Tips & Tricks: Split Screen Apple

Working with two windows or apps side-by-side became much easier since OS X 10.11 El Capitan, thanks to Split Screen view. By holding down a left-click on an app’s green maximize button in the top-left hand side, you can then drag it to be positioned on the left or right-hand side of the display.

You’ll then need to pick a second open window or app to snap to the opposite side. Split Screen obscures the launcher and OS X’s Menu Bar, so you get a bit more screen real-estate and fewer distractions.Dividing the separating line between the two apps lets you make them smaller or larger, which can come in handy for keeping an eye on live information such as sports scores at one end while being productive on the other.

Advertisements

Tech Terms: IT

IT is short for Information Technology and is pronounced as separate letters. IT is the broad subject concerned with all aspects of managing and processing information, especially within a large organization or company. IT is generally not used in reference to personal or home computing and networking.

IT is More than Computers and Networks
While IT is often used to describe computers and computer networks, it actually includes all layers of all systems within an organization — from the physical hardware to the operating systems, applications, databases, storage, servers and more. Telecommunication technologies, including Internet and business phones are also part of an organization’s IT infrastructure.

IT Departments
Because computer systems are central to information management, computer departments within companies and universities are often called IT departments. Some companies refer to this department as IS (Information Services) or MIS (Management Information Services).

Information Technology Jobs
IT spans such a broad subject there are many careers associated with IT, starting with the information technology degree focusing on the branch of engineering that pertains to the use of computers to collect, store, and share and protect information. Other careers in IT include the following:

  • Information Technology Architect
  • Information Technology (IT) Trainer
  • Information Technology Specialist
  • Information Technology (IT) Manager
  • Information Technology (IT) Supervisor
  • Information Technology (IT) Director

Source

Why Use an IT MSP Benefit 4 of 5

Benefit 4: Reduce Downtime.

Even a few minutes of system downtime carry enormous business costs. Maximizing uptime must be a high priority. Businesses can no longer afford issues with internet connectivity, email communications, corrupt data or systems failure the cost of reacting to these events is just too high. IT managed services provider offers planned, measured approaches to pro-active systems maintenance, security, backup and disaster recovery. When providers couple this with remote system monitoring and 24/7 response capabilities, they reduce and often totally eliminate costly downtime.

Zerofail Southeast is an IT Managed Services Provider (MSP). So what does that mean for you? We provide IT Support Services like, virus removal, computer troubleshooting, server maintenance, etc.

Your IT Concierge for Everything IT.

To learn more contact us today at info@zerofailse.com or 770.396.6000 Option 1.

Tips & Tricks: Share with Friends

In various places in OS X and macOS you see the option of sharing things to friends and contacts from a little Share button that looks like an arrow going up out of a box. The best bit, though, is that Macs keep track of how and to whom you most often share stuff.

So, if you’re in the habit of sharing funny links with a friend and AirDropping files to a colleague sitting next to you, these options will get stuck to the bottom of the share menu to make it easy to pick those options next time.

Tech Terms: SSID

SSID is short for service set identifier.
SSID is a case sensitive, 32 alphanumeric character unique identifier attached to the header of packets sent over a wireless local-area network (WLAN). The SSID acts as a password when a mobile device tries to connect to the basic service set (BSS) — a component of the IEEE 802.11 WLAN architecture.

The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID to enable effective roaming. As part of the association process, a wireless network interface card (NIC) must have the same SSID as the access point or it will not be permitted to join the BSS.

SSID is also referred to as a network name because essentially it is a name that identifies a wireless network.

SSID Security
SSID is considered to be a fairly weak form of security because an SSID can be sniffed in plain text from a packet and most access points broadcast the SSID multiple times per second within the body of each beacon frame. A hacker can easily use an 802.11 analysis tool to identify the SSID. Some network administrators turn off SSID broadcasting, but a hacker can still sniff the SSID from frames that stations use when associating with an access point.

Using Multiple SSIDs
Using multiple SSIDs allows users to access different networks through a single access point. A network manager can assign different policies and functions for each SSID, increasing the flexibility and efficiency of the network infrastructure.

Source

Tips & Tricks: Batch Rename Files

In versions of OS X before Yosemite, renaming a group of files at once either meant third-party software or rolling your own rename script using something like Automator or AppleScript. Now, though, you can just select a group of files and then select Rename either from the right-click contextual menu or from the drop-down button marked with a cog icon in Finder windows.

When you do, you get the option of adding text, replacing text, or applying a format such as a name and an automatically incrementing counter.

Tech Terms: Word Processing

Word processing is the phrase used to describe using a computer to create, edit, and print documents. Of all computer applications, word processing is the most common. To perform word processing, you need a computer, a special program called a word processor, and a printer. A word processor enables you to create a document, store it electronically on a disk, display it on a screen, modify it by entering commands and characters from the keyboard, and print it on a printer.

The great advantage of word processing over using a typewriter is that you can make changes without retyping the entire document. If you make a typing mistake, you simply back up the cursor and correct your mistake. If you want to delete a paragraph, you simply remove it, without leaving a trace. It is equally easy to insert a word, sentence, or paragraph in the middle of a document. Word processors also make it easy to move sections of text from one place to another within a document, or between documents. When you have made all the changes you want, you can send the file to a printer to get a hard copy.

