatibility and other parameters. Enhance new network implementations and diagnostics. AI can create potential scenarios for the design and deployment of new systems. It can create hypotheses to pinpoint problems and suggest solutions. About the Book Wiley has recently published AI Data Management For Dummies, Keboola Special Edition. It includes insights from Snowflake and Capgemini that will help your organization integrate best practices and advanced technologies into your data strategy, what the future of AI development looks like, and more use cases. Download AI Data Management For Dummies, Keboola Special Edition by Andy Mott, Dan O’Riordan, and Rithesh Makkena to open the door to AI success.

View Article
Instagram Instagram For Business For Dummies Cheat Sheet

Cheat Sheet / Updated 02-19-2025

Before you start using Instagram to promote your business, you may want to learn the lingo that Instagrammers use. Instagram doesn't like accounts that act spammy or over-engage in certain behaviors, so you need to become familiar with a number of restrictions as well as the appropriate image or video size to showcase your products and services. When you follow other Instagram profiles, you can share posts and even entire profiles in a direct message to another Instagram user.

View Cheat Sheet
General Microsoft Microsoft Copilot For Dummies Cheat Sheet

Cheat Sheet / Updated 02-19-2025

Whether you're drafting text in Word, designing presentations in PowerPoint, analyzing data in Excel, or managing your inbox in Outlook, Microsoft Copilot can assist you every step of the way. With this cheat sheet, you'll have a handy reference to quickly understand how Copilot can enhance your productivity and streamline your tasks across various Microsoft 365 programs.

View Cheat Sheet
iPhones iPhone for Seniors For Dummies Cheat Sheet

Cheat Sheet / Updated 01-13-2025

This cheat sheet gives you a rundown of some of the most useful features and apps so you can find what you need to customize your iPhone’s behavior. See how to get the most out of Siri (your iPhone’s virtual assistant), review some favorite apps for news and weather, and discover several of the most popular apps for multimedia.

