Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

How to Cut Printing Costs by 40 Percent Using Technology

PrintCosts_759970452_400-1

As IT administrators, we spend our days securing networks and managing cloud migrations, yet one of the biggest budget leaks often sits right in the corner of the office: the printer.

If you haven’t taken a serious look at your organization’s printing costs lately, the numbers are staggering. The average organization spends between 1 percent and 3 percent of their annual revenue on printing. That comes out to roughly $750 per employee every year. With a strategic digital transformation, however, these costs stop skyrocketing; they start vanishing.

Continue reading

Should You Pay Your Vendors and Bills with Crypto?

Crypto_392388993_400-1

One question businesses have been asking over the past couple of years is: “Is crypto a viable payment system?” With the maturity of digital asset markets and the rise of regulated stablecoins, the landscape is more professional than any time in the past, but still carries with it substantial risks. If you are considering adding digital assets to your checkout or B2B payment flow, here is the current breakdown of the pros and cons.

Continue reading

Getting a New Computer? We Can Help, Part IV


The Number of Monitors

Do you have more than one monitor for your home PC? Most people don’t, which is why having a second one is all the more interesting once you get to a work environment where it’s practically necessary. Having more than one monitor can dramatically improve your productivity by spending less time moving applications around and having multiple applications open without needlessly complicating the screen.

Utilizing multiple monitors is so common these days that most desktops will support it right out of the box. You need to check to see if your desktop comes with two or more ports first, though. You’ll see several options for connecting displays to your computer, including the following:

  • VGA/DVI: These older connections consist of a plug with little pins that need to be connected and tightened with screws. Older monitors will use these connections, but most desktops will have at least one VGA port to ensure compatibility with these connections.
  • HDMI: HDMI is the type of connection used by flat-screen televisions, modern game consoles, and Blu-Ray players. As such, you can assume that it’s pretty standard these days.
  • DisplayPort: DisplayPort is similar to HDMI, as it’s another cable that can carry video and audio. DisplayPort will eventually become the standard, but for your purposes, you might as well consider HDMI and DisplayPort the same. The only reason not to is if you look into the finer details of these cables.

Budget desktops will require that users examine how many ports are available on the device. It would stink to get the wrong kind of monitor because you thought you had a port for that particular type. Some types will also require connectors or adapters, so be sure to do your due diligence before purchasing a monitor.

Integrated Video vs Dedicated Graphics

Integrated video simply means that your computer processes video and graphics from hardware that is built in on the motherboard rather than a dedicated graphics device, like a video card. Most office PCs don’t need dedicated graphics, but they are helpful for video editing and gaming. Of course, this is also where the price starts to increase. High-end graphic cards can cost anywhere between $500 to $1,500.

Most graphic card chipsets have multiple models, and with so many companies out there selling their own brands of hardware, purchasing a graphics card might seem a little intimidating. While you don’t have to worry about things like 3D rendering or video editing (unless you’re making a gaming or video editing rig), the graphics card that comes with your desktop’s hardware will likely be adequate.

Are You Purchasing Monitors for Your Desktop?

With so many options to consider, we want to outline some of the important specs you’ll need to focus on when looking for a monitor:

  • Resolution: The resolution of a monitor is how many pixels the monitor will display. Most desktop monitors display at a 16:9 display ratio, or “widescreen.” This is the current standard, though there are other ultra-wide monitors that utilize either HD, FULL HD, Ultra HD, or 4K to break the mold.
    • HD: In a bizarre twist of fate, HD is actually the low-end of the spectrum, displaying its best on small screens. This resolution tends to be known as 720p, and it’s the go-to display for budget laptops.
    • FHD: Full HD is known as 1080p, and it’s the most common resolution you’ll see. It’s the one that you should focus on finding whenever possible.
    • UHD: Ultra HD is a pixel resolution of 3,840 x 2,160. This might not be available on low-end desktops without dedicated graphics cards, or at least integrated video that supports higher resolutions--particularly if you’re using multiple monitors.
    • 4K: 4K is technically a higher resolution that UHD, though some people think that it’s roughly the same thing. These displays are much more expensive than the average office needs, and they are only particularly useful for high-end gaming, video production, graphic design, or other visual tasks. Budget hardware often times won’t even support 4K, although this is a trend that is slowly being broken down.
  • Refresh Rate: The refresh rate is measured in milliseconds. This is a statistic that measures the speed that your monitor can update its image. High refresh rates give the impression that the time between you moving or clicking the mouse and the time it takes for the computer to register the movement is delayed. This was a much bigger problem in the past but suffice to say that it’s not as big of an issue in today’s environment, unless you are a gamer.

Coleman Technologies can help you determine the best options for your display needs. To learn more, reach out to us at (604) 513-9428.

Continue reading

What’s the Deal With the Blockchain?




What’s the Deal With the Blockchain?

With things like cryptocurrencies and NFTs flooding the public awareness, the term “blockchain” has been brought up more than a few times. However, this association hardly covers what the blockchain is or what it is capable of.

Let’s briefly review what the blockchain really is, and what the technology can do.

The Blockchain is Nothing More Than a Distributed, Immutable Ledger

So, what does this mean?

In other words, the blockchain is a means of recording information in such a way that it is effectively impossible to manipulate, as this record is replicated across the network of devices that create the blockchain. Every transaction made (a block) is recorded in this network (the chain), which means that any attempt to edit information results in a new block being created.

The only way that this information can be changed is if every single block in the chain is simultaneously altered—requiring anyone trying to change that record to infiltrate each and every device in the chain simultaneously, which potentially means hacking dozens or even hundreds of endpoints all at the same time.

This Gives the Blockchain Assorted Advantages

For example…

The Blockchain is Very Secure

The distributed nature of the blockchain, and the fact that it relies on digital signatures, makes the prospect of fraud nearly impossible due to the scale of the network and the need for the digital signatures in order to change data as well.

The Blockchain Enables Automation

Transactions can be set up to be completed when different triggers are fulfilled, allowing you to focus on other matters with the confidence that the blockchain will attend to what you have previously instructed it to do.

The Blockchain Saves Time

Finally, while many traditional transactions need to go through numerous, time-consuming steps, the blockchain can reduce the time you need to spend on these processes from days to mere minutes.

How Can Your Business Put Blockchain to Use?

There are actually quite a few ways that the blockchain can be used by businesses of all sizes, from supply chain management, smart contracts, and others. Reach out to us to learn more about how you can use various technologies with our help to benefit your business. Give us a call at (604) 513-9428.

Continue reading

How Faster Internet Speeds Can Improve Your Business




How Faster Internet Speeds Can Improve Your Business

The past several years have brought about dramatic increases in internet speeds, further fueling online activity and allowing businesses to innovate in all kinds of ways. Here are five of the best benefits that these increased Internet speeds have brought about for small and medium-sized businesses.

Increased Productivity and Collaboration

Slow Internet connections have historically prevented businesses from operating in ways that would improve productivity, such as communication, data transfer, and cloud-based tools. With faster Internet connections, employees can share large files and collaborate more efficiently. This gives companies a leg up on their competitors and allows remote teams to collaborate in-office or otherwise.

Better Customer Experiences

Anything that improves your company’s ability to interact with and respond to customer needs can help your business grow. Faster Internet speeds can reduce website load times and ensure that online transactions take place without a hitch. Often, the connection speed can make all the difference in making a sale or selling a product.

Advanced Technology Integration

Bandwidth is a vital resource for businesses hoping to use the latest technologies, like the Internet of Things and artificial intelligence (AI). Higher Internet speeds grant your organization access to more of this resource and allow for more efficient and streamlined operations.

Cloud Services and Remote Work

With cloud computing and remote work becoming a considerable force in today’s interconnected world, fast and stable Internet connections are more important than ever. High-speed Internet gives companies the ability to host cloud-based applications and services with minimal downside. This promotes remote work and minimizes latency. 

Lower Costs and Improved Security

With faster Internet speeds, your organization can take advantage of cost savings and greater security measures than before. Businesses will be able to fully use their Internet connections to their greatest potential through advanced cloud services, which are generally more budget-friendly and flexible enough to suit the needs of just about any organization. Furthermore, faster security updates through Internet connections means better security in general.

If you are concerned about your Internet connection, we can offer you opportunities to improve its speeds, quality, and stability. Contact us today at (604) 513-9428 to learn more.

