Small Business Technology Blog

Thursday, October 30, 2008

Find lost user manuals for your technology.

User Manuals are often the first thing that go to the garbage bin, after you have got your hands on your favorite product / gadget, though most of the time you do not require a user manual, it becomes essential when you have a problem with your gadget or want to learn more about certain features.

search-user-manuals

But the user manuals are long gone with no possible way of getting them back. So how do you find user manuals for any products or gadgets online? Well follow these simple tips to find the the user manuals for your products.

Google Search Trick

Google search is a abundance of resources and documents and you just need to use the right search terms to find things from it. To search for user manuals with Google, follow this simple trick.

google-search-user-manuals

Search for “Product Name user manual” without the quotes, this should show you links from where you can easily download user manuals for your gadget.

User Manual Index

UserManualGuide provides users with a browsable index of user manuals, the user manuals are neatly categorized into proper hierarchy. So you can find user manuals based on manufacturers, which are further divided into product categories like home products, PC products, cellphones and so on.

usermanualguide-user-manual-index

Nodevice is also a great place to start searching for user manuals, it indexes the manuals for most of the popular gadgets, computer systems, cellphones, home products and more.

nodevice-user-manual-index

You can also find service manuals for products such as microwaves, fridges and more. Visit Nodevice to browse the user manuals index.

Search The Manufacturer Website

The last preferred way of finding manuals would be to search on it on the manufacturers site, the problem we see here is that popular product manufacturers keep on building newer and newer products making it a bit harder to find the right manual for the product.

search-manufacturer-site-for-user-manuals

The first two methods will not only help you find manuals from the manufacturers site itself, it will also give you access to several user uploaded manuals which are scattered across the internet, giving you a higher chance of finding the manuals.

If all else fails don't be afraid to call the manufacturer and ask for a copy to be either emailed or regualr mailed to you, there might be a small fee but given the other option (replacing the technology) It's probably worth it.

If you're still stuck and you're technology isn't doing what you'd like, Give us a call at the Technology Coach, we're here to help!

Friday, October 24, 2008

How to Save a Wet Cell Phone

Ever dropped your cell phone in the sink, or even worse, the toilet? Did you ever leave it in your pocket and run it through the washer? Did you ever swim with your cell phone in your pocket? It usually means you have to replace your phone, but sometimes if you're fast, you can save the phone!

Find out how here: http://www.wikihow.com/Save-a-Wet-Cell-Phone

Websites, Email Newsletters, FaceBook, LinkedIN, Blogs, YouTube and PodCasts!

Join Scott Kendall - The Technology Coach in Port Credit, Mississauga on Tuesday October 28st

We know as small business owners that there are a tremendous number of resources online to help us promote our business and get noticed, but how?

Whether you're a seasoned internet veteran or just looking to get your feet wet you'll learn how these inexpensive and often free tools can turn your business from an internet no-show to a well respected brand."
Join Scott Kendall, The Technology Coach for a glimpse into the world of online marketing and learn how to put these tools to use for your business.

*****************


Port Credit Library Texaco Room 6:30-8:30pm
$20.00 per person includes a light supper.
Last chance so act quickly by emailing info@portcredit.com

Presented by the Port Credit BIA and
Sol Solutons

Go Green with Ease: Five Steps for Small Businesses

Easy IT Strategies that Save Money and Help the Environment

Smart information technology (IT) practices can reduce the environmental impact of conducting business, and help small and medium-sized businesses (SMBs) reduce expenses.

With employee awareness and participation, even the busiest SMB can adopt simple "green" strategies that require little to no additional equipment or labor expenditures. Consider these enviro-friendly IT strategies:

Turn It Off


Reducing electricity consumption can help your business save money and the environment. U.S. computers used nearly 64 billion kilowatt hours of energy in 2005, costing over $6 billion, according to GreenIT, a consultancy focused on sustainable solutions for IT systems. Some solutions:

* Activate the sleep settings on idle monitors and PCs. The U.S. Environmental Protection Agency (EPA) estimates this action can save up to $75 per computer in annual power costs. From one management console, IT staff can use commercial software to control the power management features in networked computers.

* Replace power-hungry cathode ray tube (CRT) monitors and televisions with more efficient Light-Emitting Diode (LED) monitors.

Consolidate

* Converge multiple networks into a single infrastructure to reduce the number of devices (and power they consume), miles of wiring, and ultimately, amount of electric and electronic waste (WEEE, or e-waste); another benefit is more efficient centralized management.
* Deploy wireless networks to facilitate more flexible work environments and reduce cabling and power requirements.

Shop "Green"

* Choose Electronic Products Environmental Assessment (EPEAT)-registered products. The manufacturers declare, and EPEAT periodically verifies, that registered products conform to the IEEE 1680 environmental performance standard.

