Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Networking Isn’t What It Used to Be

Connecting Your Office

The modern office functions a lot like the office of twenty years ago in terms of networking. Most of the time, endpoints connect to switches that connect to routers that connects to servers and the internet. This has been the way it has been for a couple of decades. Sure, the technology itself has been improved drastically, bandwidth dwarfs older connection speed, but all-in-all it is pretty similar to the way that office networking has been structured for some time. 

One major change is the reliance on Wi-Fi. Wireless internet provides a more flexible work environment, giving staff a better ability to collaborate through the use of mobile devices such as laptops and smartphones. The integration of wireless connections necessitates the integration of security infrastructure and policies that work to keep unauthorized entities off of the business’ computing network. 

What Is Changing?

You can count on one hand the inventions that have had the type of impact that the Internet has had on modern society. It’s no secret that there is a worldwide push for ubiquitous Internet access. This push will no-doubt be felt inside the offices of businesses big and small for years to come. There are new considerations coming to the forefront of networking technology. Some of which promise to change the way networking works. These include:

Improvements to Wi-Fi

Wi-Fi 6, or 802.11ax, upgrades the current highest-speed Wi-Fi available, 802.11ac. It brings a substantial improvement in efficiency across all current Wi-Fi bands, including older frequencies, such as 2.4 GHz. The biggest improvement Wi-Fi 6 brings is it increases the density of devices that can co-exist in a single space, increasing the networking speed on all devices. 

Additionally, Wi-Fi 6 will improve performance by supporting packet scheduling that will make for dramatic improvements in power utilization by mobile devices. This will improve the wireless experience for every user and will substantially improve the way the Internet of Things is leveraged in the workplace. 

Improvements to Wireless Mobile Networks

If you haven’t heard about 5G yet, you will. The fifth-generation wireless network is going to be a game changer. Wireless carriers are beginning to roll out 5G slowly and manufacturers have balked at going all-in on building 5G devices, but soon 5G will be the predominant wireless Internet platform and it will change everything. 

5G will bring improved speed and battery life to smartphones and expand high-speed Internet for home users.

For the business, 5G will have less of an impact, but it will have one. 5G fixed access will be a useful option as a WAN connection for organizations that have multiple branches. Additionally, as 5G rolls out, it will present more opportunities for organizations to leverage the Internet of Things in new and useful ways.

Smarter Networking

In managing a modern network, administrators need powerful tools to be able to make everything play nice together. This type of coordination, especially as new wireless technologies take hold, needs to happen in real time. Businesses will start to use machine learning to learn more about all aspects of their network. In doing so they will be able to prioritize the efficiency of their networks. 

Machine learning, a type of artificial intelligence, will help push this along by optimizing network performance, enhance security, and do it at a reduced cost. It accomplishes this through strong pattern identification that will reduce the amount of time and effort spent by administrators on issues that aren’t critical in nature.

The immediate future will see gains in the way businesses and individuals are able to share, collaborate, and produce. If you are looking for some more information about innovative new networking technologies and how they can work to help your organization, call us today at (604) 513-9428.

0 Comments
Continue reading

End of Life Event on the Horizon

January 14, 2020

Microsoft has announced that Windows 7 will no longer be supported after January 14, 2020. Computers that are running the software will no longer be protected, and put your business at risk. After January 14th, any computer still running Windows 7 will not be receiving technical assistance from Microsoft. First released in late October 2009, Windows 7 was one of Microsoft’s most effective and popular operating systems, but the time has come to upgrade.

Why Shouldn’t You Run Unsupported Software?

Simply put, by running unsupported software your business becomes much more vulnerable to cyberattack. Supported software is routinely patched to keep potential vulnerabilities from becoming disasters for your company. A data breach can flatten any forward momentum a business has, and today, with ransomware being a consideration, making sure all of the software you depend on is supported keeps your business secure.  Besides the security issues, there are other considerations to contend with, like a loss in functionality 

What are Your Options?

Since you have around a month left to upgrade away from Windows 7, you still have time to switch your Windows 7 workstations over to Windows 10. Windows 10 is the current standard and has been for nearly five years. To upgrade to Windows 10 requires at least a 1 GHz processor, 2 GB of RAM, and 20 GB available on a hard drive. Since these specs aren’t much over what Windows 7 required, it may not be necessary to overhaul the hardware on each of your workstation. 