Continue reading

How to Tell Your Business’ Technology Needs an Upgrade




How to Tell Your Business’ Technology Needs an Upgrade

Do your employees have a hard time with the technology that you’ve provided them? Are your digitization efforts lagging behind? Are the systems your business is using coming up on their end of support date? Old technology can cause major problems for a business. In this week’s blog, we go through some of the signs that you may need to upgrade your business’ technology.

Your Technology Is Slow

One of the most frustrating things any employee can deal with is a work computer that takes significantly longer than their personal computer to load up and function. The longer a computer is used, the slower it will become. If your computer is approaching the five-year mark and the person using it is constantly complaining that it is a hindrance to their ability to be productive (not to mention run more advanced applications that your business may use), it is probably time to consider an upgrade of that particular machine. 

For more centralized computing, you should keep in mind that we recommend that you start considering your server refresh at the four-year mark. While you can probably continue using that technology for years after that, you need to start considering a server upgrade because it takes some time to pull the trigger on large technology expenses and services. 

Your Company Is Growing Fast

If your company is experiencing a boom in growth, getting technology into your employees’ hands comes with the territory; and, it can start to become an issue. Not only do your employees need different types of technology, as your business grows this will become an even bigger issue, as presumably the array of different job-related tasks will diversify. 

Another issue is that if you’ve found success with older software (often called legacy), you may find it more difficult to purchase new hardware that is compatible with the older software. Of course, there are options to rent server space in the cloud to accommodate this demand, but there are other issues you then have to consider. Most businesses that maintain an upward trajectory find ways for their technology to grow with their business. 

You Have a Remote Workforce

Managing a remote workforce is a lot different than managing people that come to a central location five days a week. It becomes an issue to get everyone on your team the technology they need. In this case, obtaining resources in the cloud makes a lot of sense. Today, you can get nearly any computing your company needs through cloud-hosted offerings. 

Since the average cloud platform cuts computing and support costs by around a third, it creates a situation where an organization that has distributed employees will prioritize cloud computing due to the ease in which they can deploy required resources, the ability for access from nearly anywhere, and the built in management and support that you get when you purchase SaaS applications.

Ultimately, new technology can allow you to do more, build a more efficient and productive business, and do so with whatever workforce you feel comfortable utilizing. At Coleman Technologies, our IT experts can help you procure and integrate your new technologies and help you manage your entire business IT infrastructure. Give us a call today at (604) 513-9428 to learn more.

Continue reading

Artificial Intelligence Will Be Assisting Cybercriminals


We aren’t alone in believing so, either. A recent study examined twenty such AI-integrating cybercrimes to see where the biggest threats would lie.  

Here, we’re looking at the results of this study to see what predictions can be made about the next 15 years where AI-enhanced crime is concerned. Here’s a sneak preview: Deepfakes (fake videos of celebrities and political figures) will be very believable, which is very bad.

The Process

To compile their study, researchers identified 20 threat categories from academic papers, current events, pop culture, and other media to establish how AI could be harnessed. These categories were then reviewed and ranked during a conference attended by subject matter experts from academia, law enforcement, government and defense, and the public sector. These deliberations resulted in a catalogue of potential AI-based threats, evaluated based on four considerations:

  • Expected harm to the victim, whether in terms of financial loss or loss of trust.
  • Profit that could be generated by the perpetrator, whether in terms of capital or some other motivation. This can often overlap with harm.
  • An attack’s achievability, as in how feasible it would be to commit the crime in terms of required expense, technical difficulty, and other assorted obstacles.
  • The attack’s defeatability, or how challenging it would be to overcome, prevent, or neuter.

Split amongst themselves, the group ranked the collection of threats to create a bell-curve distribution through q-sorting. Less-severe threats and attacks fell to the left, while the biggest dangers were organized to the right.

When the group came back together, their distributions were compiled to create their conclusive diagram.

How Artificial Intelligence Cooperates with Criminality

In and of itself, the concept of crime is a very diverse one. A crime could potentially be committed against assorted targets, for several different motivating reasons, and the impact that the crime has upon its victims could be just as assorted. Bringing AI to the party—either in practice or even as an idea—only introduces an additional variable.

Having said that, some crimes are much better suited to AI than others are. Sure, we have pretty advanced robotics at this point, but that doesn’t mean that using AI to create assault-and-battery-bots is a better option for a cybercriminal than a simple phishing attack would be. Not only is phishing considerably simpler to do, there are far more opportunities to profit from it. Unless there is a very specific purpose to a crime, AI seems most effective in the criminal sense when used repeatedly, on a wide scope.

This has also made cybercrime an all-but-legitimate industry. When data is just as valuable as any physical good, AI becomes a powerful tool for criminals, and a significant threat to the rest of us.

One of the authors of the study we are discussing, Professor Lewis Griffin of UCL Computer Science, put the importance of such endeavors as follows: “As the capabilities of AI-based technologies expand, so too has their potential for criminal exploitation. To adequately prepare for possible AI threats, we need to identify what these threats might be, and how they may impact our lives.”

The Results of the Study

When the conference had concluded, the assembly of experts had generated a bell curve that ranked 20 threats, breaking each down by describing the severity of the four considerations listed above—specifically, whether or not they were to a criminal’s benefit. Threats were grouped in the bell curve based on similar severity, and so the results neatly split into three categories:

Low Threats

As you might imagine, those crimes ranked as low threats suggested little value to the cybercriminal, creating little harm and bringing no profit while being difficult to pull off and easy to overcome. In ascending order, the conference ranked low threats as such:


  • 1. Forgery
  • 2. AI-assisted stalking and AI-authored fake reviews
  • 3. Bias exploitation to manipulate online algorithms, burglar bots, and evading AI detection

(In case you were wondering, “burglar bots” referred to the practice of using small remote drones to assist with a physical break-in by stealing keys and the like.)

Medium Threats

Overall, these threats leveled themselves out. The considerations for most canceled each other out, generally providing no advantage or disadvantage to the cybercriminal. The threats included here were as follows:


  • 4. Market bombing to manipulate financial markets through trade manipulation, tricking face recognition software, blocking essential online services through online eviction, and utilizing autonomous drones for smuggling and interfering with transport.
  • 5. Learning-based cyberattacks (or an artificially intelligent distributed denial of service attack), fake AI sold in a snake oil misrepresented service, data poisoning by injecting false numbers, and hijacked military robots.

High Threats

Finally, we come to those AI-based attacks that the experts felt the most concerned about as sources of real damage. These columns broke down as such:


  • 6. AI being used to author fake news, blackmail on a wide scale, and disrupting systems normally controlled by AI.
  • 7. Tailored phishing attacks (what we call spear phishing) and weaponized driverless vehicles.
  • 8. Audio/visual impersonation, also referred to as Deepfakes.

Deepfakes are a digital recreation of someone’s appearance to make it appear as though they said or did something that they didn’t or were present somewhere that they never were. You can find plenty of examples on YouTube of Deepfakes of various quality. Viewing them, it is easy to see how inflammatory and damaging to someone’s reputation a well-made Deepfake could prove to be.

Don’t Underestimate Any Cyberattack

Of course, now that we’ve gone over these threats and described how much of a practical threat they really are, it is important that we remind ourselves that all of these threats could damage a business in some way, shape, or form. We also can’t fool ourselves into thinking that these threats must be staged with AI. Human beings could also be responsible for most of them, which makes them no less of a threat to businesses.

It is crucial that we keep this in mind as we work to secure our businesses as we continue to operate them.

As more and more business opportunities can be found online, more and more threats have followed them. Keeping your business protected from them—whether AI is involved or not—is crucial to its success.

Coleman Technologies can help you keep your business safe from all manner of threats. To find out more about the solutions we can offer to benefit your operations and their security, give us a call at (604) 513-9428.

Continue reading

Sports Franchises All-In on Data Analytics




Sports Franchises All-In on Data Analytics

Sports franchises have changed the way they use data to help them strategize. In the past, businesses used basic scouting to find and develop talent, but with the use of advanced analytics, not only can sports franchises improve their talent bases, they can save money and build a competitive advantage over organizations that aren’t so analytically inclined. 

