think-cell: PowerPoint presentation suite for creating business presentations

May 12th, 2014 by ProcessFlows


slider_2It is a well-known fact that data visualisation boosts up your presentation: the effective use of charts and graphs makes your point stronger, provides a better understanding of abstracts, and can make selling your products and services easier.

There are a number of ways to visualise data – tables, histograms, pie charts, bubble charts, bar graphs, network diagrams, etc. – which are used every day in projects, meetings, and trainings. Why? Because it’s proven that we learn more quickly and retain more information when presentations are strengthened by visuals, as opposed to simply describing the data.

Back in 2012, while working in a consulting firm, Dr. Markus Hannebauer and his colleague Arno Schödl were facing a lot of problems in creating convincing data-driven charts. The use of PowerPoint was sometimes frustrating and time-consuming – they often struggled with small details like integrating graphical elements into charts and getting label-placement right. What’s more, some chart types were simply not available. Eventually, they were asked if they can do something to make the consultants’ lives easier. And this is how think-cell was born.

think-cell is a powerful charting package that integrates seamlessly with PowerPoint, and was designed specifically to create corporate presentations, such as complex Waterfalls, Mekkos and Gantts, in just a few minutes.

More than 275,000 business users world-wide use the software every day, as it makes creating PowerPoint presentations much easier, faster and enjoyable.

Using think-cell chart, the efficiency in creating and altering charts can be improved by a factor of 3 to 5 compared to the current best practice in top-tier business consulting firms.

With minimum effort or adjustments, think-cell can enhance your presentation by accurate and well-laid-out charts featuring:


• Column & bar charts
• Self-adjusting labels
• Column/bar totals
• Column/bar breaks
• Compound annual growth rate arrows
• Absolute & percent difference arrows
• Average line
• Pie charts
• Self-adjusting labels
• Interactive rotation and explosion
• Scatter & bubble charts
• Self-adjusting labels
• Two labels per data point
• Waterfall charts
• Marimekko charts
• Gantt charts
• Intelligent Excel links

And the best part – it’s easy, even if you are using the program for the first time, because making a chart with think-cell is like scribbling the same on a piece of paper or whiteboard.

We at Software Paradise believe that if a picture is worth a thousand of words, then the potent use of graphs and charts is certainly a worthy business investment. Email us now at to receive a think-cell quotation for your team.

We can source any software for you! Please email us for more information or call us at +44 (0)1962 59168. Quotations submitted within an hour!

Cost proposals made easy with ProPricer

February 17th, 2014 by ProcessFlows

Every year the Washington Technology magazine publishes a list of the 100 Biggest Government Contractors based on prime revenue. Examining the annual rankings closely can provide valuable insights into who has found the best contracting strategy and practices.

Here’s a thing that 7 of the Top 10 on the list have in common: they all use ProPricer!



Designed especially for government contractors and estimators, ProPricer helps companies from all over the world to overcome various proposal challenges, evaluate complex cost data, and get the winning bid.

As the market changes, so do contracts and proposals. Budgets cuts, new policies, higher demands and tough competition – combined with a still unstable economy – are among the challenges that contractors meet these days.



ProPricer is a reliable, industry-proven solution for proposal pricing, project estimation and cost analysis. It also provides analytical tools for source selection and real-time negotiation, and features multiple proposal comparison, sophisticated “what-if” analysis and risk evaluation, as well as should-cost and life cycle cost analysis, dynamic reporting possibilities, and more!




Propricer replaces manual estimating and simplifies the proposal process, providing all the necessary tools to estimators, pricing teams, contract managers, accounting, procurement, and project management specialists in just one package.

With ProPricer, cost proposal analysis is ready in minutes, and there’s no need to use too many (and often inflexible) software programs.

ProPricer is a single data source of rates, resources, materials, and tasks. In addition, 17 charts and graphs are available, allowing to quickly and efficiently capture the most important data.



Executive Business Services, Inc. (EBS) is offering innovative software solutions since 1986.

EBS flagship product, ProPricer, helps organizations of all sizes (from engineering and manufacturing to government, healthcare, aerospace and defense) to streamline the processes of proposal creation and data organization and improve the accuracy and exchangeability of cost data.



