Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Music is Being Lost to Failing Hard Drives, Reminding Us of a Few Best Practices

Music is Being Lost to Failing Hard Drives, Reminding Us of a Few Best Practices

Nostalgia is a powerful force. It can drive us to look to the past for things we once loved, such as the music we listened to over the years. However, what if the music you loved was lost forever?

This could be the case for many, as older hard drives that archive this music have been discovered to have failed. Let’s examine the situation to see what lessons any small-to-medium-sized business can learn.

0 Comments
Continue reading

Neglecting this Patch Could Allow a Computer to Explode

Neglecting this Patch Could Allow a Computer to Explode

Your computer has a brain, of sorts, in its CPU… a tiny square that literally enables everything the device does, as it processes billions of instructions at a time. Of course, to support this on such a relatively tiny piece of hardware, most CPUs are packed with microscopic transistors—these transistors being small enough to fit hundreds on a single blood cell.

As you might imagine, this means things can go wrong pretty easily… and gone wrong, things have. Many newer computers are suffering from a bug that could cause permanent damage to the CPU… and if you don’t take steps fast, it could be too late.

0 Comments
Continue reading

Benefits of Virtualization on Your IT Infrastructure

Benefits of Virtualization on Your IT Infrastructure

Is your business frequently grappling with the challenges of implementing new solutions, whether software or hardware? Consider harnessing the power of virtualization in the cloud to address these issues head-on. With the right tools, virtualization can open up remarkable opportunities to enhance your business' operations while bolstering its security and flexibility.

0 Comments
Continue reading

Properly Cleaning a Laptop

Properly Cleaning a Laptop

It is important to keep modern computers clean, and laptops are no exception. However, a laptop's different form factor makes cleaning it much different from cleaning a traditional desktop computer.

0 Comments
Continue reading

Why You Need to Keep Track of Your IT Infrastructure

Why You Need to Keep Track of Your IT Infrastructure

When taking stock of your business assets, technology is particularly critical to pay attention to. Let’s discuss why this is and what you must do to manage it properly.

0 Comments
Continue reading

USB-C? Thunderbolt? What Ports Should My New Laptop Have?

USB-C? Thunderbolt? What Ports Should My New Laptop Have?

We’re at a weird point in the technology world (but honestly, when is it not at least a little convoluted?). Right now, modern technology has been slowly shifting between a few different technologies and consumers and businesses are stuck in the middle trying to figure out what to do and how to future-proof their hardware investments.

0 Comments
Continue reading

Necessary Networking Tools You Need to Know

Necessary Networking Tools You Need to Know

Every organization, whether it’s a farm with a stable full of horses or an office with a stable filled with people, depends on its access to the Internet. Most people take for granted their ability to connect whether it be with their smartphone via Wi-Fi or their workstation, which is typically hardwired. There is a whole infrastructure behind the near ubiquitous Internet access you enjoy. Today, we will go through some of the essential hardware needed. 

0 Comments
Continue reading

How to Implement an Effective BYOD Policy

How to Implement an Effective BYOD Policy

Let’s face it; running a business can be expensive, and taking any measures possible to mitigate those costs can have huge benefits for your bottom line. One way companies are minimizing costs is by implementing a Bring Your Own Device policy, or BYOD, to allow employees to use their own personal devices for work purposes. We’re here to help you do so without putting security at risk.

0 Comments
Continue reading

ALERT: Dangerous Zero-Day Threats Found in Recent Samsung Chipsets

ALERT: Dangerous Zero-Day Threats Found in Recent Samsung Chipsets

Google’s Project Zero team has discovered 18 zero-day vulnerabilities impacting the Samsung Exynos modems—four of which enable remote code execution. Let’s talk about what this issue does, and what needs to be done to minimize risk.

0 Comments
Continue reading

Are Magnets Really Bad for a Computer?

Are Magnets Really Bad for a Computer?

Magnets are often portrayed as the bane of technology’s existence, especially in media where data must be scrubbed from devices through the use of a magnet. How true is this representation of the relationship between magnets and technology? We’ll examine this in today’s blog article.

0 Comments
Continue reading

The Rubber Ducky Hacking Tool is Back

The Rubber Ducky Hacking Tool is Back

For millions of people, the rubber ducky is a benign reminder of childhood. Depending on when you were a child, the rendition of Sesame Street’s Ernie singing “Rubber Duckie, you’re the one,” is ingrained in your mind every time you hear the term. Unfortunately, the Rubber Ducky we are going to tell you about today has only fond recollection for people who are looking to breach networks they aren’t authorized to access or deliver malware payloads that are designed to cause havoc. 

0 Comments
Continue reading

Don’t Know Where to Start? Three Places to Spend Your IT Dollars

Don’t Know Where to Start? Three Places to Spend Your IT Dollars

For years, IT has been at the forefront of business administration, productivity, communications, and many other parts of an organization's efficient operations. For the growing business it can be rather difficult to know where to invest your capital so that you can get the best ROI or the most value out of your IT investments. Let’s take a look at how the growing business can use their earmarked capital to improve their business.

0 Comments
Continue reading

How to Determine the Costs Associated with Your Printing

How to Determine the Costs Associated with Your Printing

Sad to say, but for the foreseeable future, cost control is going to be the number one priority for almost every business. With the impacts of the COVID-19 pandemic still lingering, and revenue streams interrupted, many businesses are still being extremely cautious with their capital. One place where most businesses can cut back is on printing. Let’s discuss how to cut your organization’s printing costs. 

