CS TechBits – Applying “Text Effects” in Word 2010

Our trainers: Carol Smith, Holly Berlin and Chrissy Le will frequently be posting TechBits on our Tech Talk blog. This weeks video will show you how to apply “Text Effects” in a Microsoft Word 2010 document.


Leave a comment

Filed under CS Techbits

The Need For Advanced Security Communication

The integration of security systems into the digital world has opened up many doors to create robust systems to allow us to stay connected to our home or business with a smart phone or laptop.  But there is another, critical advantage that has closed the door on serious security system vulnerabilities. Redundant Communication.

Over the years, systems were connected with standard telephone land lines, (POTS lines).  Many events have gone unreported to the monitoring station when the land lines were cut prior to the intruder entering the home or business, resulting in no communication to the central station and no response from authorities.  The loss is great. In addition, many businesses and some homes as well, have installed video surveillance camera systems in addition to security alarm systems to better enhance security and provide a visual record in the event of a break in to aid in the prosecution of would-be intruders.  But here is the problem:

The Scenario:

Intruder cases home or business and is aware of security system.  Then before breaking in, the intruder cuts all landlines to the premises, disabling communication from the security systems, and then proceeds to gain entry into the premises.  The Intruder sees a camera system in place and knows that a recording device such as a DVR is onsite recording the event.  After the intruder cleans out all the valuables from the premises, the recording device is located and taken from the premises upon exiting. When the home or business owner arrives to the premise, they find that they have been robbed, but wonder why the security system did not call authorities.  When they try to check the recording device for events, they realize it is missing.  Therefore, no video evidence is available either.

The Security System Solution:

With the addition of a cellular backup communicator, the system reports over both landline and cellular communication.  With the landlines cut, the cellular communicator is still able to report and the authorities are still dispatched.

A more recent technology has been added to security panels called Advanced Protection Logic, APL. This was developed to respond to the “Smash and Grab” action, where an intruder cuts phone lines, gains entry through a door that would normally have an entry delay and quickly disables any additional communication by smashing or removing the device from the premises.  Normally, no signals would be sent by either landline or cellular communication until the delay expires.  This is especially an issue with integrated security panels.  APL sends a signal to central station immediately when the door is opened, but it is stored in hold register, awaiting the correct security code to be received.  If the correct code is not received within the delay period, it is read as a valid signal and the authorities are dispatched.  If the correct code is sent in time, then the signal is dumped.x

The Video Surveillance Solution:

The advancement of network cameras has made a digital solution for video surveillance more affordable.  Up to 6 indoor or outdoor network cameras can be installed and managed through an IP Communicator.  Rather than video being stored on the premises, the video is immediately sent off-site and stored at the provider’s servers.  No recording devices are present on the premises and any events are captured and sent off-site for later review.  Nothing can be removed by the intruder to destroy the video evidence.

As the Information Technology world advances, the Security world will further integrate with it and the solutions and possibilities will advance with it.  We have come a long way since the conventional burglar alarm system and the need for advanced physical security will continue to grow.

Jim Welch – Technology Specialist

Leave a comment

Filed under Safety, security

IT Devices as Accessories?

I felt so totally stuck in nineteenth century technology during my trip to Seattle three weeks ago that I almost threw my business cards away. I didn’t want to admit I worked for a tech company. I now know that my next IT purchase has to be a tablet device. Seriously.

I expected to see a lot of new tech devices in Seattle, but the number in the Akron/Canton airport was amazing. People were walking around talking to their Bluetooth connected smartphones or tablets things. The only individuals who were lugging full sized laptops were the ones in business suits, looking both uncomfortable and out of place. And me.

Then there’s the issue of weight of device. This is a huge thing when travelling. I don’t care how light that laptop is, it’s still 42 times as heavy as a tablet when you finally manage to get to your boarding gate.

And the room it takes up in your carry-on? That’s the equivalent to two pair of sandals or seven souvenirs. I could have three different brands of tablets for the weight and room needed for a single laptop. (This is calculated without factoring in the weight of the power pack or battery.)

