Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Tip of the Week: How to Use Google Docs to Draft Google Calendar Events




Tip of the Week: How to Use Google Docs to Draft Google Calendar Events

One of the nice things about software platforms is how well the applications within them interact with one another. Take, for instance, the applications contained within Google Workspace.

Because of the interconnected nature of the Google Workspace platform, there’s a lot that the different programs can do in tandem. As an example, let’s consider how the word-processing application Google Docs can be used to generate events in the associated account’s Google Calendar.

How to Draft Calendar Events via Google Docs

First, you need to open up a new Google Doc. Under Insert, select Building blocks and then Calendar event draft. Alternatively, you can also use the “@” sign, typing “@calendar event draft” and pressing Enter.

You then have a few options to add people to your new event’s Guests field. You can once again use “@” and search through your contacts, or you can manually type out the appropriate email addresses. Add a title for your event, when it will start and end, where it will be, and a description, and you’re ready to send it over to the Calendar.

This is simple to do. In your calendar event draft, you’ll see the option to Send the event draft to the Calendar. You’ll have the option to make more changes in the Calendar window that appears in a new tab.

Once you’re finished, click Save.

Make sure you check back for more handy tips!

Continue reading

Tip of the Week: Improve Your Business’ Wi-Fi


We’re here to help your organization make better use of its wireless connection.

The Router
Your router will determine the general range of your wireless network, as well as its security. Depending on your business’ specific needs, a router can be a tricky investment. You have to consider several aspects, including how much range you need and what kind of options are available for it. Here are some of the variables you’ll need to consider:

  • It is within your budgetary constraints
  • It supports Internet speeds you pay for
  • The space your router needs to cover
  • The devices the router has to support
  • Ensure that any router you choose supports WPA2 encryption

Once you’ve determined which router you’re going with, you can set it up in a place that is most effective for your purposes. If you want your router to broadcast a signal through your entire office, you’ll need to test it out and see how the location works. Try to find a nice central location. If the router doesn’t work as intended in specific parts of the office, you might need to include a Wi-Fi repeater to get the range you’re looking for.

The Repeater
If your signal isn’t extending as far as you’d like, a repeater (or extender) can be used to extend the wireless signal to reach a larger area. This way, the signal will reach any area you need it to reach. A Wi-Fi repeater contains two wireless routers. One of them picks up the wireless signal coming off of your network’s central router, while the other picks up the signal and transmits it in much the same way as your network’s central router. Thankfully, the wireless repeater only needs to be in a location within the broadcasting range of the central router. Just plug it into an average outlet and you’re good to go.

Security
Security is another important part of your business’ wireless network that requires you to think about it during the setup phase. The router doesn’t necessarily have to be hard to set up, though. First, make sure you have WPA2 encryption turned on. Some models don’t default to this and instead use the ineffective Wireless Equivalent Privacy (WEP) encryption that can be broken through easily enough. With WPA2, you’ll be much more secure.

Next, you want to name your wireless network to something that can help you identify it, as well as assign a complex password to defend it. This ensures that only those who need the network for work will be logging onto it, and that they will know which network belongs to your organization if multiple are available. Once you’ve finished with this task, you want to enable the router’s firewall. Doing this provides an additional layer of protection against potential threats.

One more thing: be sure to change the admin’s password on the actual router, as most default passwords can simply be looked up online.

For more information on how to optimize the use you get out of your business’ wireless connection, reach out to us at (604) 513-9428.

Continue reading

Tip of the Week: Ways to Be Active and Proactive With Your Network Security


Applying Software Patches
It should be clear that software patches are designed to fix security problems and improve the functionality of the software, but some organizations simply don’t have time to implement them manually, or they simply don’t understand the purpose for them. Part of the problem is that sometimes the developers aren’t necessarily clear that patches are available, while other times those within your organization may not even know how to administer them. Regardless of the reason, there are usually problems on a network that will go unattended for extended periods of time.

Most hackers only want to take advantage of the issues they can detect. Thus, there could be countless threats out there designed to target countless unpatched vulnerabilities on your network that not even the hackers can know about. It makes sense for a hacker to use just one exploit to target a handful of vulnerabilities. Therefore, it’s important to make sure that all software that you use is updated and patched.

Additionally, your systems shouldn’t be running unused programs. The more software you have, the more ways hackers can take advantage of your organization’s network vulnerabilities. Moreover, you might even be wasting revenue on renewing software licenses that you don’t even need, so it’s best perform a network audit from time to time to get the worthless software off your infrastructure.