Software Paradise Ltd. is the official distributor of EBS in the UK. Email us at to see which ProPricer edition would be the best fit for your organization and turn ProPricer into a valuable investment in your business!

We can source any software for you! Please email us for more information or call us at +44 (0)1962 59168. Quotations submitted within an hour!

Print Management: Fuji Xerox integrates facial recognition in printers

December 5th, 2013 by ProcessFlows

Print Management SolutionsFuji Xerox announced the integration of ground breaking facial recognition technology in their new multi-function device line ApeosPort-V C and DocuCentre-V C series.

The new line includes 18 MFD models featuring the new technology called Smart WelcomEyes Advance – a combination of image recognition software, a proximity camera and a heat sensor that detects an approaching user and gets the device to wake up immediately from Sleep Mode. Once the user is done with their printing, copying or faxing activities and walks away, the printer once again enters Sleep Mode to conserve energy.

This incredible technology also offers sophisticated user authentication method through face recognition. The face recognition camera can recognise the face of the user standing in front of the device, making authentication simple and fast.

Reduce Overall Print Costs

Companies that can’t afford to replace their entire printer fleet with the new ApeosPort-V C series can benefit from intelligent printing right away thanks to print management solutions like Safecom Smart Printing. Careless printing practices result in unnecessary spending. With SafeCom organisations can save an astounding 40% of their print budget through:

  • Reducing paper and toner usage to a fraction – no more misprints.
  • Cost-saving print behaviour through optimised colour and duplex print settings
  • Consolidated and standardized printer fleet that reduces administration and maintenance expenses.
  • Accurate cost allocation and procurement through centralised track and report management.

Safecom print management software and hardware provides the secure printing and document accounting solution to companies that need to control and optimise their print environment, enabling them to consolidate their printing infrastructure and reduce operational costs.

Ensure Data Protection with Print Management

One of the main advantages of Safecom is its modular nature, allowing companies to build the print management solution they need and only pay for what they get. SafeCom’s Pull Print module safeguards document confidentiality and unauthorised access to print, scan, copy and e-mail functions. Its user authentication provides air-tight security on all shared MFDs that function as personal printers. SafeCom Pull Print with authentication ensures:

  • Documents are delivered only into the right hands
  • Information is kept confidential. No risk of being left unattended at the printer
  • Users login to access MFP functions, like print, copy, scan and e-mail
  • Users login with a simple swipe their key-card
  • Document collection is safe anytime and anywhere – no “print and sprint”
  • Integration with other enterprise applications and workflows is kept secure through single sign-on
  • Savings of up to 20% on total printing costs

Printer fleet optimisation can provide considerable savings across your business. Being the leading solution provider in Great Britain, ProcessFlows UK Ltd is a premium Nuance partner for the UK and Ireland. We are the exclusive Safecom distributor for South Europe and the Middle East. Email or call 01962 280258 for more information about Safecom print management, technical and pre-sales support.

Calling all SketchUp users: Help Trimble improve SketchUp 2014

June 25th, 2013 by ProcessFlows

Last week John Bacus, the Product Manager for SketchUp, announced the new session of “post-launch, pre-development introspection” and asked his followers on Google Plus the following: “What do you think we should be working on for the next version of SketchUp and why is that important to your work?”

The SketchUp team traditionally strives to implement users requests and now with the yearly release cycles, it’s again calling for users to suggest improvements for the 2014 release of the leading CAD tool.

The full text of Bacus’s post on Google Plus reads the following:

Hi everybody,

In the weeks following the release of SketchUp 8, we had a lively discussion about what the SketchUp team should be working on next. While a user base of 30 million people or so using SketchUp in every way imaginable will never all have the same requirements, there was some convergence last time on a couple basic requests.

The majority of folks who responded asked for better support for finding and installing Ruby extensions. Our developers wanted API improvements so they could write better extensions. Folks who make drawings for a living wanted better tools for drafting. Folks who make renderings for a living wanted better tools for working with rendering engines. There were also dozens of good ideas about basic toolbar management and other such things in the UI. We had many requests for improvement in model interoperability with other applications.

