Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Cyber Censorship is a Complicated Issue

Cyber Censorship is a Complicated Issue

The web is filled with all types of content, and depending on where you live, it can be regulated by a myriad of organizations from all sections of society. From internationally recognized trade organizations to governments to industry regulators, there are a lot of moving parts in data regulation as it now stands. That leads to people wanting more control over data and censorship. Let’s take a look at cyber censorship and how it's a bigger issue than you might think.

0 Comments
Continue reading

The Most Dangerous Things to Search for on Google

The Most Dangerous Things to Search for on Google

The Internet is pretty great. You can watch videos of cats being weird, and then watch the London Philharmonic Orchestra perform Stravinsky’s Rite of Spring. Then you can go on Reddit and learn how to replace the drywall in your bathroom. Just another typical Sunday afternoon with the Internet, right? 

Unfortunately, the Internet isn’t always perfect. It can be pretty dangerous, and we’d like to share some surprising terms that can lead to dangerous websites and malware if you search for them on Google.

0 Comments
Continue reading

Cyberthreats Can Threaten Your Business in Several Ways

Cyberthreats Can Threaten Your Business in Several Ways

Every organization has a lot of things that could go wrong in the course of doing business. They can run into supply chain issues, employee turnover and poor performance, natural disasters interrupting your “business as usual”, but one of the most unassuming, yet worrisome threats to your business is the cyberattack. This month, we go into a few ways cyberattacks threaten your business and how they play out to give you an idea of how to prepare.

0 Comments
Continue reading

VoIP is an Extremely Good Option for Business Communication

VoIP is an Extremely Good Option for Business Communication

Effective communication often operates behind the scenes, yet it serves as a vital cog in the smooth operational ability of business, lending support to a multitude of functions. Consequently, making judicious investments in the right tools can markedly elevate your business. In the contemporary landscape, one such indispensable tool is Voice over Internet Protocol (VoIP).

0 Comments
Continue reading

Which is Better? Wired or Wireless Connection

Which is Better? Wired or Wireless Connection

Make no mistake about it, connectivity to the Internet is paramount for any business. A surefire way to gauge this importance is to observe people's reactions when they are informed that the Wi-Fi will be down for a few hours. In such a context, businesses face a crucial decision: should they opt for wired connections or embrace robust Wi-Fi? To make an informed choice, it's essential to understand the benefits associated with both options.

0 Comments
Continue reading

Your (Far From Comprehensive) Guide to Google’s Secrets and Easter Eggs

Your (Far From Comprehensive) Guide to Google’s Secrets and Easter Eggs

Since its domain was first registered on September 15, 1997, Google has exploded from a relatively simple search engine to the massive assortment of platforms and services that fall under the Alphabet umbrella. That being said, most people tend to think of very specific aspects of Google’s Search function… like the amusing Easter Eggs that the platform has become somewhat famous for.

0 Comments
Continue reading

Industrial IoT is Bringing Big Data to Manufacturing

Industrial IoT is Bringing Big Data to Manufacturing

By now you’ve heard of the Internet of Things. It consists of all of the Internet-connected devices found on a given network. Different types of businesses have different ways that they can use the IoT. This month, we thought we would discuss the Industrial Internet of Things (IIoT) and the ways modern manufacturers use it to make big changes to their businesses.

0 Comments
Continue reading

Don’t Be So Quick to Scan Every QR Code You See

Don’t Be So Quick to Scan Every QR Code You See

There is no denying that Quick Response codes—better known as QR codes—are a handy little invention. Just a few years ago, many businesses heavily adopted these contactless communication tools, allowing customers with a smartphone to access menus, documents, and more with ease. Having said that, we unfortunately can’t deny that cybercriminals are taking advantage of how handy QR codes are, too.

0 Comments
Continue reading

How Internet Speeds Have Changed

How Internet Speeds Have Changed

The Internet is used for a great many things in business nowadays, but some may not realize just how much Internet speeds have changed over time. This week, we thought we would take a brief look at the evolution of Internet speeds and what today’s speeds allow businesses to do. 

0 Comments
Continue reading

What Search Engine is Truly the Best, Part 2

What Search Engine is Truly the Best, Part 2

Last time, we started our discussion on the best search engines by talking about the behemoth, Google. While Google is, by far, the most popular and commonly used, and arguably the most accurate search engine, it doesn’t mean it’s always the right search engine to use. Let’s talk about some other alternatives and see where they might fit in.

0 Comments
Continue reading

What Search Engine is Truly the Best, Part 1

What Search Engine is Truly the Best, Part 1

Even if you lived under a rock, you’ve probably done a Google search or two. There are, in fact, other search engines, each with their own pros and cons. We’re going to compare some of the most popular search engines and talk about what makes them different.

0 Comments
Continue reading

The IoT Can Do More than You Think

The IoT Can Do More than You Think

We often talk about how the Internet of Things can create security issues in businesses if not properly handled. While there are some very real threats that can be posed by the IoT in the workplace, there is no denying that it can also serve some very real utility there as well.

0 Comments
Continue reading

These Link Checking Tools Might Save Your Bacon

These Link Checking Tools Might Save Your Bacon

We often talk about scams and cyberthreats, and lately our advice for dealing with a potential phishing threat is to simply avoid it altogether.

0 Comments
Continue reading

Tips to Help You Determine How Much Bandwidth You Need

Tips to Help You Determine How Much Bandwidth You Need

For small businesses, having a fast, reliable Internet connection is needed to run all the digital tools that your staff has come to depend on. If you don’t have the bandwidth in place, you can deal with bottlenecks that can ruin communications, stall productivity, and cause operational issues of all types. Today, we’ll take a look at how to determine the amount of bandwidth you need to support your business’ computing infrastructure.