* Purchase IT products that perform several functions instead of one. They are easier to manage, cost less, and use less power than multiple single-purpose devices. For example, the functionality of seven separate devices--router, firewall, VPN, Power over Ethernet switch, WiFi access point, telephony gateway, and voice messaging—is available in one Cisco platform for small businesses.

Throttle Back Employee Transport

* Encourage secure telecommuting by implementing VPN-based solutions.

* Perform training, sales presentations, project collaboration, and other group activities by using telepresence technology, which reduce travel time and expenses as well as greenhouse gas emissions. By presenting a sales pitch with a customer as an online conference, one executive not flying from New York to London can save 2,690 pounds of carbon dioxide from jet fuel, according to WebEx, a Cisco subsidiary which offers SMBs a range of on-demand collaboration software. Use the WebEx CarbonCalculator to estimate the time, cost, and carbon dioxide incurred by employee car and air travel. To cut carbon, SMBs with a converged IP network can use telepresence applications that combine audio, video, and interactive elements; other SMBs can use WebEx subscription-based services.

Don't Throw It Away

E-waste is a sinister problem: it's loaded with toxic metals and organic chemicals that contaminate soil, water, and air. Europeans produce between 17 and 20 kilos of WEEE per capita each year, reports the EU Directorate-General for the Environment. Until recently, over 90% of it was buried in landfill sites, incinerated, or recovered without any treatment. In the United States, there are over 500 million obsolete computers, and only 10% of them are properly recycled, reports the Silicon Valley Toxics Coalition. Some solutions:

* Return end-of-life products in the EU to their producers. EU WEEE Directives require electronics vendors to take back their products for proper toxics disposal and component recycling; consumers may return their products free of charge. Some IT producers that do business in the EU plan to extend WEEE-type disposal and recycling programs to customers outside the EU.

* Dispose of other e-waste at government-certified facilities that are licensed for both hazardous waste disposal and recycling; some of them charge a fee.

Microsoft Security and vulnerability Alert "outside the norm"

If you've been using windows for more than just a little while now you're probably aware of the constant and unrelenting system updates, patches, security warnings from Microsoft, so why was it that Thursday October 24th was any different?


Well for starters I got not one, not two or three but 5 separate notices from Microsoft about this update, and it's not even "update day" by microsoft standards, they're breaking the mold, they don't do that often, and when they do, it's for good reason.


In this case Microsoft has found (and fixed) a major flaw, and not even a new one, this particular flaw was found about 2 years ago and fixed, and it's reared it's ugly head again, the details are below about the how and why of the update but the short answer to thos concerned is run a windows Update on your system (visit http://update.microsoft.com) and ensure you've got the latest patches, there is also a link below for the manual update, this applies to all current (2000 through XP and Vista) versions of windows.


The concern "ulnerability in Server Service Could Allow Remote Code Execution" translated out of technical jargon means any computer in the windows 2000 through Vista age (any windows pc less than 8 years old typically) is now vulnerable to a hacked attack that could allow remote control of your PC from the internet.


Alert - Critical Product Vulnerability - October 23, 2008 Microsoft Security Bulletin Release (Out of Band)

Due the urgency of this bulletin, you have received this notification in English. If your specified language preference is French, we will send you a French language version as soon as it becomes available. Thank you for your understanding.

What is the purpose of this alert?


This alert is to provide you with an overview of the new security bulletin released (out of band) on October 23, 2008. Microsoft has released security bulletin MS08-067, Vulnerability in Server Service Could Allow Remote Code Execution (958644), to address a vulnerability in all currently supported versions of Windows. This security update was released outside of the usual monthly security bulletin release cycle in an effort to protect customers.

Executive Summary

This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter. The security update addresses the vulnerability by correcting the way that the Server service handles RPC requests.

Recommendations

Microsoft recommends customers prepare their systems and networks to apply this security bulletin immediately once released to help ensure that their computers are protected from attempted criminal attacks. For more information about security updates, visit http://www.microsoft.com/protect.


http://www.microsoft.com/technet/security/bulletin/MS08-067.mspx

Understanding Data Exclusions for Small Business

A business associate of mine Domenic Martino recently shared a great article on small business insurance, of course at The Technology Coach our goal is to ensure data loss in your business never happens, but as with any other insurance, this type of protection is always recommended for those "just in case" scenarios.

So here’s a short article regarding insurance that may be of interest to small business owners, It has to do with a policy exclusion, known as “DATA EXCLUSION CLAUSE”. An exclusion in an insurance policy, simply means that there is no coverage for whatever is excluded.

Most policies specifically exclude coverage for losses resulting from loss of data. Read on....

Understanding Data Exclusions

You should know that, today, most business insurance does not cover the loss of or damage to data used and stored by your business. Here's what the Canadian insurance industry defines as data, why it's now excluded, a little background on the issue and some related problems from an insurance perspective.

What is data?

