Posts

Google Gemini Licensing Explained

Gemini Licensing Explained

Google’s recent announcement that Google Gemini is now a core service within Google Workspace has led to some confusion regarding the distinction between the Gemini App and Gemini for Google Workspace and your Gemini licensing options.

This blog post provides clarity on the products and their pricing.

The Gemini App

The Gemini App runs at gemini.google.com. There are two versions of the Gemini App: Gemini and Gemini Advanced.

Gemini is free and runs as a web app and a Chrome extension. It offers a range of features, including: 

  • Summarization
  • Translation
  • Q&A
  • Brainstorming
  • Writing suggestions

Gemini integrates with other Google apps and is free to use.

Gemini Advanced is a stand-alone paid service, and it is included as a core service in most Google Workspace subscriptions. It offers all of the features of Gemini, plus:

  • Access to a larger language model
  • The ability to create custom models
  • More robust image generation
  • Priority support

If you have Google Workspace, Gemini Advanced is included as a core service at no additional cost. Stand-alone access to Gemini Advanced costs $19.99 per month and requires a Google One account for security.

Gemini for Google Workspace

Gemini for Google Workspace is an add-on to Google Workspace that brings Gemini directly into Gmail, Drive, Docs, Sheets, and Meets.  Integrations into Chat and other Google Workspace apps are expected in the near future.

Pricing depends on your Google Workspace subscription tier. With an annual commitment, Gemini for Google Workspace pricing is as follows:

  • Business Tier: $20/user/month 
  • Enterprise Tier: $30/user/month

You can subscribe on a month-to-month basis for $24 and $36 per user, respectively.

Gemini for Google Workspace for Education has two pricing options with an annual commitment:

  • Gemini Education: $16/user/month
  • Gemini Education Premium: $24/user/month

Your Next Step:

Give Gemini a try. For a limited time, we are offering a Gemini $10 Trial for Google Workspace clients that includes Gemini Advanced, Gemini for Google Workspace, and learning tools.

Google occasionally offers free trials and incentive discounts. Schedule a quick consultation to discuss your specific Gemini licensing options. Our Cloud Advisors will help you navigate offers, options, and pricing.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America. Starting his first business at age 12, Allen is a serial entrepreneur. He has launched strategic IT consulting, software, and service companies. An advocate for small and midsize businesses, Allen served on the board of the former Smaller Business Association of New England, local economic development committees, and industry advisory boards.

Pragmatic Security: Balancing Security Measures for Small Businesses

Security vs UsabilityWhile on vacation recently, I did something that I did not think has been possible since July 1970. I boarded a commercial airline flight without having to go through security. No ID check. No metal detectors. The gate agent scanned the barcode on my ticket and I walked on board. The experience was, at first, confusing as I went from curb to gate with no security checks. I asked the gate agent why there was no security check; the answer was pragmatic security.

Pragmatic Security in Action

Airport security intends to prevent hijackings. I was traveling in New Zealand, which you know is an island country.  The nearest country, Australia, is at least a 3½  hour flight by jet. My plane was a dual engine turboprop with about 70 seats with and a range of 930 miles. It is impossible for the plane to leave the country.

Hijacking a regional flight in New Zealand is pointless, as you cannot escape the country. The security risk is miniscule.

In New Zealand, flights on regional planes do not have (or need) security checks. To board a jet, however, you will board at a “jet gate” having passed through all of the common security and ID checks.

Pragmatic Security for Your Small Business

The concept of pragmatic security also applies to IT and cybersecurity. Not every business needs every security measure. We can, and should, scale our IT and cyber security to meet our needs and priorities.

That said, the baseline has changed. In New Zealand, the baseline security for flights is that the customer has a ticket.  For smaller businesses, the historical baseline has been “a secure firewall/router, antivirus software, and email filters for spam.”

As we have discussed in other Security Update Series blog posts, we face new security demands from customers, insurance providers, and regulators. As cybersecurity risks increase, so do the solutions we need to implement.

Pragmatically: How Much Security is Enough?

While the answer varies based on your business needs, risks, and priorities, our Security CPR model provides a solid baseline. We are also proponents of understanding risks. As we discussed in this blog post, focusing on the most prevalent risks and the most damaging risks is the best place to start.  Designing your security solutions from these two angles provides a solid baseline of protections. Additional measures can be added as needed to meet industry or regulatory requirements.

