Downloading Embedded images

To download multiple embedded images from an email in Outlook as separate JPG files, follow these steps: Open the email > Click on the File tab > Select Save As > Choose the location where you want to save the images. In the Save as type drop down menu, select Web page, HTML only. > Click on the Save button. The images will… Read More »

Snapdrop – Transfer Files Between Any Device

Snapdrop allows users on the same network to quickly transfer files or send messages across all platforms. It uses a peer-to-peer (P2P) connection, making the data transfer very fast, and does not use Internet bandwidth or upload files to a server.  To use it simply navigate to snapdrop.net on any two devices that are connected to the same… Read More »

Multi-factor authentication

Multi-factor authentication (MFA) is an authentication technique that requires a user to present at least two factors that prove their identity. Something you know: A password. Something you have: A cellphone or keycard that can verify your identity. Something you are: Fingerprints or some other biometric data.

Dell Proximity Sensor.

Dell has added a feature on laptops that can make them act a bit strange. The proximity sensor watches you at all times. When you turn away it locks your PC. To turn this off go to Start Menu > Dell Optimizer > Proximity Sensor > Disable it.

Limiting Data Use on Cellular

To limit the use of cellular data you will want to set your connection to Metered. 1) From the Start menu open Settings (gear icon) > Click On Network & Internet 2) Locate your Wireless connection and click on Properties. 3) Find Metered connection and turn it on. Avoid the following: Installing  software updates Streaming Video Uploading files… Read More »

Open Database Connectivity

Open Database Connectivity (ODBC) is designed to expose database capabilities via SQL. It improves the analytics process by giving users real-time access to data from multiple sources. Data can be transformed, within applications such as Excel and PowerBI, into reports and dashboards. Excel macros and scripting languages like PowerShell can automate the creation and distribution of reports via… Read More »

Web Searching 101

Boolean search Utilizes special words or symbols to limit, widen, or define the scope of your search. These include: AND, OR, NOT, and NEAR, as well as the symbols + (add) – (subtract) ” ” (quote). Boolean Operator Symbol Explanation Example AND + All words must be present in the results football AND nfl OR Results can include any of the words… Read More »

Add Public Folder Contacts to your Mobile:

To add public folder contacts to your mobile: In your Outlook desktop app at the bottom left > click the ellipsis (…) > choose folders In the left panel locate Public Folders below your mailbox > expand the folders by clicking the “>” on the left of the folder until you see the contact folder you want to… Read More »

Dell Latitude 7400 2-in-1

Performance: 8930 CPU / 1058 GPU Dimensions: 12.6″ x 8″ x 0.6″ – 3.3 lbs – Display: 14″ 1920×1080 Cost: ~$2670 Special Features: Cell Modem & Wacom Tablet

Creating PDF Forms

A document can be easily converted to a fillable PDF form using either Adobe Acrobat Pro DC or Bluebeam Revu eXtreme (this feature is not available with Revu CAD or Revu Standard). If you are starting with a Word or Excel file, first convert that to a PDF, then follow these instructions:

File Format & Missing Data

When collaborating on a document in the cloud, it is advisable to use common fonts. A custom font loaded on your local computer will be replaced when the recipient either does not have the font installed or opens the file in their browser-based Apps. This can lead to substantial changes in the layout of the document.

Keyboard Shortcuts

Using keyboard shortcuts will greatly enhance your productivity. Ctrl + Action Ctrl + Action Ctrl + Action b Bold c Copy a Select all u Underline x Cut z Undo i Italic v Paste y Redo

Searching in Outlook

To access the advanced search tool: Go to Search (Tab) > Search Tools > Advanced FindUse: AND, NOT, OR, <, >, =, operators (must be typed in all CAPS) to refine your search..

Setup App Password for 365

What is it? Due to increased security on the 365 platform, you have two choices when accessing your mail, calendar, and contacts on your iOS devices. Switch to the Outlook App and stop using the built-in Apple apps. You will log in with your work password and use Multi-factor Authentication. Continue to use the native Apple apps for… Read More »

Call Forwarding

Cellular Call Forward (The phone will not ring): *72 & Number forwarding to Disable *72 0 No Answer Call Forward (Unanswered calls are forwarded):  *71 & Number forwarding to Disable *71 0 Vonage From the Vonage App: Tap the top left Icon > Settings > Call Settings > Call Forwarding > Select “Forward All Calls” > Tap the… Read More »

Vonage Fax

Setting up the account: Each user who will be using the fax needs to be added to the Vonage portal by the administrator. These people do not necessarily need to have assigned Vonage extensions, as the fax permissions are assigned using the person’s email address. Up to 6 users can be assigned permission to receive faxes as well… Read More »

Managing InDesign Versions

Adobe InDesign updates change the .indd file format, with each major release. Because of this, it is advisable for all team members to run the same version of the software and coordinate their transition to a new version. Users can manage the update process by: Open the Creative Cloud App Click the ellipsis next to the currently installed… Read More »

Verizon Call Filter

For Verizon customers, this app does a good job of blocking unsolicited calls. It provides real-time alerts and automatically blocks known offenders. The$3 subscription is not necessary for the basic level of protection. Download

Microsoft 365 Username Change

When signing into Office 365 it is important to go to www.office.com first. Here you can download software, access cloud based apps, but more importantly, you will setup two-factor verification.

