Back to Top

Tech, Web, Cloud & Cabling Services

Author Archives: Website Admin

Microsoft Word – Undo Automatic Indents Tip

word

Takeaway:  Creating numbered or bulleted lists would be simple with the ability to adjust or remove automatic indents.

 

Simple Solution

This simple solutions works with the current list only. If you add to this list, Word will remember the indent. When you start a new list later in the document, it won’t.

  1. Create an numbered or bulleted list.
  2. Double-click any number or bullet in the list to select all.
  3. To change the indent position:
    • Select the Decrease option in the Paragraph group (Aligning all items to the left margin)
    • Select the Increase option in the Paragraph group. (Aligning all items to the right margin)

1

Entire Document Solution

3

The entire document solution will adjust the settings for all numbered/bulleted lists in the document.  Instructions below will default the list to be aligned at the left margin (0), you can adjust accordingly.

  1. Create an numbered or bulleted list.
  2. Double-click any number or bullet in the list to select all.
  3. Right-click the selection; select Adjust List Indents.2a
  4. The Adjust List Indents window opens.
    • Number Position:  0 (Where the numbers / bullets will align.)
    • Text Indent:  .25 (Space between numbers/bullets and text.) 

 

10 Purchases for Small & Medium-Size Businesses

Saving-Money

Small and Medium-Size Businesses (SMBs) will often take shortcuts to cut costs when purchasing.  To avoid disasters such as a loss of data or work, SMBs are strongly suggested to focus on the ten points below.

Hardware

Considering the rapid change of technology requirements, a pro-active approach for replacing desktops, laptops, servers, and networking hardware is to look five years into the future.

Backup Software

Although built-in backup software and Windows Server backup are adequate, purchasing a third-party backup solution will have the ability to recover from an image.

Internet Connection

Providing your SMB with a consumer-grade DSL line would not be an efficient business plan. Setting up a network that provides your business with more bandwidth than required will prevent a network bottleneck from occuring.

Firewall

Securing your business with only Windows built-in firewall is not ideal.  Configuring a Cisco, Fortinet, or Sonicwall is more secure, reliable and flexible in a SMB environment.

Cloud Storage

Cloud storage provides scalability, reliability and portability.  Cloud storage is divided into three categories:  Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).  Many companies are transferring to Cloud services for access to data outside the network.

Website

Online presence has become an important key for all businesses.  A solid solution is to have a strong website, blogging and effectively using social media.

Redundancy

Redundancy is an appropriate investment towards ensuring that your SMBs network does not go down.  Similar to backups, redundancy does not affect everyday business but should an incident arise, you’ll be glad it’s there.

Support

IT Support is a necessity, whether it’s an in-house department, third-party service provider, or support for software.

Mobile Devices

The ability to work from outside the office and accessing data from anywhere  is now an important key for businesses.  Setting up a virtual private network enables laptops, tablets and smartphones to connect and work from anywhere.

Printers

Supply your SMB with a printer that has the sustainability and features required for business use.

 

Apple: Larger Screens for iPhones & iPads

Apple-LogoApple, Inc. offers innovative products that continue to grow its customer base.  Testing new designs for current products is a consistent task for Apple, Inc.

“Apple has been slow to react to consumer desire for larger smartphone screens, [and] entry level price points on new phones,” said BGC Financial’s Colin Gillis. “Waiting and waiting, for the new products to launch, has become painful,” he wrote.

Currently, Apple is testing various sizes for iPhone and iPad screens.  Samsung has become the world’s largest smartphone maker because Samsung offers a variety of smartphones with display sizes that range up to 5.5-inches.   Continuing to compete with Samsung, Apple is testing for a 5-inch iPhone screen expected to be released in 2014.

A new tablet design is also being tested by Apple with a display that is a little less than 13-inches.  This would be a great addition to the iPad that has a 9.7-inch display and the iPad Mini that has a 7.8-inch display.

Lastly, Apple has been developing an iPhone that would be cheaper than the current iPhone.  According to many articles, the cheaper iPhone will be made from plastic instead of the traditional metal casing that will be available in different colors.

Apple, Inc. could climb back to the top of both smartphone and tablet sales by releasing a larger display for the iPhone/iPad and releasing an iPhone that is reasonably priced.

 

Microsoft – What went wrong?

ET83-screen[1]Touch 10 MonitorMicrosoft has always been key player in the Technology world.  In 2009, Microsoft released Windows 7, for many users it became the best operating system yet.  Not too long after the release of Windows 7, Microsoft predicted that “touch-screens” were the future of technology and focused all of their resources in one place.