Dodging Social Engineering Attempts
Social engineering is broadly categorized as any method that takes advantage of unprepared users or those who are ignorant of solid network security practices. Examples include a phone call or email message claiming that the network has been breached by a foreign entity and that “tech support” needs to remote into the computer and resolve the issue. There are other, more subtle methods as well, such as targeted spear phishing attacks that go after specific users with personal information that convince them that the hacker is someone in authority.

These types of attacks vary in sophistication, but they can range anywhere from an employee receiving a message claiming that they’ve won a prize, to the intruder physically following your employees into the office and stealing sensitive data manually. In instances like these, a little bit of employee training can go a long way. Teach them to look for anything suspicious, and inform them that vigilance is incredibly important in the workplace.

These two security improvements barely scratch the surface of what your organization should be focusing on for network security. If you want to fully protect your business to the best of your ability, give us a call at (604) 513-9428.

Continue reading

Tip of the Week: Working with PDF Files


Rotate the Document

It is very easy to accidentally scan a document into your computer so that it doesn’t appear upright on your display. A program like Adobe Acrobat Pro offers an in-menu option that allows you to do just that - in Document, find Rotate Pages. This option will allow you to select the pages that need to be rotated, and how to rotate them. Other programs may feature a toolbar button that allows you to rotate each page.

Fixing your pages, despite taking a few moments of time, is certainly a worthwhile thing to do, as it makes the document easier to read, promoting accuracy and convenience.

Password Protecting the Document

As long as the person or people who need to see a particular PDF have the proper password, protecting the document in question with a password is a generally good idea - especially if it contains “for your eyes only” information. To make these files as secure as possible, make sure that the passwords are distributed through secure means.

In Word, you can save your files as a PDF using the “Save as” function, simply selecting the PDF option as you do so. You will also see a button offering More options, which brings up a second dialogue box where you can find “encrypt document with a password” in that box’s Options button. By selecting encrypt document with a password, you will have the option to provide a password (and confirm it). At that point, anyone opening the PDF will need to enter that password to view it.

Merging PDF Files

It isn’t uncommon for different parts of the same document to be saved as different PDF files, or for multiple copies to be saved with different information filled in. It is usually better to have all of this information consolidated, to make reviewing it much easier. While many free and paid software titles can allow you to do this, you should reach out to us before you select one, as we can help you make the right choice for your needs - you probably don’t want the program’s watermark on your finished document, or find yourself needing to merge more documents than a free program will allow.

If you’ve already acquired Adobe Acrobat, merging your files is fairly simple. After opening the program, access the Tools menu and select Combine files. Doing so will give you the ability to Add Files… and once you have selected all of the files that should create your new PDF, click Combine. Once they are combined, clicking Save as will allow you to store it where it belongs.

Signing a PDF

Many times, a contract that needs to be signed will arrive as a PDF. While many resort to printing these documents out to sign them, there is an easier way - signing them electronically.

This time, the free Adobe Reader software can get the job done, but you should still check with your IT resource before using it.

If Adobe Reader is approved and installed by IT, you can easily sign PDFs electronically. By opening the PDF file with Reader, you have access to a Fill & Sign button. Click it, then Sign and Add signature. You’ll then have access to three options:

  • Type - you simply type your name into the field, and an electronic signature is rendered (which will not look like yours).
  • Draw - you use your mouse to draw out your signature.
  • Image - you use a scanned image of your actual signature that is then saved for future use.

Once you’ve positioned your signature where it should be, click apply and make sure you save your revised PDF.

Always remember to check with your IT team before you download any software! For more IT tips and other useful pieces, make sure you subscribe to our blog!

Continue reading

Tip of the Week: Using Microsoft Word Templates


In actuality, you’ve used a template every time you’ve opened a Microsoft Word document… the Normal template. However, you may want to use a different template to meet your different needs. If that’s the case, you’ll need to adjust some settings as you create your document.

As you select New from the File tab, you will be presented with a few options. One of them will be Blank document, but you also have the opportunity to utilize a huge variety of other templates that can be found in the application and then downloaded. Once you have done so, select your chosen template and your new document will be generated with that template’s contents. These can include:

  • Boilerplate text
  • Styles
  • Images and logos
  • Table of contents
  • Sections that split the document into different parts, with appropriate numbering
  • Table and chart boilerplates

Of course, this isn’t a comprehensive list of your options. Feel free to explore the different templates and their options to see all that these documents can do.

Once you have a few templates downloaded, you can even edit them to better fit your needs. To do so, all you need to do is open the template you want to edit (File>Open>This PC>My Documents>Open) and make your desired changes. Once that’s done, just Save and Close.

Why Bother with Templates at All?

There are a few advantages to using templates that you should see significant benefits from, such as:

  1. Templates can be shared amongst your staff and unify your business’ style.
  2. Templates can be used to make forms much easier (and less expensive) to reproduce.
  3. Templates can reference your other applications to simplify additional tasks.
  4. Templates allow you to quickly reformat your documents if need be.