Mind you, I don’t expect a tablet device to have the capability of my desktop or even my laptop. That would be like purchasing a Smart Car and expecting it to carry the load of a half-ton pickup.

I do expect to look like I embrace technology, get online and never   miss a play in Words with Friends or check-in on FourSquare.

Yes, people, your IT device of choice now determines your level of tech literacy. People look with envy at the latest (but not necessary greatest). Once again, appearance is everything.

Past generations were advised to dress for success. In the 21st Century, we need to pick our IT items for success. In an era where your car can be started by your smart phone, open your garage, parallel park for you, and call for reservations at the George V in Paris, choosing the ‘right’ IT device to travel and be seen with is critical.

Oh, and for those of you who participate in dating? Tablet devices are the new pickup tools, better than babies and dogs.

Carol Smith, Training Manager

Leave a comment

Filed under Computing

A Basket to Catch the Apple

For as long as there were personal computers, Microsoft had been the leader in software development and engineering for operating systems, and they stood firm on that belief. Today they are going to build a basket to catch the apple.

This week, Microsoft is expected to introduce a tablet computer to run their new Windows 8 operating system. It is the first time in the company’s 37-year history that it will offer a computer of its own. Google also has made waves in channeling the same plan as it announced plans to pay $12.5 billion to acquire Motorola Mobility, a maker of Android’s smartphones and tablets.

With the tremendous success of Apple, now the most highly valued company in the world, has shown rivals that in order to create superior technology was to “make the whole widget”. In the most recent  quarter, Apple’s revenue from iPad was $6.59 billion, more than Microsoft’s sales of Windows.

For Microsoft, making a tablet is a risky venture. Windows has a steadfast relationship with its hardware partners. The plan could erode the commitment those partners have to Windows since Microsoft will effectively be competing with them for sales.

Also, Microsoft has a mix track record. It makes the Xbox 360, but took years of losses due to manufacturing problems. They also failed with the Zune, which is a music player that was designed to compete with the iPod.

The Microsoft tablet is expected to use Windows 8 RT, based on a class of microprocessors called ARM chips. That is the same class of chips inside the iPad.

Let’s hope Microsoft will be successful in catching the golden Apple. Competition is always a good thing.  All comments are welcome for discussion!

Chrissy Le, Technology Marketing Specialist

1 Comment

Filed under Computing

Tech and Pseudo Invasion of Privacy

We hear a lot about our privacy being invaded by such modern technologies as cell phones, Twitter, FaceBook, credit and debit card usage tracking, etc. I wonder, though, did we ever really have the privacy we’re claiming to have lost?

An immediate example that comes to mind is the telepathic communication between parents living in small communities and close-knit neighborhoods when their children do something wrong. I know I never got home before the news of my disgraceful behavior did. This happened even when we were living with no telephone.

Then there were the party lines. Do you remember them? Anyone could listen in. (How many times did you drop a handset when someone yelled, “I know you’re there listening, you get off right now or I’m telling your mother!”)

Of course, the parental communication zone had nothing on the school gossip-rumor incubation zone. Age never mattered. It began in kindergarten. I don’t think it ever stops. The topics may change over time – from who got a new bicycle to who was dating who or who got what job – but it is still gossip and rumor.

It’s a very active part of society. From co-workers talking to each other to the people who you see publically, news of what you think, do, say, wear and dress gets around quickly….although not necessarily accurately. I’m convinced when they complete translations of cave paintings, they’re going to discover they were the tabloids of the day.

What technology has brought to the mix is just a function of speed and distance. While it may have taken news of bad behavior about 15 minutes to reach your folks, today that same behavior announcement can travel around the world twice in about 10 minutes – in multiple languages – with multiple twists on hairstyles, companions, clothing, locations, money spent, and/or drugs consumed.

It’s still the same old same old gossip/rumor mill.

Only now it’s on steroids.

And satellites.

Carol Smith / Training Manager

Leave a comment

Filed under Free Applications

Life in the Slow Lane?