Call to Action:

If you have not done so already, a baseline security assessment is a good place to start. Our Rapid Security Assessment provides a quick review of core security services. And our Cloud Advisors are ready to assist with any questions or concerns.

Contact us or schedule time with one of our Cloud Advisors

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America. Starting his first business at age 12, Allen is a serial entrepreneur. He has launched strategic IT consulting, software, and service companies. An advocate for small and midsize businesses, Allen served on the board of the former Smaller Business Association of New England, local economic development committees, and industry advisory boards.

IT Solutions: 3 You Can Live Without

Business Continuity & Protection

With continued, rapid change and evolution of the cloud services and capabilities, we hear that we “need” many things. The reality, however, is that many of the “solutions” being hyped are not really needed. In our recent blog post, we offered three IT solutions you need. But in this blog post, we will share three solutions you can do without.

1 3rd Party Conference Tools

Both Microsoft and Google Workspace, with Teams and Meet, include robust audio and video conferencing services. There was a time when third-party services like Zoom offered unique features. However, capabilities such as transcription, translation, break-out rooms, and Q&A panels are now a part of Teams and Meet.

Notably, some of the advanced features of Teams and Meet, such as streaming, come with upgraded Microsoft 365 and Google Workspace licenses. These upgrades are generally less expensive than third-party services.

2 Physical Desk Phones

While some of us may have an emotional attachment to the physical phone on our desks, for many, these devices feel like clutter. The way we make and receive calls has changed. Our devices should change as well.

Features like hot links, click-to-dial, and voice dialing are available within the apps and browsers on our computers and phones. Smartphone apps let us make and receive business calls without sharing our personal phone numbers and maintaining separation between personal and business text messaging and voicemail.

Headsets and speaker/microphones give us hands-free access to our phone systems at our desks, from our smartphones, and in our cars and trucks.

3 Unsecure Artificial Intelligence

You do not need unsecure AI. Even so, you and your team likely want to use it.

Chances are, you and members of your team may already be using Chat-GPT, AI meeting assistants, and other AI-powered tools.

The challenge is that most public AI tools are not secure. Using them likely violates confidentiality and nondisclosure clauses in contracts. Using them may also put you in violation of HIPAA, PCI, and other data privacy laws and regulations.

Before jumping into AI as a company, and before “Shadow AI” (unvetted tools) gets out of hand, develop an AI strategy and plan. Begin with identifying use cases and understanding how to ensure data security, privacy, and compliance. Pilot solutions and educate/train your team.

Copilot and Gemini AI both offer artificial intelligence tools that integrate with Microsoft 365 and Google Workspace, respectively. These are secure tools that use the permissions capabilities of the ecosystems. 

What to Do:

Contact us or schedule time with one of our Cloud Advisors. Without obligation, we are happy to discuss your business and IT services. We can also map out opportunities to save money and leverage AI, along with other emerging technologies.

If you are interested in three solutions you need, jump over to this post.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America. Starting his first business at age 12, Allen is a serial entrepreneur. He has launched strategic IT consulting, software, and service companies. An advocate for small and midsize businesses, Allen served on the board of the former Smaller Business Association of New England, local economic development committees, and industry advisory boards.

AI and Privacy Issues: Data Leaks and Breaches

We recently posted about the AI warning we received from a partner about the use of AI tools and protecting their confidential information. Beyond the specifics of the warning, we quickly saw a much broader context. Using AI tools, if not managed carefully, will result in unauthorized data disclosures, breaches, or leaks. These disclosures may easily violate laws, regulations, industry standards, and contractual obligations. Before exposing your business to unnecessary liabilities, understand how your AI tools and services manage, and ensure, data privacy.

Scope of the AI and Privacy Problem

To gain a better sense of the issue, we decided to look into the data privacy practices of meeting assistants.  Meeting assistants are one of the most commonly used AI tools for small and midsize businesses.  Traditional meeting assistant tools transcribe discussions. Newer versions use AI engines to capture action items, summarize discussion points, and analyze the attitudes and sentiments of participants. We reviewed the terms of service, privacy policies, and FAQs for several services.