So, do you think you’ll do any investigating into templates in the future? Why or why not? Let us know in the comments, and let us know what other tips you would find helpful!

Continue reading

Tip of the Week: How to Clear Your Browser Cache in Android OS




Tip of the Week: How to Clear Your Browser Cache in Android OS

Anyone who wants to prioritize their privacy should be aware of the role the cache plays in such a thing. Your Google web browser—even on your smartphone—will store information about what you search so it can personalize your ads and recommendations, but if you would rather not have it do this all the time, you can clear your Android device’s Google search cache and set it up to auto-delete after a set amount of time has passed.

Manually Delete Your Google Search Cache

First, make sure your Android device is connected to your Google account. From your Android’s app drawer, open up the Google app. When the window opens, tap your profile image in the top-right corner. From here, you should see an option for Search history. Select which deletion option you would prefer from the list, keeping in mind that you might have to verify your identity before proceeding.

Once you have verified your identity, you should see the Delete drop-down menu unlock. In addition to the default 15 minutes, there are options for today, custom range, or all time, so pick the one that best suits your needs.

Set Up Auto-Delete

If you’d rather not mess with manual deletion, you can set your cache to automatically delete after a set amount of time has passed. You’ll see on the above drop-down menu that, under Auto-delete, it says Off by default. You can change this by tapping on the option and adjusting a couple of settings.

After you tap Auto-delete, you’ll be brought to another page where you can set the cache to Auto-delete activity older than a set amount of time. There are options under the drop-down menu for three months, 18 months, or 36 months. Tap Next and confirm your choice to complete the process.

Privacy is a serious challenge for both individuals and businesses, which is why we like to bring you tips that help you get the most out of your technology, be they consumer or otherwise. To learn more about how you can make the most out of technology for your business, be sure to contact Coleman Technologies at (604) 513-9428.

Continue reading

Tip of the Week: How to Utilize Your Business’ Email


Properly Managing Your Email Like a Professional

Let’s not split hairs here: checking your email throughout the day can be a major waste of time. In order to avoid sinking time you could otherwise spend productively on reading (and re-reading) emails, there are a few habits you could develop.

Impose Rules on Your Email Habits

As we’ve said, repeatedly checking your email throughout the day can very quickly become a waste of your time. To avoid this, schedule times throughout your day to commit to checking your email. Once your time is up, stop until your next scheduled time.

We’ve all also accumulated emails that we simply don’t need to read. As harsh as it may seem, archive these emails, or unsubscribe as they come in to keep your inbox clean based on the subject line or the sender.

Managing Important Emails

Admittedly, not every email that comes in will be a waste of time. However, an overstuffed inbox can make it easy to miss something important. To avoid this issue, utilize folders to file your emails so that your inbox doesn’t become overfilled.

If Time is Left, Return to Your Inbox

If you finish your other tasks, return to your inbox and review your messages in order of importance. If you happen to run out of time, stop your review until your next opportunity. As you review your emails, don’t be afraid to unsubscribe to emails that aren’t important to your tasks.

Don’t Be Afraid to Leverage Filters and Labels

Filters and labels can help you to keep your emails more automatically organized. Your filters/labels should be relevant to their content. One can contain messages from a certain sender or pertain to a certain topic. As a result, you will be able to more easily keep your emails organized.

Rules like these can also keep you from having to deal with automatic replies, like out-of-office autoresponders and similar replies that you don’t need to receive.

What other emails have gotten in the way of your productivity? Let us know… we might cover them in a future blog! For more information, subscribe to our blog!

Continue reading

Tip of the Week: How to Properly Calculate Time in a Spreadsheet




Tip of the Week: How to Properly Calculate Time in a Spreadsheet

It isn’t a secret that working with different times in a spreadsheet can be a real pain… even if you’re just trying to add them all up. Fortunately (and a little unsurprisingly), this is because these programs have a specific function to accomplish this.

Let’s review the process you should follow in your spreadsheet program, whether you use Microsoft Excel or Google Sheets.

How to Use the Dynamic Time Function to Count Time

While restricting the ability to add times to a specialized formula may seem frustrating and overly complicated, it actually gives you more granular control over your calculations, helping make these sums more accurate and useful.

To use the Dynamic Time Function, you need a starting time. For this example, we’ll use 12:00:00 AM, making sure that the data is formatted as “Time.” In Excel, this can be adjusted from the Home menu in the dropdown box above Number, while Google Sheets has the adjustment in the Format menu, where you find the Number option where Time can be selected.