View Cheat Sheet
page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16
page 17
page 18
page 19
page 20
page 21
page 22
page 23
page 24
page 25
page 26
page 27
page 28
page 29
page 30
page 31
page 32
page 33
page 34
page 35
page 36
page 37
page 38
page 39
page 40
page 41
page 42
page 43
page 44
page 45
page 46
page 47
page 48
page 49
page 50
page 51
page 52
page 53
page 54
page 55
page 56
page 57
page 58
page 59
page 60
page 61
page 62
page 63
page 64
page 65
page 66
page 67
page 68
page 69
page 70
page 71
page 72
page 73
page 74
page 75
page 76
page 77
page 78
page 79
page 80
page 81
page 82
page 83
page 84
page 85
page 86
page 87
page 88
page 89
page 90
page 91
page 92
page 93
page 94
page 95
page 96
page 97
page 98
page 99
page 100
page 101
page 102
page 103
page 104
page 105
page 106
page 107
page 108
page 109
page 110
page 111
page 112
page 113
page 114
page 115
page 116
page 117
page 118
page 119
page 120
page 121
page 122
page 123
page 124
page 125
page 126
page 127
page 128
page 129
page 130
page 131
page 132
page 133
page 134
page 135
page 136
page 137
page 138
page 139
page 140
page 141
page 142
page 143
page 144
page 145
page 146
page 147
page 148
page 149
page 150
page 151
page 152
page 153
page 154
page 155
page 156
page 157
page 158
page 159
page 160
page 161
page 162
page 163
page 164
page 165
page 166
page 167
page 168
page 169
page 170
page 171
page 172
page 173
page 174
page 175
page 176
page 177
page 178
page 179
page 180
page 181
page 182
page 183
page 184
page 185
page 186
page 187
page 188
page 189
page 190
page 191
page 192
page 193
page 194
page 195
page 196
page 197
page 198
page 199
page 200
page 201
page 202
page 203
page 204
page 205
page 206
page 207
page 208
page 209
page 210
page 211
page 212
page 213
page 214
page 215
page 216
page 217
page 218
page 219
page 220
page 221
page 222
page 223
page 224
page 225
page 226
page 227
page 228
page 229
page 230
page 231
page 232
page 233
page 234
page 235
page 236
page 237
page 238
page 239
page 240
page 241
page 242
page 243
page 244
page 245
page 246
page 247
page 248
page 249
page 250
page 251
page 252
page 253
page 254
page 255
page 256
page 257
page 258
page 259
page 260
page 261
page 262
page 263
page 264
page 265
page 266
page 267
page 268
page 269
page 270
page 271
page 272
page 273
page 274
page 275
page 276
page 277
page 278
page 279
page 280
page 281
page 282
page 283
page 284
page 285
page 286
page 287
page 288
page 289
page 290
page 291
page 292
page 293
page 294
page 295
page 296
page 297
page 298
page 299
page 300
page 301
page 302
page 303
page 304
page 305
page 306
page 307
page 308
page 309
page 310
page 311
page 312
page 313
page 314
page 315
page 316
page 317
page 318
page 319
page 320
page 321
page 322
page 323
page 324
page 325
page 326
page 327
page 328
page 329
page 330
page 331
page 332
page 333
page 334
page 335
page 336
page 337
page 338
page 339
page 340
page 341
page 342
page 343
page 344
page 345
page 346
page 347
page 348
page 349
page 350
page 351
page 352
page 353
page 354
page 355
page 356
page 357
page 358
page 359
page 360
page 361
page 362
page 363
page 364
page 365
page 366
page 367
page 368
page 369
page 370
page 371
page 372
page 373
page 374
page 375
page 376
page 377
page 378
page 379
page 380
page 381
page 382
page 383
page 384
page 385
page 386
page 387
page 388
page 389
page 390
page 391
page 392
page 393
page 394
page 395
page 396
page 397
page 398
page 399
page 400
page 401
page 402
page 403
page 404
page 405
page 406
page 407
page 408
page 409
page 410
page 411
page 412
page 413
page 414
page 415
page 416
page 417
page 418
page 419
page 420
page 421
page 422
page 423
page 424
page 425
page 426
page 427
page 428
page 429
page 430
page 431
page 432
page 433
page 434
page 435
page 436
page 437
page 438
page 439
page 440
page 441
page 442
page 443
page 444
page 445
page 446
page 447
page 448
page 449
page 450
page 451
page 452
page 453
page 454
page 455
page 456
page 457
page 458
page 459
page 460
page 461
page 462
page 463
page 464
page 465
page 466
page 467
page 468
page 469
page 470
page 471
page 472
page 473
page 474
page 475
page 476
page 477
page 478
page 479
page 480
page 481
page 482
page 483
page 484
page 485
page 486
page 487
page 488
page 489
page 490
page 491
page 492
page 493
page 494
page 495
page 496
page 497
page 498
page 499
page 500
page 501
page 502
page 503
page 504
page 505
page 506
page 507
page 508
page 509
page 510
page 511
page 512
page 513
page 514
page 515
page 516
page 517
page 518
page 519
page 520
