Open Database Connectivity (ODBC) is designed to expose database capabilities via SQL. It improves the analytics process by giving users real-time access to data from multiple sources. Data can be transformed, within applications such as Excel and PowerBI, into reports and dashboards. Excel macros and scripting languages like PowerShell can automate the creation and distribution of reports via… Read More »
Boolean search Utilizes special words or symbols to limit, widen, or define the scope of your search. These include: AND, OR, NOT, and NEAR, as well as the symbols + (add) – (subtract) ” ” (quote). Boolean Operator Symbol Explanation Example AND + All words must be present in the results football AND nfl OR Results can include any of the words… Read More »
To add public folder contacts to your mobile: In your Outlook desktop app at the bottom left > click the ellipsis (…) > choose folders In the left panel locate Public Folders below your mailbox > expand the folders by clicking the “>” on the left of the folder until you see the contact folder you want to… Read More »
Performance: 8930 CPU / 1058 GPU Dimensions: 12.6″ x 8″ x 0.6″ – 3.3 lbs – Display: 14″ 1920×1080 Cost: ~$2670 Special Features: Cell Modem & Wacom Tablet
Performance: 19683 CPU / 13392 GPU Cost: ~$5,460
Performance: 17312 CPU / 9539 GPU Dimensions: 16.3″ x 10.7″ x 1″ – 6.8 lbs – Display: 17.3″ 1920×1080 Cost: ~$5300
A document can be easily converted to a fillable PDF form using either Adobe Acrobat Pro DC or Bluebeam Revu eXtreme (this feature is not available with Revu CAD or Revu Standard). If you are starting with a Word or Excel file, first convert that to a PDF, then follow these instructions:
When collaborating on a document in the cloud, it is advisable to use common fonts. A custom font loaded on your local computer, will be replaced when the recipient either does not have the font installed, or opens the file in their browser-based 365 Apps. This can lead to substantial changes in the content of the document.
Using keyboard shortcuts will greatly enhance your productivity. Ctrl + Action Ctrl + Action Ctrl + Action b Bold c Copy a Select all u Underline x Cut z Undo i Italic v Paste y Redo
To access the advanced search tool: Go to Search (Tab) > Search Tools > Advanced FindUse: AND, NOT, OR, <, >, =, operators (must be typed in all CAPS) to refine your search..
What is it? Due to increased security on the 365 platform, you have two choices when accessing your mail, calendar, and contacts on your iOS devices. Switch to the Outlook App and stop using the built-in Apple apps. You will log in with your work password and use Multi-factor Authentication. Continue to use the native Apple apps for… Read More »
Cellular Call Forward (The phone will not ring): *72 & Number forwarding to Disable *72 0 No Answer Call Forward (Unanswered calls are forwarded): *71 & Number forwarding to Disable *71 0 Vonage From the Vonage App: Tap the top left Icon > Settings > Call Settings > Call Forwarding > Select “Forward All Calls” > Tap the… Read More »
Setting up the account: Each user who will be using the fax needs to be added to the Vonage portal by the administrator. These people do not necessarily need to have assigned Vonage extensions, as the fax permissions are assigned using the person’s email address. Up to 6 users can be assigned permission to receive faxes as well… Read More »
Adobe InDesign updates change the .indd file format, with each major release. Because of this, it is advisable for all team members to run the same version of the software and coordinate their transition to a new version. Users can manage the update process by: Open the Creative Cloud App Click the ellipsis next to the currently installed… Read More »
When signing into Office 365 it is important to go to www.office.com first. Here you can download software, access cloud based apps, but more importantly, you will setup two-factor verification.
Two-factor verification is more secure than just a password because it relies on two forms of authentication: Something you know, like your password. Something you have, like a phone or other device that you carry. The recommended options are: Verification code from Microsoft Authenticator app: You’ll use your app to get a verification code you’ll type into the… Read More »
After updating your iOS you may experience issues such as: Attachments not downloading. Calendar invites showing up as .ics files. Contact searches running very slow. Unread items showing incorrect count. Email downloading only the first few lines.
OneDrive is your new cloud shared storage directory that support hundreds of file types. Access OneDrive: Go to office.com and logon. Click on the “Waffle” icon at the top left > click on OneDrive From this location you can upload files, create folders and share information with coworkers and clients. Office.com is the easiest place to setup shares… Read More »
When signing into Office 365 it is important to go to www.office.com first and sign in. Here you can download software, access cloud based apps, but more importantly, you will setup multi-factor authentication.
