Tag Archives: CS Technologies Plus

Need to Re-Direct A Website?

html redirect

One of the most requested items we get is “How do I make an html redirect page”.

Strangely enough this is one of the easiest things to accomplish, but then anything is easy when you know how to do it!

Here’s the code:

<!DOCTYPE HTML PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN”> <html> <head> <title>Your Page Title</title> <meta http-equiv=”REFRESH” content=”0;url=http://www.the-domain-you-want-to-redirect-to.com”></HEAD> <BODY> Optional page text here. </BODY> </HTML>

Code Description:

<meta http-equiv=”REFRESH” content=”0;url=http://www.the-domain-you-want-to-redirect-to.com”> is the part that actually does the redirecting.

The number preceding the url (in this case zero) tells the browser the number of seconds to wait before redirecting to the new url.

You could set this to 5 and add some optional text to your page – something like:

“Please wait while we redirect you to our new site”.

That’s it! Just copy the code, save it (i.e. save as index.html) and your html redirect will work perfectly.

Our web designers know I don’t like working in code, I am more of a “What you See is What you Get” kind of a Gal. So, If I can follow this procedure so can you.

Happy Coding!

Holly Berlin, General Manager

Leave a comment

Filed under Free Applications, Websites

CS TechBits – Applying “Text Effects” in Word 2010

Our trainers: Carol Smith, Holly Berlin and Chrissy Le will frequently be posting TechBits on our Tech Talk blog. This weeks video will show you how to apply “Text Effects” in a Microsoft Word 2010 document.

Leave a comment

Filed under CS Techbits

The Need For Advanced Security Communication

The integration of security systems into the digital world has opened up many doors to create robust systems to allow us to stay connected to our home or business with a smart phone or laptop.  But there is another, critical advantage that has closed the door on serious security system vulnerabilities. Redundant Communication.

Over the years, systems were connected with standard telephone land lines, (POTS lines).  Many events have gone unreported to the monitoring station when the land lines were cut prior to the intruder entering the home or business, resulting in no communication to the central station and no response from authorities.  The loss is great. In addition, many businesses and some homes as well, have installed video surveillance camera systems in addition to security alarm systems to better enhance security and provide a visual record in the event of a break in to aid in the prosecution of would-be intruders.  But here is the problem:

The Scenario:

Intruder cases home or business and is aware of security system.  Then before breaking in, the intruder cuts all landlines to the premises, disabling communication from the security systems, and then proceeds to gain entry into the premises.  The Intruder sees a camera system in place and knows that a recording device such as a DVR is onsite recording the event.  After the intruder cleans out all the valuables from the premises, the recording device is located and taken from the premises upon exiting. When the home or business owner arrives to the premise, they find that they have been robbed, but wonder why the security system did not call authorities.  When they try to check the recording device for events, they realize it is missing.  Therefore, no video evidence is available either.

The Security System Solution:

With the addition of a cellular backup communicator, the system reports over both landline and cellular communication.  With the landlines cut, the cellular communicator is still able to report and the authorities are still dispatched.

A more recent technology has been added to security panels called Advanced Protection Logic, APL. This was developed to respond to the “Smash and Grab” action, where an intruder cuts phone lines, gains entry through a door that would normally have an entry delay and quickly disables any additional communication by smashing or removing the device from the premises.  Normally, no signals would be sent by either landline or cellular communication until the delay expires.  This is especially an issue with integrated security panels.  APL sends a signal to central station immediately when the door is opened, but it is stored in hold register, awaiting the correct security code to be received.  If the correct code is not received within the delay period, it is read as a valid signal and the authorities are dispatched.  If the correct code is sent in time, then the signal is dumped.x

The Video Surveillance Solution:

The advancement of network cameras has made a digital solution for video surveillance more affordable.  Up to 6 indoor or outdoor network cameras can be installed and managed through an IP Communicator.  Rather than video being stored on the premises, the video is immediately sent off-site and stored at the provider’s servers.  No recording devices are present on the premises and any events are captured and sent off-site for later review.  Nothing can be removed by the intruder to destroy the video evidence.

As the Information Technology world advances, the Security world will further integrate with it and the solutions and possibilities will advance with it.  We have come a long way since the conventional burglar alarm system and the need for advanced physical security will continue to grow.

Jim Welch – Technology Specialist

Leave a comment

Filed under Safety, security

IT Devices as Accessories?

I felt so totally stuck in nineteenth century technology during my trip to Seattle three weeks ago that I almost threw my business cards away. I didn’t want to admit I worked for a tech company. I now know that my next IT purchase has to be a tablet device. Seriously.

I expected to see a lot of new tech devices in Seattle, but the number in the Akron/Canton airport was amazing. People were walking around talking to their Bluetooth connected smartphones or tablets things. The only individuals who were lugging full sized laptops were the ones in business suits, looking both uncomfortable and out of place. And me.

Then there’s the issue of weight of device. This is a huge thing when travelling. I don’t care how light that laptop is, it’s still 42 times as heavy as a tablet when you finally manage to get to your boarding gate.

