Tag Archives: CS Technologies Plus

Need to Re-Direct A Website?

html redirect

One of the most requested items we get is “How do I make an html redirect page”.

Strangely enough this is one of the easiest things to accomplish, but then anything is easy when you know how to do it!

Here’s the code:

<!DOCTYPE HTML PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN”> <html> <head> <title>Your Page Title</title> <meta http-equiv=”REFRESH” content=”0;url=http://www.the-domain-you-want-to-redirect-to.com”></HEAD> <BODY> Optional page text here. </BODY> </HTML>

Code Description:

<meta http-equiv=”REFRESH” content=”0;url=http://www.the-domain-you-want-to-redirect-to.com”> is the part that actually does the redirecting.

The number preceding the url (in this case zero) tells the browser the number of seconds to wait before redirecting to the new url.

You could set this to 5 and add some optional text to your page – something like:

“Please wait while we redirect you to our new site”.

That’s it! Just copy the code, save it (i.e. save as index.html) and your html redirect will work perfectly.

Our web designers know I don’t like working in code, I am more of a “What you See is What you Get” kind of a Gal. So, If I can follow this procedure so can you.

Happy Coding!

Holly Berlin, General Manager

Leave a comment

Filed under Free Applications, Websites

CS TechBits – Applying “Text Effects” in Word 2010

Our trainers: Carol Smith, Holly Berlin and Chrissy Le will frequently be posting TechBits on our Tech Talk blog. This weeks video will show you how to apply “Text Effects” in a Microsoft Word 2010 document.

Leave a comment

Filed under CS Techbits

The Need For Advanced Security Communication

The integration of security systems into the digital world has opened up many doors to create robust systems to allow us to stay connected to our home or business with a smart phone or laptop.  But there is another, critical advantage that has closed the door on serious security system vulnerabilities. Redundant Communication.

Over the years, systems were connected with standard telephone land lines, (POTS lines).  Many events have gone unreported to the monitoring station when the land lines were cut prior to the intruder entering the home or business, resulting in no communication to the central station and no response from authorities.  The loss is great. In addition, many businesses and some homes as well, have installed video surveillance camera systems in addition to security alarm systems to better enhance security and provide a visual record in the event of a break in to aid in the prosecution of would-be intruders.  But here is the problem:

The Scenario:

Intruder cases home or business and is aware of security system.  Then before breaking in, the intruder cuts all landlines to the premises, disabling communication from the security systems, and then proceeds to gain entry into the premises.  The Intruder sees a camera system in place and knows that a recording device such as a DVR is onsite recording the event.  After the intruder cleans out all the valuables from the premises, the recording device is located and taken from the premises upon exiting. When the home or business owner arrives to the premise, they find that they have been robbed, but wonder why the security system did not call authorities.  When they try to check the recording device for events, they realize it is missing.  Therefore, no video evidence is available either.

The Security System Solution:

With the addition of a cellular backup communicator, the system reports over both landline and cellular communication.  With the landlines cut, the cellular communicator is still able to report and the authorities are still dispatched.

A more recent technology has been added to security panels called Advanced Protection Logic, APL. This was developed to respond to the “Smash and Grab” action, where an intruder cuts phone lines, gains entry through a door that would normally have an entry delay and quickly disables any additional communication by smashing or removing the device from the premises.  Normally, no signals would be sent by either landline or cellular communication until the delay expires.  This is especially an issue with integrated security panels.  APL sends a signal to central station immediately when the door is opened, but it is stored in hold register, awaiting the correct security code to be received.  If the correct code is not received within the delay period, it is read as a valid signal and the authorities are dispatched.  If the correct code is sent in time, then the signal is dumped.x

The Video Surveillance Solution:

The advancement of network cameras has made a digital solution for video surveillance more affordable.  Up to 6 indoor or outdoor network cameras can be installed and managed through an IP Communicator.  Rather than video being stored on the premises, the video is immediately sent off-site and stored at the provider’s servers.  No recording devices are present on the premises and any events are captured and sent off-site for later review.  Nothing can be removed by the intruder to destroy the video evidence.

As the Information Technology world advances, the Security world will further integrate with it and the solutions and possibilities will advance with it.  We have come a long way since the conventional burglar alarm system and the need for advanced physical security will continue to grow.

Jim Welch – Technology Specialist

Leave a comment

Filed under Safety, security

IT Devices as Accessories?

I felt so totally stuck in nineteenth century technology during my trip to Seattle three weeks ago that I almost threw my business cards away. I didn’t want to admit I worked for a tech company. I now know that my next IT purchase has to be a tablet device. Seriously.

I expected to see a lot of new tech devices in Seattle, but the number in the Akron/Canton airport was amazing. People were walking around talking to their Bluetooth connected smartphones or tablets things. The only individuals who were lugging full sized laptops were the ones in business suits, looking both uncomfortable and out of place. And me.

Then there’s the issue of weight of device. This is a huge thing when travelling. I don’t care how light that laptop is, it’s still 42 times as heavy as a tablet when you finally manage to get to your boarding gate.

And the room it takes up in your carry-on? That’s the equivalent to two pair of sandals or seven souvenirs. I could have three different brands of tablets for the weight and room needed for a single laptop. (This is calculated without factoring in the weight of the power pack or battery.)