The process then depends on how you use this formula. For reference, we’ll keep it simple and work in row one, starting at column A:

=A1+TIME(0,0,0)

This represents your starting time at cell A1, combined with the time function and adjustments split into hours, minutes, and seconds. As our formula currently stands, A1 would be populated with 12:00:00 AM, and with zero changes to the time, the results cell would also populate as 12:00:00 AM.

To continue, we need to populate the time adjustments set at zero. Instead of using zero, you would populate your cell with the cell coordinates you wanted to sum up. Therefore, our new formula could potentially look like this:

=A1+TIME(B1,C1,D1)

In this case, B1, C1, and D1 will represent the numerical change to the hours, minutes, and seconds shown in A1.

So, if A1 was populated with 12:00:00 AM, and B1, C1, and D1 were populated with 2, 4, and 6, respectively, our result would be 2:04:06 AM. If B1 was instead 9, and D1 was instead 38, our final time would be 9:04:38 AM.

It can be tricky to get the hang of at first... but if you need to determine a deadline or approximate when a given task or process should end, the Dynamic Time Function is your ally.

Continue reading

Tip of the Week: 3 Technology Tips Anyone Can Use




Tip of the Week: 3 Technology Tips Anyone Can Use

We are always writing about how useful technology is, but it’s surprising how little even the most committed techie knows about the options that are available to them. In this week’s blog we decided to go through three features in the Windows OS that can be a big help. 

Built-in Dictation

One tip that not many people know about is the built-in dictation feature in the newer versions of the Windows operating system. All you need to do is type Windows key + H. This will open the dictation toolbar. This allows you to use speech to fill out any text field inside of windows.

Focus Assist

With so many distractions it's not a surprise that we keep getting interrupted from our work. Notifications are built-in to almost every app, and they can be a little much sometimes. Windows offers the Focus Assist feature that will work to keep you focused and on track. 

Simply go to Settings > System > Focus Assist.

Once open, you can configure the software to automatically turn on during certain times. In the Focus Assist settings you can fully customize the priority of the notifications so that important messages come through but that notification from Amazon about the tent you want to buy can be tabled for later. 

Use Multiple Desktops

One really neat feature that Microsoft has rolled out over the past few iterations of Windows is the multiple desktop feature. It allows users to separate whole projects from one another and allow them to move between them seamlessly

To access this feature you can right-click on the taskbar and go to Taskbar Settings. Once there you need to toggle on the Task view option. This will create a Task view icon just to the right of the start icon on the taskbar. Push it and you can create a whole new desktop environment (with its own background) to help keep your work organized.

Windows has long been one of the most important business tools and with Windows 10 and Windows 11, Microsoft has created operating systems filled with cool features and resources. If you want to learn more great tips and tricks, visit our blog again soon.

Continue reading

Tip of the Week: Warning Signs of a Mobile Malware Infection


Excessive Permissions

Data security is a priority for many people, but even amongst them, mobile applications often aren’t even considered a potential threat to their data. While you should ever only download applications from an official application store, some attacks can potentially slip through the vetting process to be distributed via these means. Therefore, it is important to carefully consider every application you have installed and the permissions that each one demands. If these permissions seem excessive for the application’s needs, reconsider if the app is necessary to use (chances are, it isn’t). This helps protect you against the tactic that many cybercriminals use: getting a harmless app to the store, and then turning it malicious with an update once it is downloaded.

Rapid Battery Loss

Buckle up, it’s time for a lesson in physics.

According to the first law of thermodynamics, there is a set amount of energy present in the universe. Energy isn’t created or destroyed; it is simply transferred in different forms from one thing to another. This is important to our point.

Have you ever set your fully charged phone down, not touching it or interacting with it at all, only to later pick it up and find a significantly lower charge? While the technology behind the battery isn’t perfect, the amount of energy lost should not be that extreme. Your phone may be infected with malware, which uses your phone’s battery as it operates in the background processes. Check your battery settings to see which applications are using more power than they should be.

Sudden Password Changes

Let’s say that you type in the password to one of your accounts, and it bounces back labeled as incorrect. Fair enough, everyone makes mistakes. However, if this keeps happening, and you know that you’ve entered it correctly, there’s a good chance that your account has been infiltrated and taken over.

To resolve this, you’re going to have to reach out to the company and reclaim your account, if possible. Whether or not your account can be retrieved, you need to change the passwords for all the others too, just to be safe. Keeping to password best practices and restoring your device from a recent backup to clear out any lurking malware, are solid practices.

From your on-site infrastructure, to the cloud environments you’ve deployed, to the mobile devices your employees use, Coleman Technologies can help you manage your IT. Learn more about our many managed services by calling (604) 513-9428.

Continue reading

Tip of the Week: Simple Solutions to a Few Android Problems


Screen Rotating Too Much? Lock It in Place!