Here are some excerpts from our findings (company and service names redacted):

AI Terms of Service

Do not use the service if you need to keep protected or confidential information private:

You hereby represent and warrant to [Company] that your User Content … (ii) will not infringe on any third party’s copyright, patent, trademark, trade secret or other proprietary right or rights of publicity, personality or privacy; (iii) will not violate any law, statute, ordinance, or regulation (including without limitation those governing export control, consumer protection, unfair competition, anti-discrimination, false advertising, anti-spam or privacy);

The [Company] is not liable if you use their services:

… the user understands and accepts the risks involved with the use of AI or similar technologies and agrees to indemnify and hold [Company] harmless for any claims, damages, or losses resulting from such usage.

Allowing an AI engine to analyze your information, or allowing a service to use your information to train their AI-based services, is a disclosure:

When you post or otherwise share User Content on or through our Services, you understand and agree that your User Content … may be visible to others

AI Privacy Policies

Using AI tools has inherent risks:

By utilizing [Company]’s services, the user understands and accepts the risks involved with the use of AI or similar technologies and agrees to indemnify and hold [Company] harmless for any claims, damages, or losses resulting from such usage.

Some tools have service options, at added costs, to ensure data privacy:

… customers that want their data to be strictly segregated (for example, customers dealing with PHI) can choose the [service] option to exercise complete control over their compute and data infrastructure, ensuring that their data is separated per their compliance requirements.

Some services explicitly tell you that sharing confidential information violates their privacy policy:

You may also post or otherwise share only Content that is nonconfidential and that you have all necessary rights to disclose.

The Risks and Challenges with AI

With justifiable concerns about data protection and privacy, we have been trained to think about data leaks and breaches in terms of cyber attacks. We also look at “insider threats,” which are often human errors such as accidentally sharing files externally or putting confidential information in an unsecured email.

The use of meeting assistants and other AI-powered productivity tools creates a new category of risk.  In order to learn and improve, AI tools need to train using information. The easiest way to provide information to train an AI tool is to capture information provided by the users.  The users get their results; the AI tool trains, learns, and improves.

While this works for the AI tool or service provider, it creates a data breach platform for the users unless the tool has specific policies and services to ensure compliance with data privacy laws and regulations. 

Using an unsecured AI meeting assistant creates an incidental, if unintentional, breach. 

Some examples of incidental breaches caused by unsecure AI meeting assistants:

  • Two doctors discuss a patient consult, disclosing personal health information (PHI) to third parties in violation of HIPAA
  • You discuss project details with one of your clients, disclosing confidential intellectual property in violation of your contract
  • Your financial advisor discusses your financial holdings and accounts with you, disclosing personally identifiable financial information in violation of industry regulations and standards

Protect Yourself and Your Business from AI and Privacy Issues

From our review of several AI meeting assistant services, very few will keep your information private. Those that do will charge additional fees.

When you get on a video meeting or conference call, ask the host if their meeting assistant is secure. If not, or if they are unsure, ask them to turn it off.

More generally, take a step back and plan your approach to AI.

  • Consider how and when you want to use AI in your business
  • Make sure you and your team understand your contractual and regulatory responsibilities with respect to information privacy
  • Assess the AI tools and services you plan to use:
    • Understand their data privacy commitments
    • Match privacy policies and commitments against your business and legal requirements
    • Opt-in to agreements that ensure data privacy, even if it requires paying for the service,

With an understanding of your requirements and AI services, AI can add value to your business without introducing significant avoidable risk.

We Can Help

To discuss your technology service needs and plans, click here to schedule a call with a Cloud Advisor or send us an email.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America. Starting his first business at age 12, Allen is a serial entrepreneur. He has launched strategic IT consulting, software, and service companies. An advocate for small and midsize businesses, Allen served on the board of the former Smaller Business Association of New England, local economic development committees, and industry advisory boards.

Our First AI Warning: Why Using AI Services Can Breach Your Contracts

We recently received our first AI Warning. This was not a a general warning such as, “anything built for good can be use for evil” or “AI can replace you.” We received a direct warning about specific uses of artificial intelligence services and our contracts. The warning we received applies to you as well.

