Standart Post

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla vehicula feugiat blandit. Nulla facilisi. Nulla tellus nisi, congue id tristique vitae, lacinia iaculis magna. Curabitur mattis nec nisi non consequat. Morbi nunc nisi, scelerisque in ornare ut, congue viverra lectus. Ut ut pretium elit. Donec laoreet eros sit amet purus tempus, nec faucibus enim scelerisque.Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla vehicula feugiat blandit. Nulla facilisi. Nulla tellus nisi, congue id tristique vitae, lacinia iaculis magna. Curabitur mattis nec nisi non consequat. Morbi nunc nisi, scelerisque in ornare ut, congue viverra lectus. Ut ut pretium elit. Donec laoreet eros sit amet purus tempus, nec faucibus enim scelerisque. Vivamus fermentum risus sapien, non sodales est vestibulum nec. Cras aliquet porttitor enim at adipiscing. Quisque vestibulum, nibh quis accumsan ullamcorper, justo neque commodo nibh, ut porttitor elit lectus quis risus.

Integer eget sodales turpis, vitae bibendum dolor. Curabitur congue magna eu augue interdum, euismod cursus nibh lobortis. Vestibulum tincidunt sem vel mattis semper. Mauris id imperdiet nisi. Ut volutpat dui sed lorem consectetur euismod. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Nullam gravida quis urna vel aliquam. In id ligula vitae tortor facilisis molestie at ac turpis. Suspendisse potenti. Nam pharetra gravida porta.

Praesent velit mi, accumsan in felis ut, lacinia vestibulum nisl. Praesent fringilla ipsum purus, sed dapibus leo tempor pulvinar. Donec rhoncus posuere est, sed rhoncus diam euismod a. Fusce consectetur justo erat, ac aliquet sapien luctus a. Duis sodales turpis magna, ut ornare augue interdum sit amet. Donec a sem sed risus venenatis facilisis ac sit amet turpis. Nam sed lorem egestas tellus interdum pulvinar in eget libero.

Nunc sed odio eget arcu cursus posuere. Integer tristique lacus id elit eleifend venenatis. Mauris aliquet viverra nisl, at hendrerit turpis varius quis. Vivamus odio tortor, consequat nec vehicula eget, hendrerit eu ipsum. Ut malesuada urna enim. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vivamus vehicula nisi eu blandit pellentesque. Ut nec tellus elementum, feugiat tortor a, dictum nisl. Ut aliquam leo sit amet fringilla pretium. Nam eu augue nisl. Nullam augue sapien, imperdiet id suscipit non, cursus et diam. Aenean aliquet libero commodo, auctor ligula non, ullamcorper nunc. Etiam vehicula vitae turpis vitae pellentesque. Interdum et malesuada fames ac ante ipsum primis in faucibus. Aliquam mattis tempus vehicula. Nullam egestas, ligula at suscipit varius, arcu est facilisis augue, a aliquet ipsum libero ac sapien.Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla vehicula feugiat blandit. Nulla facilisi. Nulla tellus nisi, congue id tristique vitae, lacinia iaculis magna. Curabitur mattis nec nisi non consequat. Morbi nunc nisi, scelerisque in ornare ut, congue viverra lectus. Ut ut pretium elit. Donec laoreet eros sit amet purus tempus, nec faucibus enim scelerisque.

Gallery Post Type

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla vehicula feugiat blandit. Nulla facilisi. Nulla tellus nisi, congue id tristique vitae, lacinia iaculis magna. Curabitur mattis nec nisi non consequat. Morbi nunc nisi, scelerisque in ornare ut, congue viverra lectus. Ut ut pretium elit. Donec laoreet eros sit amet purus tempus, nec faucibus enim scelerisque.Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla vehicula feugiat blandit. Nulla facilisi. Nulla tellus nisi, congue id tristique vitae, lacinia iaculis magna. Curabitur mattis nec nisi non consequat. Morbi nunc nisi, scelerisque in ornare ut, congue viverra lectus. Ut ut pretium elit. Donec laoreet eros sit amet purus tempus, nec faucibus enim scelerisque. Vivamus fermentum risus sapien, non sodales est vestibulum nec. Cras aliquet porttitor enim at adipiscing. Quisque vestibulum, nibh quis accumsan ullamcorper, justo neque commodo nibh, ut porttitor elit lectus quis risus.