"Data" has been defined as "representations of information or concepts, in any form" in the federal Personal Information Protection and Electronic Documents Act. This definition has also been chosen as the standard by the industry's advisory body, the Insurance Bureau of Canada (IBC) as:

It stands on its own, and provides no reference to other definitions; and It is concise - fewer words mean fewer possible interpretations.

Why exclude data from coverage?

An increasing number of occurrences that have resulted in an economic loss for businesses can be traced to data, in one form or another. Data can be compromised by employees within the business or unknown parties outside the business, who, intentionally or unintentionally, delete, add, change, or misinterpret it. The basis of much of what we do today, and more of what we will be doing in the future, data is captured every time an individual uses a credit card, makes a telephone call or turns on a light switch. From a business perspective, data may form part of the company's billing system, provide insights into consumers' habits or form a part of the business' management information.

Stepping back and looking at how often data is used - cash registers, telephone call displays, word processing, the Internet and so on- you can see that, as a society, we have become completely dependent on data.

This is what makes cyber-world problems unique. The decision to exclude data from insurance policies was determined by the recognition that, while data is everywhere, its corruption, destruction, etc. may cause catastrophic losses.

Background

Early in 2001, reinsurance markets around the world indicated that "cyber risk" would be excluded from catastrophe treaties in 2002. IBC took on the task of reviewing the existing wordings in insurance policies to address the situation.

The reinsurers' primary concern was that a single event such as a virus attack could shut down all of the computers in a building, a city, a province or even a wider area. Should such an event occur, the loss could conceivably exceed the insurers' and reinsurers' ability to pay - effectively bankrupting the companies and damaging the economy. To prevent this, specific data exclusion wordings were drafted for each standard insurance form that provides coverage for direct damage and business income. Now, only certain damages resulting from specific perils will be covered.

Some issues to consider

The greatest area of concern is the lack of security. Many cases of attacks such as the "I Love You" virus and more recent versions have received widespread publicity and brought the concerns to everyone's attention. It is for this reason that we recommend frequent and regular checks and updating of security systems.

The law requires that personal information be protected. Individuals and companies that deal with personal information, such as your name, address, telephone number etc., are expected to take the necessary precautions to protect it.

Intellectual property is another area where there are legal issues to be dealt with. Software programs may be illegally copied, installed or posted on the Internet.

The Internet is accessible on a worldwide basis, which means that considerations have to be given to determine which country's laws apply. For example, if you live in Canada, purchase an item on the Internet from Sweden and you encounter a claim, there is a question of whether Canadian or Swedish law applies.

Another factor of the worldwide impact is the concern that what is acceptable in one country may not be in another. It may be a question of ethnic dress, a photograph of something or someone, or just words.

Insurers are also concerned with the cost of defending claims that may arise from these situations. While the claim may have little chance of success and be settled in favour of the insured, it could still cost millions of dollars to defend.

Article Shared from:
Domenic Martino, RIBO

Commercial Lines Account Manager
TRIPEMCO BURLINGTON INSURANCE (Halton) GROUP LIMITED
440 Elizabeth St,, Suite 303
Burlington ON, L7R 2M1
Tel: 905.333-3076
Fax: 905.333.4904
Toll Free: 800.373.1106
Cell: 416-834-1611

Friday, October 3, 2008

Invitation to be a Mentor

By Email today I received an invitation to be a small business mentor and participate in the Brampton Small Business Enterprise Centers annual Small Business Month event.

The invitation asked me to act as a mentor in the Energize – Fuel for the Entrepreneurial Mind is the Bridges to Better Business sessions because feedback through surveys from last year indicated that that there is interest in additional e-business related round tables.

The event takes place on October 30th at the Holiday Inn Select Bramtpn (Dixie and Queen St) and more information can be found at through the Brampton Small Business Enterprise Center.

I'm thrilled to be included and to be thought of as a "Mentor" to other small business people in my area. Looking forward to seeing many of you there.

Scott Kendall of The Technology Coach Nominated for a BNI Notable Netwrorker Award!

Having only Joined BNI a few months ago I can't begin to tell you how thrilled I was to hear my chapter had selected me from over 45 members to represent them as a "Notable Networker" just being nominated is an honour but I have to admit I've got my fingers crossed.

Here is the Letter I received from our BNI Executive Director

Congratulations! You have been voted by your BNI chapter members as one of this year's nominees for the chapter Notable Networker Award. On Thursday November 6th we will be recognizing each chapter award recipient.

In being nominated you are clearly viewed by your referral partners in BNI as someone who practices the Givers Gain philosophy consistently.

Making that kind of positive impression as a business person is indicative of your ongoing professionalism, contribution and willingness to help others, all of which are the traits of authentic givers.
The Awards Gala is held in celebration, and appreciation of those, like you, who give so much to the BNI referral program.

We look forward to celebrating with you.



Did you Know?

This fascinating and inspiring Video came to me via email the other day, what a wealth of knowledge delivered in a high energy format.


It focuses on the current north American growth and the application of technology in our lives. 5 minutes of your time well spent.