On October 26, 2012, Microsoft released their Windows 8 OS and their first tablet, the Surface RT.  Shortly thereafter, on February 9, 2013, Microsoft released the second tablet, the Surface Pro.  For more information regarding the Surface RT or the Surface Pro, click here

“A Windows 8-based PC is really a new kind of device, one that scales from touch-only small screens through to large screens, with or without a keyboard and mouse,” said Julie Larson-Green from Microsoft.

Apple and Android touchscreen devices have been very successful because they are useful on-the-go.  Trying to compete with Apple and Android, Microsoft developed Windows 8, a touch-oriented OS.  Many desktop and laptop users have had problems adjusting to the new OS.   Also, the Surface Tablet users are having trouble adjusting to this device and OS because it is a touch-enabled laptop.  Using the touchscreen features on a laptop is not convenient and very uncomfortable.

How long will it take for Microsoft to regain its position in the technology world?

 

5 Steps to Keep Personal Data Safe

Takeaway: Managing personal data can be risky and expensive for organizations.

Untitled“As the amount of personal information increases multifold, individuals and their personal data will increasingly become a security target. And, yet in most scenarios the organization is still ultimately accountable for the personal data on its IT systems,” said Carsten Casper, research vice president at Gartner, Inc.

Gartner, Inc. has a five step plan to create an exit strategy:

Step 1:  

The first step to preparing a strategy for transporting personal data is to distinguish personal data from non-personal data.

Step 2:  

Once personal data is distinguished, it will need protection. Ways to protect data are:

    • Encryption
    • Virtual Machines
    • Secure Apps
    • Mobile Data Management Products
    • & many more options.

Step 3:  

Next step is to use Human Resource (HR), Customer Relationship Managment (CRM) and Enterprise Resource Planning (ERP) programs that specialize in organizing and storing personal data.

Step 4:  

The most problematic task is guaranteeing that an organization will obey privacy standards for the transfer of personal data which is Gartner’s fourth step.  

Step 5:  

Create a practical method of discussing  Cloud computing including laws and jurisdictions for the physical location and logical location of stored personal data.

 

ActiveSync Limits – Exchange 2010 SP1

es10sp1

Exchange 2010 Service Pack 1 restricts the number of ActiveSync devices (=EAS PartnerShips) by setting the default to allow up to only 10 devices.  This default helps eliminate resources from being monopolized.

Limiting ActiveSync devices is for the new feature “Throttling” which manages Exchange performance. Throttling enforces bandwidth limits by tracking consumed resources per user.

Run command in cmdlet to adjust ActiveSync limits:

 Set-ThrottlingPolicy –EASMaxDevices # –Identity DefaultThrottlingPolicy_hex_string

  • Change # to the number of devices.
  • Run  Get-ThrottlingPolicy to find out the hex_string identity.

 

Features the iPhone Could Use

Untitled2

iPhone 5 is the fastest, thinnest and lightest iPhone;  nevertheless many features remain absent that are provided by Apple’s competitors. 

NFS Built-In

Apple prefers to use Passbook system instead of Near Field Communication (NFC).  Passbook is not capable of performing all tasks that NFC can handle such as the ability to beam content by touching devices or send money via PayPal wirelessly.

Swypeswype-symbian

“Swype is a faster and easier way to input text on any screen.”

Swype gives your phone the capability to input text by sliding your finger from letter to letter accross the screen.  Only Android smartphones offer this input ability.

SD Cards

iPhone’s are not built to extend device storage using external SD Cards, Micro SD Cards or Mini SD Cards.

Storage

Many iPhone user’s have replaced their iPod’s with their smartphone.  The storage capacity for an iPhone (64GB) versus an iPod Classic (160GB) is not comparable. 

USB

iPhones have never used a standard USB cable to sync.  Currently, iPhone 5 uses a new MicroDock connection that will not allow older sync cables to connect without a specific adapter.

Micro HDMIUntitled3

Android devices have a Micro-HDMI port for retrieving video from your phone. iPhone 5 requires a special adapter or an Apple TV to retrieve video.

Changing the Battery

Although, iPhone 5 provides a stronger battery, some users require more power but replacing an iPhone battery is challenging.  To replace the battery it requires a special screw driver and special tools to lift the screen 90°.

Battery Life

While the iPhone 5’s battery is larger that the iPhone 4S, it produces the same battery life because of the bigger screen and power to run 4G LTE.

Implementing BYOD

BYOD

Bring-Your-Own-Device (BYOD) is permitting employees to bring personal devices (laptops, tablets, and smart phones) to their workplace, and use those devices to access company information and applications.

Create a Private App Store

Designing a private App Store provides the ability to manage custom and purchased apps.  Businesses can manage apps by pushing mandatory apps, approving recommended apps and blocking rouge or unrelated apps.

Policy Compliance

Policies ensure security, productivity, protection of resources and reduce risks.  Implementing a location-based service (LBS) such as Geo-Fencing and GPS will set limitations on access to data based on location.