Enhanced Analytics

The field of sports analytics combines statistical analysis, data processing, and predictive modeling to build competitive superiority. In fact, more and more teams are enhancing the way they view data as franchises that were at the forefront of this strategy have found success using them. Improvements in sensor technology gives teams the ability to measure anything to help with team construction, individual performance, and what sells the best at the concession stands. 

Data-Driven Decision Making

With data driving organizational decision-making, teams can identify metrics to help them get the most out of their investments. By creating key performance indicators an organization can make more informed decisions using objective data rather than subjective insights, often to the benefit of the whole franchise. 

Improved Player Performance Analysis

Advanced analytics replaces some of the more basic statistics that sports franchises depended on to track player and team performance like goals scored and batting average with more advanced algorithms and statistical data that is collected using IoT sensors that give team managers a more accurate representation of the product on the field. This helps players know what to work on and helps teams construct better game plans. 

The technologies behind these major analytical improvements can work to help you make your business better as well. From measuring individual employee performance to strategizing your sales and marketing improvements to using predictive analysis to improve your standing processes, data analysis can help any business be more successful. If you would like to learn more about how to use data to improve your business, give us a call today at (604) 513-9428. 

Continue reading

The Pros and Cons of a Digital Dollar




The Pros and Cons of a Digital Dollar

The United States has seen a push for the digitization of the dollar for some time now, with a few pros and cons to consider from this shift. Let’s go over these pros and cons now, and see if there are any parallels to be found to your business.

To begin our discussion, let’s go over what’s been happening recently in terms of the legislation.

Back in March 2022, There Were a Few Pushes Towards Digitizing Currency

In addition to President Biden signing an executive order which—amongst other calls to action—called for research into a United States Central Bank Digital Currency, or CBDC, lawmakers in the House of Representatives introduced a bill—H.R. 7231, or “Electronic Currency and Secure Hardware Act”—to enable the US Treasury to create a digital dollar. This electronic currency, “coined” ECASH, would enable near-instantaneous transactions with a good chance of dramatically reduced processing fees. ECASH would not be a cryptocurrency, mind you, as CBDCs are classified differently.

This all came after the Federal Reserve tested a digital currency system codenamed Project Hamilton in February, after years of research and development by the Federal Reserve Bank of Boston and the Massachusetts Institute of Technology Digital Currency Initiative. Meant to help explore the feasibility of a CBDC design in a wide-scale implementation, Project Hamilton peaked at about 170,000 transactions per second after bottleneck. While promising, this indicates that there is still a way to go before there’s a full replacement for the reserve currency the United States currently relies on.

What are Some Benefits and Drawbacks of Fully Digital Currency?

The benefits of digital currency are considerable. Not only could transactions—even those that cross borders—be carried out effectively instantaneously, as we mentioned, United States Representative Ayanna Pressley states that it would help create wealth inclusivity for “black, brown, and low-income communities.”

Having said that, a CBDC doesn’t inherently guarantee privacy, even if zero-knowledge proof technology is in place—which allows a system to confirm that knowledge is known without actually revealing the information that is known. Essentially, you have to trust the government backing the digital dollar to keep the protections of a zero-knowledge proof active…and not to arbitrarily change your personal privacy settings. More on this in a moment.

In addition to this, Representative Steven Lynch, the primary sponsor of the ECASH Act, called out some of the infrastructural issues that could get in the way of adopting a fully digital dollar. The lack of reliable Internet service in many areas of the country is a major hurdle that Lynch hopes this bill will help the country clear.

Going back to the privacy concerns, founder and research scientist of the MIT Cryptoeconomics Lab, Christian Catalini, shared his own predictions. He foresees ECASH as a system that relies on another plastic card—albeit one with some additional functions to it—that effectively stands in for cash. Basically, by using this card, the only data shared would be the successful transfer of a payment.

However, there are some challenges that need to be addressed. For instance, in order to avoid major criminal activity, full privacy would be impossible so that the financial system isn’t an accessory to crime. In addition to this, as ECASH lacks any form of ledger whatsoever, it would require the government to issue everyone a dedicated piece of hardware to use to handle and exchange ECASH locally—again, with limits as to how much the device could hold at once. It also is yet to be determined how funds would be added to the device, and if some form of identity authentication would be required to do so.

Catalini expects that these challenges will cause ECASH or whatever we ultimately get to be delayed for at least five years, with the various philosophical and technical questions likely pushing this delay out even further.

In the Meantime, We’d Love to Hear Your Thoughts!

Don’t hesitate to comment here and weigh in on the topic. Would you prefer all of your money handling to go digital? What are some of the pros and cons you can think of? Please don’t hesitate to share, and if you have any questions about securing your business’ dollars (or using IT to make more of them) be sure to reach out to us at (604) 513-9428!

Continue reading

Tip of the Week: Technology Has Your Business Covered


Customer Service
Your customers are one of your most valuable assets, so it’s natural that you want to build a powerful bond with them. If you can’t support the products you sell to them, you’ll have a difficult time keeping your business in good standing with both current and prospective clients. Technology can help you maintain this positive relationship through the use of a ticketing system to handle customer complaints and concerns, and it also makes it easy to handle support for various services you might offer.

Social media and social networking in general provides businesses with more direct ways of interacting with consumers. Sites like Facebook and Twitter essentially offer a platform to promote a brand and knowledge base. Of course, this advantage can quickly become a detriment if it’s not managed properly, as you’re (again) dealing directly with customers--if they aren’t satisfied by your interaction, they’re more likely to share it and complicate public relations.

Productivity
To be successful as a business, you have to accrue money somehow. This is where productivity comes in--technology helps by enabling workers to get more done throughout the workday, building more value for your organization in the long run. For example, time-tracking software can help with task scheduling, giving employees the opportunity to accomplish more during the time they spend in the office. Moreover, you’ll be able to assign a monetary value to the time your employees spend on various tasks and streamline their work processes.

Many of today’s most helpful technology solutions come with built-in productivity solutions that allow for collaboration through the cloud. These cloud-hosted applications provide flexibility to workers so they can communicate in the way most efficient for them. Since these solutions are flexible and scalable, your business can adjust them as needed.

Finance
Money is a big part of why you’re in business, but you can’t do anything without funding of your own. You have a bottom line to keep in mind, after all. Technology can help businesses better manage their finances through online invoicing services to collect payments and reduce paper expenses. If you use software to manage payroll and other accounts, you’ll be able to handle them easily and more efficiently. If you can streamline these processes at all, your business can run much better and you’ll be better off in the long run.

Security
Security plays a critical role in the sustainability of your business, both on your network and in your physical office. You can’t let workers or other entities waltz around your network and your office uninhibited, as the opportunity to cause major damage is practically omnipresent in today’s business world. You need to implement not only network security solutions such as antivirus, firewall, content filtering, and spam blocking technology, but physical security solutions like security cameras, biometric security locks, and other measures as well. Doing so ensures the protection of all your business’ assets, whether it’s from a hacker or a careless employee.

A lot goes into making a business successful, and technology plays a large role in doing so. How does your business use technology? Coleman Technologies can help you get started thinking about the future for your organization. To learn more, reach out to us at (604) 513-9428.

Continue reading

It’s Summer and You Have to Take Care of Your Tech




It’s Summer and You Have to Take Care of Your Tech

Summer is here, and sometimes, your technology pays the price. In today’s blog, we’ll discuss some ways to protect your tech as you travel and enjoy the nice weather.

Keeping Devices Safe While Traveling

Don't let cyber criminals ruin your summer plans. Protect your devices with these tips:

Install Updates Before You Travel

Keep your software and devices up to date to close any vulnerabilities hackers might exploit. This can also prevent the need for urgent updates using unreliable hotel Wi-Fi or mobile data.

Avoid Public Wi-Fi

Assume unknown public networks are compromised. Avoid using untrusted Wi-Fi, but if you must, ensure websites you visit use  “https://” instead of “http://” and avoid transmitting personal or sensitive information.

Backup Important Data

Backup your mobile data, such as contacts, photos, and videos, to prevent loss if your device is lost, stolen, or damaged. Sync your data with another device, like a laptop or desktop.

Activate "Find My" Features

Enable the "Find My Device" feature on your phones, tablets, and laptops. This feature allows you to track your device's location if it’s lost or stolen, as long as it’s turned on and connected to the internet.

Keeping Your Electronics Cool

Here are a few tips to keep your technology cool when it gets hot.