How often have you been in the middle of doing something, only to shift your phone’s position and have your screen switch orientation as it calibrates to what it assumes is what you are looking for? It doesn’t take long for this to get old, and quick.

Fortunately, Android 9 and later iterations have included a fix for this. In your System Settings, access Display and from there, Advanced. Here is where you’ll find the Auto-rotate screen option and the means to switch it off.

Samsung device users have a bit of a different process. This toggle can instead be found in the Quick Settings menu (the one that emerges from the top of your screen by swiping down twice). It includes an icon labeled Auto rotate, which you will want to switch to Portrait. This effectively disables Landscape mode from switching over unless commanded to in context.

Too Many Notifications? You Have More Options than “Yes” or “No”!

We’ve all been there before, too, and have had those applications that—if given permission to notify you of things—do so seemingly incessantly. Android has now made it very simple to adjust these permissions on the fly. Once you receive one of these annoying notifications, you can press and hold it to access a control panel. This panel can be used to either silence your notifications, or completely turn them off.

Has Your Phone Stopped Charging Well? Clean Up the Charging Port!

Debris that accumulates in your phone’s charging port over time can easily interfere with your device’s ability to charge. So, before you assume the worst and start budgeting for a costly repair job, why not try cleaning out this debris?

With extreme caution, take a toothpick or a cotton swab and try to tease out any junk that the device has collected over time. Then, try charging your device again and see if you have any more success in doing so. You may just find that your issue was little more than pocket lint, and not a problem with the hardware.

For more useful technology information, advice, and tips, subscribe to our blog!

Continue reading

Tip of the Week: Simplifying Your Email with Consolidation


One Account, Two Accounts, Three Accounts, Four…
Based on your work responsibilities and how your office is structured, it is quite possible that you need regular access to multiple email accounts. You could have one you use internally, one for communicating with clients, one to reach out to vendors, one to use to sign up for resources… you get the point. When all is said and done, that’s a lot of email messages.

However, you presumably have other work responsibilities beyond just checking your email, so switching between all of them just isn’t a practical option. Well, it just so happens that you won’t need to switch, as the email client you choose will be able to consolidate these multiple accounts for you. Before we get into how, we need to make sure that we’re speaking the same language here.

- An email account is the individual address used to send or receive a message. In your organization, you might have This email address is being protected from spambots. You need JavaScript enabled to view it. and This email address is being protected from spambots. You need JavaScript enabled to view it.. Likewise, each employee may have a different account for their different responsibilities - for instance, This email address is being protected from spambots. You need JavaScript enabled to view it. and This email address is being protected from spambots. You need JavaScript enabled to view it..

- An email client is the program that allows you to send and receive emails. Gmail and Microsoft Outlook are two perfect examples. If you have multiple clients stored on the same server, they can be used pretty much interchangeably, each client presenting all emails. An email client also has a few features that enable you to better keep track of multiple email accounts, provided you have set it up to do so.

Let’s go over your options now.

Multiple Inboxes
The people who developed the email clients that we use weren’t naive. They understood that a given user isn’t going to be tied down to a single email provider, and certainly not a single account. This is why email clients can support multiple inboxes, assuming they are configured correctly. Multiple inboxes allow a user to access a single client to manage multiple email accounts, streamlining the process greatly and enabling customized organization.

Multiple Email Personalities
On the other hand, some users don’t mind leveraging one inbox, but might still need to utilize more than one address in their correspondence. There is also a method that enables the use of a single, catch-all inbox, but enables the user to select which email address (in this case, known as personalities) their response is sent from.

To do so, you will first need to set up an email account that you do not give out, as it will serve as the catch-all address that all of your emails ultimately accumulate within. Once it has been set up, you need to set all of your other accounts to forward their contents to that mailbox - your internal IT resource should be able to help.

Once your messages are all being sent to the catch-all account, you will be able to respond to these emails from the address that they were originally sent to.

Setting Up Inboxes and Personalities
In order to accomplish either of these tasks for your client of choice, you will need to adjust a few settings.

Gmail
To add another account to your Gmail client, you’ll need to access your Settings, which means you have to click on the gear icon. Once you’re in your Settings, you should see a tab labeled Accounts and Import. Under that tab, there is a Check mail from other accounts section. Click on Add a mail account, and follow the instructions provided.

To add additional personalities to your Gmail account, you’ll need to again navigate to the Accounts and Import tab. There, you will find a section labeled Send Mail As, with the option to Add another email address. This will also allow you to choose your default email address.

Outlook
As it happens, there are too many different versions of Microsoft Outlook and too many variables to allow us to provide a walk-through. Fortunately, Microsoft does offer some documentation that instructs users how to manage their "connected accounts.” Of course, you can also call (604) 513-9428 for our assistance, as well.