Strong Security

There are many layers of security for a BYOD environment.  Device enrollment can be a one-time passcode and/or Active Directory credentials.  Applying user profiles will distribute policies, restrictions and Apps based on logical groups (department/location/device type).  Other types of security are tracking device locations, Remote Lock, Complete Wipe and Corporate Wipe.

Track Usage

Usage thresholds can be monitored based on talk, text, data and roaming for each user.  Setting up alerts and reports for misuse, excessive bandwidth, additional charges and security exposures will help track usage appropriately. 

Banning Rouge Devices

Compromised devices such as “jail broken” iPhone or a rooted Android should be restricted from accessing enterprise data and resources.  Compromised devices are susceptible to virus attacks.

For more information on Mobile Device Management

Contact us at 856-745-9990 or click here.

 

10 Enterprise Benefits of Windows 8.1

3

Windows 8.1 will be released on October 17, 2013, followed by a full launch on October 18, 2013.  Although Windows 8.1 is not a “new” operating system, the major updates created for 8.1 have made the upgrade more than a simple service pack.

Enterprise Benefits:

1.  Mobility

Windows 8.1 benefits a wider range of employees to include a combination of productivity and mobility.  IT can manage Windows 8.1 devices, such as desktops, laptops, and tablets, with a universal management client.

2.  Tablets

Enabled hardware for Windows 8  offers the option to have a standard operating system for enterprises, but allow individual users to select their device, such as desktops, laptops, and tablets, and have a consistent interface across these devices. 

3.  Application Development

Streamlining Windows 8.1 allow developers to design applications that can work across devices, such as desktops, laptops, tablets and smartphones.

4.  IT Support

To reduce the strain on IT resources for business mobility, standardizing on Windows 8.1 allows a majority of IT support to become simplified. 

5.  Total Savings

Standardizing on Windows 8.1 will reduce the cost for development, maintenance and support.  Also, reducing costs by eliminating licensing/support costs of a enterprise environment with varied devices.

6.  Restore Optimization

Windows 8.1 has the ability to restore factory settings for the operating system.  For all businesses, this is an advantage and a simple way to reduce costs and recover time for IT departments. 

7.  IT Operations

Windows 8.1 is a services pack for Windows 8 that includes new features, not just fixes.  Creating user documentation can be streamlined for Windows 8.1 for all applications.  Additionally, future service packs will follow in the footsteps of Windows 8.1 to include new features; then IT departments can frequently provide updates to user documentation.

8.  Reduced Confusion

To reduce user confusion, after a user joins to Windows Intune Management Service the user gains access to the Company Portal.  The company portal has access to the applications, data, and device settings.  Also, users can troubleshoot their own devices using the service desk self-help portal.

9.  Security

Microsoft is enhancing security with Windows 8.1 with Remote Business Data Removal and the new Internet Explorer.  Remote Business Data Removal provides control over encrypted data that can be wiped from any device.  The new Internet Explorer has Anti-Malware included to scan binary extensions to prevent infections.

10.  Education

Windows 8.1 offers an evaluation of current infrastructure, how to execute migrations plans and ways to educate users on how to use the new version.  Microsoft ends support for Windows XP on April 8, 2014, business should consider the option of upgrading to Windows 8.1. 

For more information regarding Windows 8.1 click here.

 

‘Zero-Day’ for Microsoft XP Users

194212

On April 10, 2012, Microsoft officially announced that as of April 8, 2014 they will end extended support for Windows XP and Office 2003, after which no new updates, hotfixes, patches or support will be issued.  “Since a security update will never become available for Windows XP to address these vulnerabilities, Windows XP will essentially have a “zero day” vulnerability forever” said Tim Rains from Microsoft.  Zero-day attacks are when attackers exploit a vulnerability before the developer is aware or can fix the problem.

Windows XP already has a notably higher infection rate than its successors Windows 7 and Windows 8.  Those preparing to continue using XP after the cut-off date, are going to be in a unpleasant situation trying to protect their intellectual property.   With Microsoft ending their support, the vendors for applications running on it will most likely end support.

Attackers will have the upper hand once Microsoft cuts off XP support and presumably will have more information than the defenders about system and application vulnerabilities.  Also, attackers will have the possibility of compromising the system and applications if they exploit the zero-day vulnerabilities.

For more information regarding Windows XP End of Life, click here.

According to NetMarketShare.com, Windows XP still has about 37 percent desktop operating system share as of June 2013.   Although it is the second most used operating system, Microsoft said that they will not be extending support for XP after April 8, 2014.

xp

To protect and upgrade your home or business

 please contact us 856-745-9990 or click here.

 

CALL US NOW!