Integer eget sodales turpis, vitae bibendum dolor. Curabitur congue magna eu augue interdum, euismod cursus nibh lobortis. Vestibulum tincidunt sem vel mattis semper. Mauris id imperdiet nisi. Ut volutpat dui sed lorem consectetur euismod. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Nullam gravida quis urna vel aliquam. In id ligula vitae tortor facilisis molestie at ac turpis. Suspendisse potenti. Nam pharetra gravida porta.

Praesent velit mi, accumsan in felis ut, lacinia vestibulum nisl. Praesent fringilla ipsum purus, sed dapibus leo tempor pulvinar. Donec rhoncus posuere est, sed rhoncus diam euismod a. Fusce consectetur justo erat, ac aliquet sapien luctus a. Duis sodales turpis magna, ut ornare augue interdum sit amet. Donec a sem sed risus venenatis facilisis ac sit amet turpis. Nam sed lorem egestas tellus interdum pulvinar in eget libero.

Nunc sed odio eget arcu cursus posuere. Integer tristique lacus id elit eleifend venenatis. Mauris aliquet viverra nisl, at hendrerit turpis varius quis. Vivamus odio tortor, consequat nec vehicula eget, hendrerit eu ipsum. Ut malesuada urna enim. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vivamus vehicula nisi eu blandit pellentesque. Ut nec tellus elementum, feugiat tortor a, dictum nisl. Ut aliquam leo sit amet fringilla pretium. Nam eu augue nisl. Nullam augue sapien, imperdiet id suscipit non, cursus et diam. Aenean aliquet libero commodo, auctor ligula non, ullamcorper nunc. Etiam vehicula vitae turpis vitae pellentesque. Interdum et malesuada fames ac ante ipsum primis in faucibus. Aliquam mattis tempus vehicula. Nullam egestas, ligula at suscipit varius, arcu est facilisis augue, a aliquet ipsum libero ac sapien.Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla vehicula feugiat blandit. Nulla facilisi. Nulla tellus nisi, congue id tristique vitae, lacinia iaculis magna. Curabitur mattis nec nisi non consequat. Morbi nunc nisi, scelerisque in ornare ut, congue viverra lectus. Ut ut pretium elit. Donec laoreet eros sit amet purus tempus, nec faucibus enim scelerisque.

Windows XP Support – IMPORTANT INFO

July 2, 2013

You have been identified as possibly having 1 or more Windows XP Machines.

What does this mean for you? 

Actually you are not required to do anything but we feel it is our duty and obligation to let you know what the risks are to you and your business.

Windows XP Support is coming to an end by Microsoft on April 8, 2014.

This does not mean Sterling Rose will not continue to support it.    It means Microsoft will stop releasing security updates and software fixes related to Windows XP as well as new programs and updates might not work with Windows XP.

So what if we stay with XP?

There’s a seemingly valid contention that sticking with XP after Microsoft’s end of life for the OS isn’t a big deal. Most large companies have applications and custom code from the COBOL days, and no doomsday scenarios are playing out, so why should XP be any different?

While this logic is sound, XP remains one of the major targets for exploits, primarily due to market share. Just as infamous bank robber Willy Sutton quipped that he robbed banks “because that’s where the money is,” malware and targeted exploits will go after systems with a large installed base. Surely new exploits will be found after Microsoft ends support, and users will have to rely on Microsoft extending support yet again, or a third party layering protections atop Microsoft’s code

What if I want to upgrade?

Now is a great time to upgrade.   While we feel Windows 8 is not right due to its drastic user interface changes especially removal of the Start Menu and Windows 8.1 not making things much better. Windows 7 is a great choice and has been around and some large companies are just beginning Windows 7 deployments.  This means you can upgrade to an operating system that is very well supported and will continue to be for a while at least till the year 2020.

What is it going to cost?

That’s a great question.   There is the new hardware cost which is minimal.    But the reason we send out this letter months in advance are to give you time to budget replacement as there could be software that might need to be upgraded as well.     We realize that it is not just the cost of the PC but the labor, data transfer, and any associated software costs that add up to the total cost.

If you would like to discuss this further and would like to start planning do not hesitate to reach out to us to setup a meeting.

 

Two-Factor Authentication

Two-factor authentication is another security layer for remote access to websites and networks. With more and more web-based applications requiring more complex passwords, needing to enter some other information may seem like a royal pain. But it provides the protection you need to enhance your data safety.