Are there any solutions that you frequently use that you’d like some extra tips for? Tell us which ones in the comments section, and don’t forget to subscribe!

Continue reading

Tip of the Week: Stay Positive When Disaster Strikes


Involve Your Team

In a crisis event, you need to have your team at your side (even if they must physically stay home) and supporting you. Here are a few ways to encourage this:

  • Keep your team in the loop. Make sure that everyone has the information that they should, as withholding as much as possible will only distract from the goals you are trying to accomplish and make effective communications more difficult. Of course, don’t share information that they shouldn’t hear.
  • Set the tone. As much as you can, maintain control of the situation at hand and make sure everything that you need to complete is still completed. Your employees will probably follow your example, making progress and recovery much simpler.
  • Trust who you’ve hired. There is a reason that you haven’t fired your employees: they can contribute to the business. Allow them to make these contributions, rather than taking on too much yourself.

Evaluate the Situation and Adjust

Of course, a disaster is going to require some deviation from your standard operating procedures. Considering this, you need to be prepared to do a few things:

  • Take stock of your situation. Try to get a comprehensive understanding of how things have been impacted by the disaster, and what is likely to happen as a result. Once you do this, you will be more prepared to shift your strategy as need be.
  • Make the hard calls ahead of time. As you are anticipating the future, figure out what you will need to do to potentially deal with your predicted scenario. Start with the smaller stuff, like how your business hours might be influenced, and move on to the major ones, like how long of a shutdown your business could survive.
  • Adjust to continue operations. Use the technologies available today to figure out alternative methods of completing your usual workflows. Give remote work a try, or open an online store to sell merchandise.

Keep Your Chin Up

Finally, it is important that you and your team maintain a healthy frame of mind as you make these adjustments, never mind deal with a disaster’s other ramifications.

  • Find some normal. Keep yourself grounded and thinking clearly by finding something that helps you disconnect from the influence of a disaster. This can be something as simple as a new hobby, fostering an animal in need, anything that keeps you occupied and engaged.
  • Help. If you have any free time, spend it doing something that can help someone else, even if it’s just writing a card. Even the smallest gesture can make a big difference.
  • Stay informed via reliable sources. With the low barrier for entry that today’s technology provides, it is too easy to find and share incorrect and inflammatory information out there, not to mention opportunistic scams. Make sure you only trust news sources with a lengthy and proven history of reliability… even if it doesn’t make you feel better, at least you’ll know the information is trustworthy.

A big part of what Coleman Technologies does as a managed service provider is to help make sure that our clients are able to use the tools we give them to make it through scenarios like this. Call (604) 513-9428 today to learn more about how we can help, and make sure you are staying safe.

Continue reading

Tip of the Week: Making Use of Chrome Actions


Introducing Chrome Actions

Chrome Actions take the familiar address bar of the Chrome Internet browser and add some extra utility to it. Rather than specifying a webpage or network location to visit in the address bar (known as the “omnibar” to very few of us), Chrome now accepts very basic commands as input, and will follow these commands when they are entered.


For instance, opening a window in Incognito mode is as easy as simply typing “incognito” into the address bar.

 


As of yet, there are a few Chrome Actions that have been implemented:

  • Clear Browsing Data - type ‘delete history’, ‘clear cache ‘ or ‘wipe cookies’
  • Manage Payment Methods - type ‘edit credit card’ or ‘update card info’
  • Open Incognito Window - type ‘launch incognito mode‘ or ‘incognito’
  • Manage Passwords - type ‘edit passwords’ or ‘update credentials’
  • Update Chrome - type ‘update browser’ or ‘update google chrome’
  • Translate Page - type ‘ translate this’ or ‘ translate this page’

Of course, they come with the promise of more being added in future updates.

Is This Something You See Yourself Using?

Leave your thoughts in the comments and tell us why or why not. For more information and assistance pertaining to your business’ IT, give us a call at (604) 513-9428.

Continue reading

Tip of the Week: Project Management Software


There are a lot of tools used to manage projects. Regardless of what platform your company uses, there are some simple, common sense practices your team can use to enhance its project management proficiency. Here are five:

Tip #1: Hash Out Details Before You Start

Sometimes getting a project off the ground is harder than actually completing it. Depending on the number of stakeholders involved, many projects may find it difficult to get off the ground. Ensuring that the project is viable, has the support it needs to come to fruition, and has the resources in place to be most efficiently implemented are important before a minute of work is done on the project.

You will want to identify what workers will be responsible for what work, while also doing your best to come up with a timeline for the project that will not waste resources.