Provide Ventilation

To extend the lifespan of your devices, ensure they have adequate ventilation. Leave a gap of 2-to-3 inches around them and keep the vents free from obstructions. Most electronics have vents on the back or side that draw in cool air and expel hot air, so make sure these aren't blocked.

Keep Away from Heat Sources

Avoid placing your computer and other electronics in direct sunlight or near windows. Position them in the airflow of a fan or air conditioner for optimal cooling. Since heat rises, store your devices on lower levels of your home when possible.

Clean Devices Regularly

Fans in your devices help keep them cool, but dust, dirt, and hair can slow them down or cause them to stop. Use compressed air to clean out dust and keep all vents clear.

Power Down When Overheating

If a device overheats and malfunctions, turn it off and disconnect the power supply immediately. Allow it to cool down before using it again. Ensure it’s not stacked with other devices and that the area around it is clear to prevent future overheating.

To gain more insights on how to utilize technology best, keep coming back to our blog.

Continue reading

Should You Invest In the Creation of an App for Your Business?




Should You Invest In the Creation of an App for Your Business?

It seems that almost everyone owns a smartphone these days, and with smartphones come a multitude of apps. Mobile applications are the driving force behind the world's largest computing ecosystems. Consequently, the question arises, "Is it necessary for my business to have a mobile app?" Whether this is a wise decision depends on your unique business objectives, target audience, and available resources. Let’s explore the advantages and disadvantages of developing a mobile app for your business.

Here are a few advantages of developing a mobile app:

  • Enhanced Customer Engagement - Mobile apps offer a direct channel to engage with your customers, enabling personalized notifications and exclusive offers, fostering enduring customer loyalty.
  • Improved User Experience - Apps provide a smoother and more interactive user experience in comparison to mobile websites, leading to greater user satisfaction.
  • Access to Device Features - You can harness the capabilities of the device, such as the camera, GPS, and push notifications, to provide enhanced functionality.
  • Branding and Recognition - Having an app can elevate your brand's visibility and recognition, giving your business a more professional and tech-savvy image.
  • Data Collection and Monetization Opportunities - Apps offer opportunities to gather valuable data on user behavior and preferences, which can inform your business strategy. Additionally, you can generate revenue through app purchases, in-app advertising, or premium features.

Here are a few disadvantages of developing a mobile app:

  • Development and Maintenance Costs - Creating and maintaining a mobile app can be considerably more expensive than maintaining a website, especially if it needs to support multiple platforms like iOS and Android.
  • Market Saturation - There are millions of apps available, and if you operate in a market that has a lot of competition, having just another app could actually work to your business’ detriment.
  • Compatibility Issues - Ensuring that your app functions smoothly on various devices and operating system versions can be complex, necessitating continuous development to ensure updates are available for each platform. If your app becomes incompatible with newer versions of iOS or Android, it will require additional time and financial resources to update.
  • Security Concerns - Apps, especially those not in constant development, can be vulnerable to security threats. You must invest in security measures to protect user data.

Before deciding to develop a mobile app for your business, it is crucial to conduct a comprehensive cost-benefit analysis, take into account your target audience's preferences, and evaluate your long-term strategy. In some instances, a mobile-responsive website may be a more cost-effective and practical choice.

Ultimately, the decision of whether or not to invest in an app or opt for a website depends on the individual business owner's assessment of what best serves their business' needs.

Continue reading

Flip and Fold: Innovative New Smartphones


Samsung Galaxy Z Fold2

Samsung’s major contribution into the folding smartphone market is the extraordinarily expensive Galaxy Z Fold2. While the device is impressive with its two full displays and three camera sets, there are some questions about who this device is for. 

Basically the biggest benefit is that the phone opens up to a 7.6-inch tablet. That benefit is substantial, of course, but without dedicated apps for that aspect ratio, it may only be valuable for people who want the best folding smartphone on the market, which this currently is. 

When folded it has a 6.23-inch Super AMOLED screen that functions much like your standard mid-range smartphone would, but when you unfold the Fold2, you get a 7.6-inch Dynamic AMOLED display. The rest of the phone is as you would expect. It features a five-lens camera platform, a 4,500 mAh battery with fast charging, and an in-display fingerprint scanner for security. The Z Fold2 is available in Mystic Bronze, Mystic Black, and a Thom Browne Edition Grey from most major carriers. 

Samsung Galaxy Z Fold2
Body: Aluminum with plastic front andGorilla Glass 6 Back
Display: Folded: 6.23-inch Super AMOLED Unfolded: 7.6-inch Dynamic AMOLED 2X (~373 ppi)
OS: Android 10
Chipset: Qualcomm Snapdragon 865+
Memory: 12 GB RAM
Expandable Memory: No
Cameras: Rear - 12 MP (wide), 12 MP (telephoto) 2x, 12 MP (ultra wide); Front (Folded) - 10 MP (wide); Front (Unfolded) - 10 MP (wide).
Sounds: Stereo Speakers, No Headphone Jack
Battery (endurance rating): 4,500 mAh (87 hours)
Security: Fingerprint reader
Miscellaneous: Accelerometer, Gyrometer, Proximity, Barometer, Compass, Bixby assistant
Other versions: 5G version

Samsung Z Flip and Motorola RAZR 5G

Two devices that are of similar form factor are the Samsung Z Flip and the Motorola RAZR 5G. Like the flip phones of old, each of these devices fit in the palm of your hand and fold virtually in half. The difference, of course, is that today’s version of the flip phone flips into a massively powerful smartphone.

The Samsung Z Flip doesn’t feature a large external display like the RAZR (which we’ll talk about in a minute). It’s 1.1-inch numeric display doesn’t really have a lot of function, but when it’s open, it becomes a 6.7-inch smartphone. Like the other premium devices, it runs on Android 10 on a powerful Qualcomm Snapdragon 865+ processor, with 8 GB of RAM. The Z Flip provides a high-end smartphone experience in a device that folds in half, it’s that simple. 

The Motorola RAZR 5G looks like the iconic Moto RAZR did in the era before smartphones were king. For all of the RAZR’s nostalgia it seems to spec-out significantly lighter than the Z Flip. It features a 6.2-inch P-OLED screen that folds up and a smaller display on the outside of the folded phone. It runs Android 10 on a Qualcomm Snapdragon 765G chip and comes with 8 GB of RAM with 256 GB of onboard storage space. 

Let’s take a look at the complete specs of these devices:

Samsung Galaxy Z Flip
Body: Aluminum with Plastic Front and Glass Back
Display: Folded: 1.1-inch Super AMOLED; Unfolded: 6.7-inch Foldable Dynamic AMOLED (~425 ppi)
OS: Android 10
Chipset: Qualcomm Snapdragon 865+
Memory: 8 GB RAM
Expandable Memory: No
Cameras: Rear - 12 MP (wide), 12 MP (ultrawide). Front - 12 MP (wide)
Sounds: Loudspeaker, No Headphone Jack
Battery (endurance rating): 3,300 mAh 
Security: Fingerprint reader
Miscellaneous: Accelerometer, Gyrometer, Proximity, Barometer, Compass, Bixby assistant, IP68 dust/water resistant
Other versions: No

Motorola RAZR 5G
Body: Aluminum with plastic, Gorilla Glass 5
Display: 6.2-inch P-OLED (~373 ppi)
OS: Android 10
Chipset: Qualcomm Snapdragon 765G
Memory: 18 GB RAM
Expandable Memory: No
Cameras: Rear - 48 MP (wide)
Sounds: Loudspeaker, No Headphone Jack
Battery (endurance rating): 2,800 mAh
Security: Fingerprint reader
Miscellaneous: Accelerometer, Gyrometer, Proximity, Barometer, Compass, Bixby assistant
Other versions: RAZR (2019)

LG Wing

The last device we will look at today is the LG Wing. The Wing is interesting because out of the box it looks like your typical smartphone. When you get it into your hand however, you soon see what the big hub-a-loo is. With a flick of your thumb, you can turn the device's 6.9-inch screen horizontally to expose a second smaller 3.9-inch screen. You can use both screens independently or simultaneously within the same app that supports the content distribution.

The Wing’s hardware isn’t quite flagship quality, but it is pretty good. The quirky device runs on  Qualcomm Snapdragon 765G and comes with 8 GB of RAM. It is built from solid aluminum and Gorilla Glass 5. With it’s 4,000 mAh battery most solid users will get about a day out of it if they are consistently using the dual displays (why wouldn’t you if you had this phone?) The tri-camera setup includes a 64-megapixel wide angle lens and dual ultrawide angle lenses of different speeds.