And of course everyone always wants the whole system to run ever faster on ever larger models. That’s a fixture of every release we’ve ever done. Specific technologies that have captured folks’ attention in recent years include “64-bit” and “multicore”, but performance is always on our development agenda— no matter we choose as the supporting technology.

We got to some of this in SU2013, but of course didn’t get to everything. Some of what we didn’t get to we’d like to do ‘someday’ and some of it we may ‘never’ do. Some of it we are already working on… but it will take a long time to finish. Regardless where we are on our internal roadmap, the discussion here is always good.

So let’s kick this thing off… what do you think we should be working on next and why is that important to your work?


So SketchUp users, now is your chance to have your say and help the team drive SketchUp 2014 to the next level.

Software Paradise is an authorised SketchUp reseller. For more information about the new SketchUp release, please contact our certified sales representitive Iva – .

 We can source any software for you! Please email us for more information or call us at +44 (0)1962 659168. Quotations submitted within an hour!

Cyber Security: A Fresh Approach

June 25th, 2013 by ProcessFlows

The topic of cyber security is growing exponentially each year as we commit more of our lives to the interconnected world of cyber space. As a result the threats and exploits pitched against us have grown to match. Our initial response to these threats was to “lock” the user down by limiting their ability to carry out many very basic operations whilst using their PC or workstation on the network. We are now beginning to understand that to make our responses effective to the threats posed we have to deploy systems and approaches that do not force the user to change the way they work or to impose steps too onerous in steering the user from insecure to secure.

The User Factor

Humans by nature are reluctant to change and they don’t necessarily respond well to being asked to perform additional tasks to aid security. Especially if they are seen to impede the speed with which they can complete what they see as a mundane and security irrelevant task. In fact if confronted by such systems they become “poacher not gamekeeper”, subverting the very systems put in place to protect them and their employers. User non-compliance with security systems already in place have become a common denominator in security breaches.

To counter the threats posed in today’s cyber space, it has become the accepted wisdom that both software engineers and cyber security proponents need to factor in the human response to the systems deployed. The psychology of the user is as an important a consideration as for instance which encryption algorithm is to be used.

Identifying the Threats

The threats posed to our networks are various:

  • Threats are both inbound and outbound.
  • Inbound threats encompass those that wish to disrupt the service, steal the data and corrupt or delete files.
  • Whilst outbound threats are those which seek to steal our information and or subvert our communications.

Outbound threats are arguably the hardest to defend against, since these will be perpetrated by insiders, people we trust to have access to our systems. Either deliberately or by accident. The most secure of networks is rendered insecure if the users write their passwords on “Post-it Notes” and stick them on their monitors. The user is the weakest link! Grant Morrison when writing “The Invisibles” put it this way;

“Chaos sneaks in every time. They can cover the world with surveillance cameras, but they can’t stop the guys in the monitor rooms from jerking off or playing the fifteenth sequel to “Doom” for the hundredth time.”

Countering the Threat

Often what it all boils down to is deploying some sound common sense along with your security products and procedures. There are some basics to consider and take action on:

  • Only allow access to data and resources that are required by the individual to carryout their legitimate daily tasks.
  • Identify if the user is required to be able to copy data off the network.
  • Should the user have access to plug ‘n play devices, such as thumb drives?
  • If the user has access to plug ‘n play devices should the flow of files be one way, either in or out?
  • Once data is stored on a removable device control where that device can be used within or outside of the network.
  • Establish an audit trail for data leaving the network.

Technologies are emerging that provide this level of security but nothing will stop the legitimate user sitting next to the unauthorised user and allowing them to read or photograph the on screen output. Or am I becoming paranoid at this stage?


We have a duty of care to protect the data we store, in some cases this need to protect that data is prescribed by law. The informed response in 2013 is not to look at cyber security or for that matter any security in isolation, a holistic approach is what is required. A good marriage between systems and common sense is essential. There are many third party companies operating in the information security consultancy business, be sure you select one with independently trained and certified consultants.

This is a guest article, submitted by Paul Simms at Reflect Digital

We can source any software for you! Please email us for more information or call us at +44 (0)1962 659168. Quotations submitted within an hour!