Two-factor authentication is just what it says. It’s a second password, a reference to a graphic symbol or an answer to a question. While nothing is 100% foolproof, it’s a step to help the system you’re using verify you are you. And for now, it offers protection against hackers when you bank or purchase goods online or use a VPN (virtual private network) to access your work computer or corporate systems and data files over the Internet.

Getting up and running with two-part authentication for business and personal applications is quick and easy.

Many businesses are using mobile phones as the second part of two-factor authentication. When a user accesses a VPN from a laptop or tablet, just to use one example, you enter the normal username and password. Once the network identifies the user, it sends a numeric code to a designated telephone number. For most of us, this is usually a mobile phone. You then have 60 seconds to enter  the numeric code from the computer or tablet you are using.

For personal Internet applications, such as Facebook, LinkedIn and Twitter, you can go to “settings” to strengthen your security.

In Facebook, for example, you can go to settings and click the Security folder on the top left of your screen. You’ll have nine settings you can adjust. Some of them are two-factor authentication steps. You can also deactivate your account. Going down the left side of the screen, you can edit your privacy preferences and even block or restrict email addresses and invitations for apps.

In LinkedIn, you can access your settings from your picture in the upper right corner and use the drop-down menu to change your privacy and other settings. Twitter’s settings allow you to require having a verification code sent to a telephone number when you sign in.

We can answer your questions about setting up security programs for your business or for you and your family. Leave a comment or send us an email with your questions and concerns – or give us a call at 973-433-6676.

This article was published in Technology Update, the monthly newsletter from Sterling Rose LLC.

Google’s Revolving World

In the ever-changing world of online services and applications, Google is going through another round of transitions. Here are some of the key changes that may affect your business and home computing:

  • Google Reader, which lets you pull in articles from just about any blog or news site, is being discontinued as of July 1. The company says that with more people accessing news from smartphones and tablets in bits and bites (pun intended) throughout the day and night, it’s no longer needed. You may already rely on social media sites, such as Facebook and Twitter, to keep up with news instead of devoting a larger block of time to reading more in-depth articles online. If you want a replacement for Google Reader, Feedly is seen as a good place to start. It works with the most popular browsers, except Internet Explorer, and has an app for mobile devices.
  • Google Postini, which provides email security and archiving services for use with their existing email servers, will be transitioned to the Google Apps platform. Google will manage the transition for its customers, and they will not have to replace existing email servers with Gmail. Google says it will notify customers 60 to 90 days ahead of the transition to let them know who is eligible and how it will be done. Postini customers can learn more from the Postini transition page.
  • Google Cloud Print lets you send your file securely to your printer over the web from any connected phone, tablet laptop or desktop. It’s a new app, and it has a lot of exciting possibilities. You can learn more from Google’s Cloud Print page and contact us with specific questions about setting it up and using it.
  • Google Quickoffice is coming to the web. Google recently purchased the app, which allows users to read and edit Word, Excel and PowerPoint documents on the iPad, iPhone and Android without losing the document’s layout and other advanced features that Google Docs currently can’t handle. Google recently introduced Chrome Office Viewer for displaying Word, Excel and PowerPoint files in a browser. You will get Quickoffice as part of an automatic update. Likely to replace Google Docs, the new program will affect you if you use Dropbox. Google will not support it, and you’ll lose some functionality. Documents To Go may be an alternative to the new Quickoffice if you rely on Dropbox. We’re researching it, along with other possibilities, and we’ll let you know what we find.

Microsoft Office for iPhone

Microsoft last week released a version of Office for the iPhone. It’s available through iTunes or the device app store, but you must be an Office 365 subscriber to get it. The iPhone app has light (reduced capability) versions of Word, Excel and PowerPoint and syncs with Microsoft’s SkyDrive online storage service. You should be able to pick up a document exactly where you left off on another computer tied to the same account, while comments they add to a Word or Excel file should appear when you open it up on another machine. You should be able to preserve charts, animation, comments and other key properties. That’s not always the case with programs offered by Google and other companies to work with Office files on mobile devices.

We have a copy on our phone, and here’s our initial review: It does not have the option to sync with Dropbox or Google Drive. You can only sync with SkyDrive, which means you need to choose your platforms wisely.


The app platform changes all the time, and new providers are always entering the market to bring you new products and services or to replace the apps you’ve liked and want to keep using. We’re ready to answer your questions and help you install and set up the systems and apps that will enable to be more productive at work and at home. Just call us – 973-433-6676 – or email us.