On your iOS device: 1) On iOS 14 go to Settings > Mail > Accounts On iOS 13 go to Settings > Passwords & Accounts 2) Tap on the email account you need to update > Tap Account at the top 3) Enter your new username > Done On your PC: 1) If out of the office… Read More »
Wireless headsets can be a great enhancement to your daily productivity. The Jabra Engage 75 connects to your PC, Mobile and desk phone. For those that travel the Jabra Evolve2 85 is a great over the ear solution.
Teams is a great tool for real-time collaboration. It allows your office to call, chat and meet one place. Chats are persistent and can be secured to limit access.
If your data is stored on a Windows server it is preserved for a limited time by a service called Shadow Copy. To access these files: Open File Explorer > Navigate to the original location of the data you want to recover. Right-click in the open space of the folder > choose Properties > Previous Versions (Tab) Select… Read More »
Workstation class laptops usually have two GPUs. The onboard Intel integrated GPU and a dedicated NVIDIA graphics card. When this is the case you need to make sure that your high-performance applications use the NVidia GPU, rather than the low-performance Intel integrated GPU. To ensure optimal application performance make the following adjustment:
Beginning with iOS 13 you can connect a Bluetooth mouse or Bluetooth keyboard & mouse combo to your iPad. Here are the steps: Go to settings > Accessibility > AssistiveTouch > Devices > Bluetooth Devices Place your device in pairing mode and select it from the iPad menu. Go back to AssistiveTouch and turn it on.
In order to protect yourself on the Internet, you need to be proficient at locating and identifying domain names. This is because, emails and attachments can be used to redirect you to sites that are loaded with bad content. Make sure you can: Verify the email sender. Verify any link contained in the message or within an attachment… Read More »
Editing Files in Another App Remember that FileBrowser can preview a variety of file formats such as Excel, PDF & Word. If you tap on the file in FileBrowser, it will open in preview mode. If you want to edit it in another app, Do Not preview, Do Not tap on the file name. Tap the vertical ellipsis… Read More »
The “Grandparent Scam” is a particularly disturbing scam perpetrated on the elderly. The criminal contacts the Grandparent, pretending to be a grandchild in trouble with the law or in desperate need of cash for a medical bill. They then claim that the matter cannot be discussed with other family members (red flag). Victims report receiving calls late at… Read More »
Applications like InDesign and AutoCAD interlink files as you create content. This allows teams to share workloads, provides more efficient file storage and adds greater stability to the software platforms. These linked files can create an issue when multiple entities work on the same file or when content is moved to a new location. The solution to this… Read More »
This is the mobile version of Keepass, our recommended desktop password management tool. You can use iTunes on your PC or Mac to transfer your password database to your iOS device periodically. This will give you mobile access to your passwords without ever placing them at risk in the cloud. This can also serve as a backup location… Read More »
Grammarly is a writing assistant that can spell-check your web-based content as you write. It can be loaded as a firefox browser plugin for free. It offers advanced functionality, with a monthly subscription, to evaluate your writing in the areas of tone, engagement, clarity, and grammar.
When creating an e-mail signature in Outlook or sharing a word or excel file, it is important to remember that fonts are not common across all platforms. If you use a font that does not exist on the recipient’s device, your signature or file appearance will change as the font you selected is replaced with a default font.… Read More »
360 degree images and video are incredibly easy to create and share, with the right tools. The latest 360 camera from Ricoh is the Theta V. The camera can capture both images and video. It can be controlled remotely from an iPhone and instantly transfer images and video. With the right wordpressplugin, you can post images or create… Read More »
When you have a weak wireless signal, you can try and boost it in a couple of ways: Make sure the wireless access point (WAP) closest to you is not obstructed. Clear away any dense objects within a foot of the device. You might also reposition it to boost the signal. Make sure your device in not in… Read More »
A business may be held liable for all or a substantial portion of any loss when checks are stolen or altered. Positive Pay is an automated check fraud detection service offered by most banks. It matches the payee, check number, and dollar amount of each check presented for payment against a list of checks issued from your accounting… Read More »
Tips, from the FBI, to avoid becoming a victim of cyber fraud: Do Not Do not give unknown, unverified persons remote access to devices or accounts. Do not communicate with unsolicited email senders. Do not act in haste. Criminals create a sense of urgency to produce fear and lure the victim into immediate action.