Tip #2: Choose One Project Manager

Today, there are a lot of collaborative interfaces out there that make managing a project much, much easier. As a result, sometimes a project won’t have a single project lead, it will be carried out with a team approach. You may get through a project or two like this before it becomes painfully evident that there needs to be someone to run point on the project.

The role of project leader will cultivate positive team dynamics and act as a mentor to the rest of the team. Also, you just need one throat to choke when things aren’t done on time.

Tip #3: Define Specific Milestones

For any project, there will be benchmarks it will have to be met. As a project begins, defining the metrics that will have to be met will give any project team a good idea what the expectations are at the end of each phase of a project. By frequently checking in on the status of deliverables, the project manager can ensure that all elements of the product are aligned with what customers will invest in.

Tip #4: Manage Risk

Managing risk is important in any business endeavor. There will be times when, in the course of the phases of a project, where one will go horribly wrong and will put the entire project’s success at risk. One of the best ways to identify and manage risk is by keeping the lines of communication open. Most project management software provides options to communicate, whether they be integrated through an existing system, or if they are localized as a part of the software.

Tip #5: Evaluation

Through success (or failure), lessons can be learned from any project. By reviewing and scrutinizing every aspect of the project, you will get some fuel on how to improve your project management moving forward. Identifying what went right, what went wrong, and how they make up the final result. One way to ensure that a project was a complete success is to determine its return on investment (ROI). Often, project managers will provide a planned ROI to stakeholders at the beginning. By comparing the two after the end of the project, you can establish whether it had the value you were planning for.

At Coleman Technologies, our technicians thrive on project management. Whether it is running cable, building, testing, and deploying hardware, or simple proactive maintenance, we have an answer for all of your business’ computer problems. Call us at (604) 513-9428 to learn more.

Continue reading

Tip of the Week: Locating a Misplaced Smartphone


The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

Auto-Location
On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of Coleman Technologies.

Continue reading

Tip of the Week: Using People Graph in Microsoft Excel




Tip of the Week: Using People Graph in Microsoft Excel

Microsoft Excel is a great way for data to be visualized, particularly as it offers various features to highlight the context of the data you’re trying to communicate with. Today, we wanted to walk you through how you can use one such feature—People Graphs—to do so particularly impactfully.

What are People Graphs?

People Graphs are a Microsoft Office Add-In that allows you to create a quick data visualization. While the default icon included in the People Graphs is, predictably, a person, the graphs can be customized to display different icons—from a star, a heart, a clock, a bag of money or various others.

Let’s go over how you can create these simple graphs to present simple data points to your advantage.

Creating a People Graph

First, you need to have the data you want your People Graph to depict in your spreadsheet. Let’s assume that you wanted to share some statistics concerning the work/life balance habits of today’s workers. In one column, list out the stats you want to share, and in the next, list out the numerical values associated with these statistics.

Select this data range. Then, in the Insert toolbar, select People Graph under Add-Ins. A premade graph will appear on your sheet. Select the Settings option, which will appear in the top-right corner when you click on the graph.

From there, you can customize what your graph looks like, its color scheme, and the shape of the icon itself.

Once you’re pleased with the appearance of your graph, you can then select the grid button that appears next to the settings option. From there, you can customize the title and select the data that your graph pulls from.

Once you’ve selected the data, click Create, and your People Graph is complete.

Hopefully, you find plenty of use out of this capability!

Continue reading

Tip of the Week: 5 Keyboard Shortcuts to Make Life Easier




Tip of the Week: 5 Keyboard Shortcuts to Make Life Easier

Keyboard shortcuts are undeniably useful—to the point that some are almost ubiquitous. However, there are a lot that aren’t, and they are just about as useful. We wanted to introduce you to these shortcuts so you can incorporate them into your workflows.

Open a New Tab

Ctrl+T
Having an additional tab (or, if we’re being realistic, at least a couple) open in a browser or file management window is almost always helpful. Adding a new tab in either program is simple: press Ctrl+T.

Open a New Browser/File Explorer Window

Ctrl+N
Similarly, if your process would be better served by having an entirely new window in either your browser or file manager, the Ctrl+N shortcut does the job.

Search a Document or Web Page for Something

Ctrl+F
If you need to locate something in a document or a webpage, you can press Ctrl+F to open a search box, which you can use to locate a keyword.

Take a Quick Screenshot

Windows Key+Shift+S
Screenshots are great, and Windows just so happens to come with a baked-in utility to capture them: the snipping tool. Accessing this tool is simple, too… all you have to do is press Windows Key+Shift+S, and you’re good to go.

Force Quit a Crashed Application

Ctrl+Shift+Esc
If you find yourself struggling with stuttering software or one that isn’t responding at all, it’s often best to abandon ship and start over. While you’ll lose any unsaved changes to your work, you can force quit by pressing Ctrl+Shift+Esc.