Extended Support

For organizations that simply won’t have time to upgrade their machines there are a couple of options that you should know about. Microsoft is offering a costly extended support package that will available for all Windows 7 Pro and Windows 7 Enterprise customers with volume licensing through January 2023. Most businesses will not qualify, but if yours does, the costs for Enterprise will be $25 per device from 2020-2021, $50 per device from 2021-2022, and $100 per device from 2022-2023. The cost of support for Pro versions will be double that. 

There are, at this moment no plans to support this software after 2023.

Microsoft 365

If your business is looking for an option that will move you on from Windows 7, Microsoft now offers the Microsoft 365 bundle. Available in enterprise, business, and education platforms, the cloud-based bundle provides users with Windows 10, the productivity and storage applications in Microsoft Office 365, and the security and control settings you’ll need to get the most out of the subscription service. Paid by the user, per month, major hardware upgrades can be tabled or done incrementally, allowing a business to pay as they go until they get to where they want to be. 

If your organization needs help upgrading your software, or keeping it patched and up-to-date, call the IT professionals at Coleman Technologies today at (604) 513-9428.

0 Comments
Continue reading

A Brief Look at Project Management Tools

What is Project Management?

This may seem pretty self-explanatory, but project management is the planning and systematic organization of a project’s tasks. Unfortunately, anything that ends up going wrong in a project is immediately the result of bad project management. That’s why it is essential to have tools that allow for efficient and effective project management. 

Project managers typically oversee the creation, delegation, and completion of tasks that are coordinated in a way where the tasks result in a finished product. Therefore, a lot of what a project manager does “quarterbacking” a team of resources. Solid communications, time and resource management, and constant and diligent assessment are the staples of a successful project manager.

Parts of Solid Project Management

Every project is different, but there are some of the elements that the PM has to manage. 

  • Planning- It’s the PM’s job to plan out each task and assign it to the resources that are available for it. Being able to properly schedule resources is a core responsibility of the project manager mainly because most projects not only have multiple people that work on them, but also because tracking the time that the project takes is how organizations measure the profitability of the project.
  • Time tracking - Typically integrated with the scheduler to streamline operations, time tracking is essential to manage resource involvement and be able to properly assign tasks. 
  • Collaboration - Today, businesses have collaboration options that fuel efficient project work. It is the PM’s responsibility to ensure every resource not only has access to a collaboration tool, but also uses the tool provided to complete their tasks as efficiently and effectively as possible. 
  • Documentation - In order to have a complete and thorough assessment of any finished project, you’ll need to have complete and thorough documentation to go through. Many of today’s productivity options have integrated a great set of tools that help PMs analyze contributor value.
  • Assessment - At the end of a project, after the delivery of the product to the customer/client, a complete audit of the project will provide all the successes and failures that took place in the duration of the project, helping a business know what it needs to improve on and, ultimately, if their project is bringing a large enough return (or a return at all). 

With the success of an individual project tied to the management of the resources it takes to complete it, proper coordination, documentation, and assessment are especially important. 

Project Management Tools

Most of the actual tools needed to fuel your organization’s projects have now been integrated into one or two pieces of software. They provide PMs with all of the information they need to place resources, assign tasks, and oversee the whole project. A few of these tools include:

  • Gantt chart - A Gantt chart is a visual representation of the project. The Gantt chart is used to illustrate how a project will run. It makes recalculating the timeline of a chart and shuffling resources around to meet demand much easier. 
  • PERT chart - PERT stands for Program Evaluation, and Review Technique. It’s essentially a chart that shows where each task assigned in a project is connected to other tasks in a project. Also represented through what is called the Critical Path method, this allows project managers and their teams to get a clear representation of how all the tasks in a project end up creating the end product. 
  • Moscow analysis - An analytic technique that stands for: must, should, could, won’t it allows PMs to work with project stakeholders to create the scope of the project. Obviously there are things you must do in the scope of a project, those need to be planned for and scheduled first. Then the things that should be done, followed by things that could be done to improve value, and finally eliminate things that simply don’t need to be done. 
  • WBS chart - WBS stands for Work Breakdown Structure, and is a common tool to help people visualize the entire scope of a project. This provides a comprehensive list of individual tasks. 
  • The Cone of Uncertainty - This is a visual tool that shows the measures of uncertainty vs. time. As the project goes forward uncertainty decreases. As risk is mitigated and governance is solid, confidence will increase. By managing risks properly, any project’s cone of uncertainty will show static improvement, ultimately leading to a successful finale.  