This article was published in Technology Update, the monthly newsletter from Sterling Rose LLC.

Administrative Alert

Are you the owner or key manager of a business? Do you know the passwords for your network and the software packages that keep your business running? If you answered “yes” to the first question and “no” to the second, it’s time to take the necessary steps to get control of your lifeline.

We’ve been seeing a lot of this password problem lately when called in to take over a company’s IT services. Neither the owner nor a key manager has any idea of the administrative user name or password, and that means they have no access to their system.

The issue typically shows up when a business takes on a new IT company to manage or troubleshoot its data system. It creates a huge problem because you can’t switch ownership of your system back to you and your new IT provider. That, in turn, prevents you and the provider from being able to fix problems with your network and operating system or from being able to update or upgrade your software packages.

As you would suspect, no business changes its IT provider unless it’s unhappy with the service. When we start with a new account, we find a system has deteriorated from neglect for one reason or another. Sometimes, we can use special tools to unlock a password and get into a system and/or software package. It all depends on whether the set-up is simple or complex.

When hard feelings and money are involved, the break-up is pretty bad. At worst case, the old IT provider can withhold or threaten to withhold passwords. Even if a company owner can successfully sue a former IT provider for the password information, it still takes time and money.

One of our new clients was in the middle of installing new hardware and software. With only part of the system delivered over the course of six months and only partial payments being made, the company’s owner decided to scrap the whole project and order all new hardware and software.

That’s extreme. But key point to remember is that not having your passwords makes next to impossible – if not totally impossible – to service your system properly.

To protect yourself from impending disaster, you should follow these steps:

  1. Make a list of all the user names and passwords your business has for your operating system, email system, software packages, Internet access, etc. Put them in an electronic format and decide who has access to what. As the owner, you should have all the access. You can give all or partial access to other people in your business, but make sure they will always be there or be accessible to provide the access information when needed.
  2. When you install or upgrade any system, make sure you have all the user names and passwords and that you give the information to people as required.
  3. When you change IT providers or when someone with access information leaves, change user names and passwords immediately. We recommend a complete password reset because bad break-ups lead to security breaches.

If you’re not sure about all of your passwords and access information or not sure how to set it all up, we’d be more than happy to help you resolve any problems. Just call us – 973-433-6676 – or drop us an email to schedule a consultation.

This article was published in Technology Update, the monthly newsletter from Sterling Rose LLC.

Lucky 7

Today at the Apple Worldwide Developer Conference numerous great announcements were made

 

The next release of OS X will be called Mavericks

What are some of the new features?

Now in Finder there are Tabs

You can create categories for your Files to easy find and group

Multiple Display Support and you can use Apple TV as a Display

You also have a Longer Battery Life with AppNap.   Talking about Battery Life now on the 11” Air we go from 5 hours to 9 hours and on the 13” we go from 7 hours to 12.    This means longer computing without plugs.

Now there is iCloud Keychain which can store passwords / credit cards and all your information and can sync to your MAC / iPhone / iPad

Now you can also receive Push Notifications for Apps

Send Maps to your iPhone for directions

iBooks will now be available on your MAC

 

Now there will be a new Airport Extreme / Time Capsule which will feature 802.11ac

 

A New Desktop will be coming called MAC Pro and it looks amazing

 

Now you will be be able to use iWork in the Cloud right from the web from any interface

 

Lucky 7 the next version will be IOS 7

What is one of the differences between iPhone and Android?   Version Fragmentation that means there are numerous versions of Android and some you can’t even use on your older device.

IOS 7 now will have multiple pages so you are no longer limited to just put a few apps in a folder.

Notification Center will now be available without having to unlock your device

Control Center gives you quick access to Bluetooth / Wi-Fi / Airplane Mode as well as a Flashlight

The Photos App now groups pictures to Moments so no more clutter

AppStore now you can look for Apps based on location or for the parents out there by Age Group.

Now remember the numbers you see on those apps that need updating.   No More they will update automatically.

Notification Sync – Don’t you hate when you have a reminder on your iPhone and you dismiss it and then you go to your iPad and you have to dismiss the same thing again.    Well NO More.

Now if you lose your iPhone and it gets wiped they cannot use it as it will have an Activation Lock where only you can access using your iCloud username / password.