And the room it takes up in your carry-on? That’s the equivalent to two pair of sandals or seven souvenirs. I could have three different brands of tablets for the weight and room needed for a single laptop. (This is calculated without factoring in the weight of the power pack or battery.)

Mind you, I don’t expect a tablet device to have the capability of my desktop or even my laptop. That would be like purchasing a Smart Car and expecting it to carry the load of a half-ton pickup.

I do expect to look like I embrace technology, get online and never   miss a play in Words with Friends or check-in on FourSquare.

Yes, people, your IT device of choice now determines your level of tech literacy. People look with envy at the latest (but not necessary greatest). Once again, appearance is everything.

Past generations were advised to dress for success. In the 21st Century, we need to pick our IT items for success. In an era where your car can be started by your smart phone, open your garage, parallel park for you, and call for reservations at the George V in Paris, choosing the ‘right’ IT device to travel and be seen with is critical.

Oh, and for those of you who participate in dating? Tablet devices are the new pickup tools, better than babies and dogs.

Carol Smith, Training Manager

Leave a comment

Filed under Computing

A Basket to Catch the Apple

For as long as there were personal computers, Microsoft had been the leader in software development and engineering for operating systems, and they stood firm on that belief. Today they are going to build a basket to catch the apple.

This week, Microsoft is expected to introduce a tablet computer to run their new Windows 8 operating system. It is the first time in the company’s 37-year history that it will offer a computer of its own. Google also has made waves in channeling the same plan as it announced plans to pay $12.5 billion to acquire Motorola Mobility, a maker of Android’s smartphones and tablets.

With the tremendous success of Apple, now the most highly valued company in the world, has shown rivals that in order to create superior technology was to “make the whole widget”. In the most recent  quarter, Apple’s revenue from iPad was $6.59 billion, more than Microsoft’s sales of Windows.

For Microsoft, making a tablet is a risky venture. Windows has a steadfast relationship with its hardware partners. The plan could erode the commitment those partners have to Windows since Microsoft will effectively be competing with them for sales.

Also, Microsoft has a mix track record. It makes the Xbox 360, but took years of losses due to manufacturing problems. They also failed with the Zune, which is a music player that was designed to compete with the iPod.

The Microsoft tablet is expected to use Windows 8 RT, based on a class of microprocessors called ARM chips. That is the same class of chips inside the iPad.

Let’s hope Microsoft will be successful in catching the golden Apple. Competition is always a good thing.  All comments are welcome for discussion!

Chrissy Le, Technology Marketing Specialist

1 Comment

Filed under Computing

Well I’ll Be A Monkey’s Uncle!

Picnik pioneered online photo editing, but recently closed its doors. It did not take long for another online photo editor to be developed.

PicMonkey is a  new online photo editor which does a great job, if not better than what Picnik could have done.

The user interface is very intuitive and loads fast. The features range from the basic crop and sharpen to applying advanced effects, all with a click of a button. I decided to try out this new editor to see what it can do.

This is the control panel where you do all your editing. The creative options are located on the left hand side. I loaded a photo (taken by my manager, Holly Berlin), and played with some of the features.

In the Basic Edits, I tried my hand at recoloring this photo.  I tested out the saturation and temperature feature.  Next I worked in the Effects panel, which gives you a one-click effects ranging from Urban effects to Polaroid style coloration.  I decided to work with the “Orton” effects, which gives the photo a soft magical feel.

Here is the result:

According to PicMonkey, certain features are free for the time being, but may have a cost applied to them in the future. If you would like to try out this great new online photo editor, go here: http://www.picmonkey.com/.  Tell us what you think!

Leave a comment

Filed under Free Applications

Google Chrome’s Password Generator

Everything we do via technology requires some sort of password protection. Whether we log on to a computer, check email, online banking, smart phones, or any kind of account management, we need passwords. How do we remember them all? I certainly can’t. I’m constantly fighting with myself when I need to recall a password for a particular website. Then when I think I finally have a password remembered, the system requires me to change it!

Google is in the process of working on a password generator for its  Chrome browser, to create strong passwords for its users to safeguard against hackers. When a user visits a page that Chrome thinks is going to set up an account, it will place a key icon in the password field. If the key icon is pressed, and confirmed, Chrome will generate a password that include letters, numbers, and characters to make it difficult for hackers to crack, and impossible for the user to remember.

photo credit: PC Magazine

Once the password is accepted, Chrome will sync it with the user’s other devices running the browser. Why does Google thinks it’s a good idea? They speculate that if a person doesn’t remember his or her password, then it can’t be given away to phishers.

Google’s goal is to have the browser authenticate the user’s login and identity. Currently you can achieve this through password managers, but users still know their passwords. By having Chrome generate passwords for users, this can remove the problem of phishing.

So what if the user would like to see their password from time to time? Google stated that they will create a secure website where users will be able to see and possibly print the passwords. Another problem would be, if someone cracks into the user’s Chrome account, they would have access to that person’s passwords.