The LG Wing is available in Aurora Gray and Illusion Sky and should be available on most carriers by the middle of November 2020. 

LG Wing
Body: Aluminum with Gorilla Glass 5 Front and Back
Display: 6.9-inch Dynamic AMOLED 2x (~511 ppi)
OS: Android 10
Chipset: Qualcomm Snapdragon 765G
Memory: 8 GB RAM
Expandable Memory: Yes (microSDXC)
Cameras: Rear - 64 MP (wide), 13MP (ultra wide), 12 MP (ultra wide) Front - 32 MP (wide)
Sounds: Loudspeaker, No Headphone Jack
Battery (endurance rating): 4,000 mAh (87 hours)
Security: In-screen fingerprint reader
Miscellaneous: Accelerometer, Gyrometer, Proximity,Compass,, IP54 dust/water
Other versions: None

Do you think these devices are cool? Would you consider forking over $1,000 for one this year? Leave your thoughts in the comments section below.

Continue reading

Three Great Last-Minute Gifts for the Technology Lover in Your Life




Three Great Last-Minute Gifts for the Technology Lover in Your Life

With Christmas a couple of days away, most of us are either wrapping up our shopping or wrapping up the presents we’ve already purchased. If you are looking for a last-minute gift to give the tech lover in your life, here are three that we found really cool.

Apple Air Tags

Apple AirTags are small, smart tracking devices that help you keep track of your belongings. Whether it's your keys, wallet, backpack, or even a pet, these handy gadgets make losing items a thing of the past. Using the Find My app on an iPhone, AirTags allow you to see the precise location of your tagged items. Features like precision finding, a loud chime, and even Lost Mode make finding misplaced things quick and easy. Their sleek design and durable build mean they fit seamlessly into anyone’s daily life.

AirTags are a thoughtful and practical gift idea because they solve a common problem in a simple, high-tech way. They’re ideal for busy people who tend to misplace things, travelers keeping track of luggage, or anyone who values peace of mind. They are easy to set up and work seamlessly with Apple devices, making them a great, affordable gift.

For the Android users in your life, you can check out Tile Trackers or Samsung Galaxy SmartTabs.

USB Power Banks

Power banks are compact, portable chargers that keep devices powered up anytime, anywhere. Whether you’re on a long commute, traveling, or just out and about, a power bank ensures your phone, tablet, or earbuds stay charged. With various sizes and capacities, you can choose a lightweight option for casual users or a high-capacity one for heavy travelers and gadget lovers. Many power banks even come with fast-charging capabilities and multiple ports, making them versatile for charging multiple devices simultaneously.

Power banks are both practical and universally useful. Everyone can relate to the frustration of a low battery at the wrong time, and having some extra juice at the ready is never a bad thing. As mentioned above they come in all sizes and some are even waterproof.

Portable Photo Printer

Portable photo printers are small gadgets that let you print photos from your phone in just a few seconds. They’re great for turning your favorite pictures into real-life prints you can hold, stick on your wall, or share with friends. Some even let you add cool stuff like stickers, filters, or frames to make your photos stand out. It’s like having your own mini photo studio that fits in your bag.

These printers make an awesome gift for anyone who loves taking pictures. They’re super easy to use and work with most phones. Plus, they’re perfect for the holidays—you can print and share moments with friends and family right away. A portable photo printer isn’t just a gift; it’s a way to make your favorite memories last forever.

Technology is a great gift, and these three are just a few of the myriad of gifts that are great for the people in your life. From everyone at Coleman Technologies, we hope you have a happy holiday season.

Continue reading

IT Trends SMBs Should Focus On in 2020


Business Automation

As businesses have strict cost considerations to take into account, it is likely that automation will grow in popularity. While perhaps more expensive to initially implement, automated solutions can easily provide a return on investment by clearing schedules of the annoying (if necessary) repetitive tasks that otherwise eat up your human employees’ time. This combination of machine learning and artificial intelligence is known as Robotic Process Automation and enables businesses to greatly reduce how often human employees need to interfere in these tasks.

Some professionals have been hesitant to invest in AI-driven solutions, primarily due to incomplete algorithms and the negative opinion towards “replacing human jobs with robots.” However, artificial intelligence has seen some success in reducing HR costs through its inclusion in some software, and so RPA is experiencing considerable growth.

Furthermore, many of the solutions available today can be used in more simple applications, including the improvement of communications, reducing process inefficiency, and eliminating redundancy.

The Internet of Things

“Smart” devices are quickly becoming the new norm, even in the business environment. Many establishments are directing their budgets toward devices meant to improve security, evaluate utility usage, manage supply chains, and other operations.

The prevailing motivation behind implementing and integrating these devices is simple: better cost control. If a business has the tools to track and manage their costs, the entirety of the business can be better optimized. When fewer resources are expended on a business’ crucial interactions and processes, the business inherently becomes more sustainable.

Various Cloud Services

While it may seem like there has been ample time to take advantage of every aspect of the cloud’s capabilities, new services and utilities are still emerging. Sure, most businesses have adopted the cloud to support their email and file sharing needs, but this is the relative tip of the iceberg as far as the cloud’s potential is concerned. Businesses can now consider options like Infrastructure as a Service (IaaS), Security as a Service (SECaaS), and even AI as a Service (AIaaS), confident in the reliability of these increasingly popular utilities and others.

Cloud vendors are also creating new services to see to a business’ needs. The largest cloud vendors can effectively fill any requirement a business has through increasingly specific services. As a result, SMBs definitely have options to help resolve their operational hurdles.

Cybersecurity Awareness

At this point, there is plenty of precedent to establish -- without any doubt -- that businesses of every size, industry, and resource level need to have a cybersecurity strategy in place. While many may argue that enterprise-grade security solutions are above their means, the aforementioned precedent makes this argument untenable. 66 percent of all SMBs were targeted by some kind of cyberattack in 2019, and 2020 is already projected to be just as bad, if not worse.

Fortunately, there are ways that a business can improve their cybersecurity preparedness, such as:

  • Staff training - It is a simple concept: the more able your employees are to spot and properly handle a potential cyberattack (like phishing), the less likely your organization is to be victimized. Security has improved greatly, thanks to methods like encryption, rendering your employees your most vulnerable point. Properly training your staff to identify and report suspected threats, the safer your network will be.
  • Threat intelligence - If you know how you are most likely to be attacked, based on the vulnerabilities that cybercriminals usually target, you will be better prepared to handle these attacks. Think of this as the practical application of “knowledge is power.”
  • Multi-layering - With all the potential security issues that businesses face today, businesses of all sizes need to have a strategy in place to reduce all risks that face them. Therefore, all businesses and especially small businesses, need to have redundant file backup, DNS protection strategies, and AI/machine learning-enabled security features in place.

Improved Mobility

For the past decade, businesses have struggled with mobilizing their workforce. As a result, with today’s emphasis on remote work and other mobility-related concerns, solutions that enable a mobile workforce while eliminating risk have increased in importance. Now, increased connectivity, improved data security, and data protection policies like Bring Your Own Device (BYOD) allow your operations to be completed from inside and outside of your workplace, with resources safely delivered to your employees as they need them.

Coleman Technologies can help businesses around British Columbia adopt these approaches, or improve their use of them, to assist their operations and boost profitable productivity. To learn more, give us a call at (604) 513-9428.

Continue reading

How Much Risk Can the IoT Cause?


Let’s explore some of the risks that the IoT can present.

The Security Issues of the IoT

The Internet of Things has added utility to many devices, expanding their potential in ways that would otherwise be impossible. This has only been further augmented by the access to personal devices that many employees enjoy through Bring Your Own Device policies.

However, these benefits have come with an assortment of considerable risks alongside them. Devices that are a part of the IoT are notoriously vulnerable to many cyberattacks, which means that they could potentially be used as a point of access to your business’ network. From there, a cybercriminal has plenty of opportunities to create issues - whether that’s by stealing your data, hijacking your devices to be used in a botnet, or whatever their goal may be.

This problem is only exacerbated by the tendency for IoT devices to go without updates, whether through the negligence of the manufacturer or of the consumer. Without these updates, security flaws go unresolved, and the devices are thereby left vulnerable.