0 Comments
Continue reading

How to Help Keep Your Mobile Devices Kicking for Longer

How to Help Keep Your Mobile Devices Kicking for Longer

It’s a common enough frustration—just as you really need it, your mobile device’s battery is on its last legs. This is something that we all would like to avoid if we could. That’s why we wanted to take the time to share a few ways to prolong your device’s battery life just a bit longer.

0 Comments
Continue reading

Is it Time for a Technology Upgrade?

Is it Time for a Technology Upgrade?

We live in an era of upgrades. Consider how often people upgrade their smartphone. Do you give the same care and attention to your business’ technology? Oftentimes users ignore the signs that it is time for an upgrade even when they are crystal clear, just saying to themselves, “I’ll get by just fine.”’ This is not the mentality that will help you move beyond your current productivity. You need to be able to identify when older devices are holding you back and take steps toward replacing them with better, more powerful ones.

0 Comments
Continue reading

Should You Use Wired or Wireless Connections?

Why a Hardwired Connection?

Security

The fact is that a direct connection is inherently more secure than one that is broadcast over the airwaves, as these have the potential to be snagged in transit much more easily. Therefore, if security is paramount, a wired connection is the better option by default. That said, there are ways to secure your wireless connection, utilizing a VPN.

0 Comments
Continue reading

Owning Technology is Like Owning a Pet

You Need to Take Care of It

When adopting a dog, you need to be prepared to invest a lot of time and money into your new family member. You’ll need to get her up to date on shots, get her a license, and invest in plenty of toys so she doesn’t chew on your furniture.

Any piece of technology you invest in works the same way. You need to ensure that you are willing to spend money for the infrastructure, the software licenses, the time it takes to run updates, and more. Here are some examples:

0 Comments
Continue reading

Storing Data Is More Complex than You Know

How Do Hard Drives Store Data?

A traditional mechanical hard drive, also known as an HDD, holds your data on small magnetic platters. These platters are layered on top of each other, with a small mechanical arm that rests above them. Think about a record player, with the arm and needle over the record, except you have many, many records stacked on top of each other.

0 Comments
Continue reading

You’d Be Surprised How Insecure Some Healthcare Providers Are

What is BlueKeep?

BlueKeep is a malware strain that was first discovered in May 2019, and was patched in short order to prevent it from becoming another situation like EternalBlue. EternalBlue was the exploit that allowed WannaCry to have such a considerable impact, especially on healthcare providers in the UK. Despite this precedent, however, many hospitals neglected to apply the necessary patches--and that isn’t even the worst part.

The worst part is that the three systems that BlueKeep impacts (Windows 7, Windows Server 2008, and Windows Server 2008 R2) share one thing in common: they have all passed their end-of-life date, and therefore no longer receive security updates.

This makes this situation a two-fold disaster. Not only have patches been released to mitigate BlueKeep, the systems affected by BlueKeep should not be in use anyways.

Of course, it only gets worse, and paints an unfortunate portrait of medical IT. A reported 22 percent of BlueKeep-vulnerable devices are yet unpatched. Worse, 45 percent of connected medical devices remain vulnerable, making things like x-rays, anesthesia machines, and other care-driven technology a risk to use.

Are you concerned about your organization’s technology?

Lean on the IT experts at Coleman Technologies for assistance. We can help any organization ensure that their technology won’t put their operations or their patrons in harm’s way. Learn more about what we can do by calling us at (604) 513-9428.

0 Comments
Continue reading

Is there a Difference Between Restarting and Just Turning It Off?

What’s the Difference Between the Shut Down and Restart Processes?

Before Windows 8, there was no difference whatsoever (aside from the obvious fact that Restart would start the device back up). This changed, however, with the introduction of Windows 8, and a new feature: Fast Startup.

Shut Down

Still present in Windows 10, Fast Startup shortens what was once a much longer start process after a user had clicked Shut Down.

While all a user’s files and programs are still shut down, the heart of the operating system is just put into standby mode. Please note that it does power down everything, unlike hibernate and standby. This makes it much easier for Windows to reactivate. However, since not all processes are completely stopped, present issues won’t be affected. Your problem will still be there the next time the workstation is turned on.

Restart

On the other hand, restarting the device actually does put a stop to all processes and resumes operations with a fresh boot on the motherboard level. This is why restarting your computer seems to take so long as compared to manually turning it off and on again.

So, the difference is really in the granularity of the shutdown process. Counterintuitively, “shutting down” a computer leaves more components active than a restart does, which is why restart is the process recommended when troubleshooting an issue.

So, while we may recommend that you “turn your computer off and on again,” or “reboot,” what we really mean is “restart your computer.”

For more assistance in dealing with pesky technology issues, lean on the managed services that Coleman Technologies provides. Learn more about what we offer by calling (604) 513-9428.

0 Comments
Continue reading

Customer Login

News & Updates

When it comes to growth and advancement, small and medium-sized businesses (SMBs) in British Columbia have been effectively leveraging Coleman Technologies’ affordable enterprise-level IT practices and solutions since 1999. The proof: Coleman Technol...

Contact us

Learn more about what Coleman Technologies can do for your business.

Coleman Technologies Inc.
20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Operations Center
6600 Chase Oaks Blvd, Suite 100 Plano
TX 75023

 

2 year badge

Copyright Coleman Technologies. All Rights Reserved. Privacy Policy