We just can’t win can we? My solution would be to have a password that you will always remember, but spelled backwards, with the first letter in capital case, and the last as a digit and a symbol. Either that or we can just tattoo the password onto ourselves, and when we want to forget it, just add a flower tattoo over it. It works for the celebrities…

Will you be using this service once it’s available? Tell us what you think, all comments are welcome!

Chrissy Le, Technology Marketing Specialist

Leave a comment

Filed under Free Applications, Safety

What Are You Doing?

In March, 2006 a public bulletin board, otherwise known as an online social networking and micro blogging service, called “Twitter” was created.  Twitter enables users to send and read text posts up to 140 characters.  Today, over 200 million users generate 300 million tweets and Twitter’s social networking service handles over 1.6 billion search inquiries per day. People tweet about what’s going on at work, what’s going on in their lives, just what’s going on. Twitter is a way to follow friends, industry experts, famous celebrities and what’s happening around the world. www.twitter.com

“Twitterers” or “Tweeters” send and receive short messages, called “tweets” on Twitters website, with instant messaging software, or with mobile phones. Unlike most text messages, tweets are routed among networks of friends.  Strangers, called followers, can also choose to receive the tweets of people they find interesting.

Twitter has become an important marketing tool for celebrities, politicians and businesses promoting a level of intimacy never before approached online. Is that really your favorite celebrity, politician or business owner tweeting? Well, it just could be, but in many cases there are lots of ghost writers, those who are the voices relaying the message of celebrities, politicians or a business. 

I am the twitter ghost writer for CS Technologies Plus @cstechplus. I try to tweet several times a week on behalf of my company, posting about specials/promotions, our employees accomplishments, blog announcements, customer appreciation notes, news related to technology, tidbits of information that might be helpful to our readers along with promoting local community events.

CS Technologies Plus Twitter Page

 
 
 
 
 
 
 
 
 
 
 
 
Most technology savvy people can relate to Twitter, but to an average computer user (outside of the IT industry), understanding @symbols,# hashtags (#Friday13th), and other strange intricacies of Twitter can be a little overwhelming at times, even though the concept of 140 characters with the question “what are you doing?” seems so simple.  
 
I am a huge promoter of marketing your business (promoting your brand) via social marketing for a variety of reasons but my #1 reason is because it is “FREE” – #2 it helps you gain credibility in your field and #3 it helps you promote your products and services.  CS Technologies Plus has been on the forefront of the social marketing craze in our geographic area and it has paid off, we have gained business because of our social marketing efforts, which is another reason why I promote social networking, “I know it works”. 

What are your thoughts about tweeting? We would love to hear from you, if you are on twitter, be sure to follow us @cstechplus – here are some quotes from some of our twitter friends:

 @laurakellypifer I enjoy meeting and talking to others. I’ve meet some pretty AWESOME folks just from Twitter.

 @randykite I really like the versality of advanced Tweeting with #hashtags and connecting live with fans of reality TV.

 @cinnamonsueholt I tweet because I like people to know about CASA and coffee. Plus it keeps me in touch with the world.

 @jeanne16254 I tweet for lots of reasons,  work, friends, volunteer stuff, entertainment, school and others!

 Happy Tweeting!

 Holly Berlin, General Manager

Follow us on twitter at @cstechplus

Leave a comment

Filed under Social Networking

Should you join the blogosphere?

Blogging is becoming more and more popular everyday.  Should you join the blogosphere? Take a look at this list to help you make your decision about blogging.

  1. To Express Your Thoughts and Opinions – If you have something to say, blogs provide a place to say it and be heard.
  2. To Market or Promote Yourself or your business, product or service – Sell……Sell….Sell…
  3. To Help Others – Many blogs are written to help people going through similar situations that the blogger has experienced.
  4. To Establish Yourself as an Expert – Blogging can help legitimize your expertise and expand your online prescence and platform.
  5. To Connect with People Like you – blogging brings like minded people together.
  6. To Make a Difference – Blogs can be issue-based meaning the blogger is trying to provide information to sway people’s thinking in a certain direction.
  7. To Stay Active or Knowledgeable in a Field or Topic – It’s a perfect way to post updated and fresh information.
  8. To Stay Connected with Family and Friends – Blogs can be a simple way for family and friends to stay connected from different parts of the world by sharing stories, photos, videos and more.
  9. To Make Money – You can make money with patience and practice, you can make money through advertising and other income generating activies on your blog.
  10. To Have Fun and Be Creative – Have a passion about your blog topic, so you can write prolifically about it.  Some of the best blogs started out as blogs that were written just for fun and to give the blogger a creative outlet.

To learn more about blogging check out our training schedule http://www.cstechplus.com/training/schedule.asp - we periodically teach a 3-hour class on “How to Create a Free Word Press Blog website”.

Posted by GM Holly

2 Comments

Filed under Blogging, Training, Websites