Consider how many devices are now manufactured that connect to the Internet. Smart watches and other wearables, smart speakers and televisions - really, almost anything with the word “smart” in its name - we have more or less surrounded ourselves with the Internet of Things. This includes the time we spend in the workplace, despite many of these devices not being visible on the network to IT. As a result, it has become almost impossible to track all the devices that attach to a network, which has developed into a new issue for businesses.

Shadow IoT

Thanks to the public demand for convenience and advanced functionality, more and more IoT devices are being manufactured all the time. If any of these devices makes its way into your office without the knowledge and approval of IT, you have a shadow IoT problem.

If you do, you aren’t alone.

In 2017, 100 percent of organizations surveyed by an IoT security firm were found to have consumer IoT devices on the network that qualified as shadow IoT. Another report, from 2018, stated that one-third of United States, United Kingdom, and German companies have over 1,000 shadow IT devices on their networks every day. Combine this with the security shortcomings discussed above, and you have a recipe for a cybersecurity disaster.

You may remember the Mirai botnet, which struck back in 2016. This botnet was built up of over 600,000 devices at its peak and focused primarily on IoT devices. Once these devices were identified by Mirai, they would be attacked and infected, adding more computing power to the botnet. Mirai is far from the only example, too… cybercriminals have been known to hack into IoT devices to gain network access, spy and listen in on conversations, and otherwise prove themselves to be a nuisance.

How to Minimize Shadow IoT

Clearly, shadow IoT isn’t a good thing for any organization. There are a few things you can do to help protect your business from the security issues that shadow IoT can cause.

  • Accept IoT devices in the workplace. If your employees really want to use one of their devices at work, they’re going to. Instead of shooting down requests to bring in these devices, make it easier for your employees to do so through the proper channels - and make sure your employees are aware of these channels. Openness and cooperation can be effective tools as you try to get your team on the same page you’re on.
  • Keep IoT devices separate. To better protect your network, you will want to consider utilizing a dedicated Wi-Fi network for IoT devices, configured to allow them to transmit the information they generate while blocking any incoming calls to them. This will help prevent threats from being transmitted to IoT devices.
  • Seek out potential threats. Not all shadow IoT necessarily can be found on an organization’s network, as over 80 percent of the IoT is wireless. This means that you need to be monitoring your wireless signals for shadow IoT devices and networks.

Your business’ security is important - too important to be undermined by an insecure consumer device that was brought in without your knowledge. You need to get out ahead of shadow IoT, as well as the other threats that could do your business harm.

Coleman Technologies can help. Our professionals are well-versed in cybersecurity best practices and how to use them to your benefit. To find out more about what we can do for your business, reach out to us at (604) 513-9428.

Continue reading

The Dark Side of AI




GoodBadAI

Artificial intelligence, or AI, has upended the way that we discuss technology in business, society, and individual everyday life. While we mostly focus on the benefits of the technology, there are many downsides to consider as well. That’s what we’d like to discuss today; how AI has a dark side to it that potentially requires regulation.

Understanding AI

AI is, in short, a system of complex algorithms, data, and computers that can mimic human intelligence.

Through math and logic, AI can simulate human intelligence, and for the most part, it can do so quite effectively. However, there are problems with this technology that must be considered—and it’s not all strictly cybersecurity-related, either.

In short, there will always be those who want to use technology for evil rather than good.

Hackers can use AI to automate their threats. Companies can use AI to eliminate costs and lay off employees. Individuals or government agencies can use AI to misrepresent the ideas of others to manipulate the masses into believing their wacky ideas.

Indeed, if something technology-related is good, you can count on someone bad ruining it for everyone else.

Part of the problem is the “AI black box,” which refers to the idea that people simply don’t know how AI does what it does. The old adage from math class, “Show your work,” is important here, and there’s a serious lack of transparency surrounding how AI comes up with the responses it gets. And since AI is often trusted to handle some serious tasks, it’d be foolish to trust something you don’t know or understand with total control, yet some do it anyway.

This brings us to our final point: AI is not some omnipotent force, some all-knowing system that can fabricate content from nothing.

AI runs on data, and as such, you get out what you put in. The more data it’s supplied with, the more reliable and quickly it can push out an acceptable response. But the kicker here is that if the data is biased, AI’s response will be biased, too.

So, if the data and the AI are biased, the product will be biased, which will make the end result dangerous and counterproductive.

The Question of Regulation

While regulation could make AI much more fair and safe to use, the answer is not as simple as you might think.

If you don’t put rules in place, AI could make unfair and biased decisions—decisions that invade people’s privacy and have a negative impact on society. A lot of it also boils down to purpose. For those who want to use AI to breach the privacy and security of others, regulations can go a long way toward making that goal harder.

However, some believe such rules will only slow down the growth of AI and the technology that powers it.

Thus, the challenge becomes how to strike a balance between safety and allowing this technology to grow. If the rules are too rigid, small companies will find it harder to compete and survive in an increasingly competitive business environment. Those who believe mandates are too strict still believe guidelines would be helpful to keep AI creators responsible and accountable, but how effective this practice would be is a bit nebulous at present.

All in all, the primary goal of those arguing for the regulation of AI is for the protection and safety of others and their ideas, which can never be considered an inherently bad thing.

We’re sure you have plenty of questions about AI and how you can use it for your business. To learn more, call Coleman Technologies at (604) 513-9428.

Continue reading

3 Tips for More Effective Data Backup and Disaster Recovery




3 Tips for More Effective Data Backup and Disaster Recovery

Backup and Disaster Recovery (BDR) are incredibly important elements of any successful business, as without them, you’re just one disaster away from a world-shattering wake-up call. We take a strategic approach to data backup and disaster recovery that considers your daily data backup needs while recognizing its long-term benefits. Let’s discuss how you can ensure that your business can use BDR to survive any potential threat the world throws at it.

Data Backup Strategy

Data is both an asset and a crutch, as the more of it your business utilizes and collects, the bigger the target on your back is. The looming threat of hacking attacks reminds us that the opportunities data presents can be snatched away instantly. While standard security measures are essential for all businesses, it's crucial to keep in mind that even the most meticulously crafted plans can unravel when faced with challenges and unforeseen circumstances. Data backup takes some of this guesswork out of the equation, as you’ll know without a doubt that your assets are safe and protected.

Take Advantage of Automation

Automation is a technology that, again, takes some of the variables out of the equation—namely, human error. With automation, there’s no more fretting over whether the backup was configured correctly or if it was executed manually by your staff. Automated backup systems resolve these worries by eliminating the need for manual intervention, ensuring a seamless backup process. You can also test these backups to ensure they will work when you need them most.

Eliminate as Much Downtime as Possible

When it comes to mitigating the costs associated with downtime, a robust disaster recovery plan is the clear solution. A well-crafted strategy anticipates and addresses all conceivable scenarios, minimizing the impact of data loss incidents on business continuity. By investing in a comprehensive disaster recovery solution, businesses can ensure their recovery process takes as little time as possible, all while keeping data loss to a minimum. This helps to eliminate expenses caused by prolonged downtime.

Ensure Your Business is Sustainable Long-Term

Would your business be able to survive without access to its data? We doubt it. Imagine for a moment that you lose access to all of your data, including that of customers, operations, and any intellectual property your business leverages. You’ll lose your competitive edge and ability to make effective data-informed decisions, engage with clients, and acquire new customers. Effective security measures and data backup practices—including storing them off-site and in the cloud—are not just good practices for the future of your business; they are critical ones.

Outsourcing your data backup and disaster recovery practices can go a long way toward keeping your business sustainable well into the future. To learn more about how Coleman Technologies can contribute to your business’ long-term success, be sure to contact us at (604) 513-9428.

Continue reading

An IT Christmas Carol


Scrooge, not missing a beat, and never altering his demanding demeanor, laid the responsibilities that were, up to last month, Jacob’s, at the feet of poor old Bob; with, the expectation that Bob would be able to produce more. Bob was ever the diligent worker, and he never complained, regardless of how much unwanted attention and responsibility was forced onto him. As the holidays approached, Bob was looking forward to the respite from work, even if it was for a day. He was going to spend time with his family. You see, Bob’s daughter Grace fell ill and since Scrooge didn’t believe in offering benefits, the burden of keeping her well fell on Bob’s shoulders.