For more handy IT tips to use in the workplace, make sure you check back here with Coleman Technologies!

Continue reading

Tip of the Week: Specifying Your Google Queries


Improving Your Google Queries

-

If you want to tell Google to omit certain potential results from your search, you can use the hyphen/subtraction mark to define what you don’t want considered.

For example, if you were in the market for improved seating for your workplace, you could search for computer chairs and eliminate any designed for gaming purposes by searching for computer chair -gaming.

()

Adding a parenthetical allows you to set a prerequisite for your search results. Basically, by including a term in parenthesis, you’re instructing Google to only return results for the rest of the search if they relate to that term.

So, if you were specifically looking for IT services around British Columbia, you could type in (IT services) British Columbia.

Of course, by being on our blog, you’ve pretty much skipped that step, already!

site:

Let’s say that you were looking for something that you were confident that you could find on a specific website. Perhaps you had even found it before but hadn’t been able to locate it again since. Adding the site tag into your Google search instructs Google to zero in on a particular website as it looks for your search term.

So, let’s say you wanted to know more about business continuity. To find that information, you could input business continuity site: www.colemantechnologies.com. Google will promptly deliver the links you’re looking for.

filetype:

Maybe you’re looking for a specific kind of file, like a JPEG or a PDF. Inputting your search terms and adding filetype:jpeg or filetype:pdf will only produce results that feature the designated file format.

intext:

Have you ever encountered one of those moments where you can remember an exact quote from somewhere, but you can’t remember where you read it to save your life? Google offers a feature that can work with that. Searching for intext:, followed by that particular phrase, will instruct Google to look at in-page text to find it.

Which of these Google tricks were new to you? Are there any that you see being particularly useful? Make sure you subscribe to our blog for more handy tips, and for any of your specific IT support and service needs, give Coleman Technologies a call at (604) 513-9428.

Continue reading

Tip of the Week: Three Simple Measures for More Productive Email


#1: Interact with it less.

As we established from the very start, email can very rapidly shift from an asset to a considerable time commitment, often multiple times throughout the workday. If possible, avoid getting drawn in by reducing the total amount of time you spend in your mailbox. There are a few ways to accomplish this:

#2: Organize yourself, by organizing it.

Without the proper maintenance, your inbox can quickly become bogged down with messages and make it impossible to find important messages later. Therefore, it is useful to add additional rules and features to your email client, such as:

  • When you’re dealing with a ton of emails, it can be annoying to have to bounce back to your inbox each time you delete, move, or act on one of your incoming messages. Fortunately, there is a way to mitigate this issue through a simple change in your settings.


    • In Gmail, there is a feature called Auto Advance. With it activated, deleting, moving, or archiving a message will no longer send you back to your inbox, and will instead move you to your next message. You can also activate the Send & Archive button, which will give you the option to do both things in one click.

    • When using Outlook, you can change your settings to also advance you to your next message after acting upon its predecessor. Call up your Options (under the File menu option) and select Mail. On that page, you’ll find a section labelled Other, and the specification to complete an action “After moving or deleting an open item.” Select open the next item from the dropdown.

  • Whether you’re dealing with communications referencing different projects or simply receive many kinds of correspondence, it can be difficult to keep them all straight. Sorting these messages out automatically can save quite a bit of time and frustration.


    • In Gmail, you can create Labels, which effectively help you manage different emails from different senders or that reference different topics. By creating Filters via the drop-down option in the Search bar, you can also set certain emails to have these labels applied based on preset criteria. These can even be used to sort through different email addresses you receive in the Gmail client.

    • Outlook also offers a similar function with its capability to create Folders and generate Rules to direct certain messages to them automatically, once again. When an existing inbox message is right-clicked, suggested rules will display, along with the opportunity to create one or to manage the ones you have already created.

#3: Prepare Ahead of Time

We all have those messages that we find ourselves sending time and time again, with minimal details changed between them. Shave the time you spend drafting these messages down by creating a template to start off with.

  • In Gmail, as your message composer is open, click the triple-dot menu at the bottom and navigate to Templates. From there, you have the option to either insert a template you have already created or save what you have drafted as a new template to use later. If you no longer need a template, you can also delete it from this menu.

  • In Outlook, you can create a new template from a message by navigating to File and Save As, then switching the file type to Outlook Template. To use them, select New Items as you are drafting your email and from there, More Items and then Choose Form. From there, select User Templates in File System in the Look In box. Find your template, and select Open.

What other ways do you know to speed up your use of your email? Share them in the comments! For more handy tips, make sure you subscribe to our blog.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

20178 96 Ave C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am–5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image