0 Comments
Continue reading

Tip of the Week: Making Use of Chrome Actions

Introducing Chrome Actions

Chrome Actions take the familiar address bar of the Chrome Internet browser and add some extra utility to it. Rather than specifying a webpage or network location to visit in the address bar (known as the “omnibar” to very few of us), Chrome now accepts very basic commands as input, and will follow these commands when they are entered.

0 Comments
Continue reading

CAPTCHA and Its Many Challenges

Let’s discuss what this signifies, and how this may shape how users authenticate themselves in the future.

Defining CAPTCHA

Short for Completely Automated Public Turing Test to tell Computers and Humans Apart, CAPTCHA has long been the standard tool used by Google to prevent automated spam from polluting the Internet by requiring (in theory) a human being to interact with content in some way before allowing access or a task to successfully be completed.

0 Comments
Continue reading

Tip of the Week: Specifying Your Google Queries

Improving Your Google Queries

-

If you want to tell Google to omit certain potential results from your search, you can use the hyphen/subtraction mark to define what you don’t want considered.

0 Comments
Continue reading

The State of the Internet in a Pandemic

A Look at the Numbers

Before the pandemic hit, it was believed that roughly 5.2 percent of Americans worked out of their home. That’s about 8 million people, and that number is fairly recent, from 2017. By the end of 2019, we can estimate it was maybe between 5.5 percent to 6 percent.

We can simplify this and say one out of every 20 American workers worked from home before the pandemic.

0 Comments
Continue reading

Will 5G Change Wi-Fi as We Know It?

We like to talk about the major security problems that could come from using public Wi-Fi networks. Data security can be severely compromised by using some unsecured wireless connections. Then you have the issue of unpredictable (and often unreliable) network speeds and the need to routinely give over your personal information to sign in that can be plenty annoying. In the future, these considerations should dissipate as 5G technologies and new ways of sharing information begin to take hold.

There are three technologies looking to change wireless network access forever. They are Wi-Fi 6, 5G, and Hotspot 2.0. 

5G

5G just stands for the fifth generation of wireless technology. 5G, which started rolling out in 2019, is promising gigabit speeds to every user. For reference, gigabit speeds are approaching (and sometimes surpassing) the speeds delivered by fiber optic cable. By being able to broadcast wireless signals at those speeds will allow for an unprecedented level of innovation.

In fact, the capabilities are virtually endless with this type of networking speed. At the very least, it will highlight the capabilities of emerging technologies that require fast data speeds such as augmented reality and autonomous cars/trucks as viable technology for the very first time.

Wi-Fi 6

Wi-Fi 6 is the newest version of Wi-Fi. It is said to provide up to 40 percent higher available network speeds as compared to current Wi-Fi. For the vast majority of people, the data caps, data speed throttling, and overage charges are unfortunate realities when purchasing wireless platforms. Wi-Fi, therefore, is needed to bridge the gap to help us all avoid the major costs associated with wireless networking delivery. Wi-Fi 6, like Wi-Fi 5 before it, will be an essential part of doing business in the future.

Hotspot 2.0

So unfortunately 5G won’t eliminate the need for Wi-Fi. As a result, Wi-Fi hotspots will continue to be an important part of computing on the go. Hotspot 2.0, also referred to as Wi-Fi Certified Passpoint, removes a lot of the agita from using unsecured wireless networks by improving security and taking the actual connection out of the network deliverer’s hands. Essentially, when your phone comes in contact with a Hotspot 2.0 connection it will connect your phone automatically, using encryption to keep your data and the connection more secure. 

Over the next few years you will begin to see public places switching over to Hotspot 2.0. It will become the standard for wireless hotspots, limiting the need for third-party software that often confronts users of today’s hotspots or hospitality visitors. 

Subscribe to our newsletter for more information about using mobile technology for business.

0 Comments
Continue reading

Considerations for Your Business Networking Setup

One of the first things you should know is what might be a part of your network infrastructure. You’ll likely be working with at least one network switch and at least one router. A network switch allows all the technology on your network to communicate with one another through network cables, while the router provides wireless capabilities and connectivity. Your modem enables you to access the Internet.

Networking Best Practices

As your network is such an important tool to your business’ success, you need to be sure that it is sufficiently prepared for this task. To do so, it will help to keep to the following tips in mind:

  • Skip the consumer level. Networking products come in a variety of “grades,” intended for consumer or business use. When equipping your business with these solutions you should only use options made for professional applications. This is because the consumer-based ones are simply not secure enough for business purposes, and likely will not be able to support your business’ needs.
  • Incorporate some redundancy. In the event that your business suffers from a disaster, you will want to be sure that your network is reliable enough to make it through and bounce back. Having a data backup and disaster recovery platform will build the redundancy you need to protect your network. 
  • Plan for future growth. Or in other words, make sure that the network you put in place can be scaled to your business’ future expansion, and that it can incorporate the solutions you will ideally grow into.

Coleman Technologies is here to assist as needed. Our team can help optimize your business’ network to best fit its needs and your professional development. To learn more, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Customer Login

News & Updates

When it comes to growth and advancement, small and medium-sized businesses (SMBs) in British Columbia have been effectively leveraging Coleman Technologies’ affordable enterprise-level IT practices and solutions since 1999. The proof: Coleman Technol...

Contact us

Learn more about what Coleman Technologies can do for your business.

Coleman Technologies Inc.
20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Operations Center
6600 Chase Oaks Blvd, Suite 100 Plano
TX 75023

 

2 year badge

Copyright Coleman Technologies. All Rights Reserved. Privacy Policy