Microsoft 365 two-factor verification

Two-factor verification is more secure than just a password because it relies on two forms of authentication: Something you know, like your password. Something you have, like a phone or other device that you carry. The recommended options are: Verification code from Microsoft Authenticator app: You’ll use your app to get a verification code you’ll type into the… Read More »

iOS Database issues

After updating your iOS you may experience issues such as: Attachments not downloading. Calendar invites showing up as .ics files. Contact searches running very slow. Unread items showing incorrect count. Email downloading only the first few lines.

OneDrive 101

OneDrive is your new cloud-shared storage directory that supports hundreds of file types. Access OneDrive: Go to office.com and logon. Click on the “Waffle” icon at the top left > click on OneDrive. From this location, you can upload files, create folders and share information with coworkers and clients. Office.com is the most accessible place to set up… Read More »

Office 365 Sign in process

When signing into Office 365 it is important to go to www.office.com first and sign in. Here you can download software, access cloud based apps, but more importantly, you will setup multi-factor authentication.

Username update

On your iOS device: 1) On iOS 14 go to Settings > Mail > Accounts On iOS 13 go to Settings > Passwords & Accounts 2) Tap on the email account you need to update > Tap Account at the top 3) Enter your new username > Done   On your PC: 1) If out of the office… Read More »

Jabra Engage 75

Wireless headsets can be a great enhancement to your daily productivity. The Jabra Engage 75 connects to your PC, Mobile and desk phone. For those that travel the Jabra Evolve2 85 is a great over the ear solution.

Microsoft Teams 101

Teams is a great tool for real-time collaboration.  It allows your office to call, chat and meet one place. Chats are persistent and can be secured to limit access.

Restore Missing Data

If your data is stored on a Windows server it is preserved for a limited time by a service called Shadow Copy. To access these files: Open File Explorer > Navigate to the original location of the data you want to recover. Right-click in the open space of the folder > choose Properties > Previous Versions (Tab) Select… Read More »

Multiple GPU Best Performance

Workstation class laptops usually have two GPUs. The onboard Intel integrated GPU and a dedicated NVIDIA  graphics card. When this is the case you need to make sure that your high-performance applications use the NVidia GPU, rather than the low-performance Intel integrated GPU. To ensure optimal application performance make the following adjustment:

Connect a mouse to your iPad

Beginning with iOS 13 you can connect a Bluetooth mouse or Bluetooth keyboard & mouse combo to your iPad. Here are the steps: Go to settings > Accessibility > AssistiveTouch > Devices > Bluetooth Devices Place your device in pairing mode and select it from the iPad menu. Go back to AssistiveTouch and turn it on.

Identifying Nefarious Links

In order to protect yourself on the Internet, you need to be proficient at locating and identifying domain names. This is because, emails and attachments can be used to redirect you to sites that are loaded with bad content. Make sure you can: Verify the email sender. Verify any link contained in the message or within an attachment… Read More »

FileBrowser 101

Editing Files in Another App Remember that FileBrowser can preview a variety of file formats such as Excel, PDF & Word. If you tap on the file in FileBrowser, it will open in preview mode. If you want to edit it in another app, Do Not preview, Do Not tap on the file name. Tap the vertical ellipsis… Read More »

Grandparent Scam with a Twist

The “Grandparent Scam” is a particularly disturbing scam perpetrated on the elderly. The criminal contacts the Grandparent, pretending to be a grandchild in trouble with the law or in desperate need of cash for a medical bill. They then claim that the matter cannot be discussed with other family members (red flag). Victims report receiving calls late at… Read More »

Relative Paths and Linked Files

Applications like InDesign and AutoCAD interlink files as you create content. This allows teams to share workloads, provides more efficient file storage and adds greater stability to the software platforms. These linked files can create an issue when multiple entities work on the same file or when content is moved to a new location. The solution to this… Read More »

KeePass Touch

This is the mobile version of Keepass, our recommended desktop password management tool. You can use iTunes on your PC or Mac to transfer your password database to your iOS device periodically. This will give you mobile access to your passwords without ever placing them at risk in the cloud. This can also serve as a backup location… Read More »

Grammarly

Grammarly is a writing assistant that can spell-check your web-based content as you write. It can be loaded as a firefox browser plugin for free. It offers advanced functionality, with a monthly subscription, to evaluate your writing in the areas of tone, engagement, clarity, and grammar.

Common Fonts

When creating an e-mail signature in Outlook or sharing a word or excel file, it is important to remember that fonts are not common across all platforms. If you use a font that does not exist on the recipient’s device, your signature or file appearance will change as the font you selected is replaced with a default font.… Read More »

360 Images and Video

360 degree images and video are incredibly easy to create and share, with the right tools. The latest 360 camera from Ricoh is the Theta V. The camera can capture both images and video. It can be controlled remotely from an iPhone and instantly transfer images and video. With the right wordpressplugin, you can post images or create… Read More »