Mind you, I don’t expect a tablet device to have the capability of my desktop or even my laptop. That would be like purchasing a Smart Car and expecting it to carry the load of a half-ton pickup.

I do expect to look like I embrace technology, get online and never   miss a play in Words with Friends or check-in on FourSquare.

Yes, people, your IT device of choice now determines your level of tech literacy. People look with envy at the latest (but not necessary greatest). Once again, appearance is everything.

Past generations were advised to dress for success. In the 21st Century, we need to pick our IT items for success. In an era where your car can be started by your smart phone, open your garage, parallel park for you, and call for reservations at the George V in Paris, choosing the ‘right’ IT device to travel and be seen with is critical.

Oh, and for those of you who participate in dating? Tablet devices are the new pickup tools, better than babies and dogs.

Carol Smith, Training Manager

Leave a comment

Filed under Computing

A Basket to Catch the Apple

For as long as there were personal computers, Microsoft had been the leader in software development and engineering for operating systems, and they stood firm on that belief. Today they are going to build a basket to catch the apple.

This week, Microsoft is expected to introduce a tablet computer to run their new Windows 8 operating system. It is the first time in the company’s 37-year history that it will offer a computer of its own. Google also has made waves in channeling the same plan as it announced plans to pay $12.5 billion to acquire Motorola Mobility, a maker of Android’s smartphones and tablets.

With the tremendous success of Apple, now the most highly valued company in the world, has shown rivals that in order to create superior technology was to “make the whole widget”. In the most recent  quarter, Apple’s revenue from iPad was $6.59 billion, more than Microsoft’s sales of Windows.

For Microsoft, making a tablet is a risky venture. Windows has a steadfast relationship with its hardware partners. The plan could erode the commitment those partners have to Windows since Microsoft will effectively be competing with them for sales.

Also, Microsoft has a mix track record. It makes the Xbox 360, but took years of losses due to manufacturing problems. They also failed with the Zune, which is a music player that was designed to compete with the iPod.

The Microsoft tablet is expected to use Windows 8 RT, based on a class of microprocessors called ARM chips. That is the same class of chips inside the iPad.

Let’s hope Microsoft will be successful in catching the golden Apple. Competition is always a good thing.  All comments are welcome for discussion!

Chrissy Le, Technology Marketing Specialist

1 Comment

Filed under Computing

Well I’ll Be A Monkey’s Uncle!

Picnik pioneered online photo editing, but recently closed its doors. It did not take long for another online photo editor to be developed.

PicMonkey is a  new online photo editor which does a great job, if not better than what Picnik could have done.

The user interface is very intuitive and loads fast. The features range from the basic crop and sharpen to applying advanced effects, all with a click of a button. I decided to try out this new editor to see what it can do.

This is the control panel where you do all your editing. The creative options are located on the left hand side. I loaded a photo (taken by my manager, Holly Berlin), and played with some of the features.

In the Basic Edits, I tried my hand at recoloring this photo.  I tested out the saturation and temperature feature.  Next I worked in the Effects panel, which gives you a one-click effects ranging from Urban effects to Polaroid style coloration.  I decided to work with the “Orton” effects, which gives the photo a soft magical feel.

Here is the result:

According to PicMonkey, certain features are free for the time being, but may have a cost applied to them in the future. If you would like to try out this great new online photo editor, go here: http://www.picmonkey.com/.  Tell us what you think!

Leave a comment

Filed under Free Applications

Google Chrome’s Password Generator

Everything we do via technology requires some sort of password protection. Whether we log on to a computer, check email, online banking, smart phones, or any kind of account management, we need passwords. How do we remember them all? I certainly can’t. I’m constantly fighting with myself when I need to recall a password for a particular website. Then when I think I finally have a password remembered, the system requires me to change it!

Google is in the process of working on a password generator for its  Chrome browser, to create strong passwords for its users to safeguard against hackers. When a user visits a page that Chrome thinks is going to set up an account, it will place a key icon in the password field. If the key icon is pressed, and confirmed, Chrome will generate a password that include letters, numbers, and characters to make it difficult for hackers to crack, and impossible for the user to remember.

photo credit: PC Magazine

Once the password is accepted, Chrome will sync it with the user’s other devices running the browser. Why does Google thinks it’s a good idea? They speculate that if a person doesn’t remember his or her password, then it can’t be given away to phishers.

Google’s goal is to have the browser authenticate the user’s login and identity. Currently you can achieve this through password managers, but users still know their passwords. By having Chrome generate passwords for users, this can remove the problem of phishing.

So what if the user would like to see their password from time to time? Google stated that they will create a secure website where users will be able to see and possibly print the passwords. Another problem would be, if someone cracks into the user’s Chrome account, they would have access to that person’s passwords.

We just can’t win can we? My solution would be to have a password that you will always remember, but spelled backwards, with the first letter in capital case, and the last as a digit and a symbol. Either that or we can just tattoo the password onto ourselves, and when we want to forget it, just add a flower tattoo over it. It works for the celebrities…

Will you be using this service once it’s available? Tell us what you think, all comments are welcome!

Chrissy Le, Technology Marketing Specialist

Leave a comment

Filed under Free Applications, Safety