Just as he did the best that he could for Scrooge, he did the best that he could for his family. The problem was that Christmas is tomorrow and there has been no mention of him getting the day off. At about 1 p.m., after he had eaten the soup his wife had made (the same soup he had been eating for five consecutive working days), he went to Scrooge.

“Mr. Scrooge, I was wondering if I could have the day off tomorrow for Christmas?”

“No, Bob,” Scrooge answered immediately, “We just can’t afford it if you missed any time. It’s not fair or convenient to the business for you to miss any time.”

“But Mr. Scrooge,” Bob pleaded, “My wife is making a roast and I am hosting Christmas.” He went on to observe that it was only one day a year.

“Bah! Humbug.” Scrooge crowed, “It’s a poor excuse for picking a man’s pocket every twenty-fifth of December! You’d better be here in the morning, or you can find yourself another job.”

Bob, not wanting to put his job in jeopardy dejectedly answered, “Yes, sir.”

Bob went back to work and toward the end of the day, Scrooge emerged from his office, put on his coat and meandered over to Bob’s desk with a box. He stopped, placed the box on the desk and placed his hand upon the box.

“Bob,” Scrooge started, “I was thinking about your request for time off, and I wanted to tell you that since Jacob left, we just can’t have anyone missing any more time, so just tell your family to come after you get out of work.” Bob was upset, but said nothing.

“I’m headed to my club, I need you to stay tonight and install this new router.” Scrooge tapped the box, “I’m having trouble streaming in my office and want this installed and working before you leave for the day.”

Without saying goodbye, the old miser walked out the door and shuffled up the street toward his car. Bob felt crestfallen. He knew his brother and his family would be at the house when he got home, but not wanting to disobey Mr. Scrooge’s demands. He stayed until just after 8 p.m. making sure that the router was installed properly and that it did, indeed provide Mr. Scrooge’s office with the wireless signal he demanded.

After he finished with the router, he locked up the office and meandered down the street toward his car. Since Scrooge has kept both parking spots in front of the office for himself, Bob had to walk a half a mile to the parking garage. As he made his way there he went into the store to buy his family their Christmas roast. Knowing he wouldn’t be around to enjoy the company of his loved ones, he could at least get a beautiful roast.

He started pricing the meat and realized that he couldn’t afford a roast that was big enough for eight people. He checked his balance, and when the numbers came up on the screen he felt like he wanted to cry. He picked up a small roast and a large chicken, paid, and left for his home.

When Bob got home, his entire family was there. The sadness he was feeling melted away and the Christmas spirit that had escaped him returned with aplomb. His brother’s family had arrived a few hours before and so, after tucking their children in for Christmas, the adults sat around the Christmas tree telling stories and laughing, stuffing stockings, and putting out gifts. Bob didn’t know exactly how to explain that his boss wouldn’t give him the day off, but waited to reveal this sad truth for after the pleasantries of the evening were finished.

As he got ready for bed he shared the news with his wife.

“That Scrooge is a real piece of work,” his wife proclaimed.

“He’s a real piece of something,” Bob returned.

The couple talked about it a bit more, said goodnight, and went to sleep.

----

Scrooge, was sitting alone, as was his custom at a table in his club’s bar. His scowl was a solid deterrent to keep people away. He sipped his scotch and water and sat there watching the television that was mounted above the bar. The financial news was on. As the stock prices raced by and the attractive, yet muted 30-something gave the audience the recap of the money that had been made and lost during the day’s trading, his concentration was broken.

All of a sudden a man was standing, drinkless, in front of his table. “Hello Mr. Scrooge.”

“What?!” the ill-tempered codger snapped.

“Merry Christmas.” the man said joyfully.

“Bah!” Scrooge responded sharply.

“My name is Darren Coleman, and I’m with Coleman Technologies, and it’s come to my attention that your IT administrator, Jacob, is no longer with your company. I was wondering if you had a few minutes to talk about how my company can help you manage your...”

Scrooge responded, “Let me stop you before you go any further. I wish to be left alone. I don’t know how you know my business and I don’t care, I’ve got it handled.”

The conversation went on like that for a few minutes and Darren Coleman left his card on the table and wished Scrooge a merry Christmas. Scrooge predictably scoffed at the sentiment. In solitude he finished his drink, paid the bill with no tip, and left the club.

When he got home, he locked the door behind him and put on his dressing gown and nightcap. Just as he was getting comfortable in his bed, he heard a tapping, which he ignored. A minute later a banging came from the front room. He got up to investigate, grabbing his cane. Discovering nothing, he returned to his bedroom, only to find Jacob sitting at the small writing desk he had up against the far wall.

“What the hell are you doing here?!” Scrooge said aggressively.

“I’m not here, Mr. Scrooge. I’m not. I am a figment of your imagination.” Jacob stated matter-of-factly.

Scrooge charged at him and swinging his club to accost the intruder only served to break the lamp on the desk.

“How now!” said Scrooge, “What do you want with me?”

“Much” Jacob replied, “but first I have to see that you believe in me.”

“Believe in you?” Scrooge said, “Humbug, I tell you! Humbug!”

Just then Jacob let out a wail that got Scrooge’s attention. He then asked Scrooge to check his account balances, and after a little back-and-forth, Scrooge placated the spectre. The look on Scrooge’s face was of pure terror.

He began to plead, “Mercy, dreadful apparition, why do you trouble me?”

“Your life is tied to your business, Scrooge, but your repulsive avarice has left you exposed; left it exposed.”

Jacob walked up to a terrified Scrooge. “Hear me! Tonight you will be haunted by three spirits.”

“Three spirits?” Scrooge asked, terrified.

“Yes, without their visits you can’t expect to understand the danger your belligerence has caused.”

Just then, the room was silent. Scrooge was horrified. He turned every light on in his house and turned on the television. After at least an hour of trepidation, he finally started to get tired, and even though his home was lit up like a jack-o-lantern on Halloween, he dozed off on his sofa.

----

“Wake Up!” the spirit shrieked.

Scrooge arose from his peace-less slumber quickly and alertly. He took a swipe with his cane, but was rebuked by the large ethereal man standing before him. The ghost was around six-foot-four, but had a golf shirt embroidered with Scrooge’s company’s logo on it tucked into a pair of khakis. Its hair was seemingly an ethereal mist that looked like there was smoke coming up from his glasses. His eyes were ominously white behind thick black glasses.

“Are you the Spirit, sir whose coming was foretold to me?” Scrooge asked.

“I am. I am the Ghost of Christmas Past.”

“Long past?” asked Scrooge who was trembling with fear.

“No, man, your past,” the spirit returned

The spectre put his hand on Scrooge’s reluctant shoulder and led him to the door of his home. Instead of opening the door, they traveled through it only to find on the other side a vision. The vision was of Jacob talking with Bob. They were talking about how Jacob had went to Scrooge, and asked him to consider getting on a firewall installed on the business network.

“You would have thought I asked him to go steady,” Jacob started, “He screamed at me and told me that if I don’t do my #$%^*& job and stop coming to him for money, I won’t have a job to come to.”

“I remember that. He was asking for too much money!” Scrooge said defiantly.

The spirit said nothing and put his hand on Scrooge’s shoulder again. They walked back through the wall they had just come through and this time it was a school. It seemed to be sometime in the 1960s. There was a little boy who was trying to open a padlock with paperclips.

As the lock sprung open, Scrooge growled, “Tommy Hulse!”

The boy opened the locker that was being protected by the padlock and took out a small bag.

“It was him!” Scrooge screeched. He got emotional and explained that he had brought his dad’s watch into school the day before Christmas and he had kept it in the bag. When he returned to the locker that day, it was open and his father’s watch was gone.

“I bet he skinned your hide,” the spirit said arrogantly.

Scrooge, despondent, looked at the spirit, “He died soon thereafter.”

“My time is running short, Scrooge. Let us go,” the spirit said, as he put his hand on his shoulder and walked through the wall.

He was back in the front room of his house. No one else was there. He called out to the spirit but nothing answered. Just then there was a banging coming from the bedroom. He went to investigate and there was a larger spectre standing in front of his bed.

“Scrooge!” the new ghost bellowed. Scrooge turned around and shut the door, only to turn around to see the giant ghastly man. This spirit was nearly seven-feet tall, his head was covered in a hood. He couldn’t make out any of his features, except two glowing eyes that seemed to puncture a hole through him.