page 521
page 522
page 523
page 524
page 525
page 526
page 527
page 528
page 529
page 530
page 531
page 532
page 533
page 534
page 535
page 536
page 537
page 538
page 539
page 540
page 541
page 542
page 543
page 544
page 545
page 546
page 547
page 548
page 549
page 550
page 551
page 552
page 553
page 554
page 555
page 556
page 557
page 558
page 559
page 560
page 561
page 562
page 563
page 564
page 565
page 566
page 567
page 568
page 569
page 570
page 571
page 572
page 573
page 574
page 575
page 576
page 577
page 578
page 579
page 580
page 581
page 582
page 583
page 584
page 585
page 586
page 587
page 588
page 589
page 590
page 591
page 592
page 593
page 594
page 595
page 596
page 597
page 598
page 599
page 600
page 601
page 602
page 603
page 604
page 605
page 606
page 607
page 608
page 609
page 610
page 611
page 612
page 613
page 614
page 615
page 616
page 617
page 618
page 619
page 620
page 621
page 622
page 623
page 624
page 625
page 626
page 627
page 628
page 629
page 630
page 631
page 632
page 633
page 634
page 635
page 636
page 637
page 638
page 639
page 640
page 641
page 642
page 643
page 644
page 645
page 646
page 647
page 648
page 649
page 650
page 651
page 652
page 653
page 654
page 655
page 656
page 657
page 658
page 659
page 660
page 661
page 662
page 663
page 664
page 665
page 666
page 667
page 668
page 669
page 670
page 671
page 672
page 673
page 674
page 675
page 676
page 677
page 678
page 679
page 680
page 681
page 682
page 683
page 684
page 685
page 686
page 687
page 688
page 689
page 690
page 691
page 692
page 693
page 694
page 695
page 696
page 697
page 698
page 699
page 700
page 701
page 702
page 703
page 704
page 705
page 706
page 707
page 708
page 709
page 710
page 711
page 712
page 713
page 714
page 715
page 716
page 717
page 718
page 719
page 720
page 721
page 722
page 723
page 724
page 725
page 726
page 727
page 728
page 729
page 730
page 731
page 732
page 733
page 734
page 735
page 736
page 737
page 738
page 739
page 740
page 741
page 742
page 743
page 744
page 745
page 746
page 747
page 748
page 749
page 750
page 751
page 752
page 753
page 754
page 755
page 756
page 757
page 758
page 759
page 760
page 761
page 762
page 763
page 764
page 765
page 766
page 767
page 768
page 769
page 770
page 771
page 772
page 773
page 774
page 775
page 776
page 777
page 778
page 779
page 780
page 781
page 782
page 783
page 784
page 785
page 786
page 787
page 788
page 789
page 790
page 791
page 792
page 793
page 794
page 795
page 796
page 797
page 798
page 799
page 800
page 801
page 802
page 803
page 804
page 805
page 806
page 807
page 808
page 809
page 810
page 811
page 812
page 813
page 814
page 815
page 816
page 817
page 818
page 819
page 820
page 821
page 822
page 823
page 824
page 825
page 826
page 827
page 828
page 829
page 830
page 831
page 832
page 833
page 834
page 835
page 836
page 837
page 838
page 839
page 840
page 841
page 842
page 843
page 844
page 845
page 846
page 847
page 848
page 849
page 850
page 851
page 852
page 853
page 854
page 855
page 856
page 857
page 858
page 859
page 860
page 861
page 862
page 863
page 864
page 865
page 866
page 867
page 868
page 869
page 870
page 871
page 872
page 873
page 874
page 875
page 876
page 877
page 878
page 879
page 880
page 881
page 882
page 883
page 884
page 885
page 886
page 887
page 888
page 889
page 890
page 891
page 892
page 893
page 894
page 895
page 896
page 897
page 898
page 899
page 900
page 901
page 902
page 903
page 904
page 905
page 906
page 907
page 908
page 909
page 910
page 911
page 912
page 913
page 914
page 915
page 916
page 917
page 918
page 919
page 920
page 921
page 922
page 923
page 924
page 925
page 926
page 927
page 928
page 929
page 930
page 931
page 932
page 933
page 934
page 935
page 936
page 937
page 938
page 939
page 940
page 941
page 942
page 943
page 944

Quick Links

  • About For Dummies
  • Contact Us
  • Activate Online Content

Connect

About Dummies

Dummies has always stood for taking on complex concepts and making them easy to understand. Dummies helps everyone be more knowledgeable and confident in applying what they know. Whether it's to pass that big test, qualify for that big promotion or even master that cooking technique; people who rely on dummies, rely on it to learn the critical skills and relevant information necessary for success.

Copyright @ 2000-2024 by John Wiley & Sons, Inc., or related companies. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.

Terms of Use
Privacy Policy
Cookies Settings
Do Not Sell My Personal Info - CA Only