Some Background About this AI Warning

Cumulus Global is known for our professional services, including our ability to successfully manage cloud migrations from a variety of local environments. We often provide these services to other technology firms that need our expertise and experience to solve specific client needs. We have standing partnership agreements with several of these firms.

The AI Warning came from one of our partners.

The AI Warning

The warning we received centered on our potential use of AI services and the implication for confidential information belonging to our partner and their clients. The warning stated that providing this data to any AI system or tool is a likely violation of our contract, confidentiality, and non-disclosure agreements.

Specifically:

  • Providing confidential information to any AI system or tool is an authorized disclosure unless we have a contractual agreement in place with the AI vendor that ensures all data remains private and confidential.
  • The use of any confidential information for feeding or training AI system or tool is considered an authorized disclosure. Even if the AI system or tool is private the confidential information will be used outside the scope of any project, work, or need.

In addition to clearly defining limits on the use of their data with AI services, the warning included the company’s intent to pursue any and all contractual and legal methods to prevent, or in response to, disclosures.

Bigger Context

While this AI warning was specific to one business relationship, we see a bigger context. The current flood of AI services is exciting, and the potential uses and benefits are great. If we want to engage, however, we need to be careful. Whether we are deliberately training an AI system or creating prompts and providing feedback to refine answers, we are placing information in the hands of others. Unless we take explicit steps to ensure privacy with AI tools, our expectation must be that the information we provide will be used train the AI service, effectively placing the information in the public domain.

We must also recognize that the generative nature of AI increases the risk of improper disclosure. While we may not intend to disclose information, AI engines can recognize and correlate information. In other words, AI services can piece together data to create and share  information that should be private.

Your Action Plan to Prevent AI Issues

Take a step back and plan your approach to AI.

  • Consider how and when you want to use AI in your business
  • Make sure you, and your team, understand your contractual and regulatory responsibilities with respect to information privacy
  • Assess the AI tools and services you plan to use;
    • Understand their data privacy commitments
    • Match privacy polices and commitments against your business and legal requirements
    • Opt-in to agreements, even if it requires paying for the service, that ensure data privacy

With an understanding of your requirements and AI services, AI can add value to your business without introducing significant avoidable risk.

We Can Help

To discuss your technology service needs and plans, click here to schedule a call with a Cloud Advisor or send us an email.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America. Starting his first business at age 12, Allen is a serial entrepreneur. He has launched strategic IT consulting, software, and service companies. An advocate for small and midsize businesses, Allen served on the board of the former Smaller Business Association of New England, local economic development committees, and industry advisory boards.

For 2019: Focus on Outcomes

UncertaintyAs we close out 2018, we reflect on a year that has been a bit of a wild ride.  For our customers, we clearly are leaving a period of sustained growth into more uncertain economic times. At the macro level, the economy shows competing signs of growth and contraction. Our political climate is less certain and predictable.

We Live in Uncertain Times

Economies and business climates vary by region. Taking a look at a non-scientific survey of businesses in central New England (Worcester Business Journal, Central Massachusetts Economic Forecast 2019, December 24, 2019), we get a pulse of where are are and where we may be going. We also see a new way forward for small and midsize organizations looking to weather whatever stormy or calm seas may be in our future.

  • Only 35% see the economy improving in 2019, while 65% see the economy stagnating or declining in the coming year.  This is a significant change from a year ago when 65% expected the economy to improve.
  • While the number of business leaders who believe the economy has improved over the past year is at 77%, the number of those uncertain of our current economic health more than doubled from 7% for 2018 to 15% for 2019.
  • On the positive side, the number of business leaders expecting to hire additional staff in 2019 jumped to 49% from 40% a year ago.
  • At the same time, 72% of those surveyed are “very concerned” about finding qualified talent to hire, a major increase from only 50% of hiring employers a year ago.

In short, we see the economy as having improved over the past year, but are uncertain what course it will chart in 2019.  Many of us plan on growing but are concerned about being able to find, hire, and retain the right people.

Charting a Course

Economic uncertainty can, and sometimes should, cause us to pause and re-evaluate our plans. We often see businesses reacting quickly and pulling the plug or delaying technology projects and changes. Often, these decisions make it more difficult for you to manage changes you want or need to make in order to adapt to a changing business climate. Here are some thoughts on evaluating technology decisions during changing or uncertain times.