“Scrooge! I am the Ghost of Christmas Present.”

“No! No more hauntings!” Scrooge plead. The ghost lifted his right arm and snapped his ethereal fingers. The snap was the loudest noise the miser had ever heard.

Scrooge, who had closed his eyes to avert his gaze from the newest spirit, opened them and found himself alone in a dark room.

‘Where am I?” Scrooge called out. No answer.

He noticed a light coming from an adjacent room. He made his way toward it. As he entered the doorway he could see the ghost standing over what looked to be Jacob, his former IT administrator. Jacob was typing at a computer.

‘Come, Scrooge,” the spirit said in his baritone tenor.

Scrooge walked over and looked on the screen. It was indeed Jacob, he was typing in a chat on his computer. He began to read:

When I bailed on old man Scrooge, I left a hole in the network. Tomorrow, I am going to go in and put this ransomware I just purchased. When he gets back from his Christmas break, he’ll have a surprise waiting for him.

“What is this? What is ransomware?” Scrooge asked the spirit timidly.

“I can’t tell you that, but I can tell you that it is not good for you or your company.” The ghost replied.

“Tell him to stop! Tell him to stop!” Scrooge began pleading.

“No one can hear you, Scrooge.” The spirit said as it walked out of the room.

Scrooge followed, but as soon as he got into the next room, there was no one there. He turned around and seemed surprised to be in his office. He walked through his office door to see the spirit standing over Bob’s desk. Bob was sitting at his desk working away, gently sighing every once in a while and checking his phone repeatedly. All of a sudden his desk phone rang.

“Hello.” Bob answered.

“Merry Christmas to you too...Mr. Scrooge needed me to work today, so I am...Well I have my brother and his family...She’s doing well...It’s okay...I’ll think about it...Have a merry Christmas.” Bob hung up the phone and went back to doing what he was doing.

“He’s a good worker.” Scrooge admitted to the spirit.

“You just couldn’t give him the day off for Christmas?” the spirit asked directly.

“I…I...We’re so short-staffed as it is…” Scrooge stammered. Bob’s cell phone rang.

“Hey...What?!...I’ll be right there,” Bob stood up with a panicked look on his face. He put his coat on and walked out the door without turning his computer off.

“Where is he going? Where is he going, spirit?” Scrooge plead.

The spirit again snapped his fingers and the pair were standing in the waiting room of a hospital. Bob was standing at the desk filling out paperwork. A doctor came up to him and started to talk. Bob’s face succumbed to the pain of the situation.

Scrooge started in, “What is it? What has happened? Tell me what has happened, please?”

The ghost looked at Scrooge with his searing red eyes and said, “His little girl is ill, Scrooge. I’m sure you knew that.”

“Yes...Yes, but what has happened to her?”

The spirit lifted his arm again. SNAP.

The pair were on the front lawn of Bob’s house. A car pulls into the driveway. Bob’s wife got out of the passenger seat. She had clearly been crying. Bob got out of the front seat and made his way around the car. His wife muttered something to him while he opened the back door of the car. Bob lifted his tired and weak daughter out of the car seat and followed his wife in the house.

“Not very Christmasy,” the tall spirit said, mocking a relieved Scrooge.

Before Scrooge could say anything else there was a huge bang and he was back in his home. Feeling tired and emotional, Scrooge sat down on the settee in his front room. He sat there in contemplation for a few minutes. He was worried about the virus that Jacob was going to unleash, he was worried about his business, and about Bob and his family. He realized that he hadn’t treated these people with a lot of respect. Just as he was coming to the conclusion that he had to do something about it the room filled with a blinding light.

Scrooge couldn’t see a thing. All of a sudden there was a high-pitched scream that startled him further. He started to plead:

“Please spirits, no more! I have learned the errors of my ways! No more, I beg you!”

A silhouette emerged in the light.

“Come,” it screeched.

Witless and afraid, Scrooge complied. The spirit was no more than a shadow that moved independently through the ether like bolts of lightning.

Scrooge followed the spirit into the light and emerged in front of a Best Buy. There were giant “Christmas Sale” banners hanging from above the revolving doors. Scrooge walked into the store where he was confronted by himself. He was wearing a Best Buy shirt and tan slacks, staring aimlessly across the vast expanse of the retail establishment.

From the side he spotted Bob walking up to his likeness.

“C’mon Scrooge, get to work,” Bob said as he walked by future Scrooge. He was older than he was by a few years and looked malnourished and feeble.

“No! This can’t be! I am an old man. I cannot work retail!”

As future Scrooge made his way toward the warehouse modern Scrooge followed. Two younger workers were standing near the loading dock as the Scrooges approached.

“What’s the matter, Grandpa? Don’t remember where you should be?” one of the young men said as the other laughed.

Scrooge looked around helplessly as the two younger men continued to snicker and jest.

Just then the light returned, covering everything. It brought Scrooge to a grave marked “Here Lies Scrooge”. Sensing his mortality Scrooge began to wail:

“Stop! Spirit, no! Oh no! Your nature intercedes for me, and pities me. Assure me that I yet may change these shadows you have shown me, shadow! I will live an altered life!”

The light returned and Scrooge woke up. He wasn’t on the settee or in the front room, but his bed. He leaped from the sheets.

“I don’t know what to do! I am light as a feather, I am as happy as an angel, I am as merry as a schoolboy, I am as merry as a drunken man. Merry Christmas to everybody!” Scrooge cried laughing aloud. Without getting dressed he grabbed his coat and rushed out onto the street. Dawn was just breaking. He saw a young man walking on the sidewalk, he stopped him and asked, “What’s to-day?”

“Why today is Christmas, sir!” the young man replied.

“It’s Christmas day? Of course. Merry Christmas to you my fine fellow.” Scrooge said with enthusiasm.

“A merry Christmas to you, too, sir,” the man replied and walked on.

Scrooge, went back in his home and started making calls, the first call he made was to Bob, telling him to take the day and spend it with his family; and, that he was going to get a significant raise. The next call was to Jacob, who didn’t answer, but Scrooge left a voicemail that said he was sorry and would like to make it up to him. Finally, he called Coleman Technologies’s Darren Coleman to tell him that he would be happy to learn more about how he could keep his IT safe and make his business more efficient.

From all of us at Coleman Technologies, we’d like to wish you a very merry Christmas and the happiest of holidays!

Continue reading

Browser Cookies Explained




Browser Cookies Explained

When someone mentions cookies, people start paying attention. Chocolate chip, oatmeal raisin, snickerdoodles… Browser? While Browser cookies aren’t the most scrumptious, they do need some attention. Nowadays, many websites you visit have a popup asking if they want to allow cookies for that site and knowing what you are agreeing to is important. In today’s blog, we will describe what cookies are, how they work, and why they can sometimes be better than cookies with chocolate chips. 

What is a Browser Cookie?

Browser cookies are small text files created by websites and stored on a user's device (computer, smartphone, or tablet) while they browse the internet. These files contain data about the user's interaction with the website, such as login information, preferences, and activity history. The primary purpose of cookies is to enhance the user's browsing experience by remembering their actions and preferences, which enables websites to provide a more personalized and efficient service. For example, cookies can store login sessions, so users do not have to re-enter their password each time they visit new pages on the site.

Cookies Aren’t All the Same

There are different types of cookies, each serving specific functions. Session cookies are temporary and are deleted once the browser is closed, while persistent cookies remain on the device for a set period or until manually deleted. First-party cookies are created by the website the user is visiting, while third-party cookies are set by external services or advertisers embedded in the website. These third-party cookies are often used for tracking users across multiple sites to gather data for targeted advertising and analytics, raising privacy concerns among users and regulatory bodies.

Why Do Cookies Exist?

Cookies also play a crucial role in website functionality and user experience. They enable features such as online shopping carts, where items remain in the cart even if the user navigates away from the site. Cookies can also help websites remember user preferences, such as language settings or themes, making future visits smoother and more customized. However, due to privacy concerns, many jurisdictions have implemented regulations requiring websites to obtain user consent before storing cookies, and users have the option to manage or delete cookies through their browser settings.

While you may not enjoy browser cookies as much as you would the sweet kind, they do play an important role when browsing online. For more great technology content, return to our blog soon. 

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

20178 96 Ave C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am–5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image