Is your computer running slow? Is it taking longer than it used to take to do the routine tasks you like to perform? Are you wondering if it’s time to retire your PC and buy a new one? These are the questions that plague users young and old. Perhaps we can be of assistance here.

First off, your computer may not need to be replaced. There are many things that can slow you down. Here are some things to consider:

SOFTWARE – Have you purchased or updated your software with new versions that require greater system resources? It is important whenever considering software purchases to look at the system requirements that are usually printed on the side of the box or listed in the product information if you are purchasing online. These requirements may list such things as how much available hard drive space you need or how much RAM memory you should have to run the software. Oftentimes there will be a minimum number, and a recommended number. You should always go with the recommended numbers as the minimum may be setting you up for disappointing performance.

If your computer is fairly recent, there are upgrades we can install to make it last a few years longer. We can boost your RAM memory or upgrade you to a larger hard drive and you may see immediate results.

INFECTIONS – Is your computer infected? We see many cases every month of computers that are infected with various malicious attacks. Sometimes the effects of malware do not present themselves in visible ways (pop-up windows, etc.) but they go about their business of worming their way through the background processes of your computer, leading to poor performance. While a good anti-virus software package is a good idea, you must be proactive in getting the latest virus definitions and be persistent about scanning on a regular basis.

If you think you may be infected, we are able to help. We have resources available to dig out those deeply embedded malicious programs and restore your PC to a cleaner state of being.

HARDWARE – The hardware components of your computer can wear out. Sometimes you may need to replace a hard drive; not because it is filling up with data, but because it is starting to fail. Your drive may still be working, but it may be causing errors due to bad clusters. Whether your hard drive is performing 100% or showing signs of failure, it is always a good idea to have a regular practice of backing up your data. We also see RAM memory fail occasionally, as well as power supplies, fans, and CPU’s.

Oftentimes, we are able to replace faulty components and get you back on track.

Having said all that, there does come a time when you would be better off to bite the bullet and replace your entire system with a new one. Along with getting you a clean slate of all new components, you will also get the latest version of the Windows operating system. Our service technicians are here and available to discuss your issues with you and help you determine your best course of action.

Computers are like anything else. They are great when they are working, but frustrating when they aren’t. But, like anything else, with occasional check-ups, you can experience years of happy computing.

Please let us know if we can be of assistance to you. We are here to answer your questions and help you get back a smooth computing experience!

As I close, I must share with you that this is my last blog article for “Tech Talk.” As many of you know, I am also a pastor. I will be departing to continue my ministry career as chaplain at a local agency. I have enjoyed my time with CS Technologies Plus and have really enjoyed the blog as writing is something I love to do.

See you on the web!

Randy Kightlinger

Computer Service Technician

Leave a comment

Filed under Computing

Holey Magnolias

Blogging this week about FotoFlexer, another online photo editing website. www.fotoflexer.com With FotoFlexer you can edit photos from photobucket, myspace, facebook, flickr, Picasa Web Albums, or by uploading a photo directly from your computer.
I uploaded a photo of my mom and dad’s Magnolia tree to FotoFlexer. Here is what the photo looked like before editing.  I love, love, love the pink and when the Magnolias are in full bloom, they are magnificent to look at. A true sign of Spring.

After checking out all of features of FotoFlexer, I decided to edit the photo making just a couple edits, I added the “Lomoish” effect to the photo and I then decided to turn this photo into a poster (which is a feature in FotoFlexer). Then I simply added a title to my poster and some text. Well now what do you think? This all took a matter of virtually minutes. How fun!

When you are ready, give FlotoFlexer a spin (be sure to experiment) and let us know what you think! We didn’t see any pricing on their website, so we will assume that this editor is free for the time being, but just note that could change at any time.

 Since we are on the search for photo editors that are as good as the retired Picnik, be sure to share any you are using with us, so we can in-turn share them with all of our followers. 

Happy Photo Editing!
Have fun and be creative!

-Holly Berlin, General Manager

Leave a comment

Filed under Free Applications