There are several other tools that a project manager can use, and many of them are incorporated in today’s powerful collaboration software. Many Customer Relationship Management software titles provide project management tools. If yours doesn’t, you can get stand-alone project management tools for your email client that provides PMs a set of useful options.

What is happening more today, however is that PMs are beginning to use collaboration apps like Microsoft Teams and Slack that come with dozens of software integrations strategically designed to make project management--which is, of course, a traditionally messy endeavor--easier. These titles alone do a lot of good mitigating risks and fueling collaboration.

IT projects can often be difficult to implement, but the knowledgeable professionals at Coleman Technologies have a great track record of improving our client’s businesses through strategic project success. Call us today at (604) 513-9428 to see how we can help. 

0 Comments
Continue reading

You Are Most Definitely Using Cloud Computing

A Refresher on the Cloud

“The cloud” is a term that is used extremely loosely, effectively referring to any data that is stored on the Internet. So yes, online storage spaces like Google Drive, Microsoft 365, and Dropbox count as the cloud. Your website’s hosting service counts as the cloud. The social media sites you use, like Facebook and Twitter, qualify as the cloud in a way. Arguably, even online banking is a cloud-based service, as your information is stored on your bank’s online servers.

If you use a store’s photo printing services, or attach a file to an email, or ask your virtual assistant to wake you up early, you are utilizing a cloud service. Businesses around British Columbia use cloud technology to share documents, store data, and host apps and line of business software titles.

Any data you have stored online is data that you have in the cloud.

Is It Okay to Have So Much Data Online?

Truthfully? It all depends upon what data you are storing, and where it is being stored.

It is important to remember that - in essence - all the cloud is, is someone else’s computer that you can leverage. Storing data in the cloud is quite literally entrusting its security to someone else… something that has both benefits and drawbacks.

On the one hand, many businesses have onsite servers in which they keep their company data, which requires them to keep those servers secure. If something happens to this data (despite the network protections and backups that should be in place) it is on that business.

On the other hand, cloud services are typically provided by big-name companies who can feasibly afford to protect the data they have been entrusted with. Who would have more capital available to invest in cloud security… your business, or the likes of Google or Microsoft?

It should also be considered that these larger companies can provide much more value to the people who can successfully hack them. It isn’t unheard of, either… Yahoo, Dropbox, and Apple iCloud have all been breached at some level, and attacks are always happening.

So, Is the Cloud Safe? How Can I Protect My Data?

All this may make you feel as though your most secure option is to eschew the cloud as much as possible - but, depending on what you’re storing and how this data is protected, you may have other options. Here are a few practices to help you balance the potential risks and rewards.

Encrypt BEFORE Uploading

Encryption is a very popular buzzword among cloud solutions. Public cloud providers will throw terms like “256-bit encryption” around, making their services sound pretty great. However, your data will only be encrypted like this as it is being transferred. In storage, it is unencrypted, and is therefore vulnerable. If your data were to be encrypted independently of the cloud, on the other hand, it would be rendered effectively useless to someone who didn’t have the ability to unlock it.

Understand Your Compliance Requirements

Different industries maintain different standards for the security of your customer and client data, in addition to the data privacy laws that are on the books. The medical field has HIPAA, and many businesses need to abide by PCI DSS. In order for you to use a service provider’s cloud solution to store your data, you need to confirm that it is compliant to the requirements imposed upon your industry by such regulations.

Practice Password Hygiene

While this is important to consider when leveraging a cloud service, any of your online activity should abide by the same rules. If you don’t repeat passwords across accounts, you can effectively limit the number of accounts that can be breached through one action.

Be Discerning

Cloud storage and services is a growing industry, thanks to its low barriers to entry and huge potential profits. You need to make sure that you select a service that is fully protecting your data, not just the one that offers you the lowest price.

Coleman Technologies can help you with your cloud service needs, without sacrificing your security. To learn more, give us a call at (604) 513-9428.