Word processors vary considerably, but all word processors support the following basic features:

  • insert text: Allows you to insert text anywhere in the document.
  • delete text: Allows you to erase characters, words, lines, or pagesas easily as you can cross them out on paper.
  • cut and paste: Allows you to remove (cut) a section of text from one place in a document and insert (paste) it somewhere else.
  • copy : Allows you to duplicate a section of text.
  • page size and margins: Allows you to define various page sizes and margins, and the word processor will automatically readjust the text so that it fits.
  • search and replace: Allows you to direct the word processor to search for a particular word or phrase. You can also direct the word processor to replaceone group of characters with another everywhere that the first group appears.
  • word wrap: The word processor automatically moves to the next line when you have filled one line with text, and it will readjust text if you change the margins.
  • print: Allows you to send a document to a printer to get hardcopy.

Features of Standard Word Processors
Word processors that support only these features (and maybe a few others) are called text editors. Most word processors, however, support additional features that enable you to manipulate and format documents in more sophisticated ways. These more advanced word processors are sometimes called full-featured word processors.Full-featured word processors usually support the following features:

  • file management: Many word processors contain file management capabilities that allow you to create, delete, move, and search for files.
  • font specifications: Allows you to change fonts within a document. For example, you can specify bold, italics, and underlining. Most word processors also let you change the font size and even the typeface.
  • footnotes and cross-references: Automates the numbering and placement of footnotes and enables you to easily cross-reference other sections of the document.
  • graphics graphics: Allows you to embed illustrations and graphs into a document. Some word processors let you create the illustrations within the word processor; others let you insert an illustration produced by a different program.
  • headers , footers , and page numbering: Allows you to specify customized headers and footers that the word processor will put at the top and bottom of every page. The word processor automatically keeps track of page numbers so that the correct number appears on each page.
  • layout: Allows you to specify different margins within a single document and to specify various methods for indenting paragraphs.
  • macros: A macro is a character or word that represents a series of keystrokes. The keystrokes can represent text or commands. The ability to define macros allows you to save yourself a lot of time by replacing common combinations of keystrokes.
  • merges: Allows you to merge text from one file into another file. This is particularly useful for generating many files that have the same format but different data. Generating mailing labels is the classic example of using merges.
  • spell checker: A utility that allows you to check the spelling of words. It will highlightany words that it does not recognize.
  • tables of contents and indexes: Allows you to automatically create a table of contents and index based on special codes that you insert in the document.
  • thesaurus: A built-in thesaurus that allows you to search for synonyms without leaving the word processor.
  • windows: Allows you to edit two or more documents at the same time. Each document appears in a separate window. This is particularly valuable when working on a large project that consists of several different files.
  • WYSIWYG (what you see is what you get): With WYSIWYG, a document appears on the display screen exactly as it will look when printed.

The line dividing word processors from desktop publishing systemsis constantly shifting. In general, though, desktop publishing applications support finer control over layout, and more support for full-color documents.

Source

Tips & Tricks: Sign PDFs in Mail

It might be the 21st century, but we’re still using squiggles on a piece of paper to agree to all manner of things. If you are emailed a PDF to sign, though, you don’t have to faff about printing it, signing it, then scanning it back in: you can actually sign it right in Mail.

Drag a PDF into the email you’re sending, hover over it then at the top right you’ll see a little button appear; click it, and you get a range of Markup options, including one for signing documents. Best of all, you can either add your signature by holding a signed piece of paper up to the webcam on your Mac – and it does a great job of cutting it out of the background – or by drawing on your trackpad.

Got an iPad stylus? Try using that instead of your finger!

Tech Terms: Subnet Mask

Subnet mask is a mask used to determine what subnet an IP address belongs to. An IP address has two components, the network address and the host address. For example, consider the IP address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network address, and the second two numbers (017.009) identify a particular host on this network.

What is Subnetting?
Subnetting enables the network administrator to further divide the host part of the address into two or more subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to see if we show the IP address in binary format. The full address is:
10010110.11010111.00010001.00001001
The Class B network part is:

10010110.11010111

The host address is:
00010001.00001001

If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are reserved for identifying the subnet.

The subnet mask is the network address plus the bits reserved for identifying the subnetwork — by convention, the bits for the network address are all set to 1, though it would also work if the bits were set exactly as in the network address. In this case, therefore, the subnet mask would be 11111111.11111111.11110000.00000000. It’s called a mask because it can be used to identify the subnet to which an IP address belongs by performing a bitwise AND operation on the mask and the IP address. The result is the subnetwork address:

  • Subnet Mask 255.255.240.000 11111111.11111111.11110000.00000000
  • IP Address 150.215.017.009 10010110.11010111.00010001.00001001
  • Subnet Address 150.215.016.000 10010110.11010111.00010000.00000000
  • The subnet address, therefore, is 150.215.016.000.

Subnet Calculator
An IP subnet mask calculator is used to automatically calculate subnets. The calculator allows you to input an IP address and choose the Subnet Mask, Network class and other variables to calculate subnet network mask. Results of the calculation will provide the hexadecimal IP address, the wildcard mask, subnet ID, broadcast address and the subnet address range for the resulting subnet network.

There are a number of free online IP Subnet calculators including:

  • Online IP Subnet Calculator
  • ipcalc
  • Monitis Subnet Calculator

Source

Tips & Tricks: Apple Exotic Characters

As well as letters and symbols you see on your keyboard, you can type a bewildering array of special characters. You may already be familiar with typing accents such as for café (in that case you either type Option+E then E again or, on OS X 10.7 or later, hold down the E until you get extra options) but you’ll find there are many more.

Go to the Edit menu of most apps and you’ll see Special Characters at the bottom. This panel gives you access to a huge range of symbols you can drag into your documents. Not all apps or operating systems support them, but these are mostly part of the cross-platform Unicode standard. There are probably more than you see at first, too; click the cog to reveal more.