  • Understand What is Possible
    2018 is the year in which Machine Learning, AI, and Bots came into the mainstream. These technologies can, when deployed properly, can improve operations, expand the productivity of your workforce, and mitigate operating costs.
  • Remember the Cloud
    Most small businesses have not yet fully adopted a cloud computing strategy. Cloud computing is a means to scale IT resources and costs to the size of your business without sacrificing features, capabilities, or security.
  • Focus on Outcomes
    Don’t worry about the technology, focus on the outcome. What do you want to achieve? What do you need to happen? How do you want things to be different after making a change? Understand and clearly define the endpoint, as this will drive how you define and manage the projects and changes that will get you from Point A to Point B. Let the outcome guide priorities and, subsequently, the technologies and changes needed to make a difference.
  • Balance the Quantitative and Qualitative
    Not all outcomes will have a specific dollar value.  When deciding on outcomes, consider the near-term and long-term value to your business. Employee engagement and satisfaction improves retention. Automating repetitive tasks improves productivity. Training and support improves morale and fosters innovation.
  • Consider All Opportunities
    “Cut to Survive” rarely works.  Look beyond quick hits and savings. Look for opportunities that: (1) reduce operating expenses; (2) improve team and individual productivity; (3) simplify your IT services; (4) differentiate your business in your markets; (5) help employees do their jobs better; (6) improve customer service and engagement; (7) empower team collaboration and innovation; and/or (8) help you better understand your business and the metrics that measure success.

Change, particularly in uncertain times, often come with increased risks. Deciding to invest or make changes is more difficult. Not doing anything, however, is a decision.  It is a decision to NOT actively manage how your business moves forward; it is a decision to let external forces determine your future. How you move forward may require more thought and analysis, but continue to move forward.


We are here to help!  Wondering how you can get more value from your current IT services, cloud solutions, or emerging technologies?  Contact us to schedule a complementary Cloud Advisor session. 


library

Google Gemini Quick Start Guide

eBook | Source: Cumulus Global — The value of Google Gemini depends on how well you are able to use it. This eBook provides an overview of Google Gemini, 12 things Gemini can do you your (with some examples), and limitations to consider when using Gemini.

Cyber Security Requirements for Cyber Insurance

eBook | Source: Cumulus Global — This eBook presents the minimally required, recommended, and best practice cyber security components for small and midsize businesses seeking appropriate and affordable cyber insurance.

Building a Foundation for AI Success: A Leader’s Guide

eBook | Source: Microsoft — This Whitepaper shares insights from AI leaders about the five categories that, collectively, form a foundation for AI success and for building sustainable value with AI.

Gen AI Prompts: A Primer

eBook | Source: Cumulus Global — The value of AI depends on when, why, and how you decide to use it. Better Gen AI prompts get better results. This eBook provides a model, structure, and approach to building effective Gen AI prompts that save time and effort.

Gemini for Google Workspace: Prompting Guide 101

eBook | Source: Google — This eBook provides you with the foundational skills to write effective, instructional prompts when using Gemini for Google Workspace so that you can be more productive and efficient in your day-to-day tasks.

The Total Economic Impact of Google Workspace (Forrester)

Whitepaper | Source: Forrester Consulting — A Forrester Total Economic Impact™ study, commissioned by Google, estimates that Google Workspace’s secure and collaborative environment can result in a 336% return on investment over three years.

Webcasts

Small Business Compliance Primer

(6/18/24) – For many of us, ensuring we have the right security and compliance program in place remains a challenge. A basic understanding of security and compliance will inform and guide your security priorities, plans, investment, and results.

Gen AI Prompts and Privacy

(05/21/24) – Gen AI tools can boost your productivity or waste your time. The better your Gen AI prompts, the more effective and efficient Gen AI will be for you. The session provides and demonstrates a model for effective prompt-building.

Rethinking Google and Microsoft

(04/30/24) – As both suites evolve, and your business changes, is your choice still the best match for your business? Assessing whether Microsoft 365 or Google Workspace is the best fit for your business needs should either trigger a change or improve how you use your current services.