0 Comments
Continue reading

Solid Training can Make All the Difference

On the surface there is nothing abnormal or wrong about this scenario. The problem, however, that dropping a new hire into the fray with a copy of the employee handbook and a day-and-a-half of software and sensitivity training may actually not be the best way to handle your human resources. This month we are going to talk about how creating a sustained training platform can actually have a marked effect on your business’ ability to stay secure and productive. 

Education vs. Experience

The first place we’ll start is with the hiring process. Many organizations prefer to hire people that have a college degree of some sort. While that may be prudent if you are hiring people for a specialized job, many entry-level job postings are now requiring college degrees, often to the organization’s detriment. Since college graduates are likely to command a higher salary--and they didn’t go to college (and often assume large amounts of debt) to work entry-level jobs--they typically get impatient with their professional growth and hop from job-to-job until they find something more to their liking. In fact, people who have graduated from college since 2010 have averaged four job changes in their first nine years. 

That’s not the only thing. You have people whose education doesn’t match up with the demands of the jobs. People that get their degree in a certain discipline and didn’t work a job relating to that discipline for years, are often further behind than people who have experience in the field. Then you have that person who applies, but majored in Latin in college. Most businesses would be better off filling the position from within than hiring someone from outside the company and lacks real-world experience in the job.

This is where training comes in. For the college graduate who has been exposed to different perspectives, disciplines, and rules than the people that work real-world jobs are exposed to the practical knowledge necessary to troubleshoot even basic problems in a business setting may be a little troublesome to start with. There’s a reason why your average mechanic, plumber, and electrician keep being able to raise their rates: they’re experienced and trained.

Types of Training

The first thing that should be mentioned is that dedicating a lot of time and resources to employee training can become expensive. This is likely why a lot of people don’t do much of it. There are five major types of training that most organizations offer, in varying degrees. They are:

Orientation

Every business has some form of orientation. This is a short run down of the expectations of an employee by management.  Orientation will show new hires all the relevant information about what it means to be an employee at the company. Some businesses go into detail about things like the company mission, values, corporate culture, leadership information, employee benefits, administrative procedures, and any other tasks that need to be completed before any actual training begins. 

Onboarding

Onboarding is different than orientation. When you are onboarding your employees, you train them in the specific duties their job entails. This could be training on software systems they need to be accustomed to using, or training on how your business wants them to complete specific tasks. The idea is to make new hires as effective as possible, as quickly as possible. Some jobs come with a half-a-day of onboarding, while others take over a year to complete. 

Mandatory

There are some things that workers need to know, regardless of the position they hold. Some mandatory training is dictated by Federal and State governments, while others are strictly industry-wide points of emphasis. Public sector jobs often are required to take occupational health and safety courses. This practice is becoming more and more prevalent in the private sector, as is sexual harassment training.

Operational Skills

Skills training is designed to improve an employee’s ability to do the work, or to fill in other positions in your company. There are soft skills training and technical skills training. Soft skills training is designed to improve an employee’s ability to interact with others; and, with the company. These skills include:

  • Presentation and communication
  • Problem solving
  • Conflict resolution
  • Time management
  • Collaboration
  • Emotional intelligence
  • Adaptability

Studies have shown that a dedication to soft skills training works to resolve the normative problems with high turnover and unsuccessful collaborative culture.

Technical skills training enhances the technical proficiency of an employee. Any time employees can get better at the technical aspects of their jobs, it improves the products and services the company they work for delivers. 

Security

Nowadays, with the circumstances that modern workers have to consider, security training is an absolute must. Not only does it improve employees’ ability to protect business assets, it ensures that they are aware of the potential problems that the modern business is exposed to. 

Physical security training is typically limited, but if it is a major part of a person’s role within your company to keep assets secure, they should be given the information needed to accomplish this task. 

What’s more likely is that each person will need to take part in cybersecurity training. Digital assets are routinely targeted by people inside and outside of your business, so knowing how to protect them is a major point of emphasis that decision makers have to consider. The average worker needs to know how to identify a phishing attack, the best practices of data transmission, and what are good and bad practices when interacting with cloud-based and other online-based resources.

At Coleman Technologies, we know just how important keeping malware and unwanted visitors out of your network is and can help you with your cybersecurity and network security training platforms. Our team of professional IT technicians, and our dedication to helping businesses keep hackers from negatively affecting business, can go a long way to help you establish the training platform you need to keep your business' digital assets secure. Call us today at (604) 513-9428 for more information.

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image