Archive for March, 2007

Troubleshooting Font conflicts in Extensis apps

Wednesday, March 21st, 2007

Users might get errors when activating fonts that say the fonts conflict with system fonts.
Here are a couple of steps to do to fix this matter.

1. Make sure the fonts activated are not located in the system fonts folder. If not go to step 2.

2. Remove the font cache files com.apple.ATS.System.fcache, com.apple.ATSServer.FODB_system and fontTablesAnnex that are found in /System/Library/Caches. (need to have administrator privileges)

3. Remove the folder com.apple.ATS from /Library/Caches

4. Remove the file com.apple.ATS.plist from /Users/[name]/Library/Preferences.

5. Restart

Find a Blackberry’s PIN

Monday, March 19th, 2007

To get PIN on Blackberry Devices:

1) Go “Options” / “Settings” Icon which is usually the Wrench on the main menu and click on it

2) Go to “Status” and click on it

3) Write down the PIN number located in the Status Menu

4) Hit the “Back Button” twice (To Right of rolling ball on newer models or below wheel on older models) to return to the Main Menu

Whitelisting Domains in EHS

Thursday, March 15th, 2007

This article will instruct you how to set up a whitelist that allows certain domains to email either all users or specific users. Before setting this up, you must have administrative privileges in the EHS account.

1. Go to admin.global.frontbridge.com and login using your email address and password.

2. Click on “Domains” in the bar near the top of the screen. This may take some time to load.

3. Next, click on the “Policy Filter” button.

4. Click on “Add New Rule”.

5. Here you can specify the settings of the rule. Keep in mind that none of the fields can overlap. If you put yahoo.com in the safe sender domains, and then put someone@yahoo.com in the safe sender addresses field, your rule will fail on save.

Information Technology Surveys: How to Quantify Successful IT Departments

Friday, March 9th, 2007

Information Technology (IT) is, by definition, a technical business. Professionals in the industry often use technology assets and their status as a basis for referencing the performance of an IT Department. Management and end-users judge the IT Department differently. This judgment is typically less quantifiable because it is based primarily on the perception of individuals not involved directly with IT.

IT Departments are often doing better than their users think from a technical point of view. Determining the success level of an IT organization depends on identifying the positive and negative factors used to build users’ perceptions about an IT Department. A survey can be an impartial and systematic way of obtaining this information.

Surveys should be given to end users and IT staff in order to build a holistic view of performance. Everyone must be polled because using a survey can help identify problems that exist with users and IT Staff. For example, a survey can help identify training requirements for users, while at the same time providing information on a staff member with a bad attitude.

An IT Department can use surveys for strategic planning. This includes training requirements, user needs, perceptions, building mission statements and rating leadership. Management of an IT Department can use surveys to identify the attitudes of users and workers, helping to build performance matrices. The end result can be improved productivity, quality and work environments.

The design of the survey and selection of the users is important to ensure the effectiveness of the survey. A task list to start with is: Work with users to identify issues to include in the survey. Build a list of survey objectives. Decide on a sampling pool. Plan potential actions and contingency actions to reflect the survey’s outcome. Coordinate a schedule for the survey and resultant actions. Determine topics to be quantified and why, keeping within quantifiable parameters. Build impartial survey questions. Find data to cross-reference against a survey. Study the data. Present results and feedback to the survey takers. Consider a plan of action. Present final results to management. Follow-up on the expected outcomes of the survey.

An important goal of using surveys should be continuous improvement of the IT Department. This means that once a survey has been completed and action has been taken to improve any problem spots, the IT Department should perform the survey again, constantly seeking to improve service. This commitment in and of itself will go a long way in elevating the perceptions of the IT Department both in the eyes of end-users and in the eyes of the department itself.

SonicOS Enhanced: CFS Causes errors on sites with logins

Thursday, March 1st, 2007

This article applies also to any SonicWALL running SonicOS Enhanced that is having performance issues.

Safari and other web browsers on a Mac will experience errors trying to load pages that require a login over https, such as store.apple.com and www.amazon.com. To fix this, you need to uncheck the “Enforce Host Tag Search with for CFS” feature on the SonicWALL. This applies even if the SonicWALL is not utilizing the Content Filtering Service features.

In order to uncheck “Enforce Host Tag Search with for CFS”, you have to login to sonicwall console and then go to diag page, which is accessible by logging into the sonicwall and replacing the webpage name with diag.html.

For example, if you log into http://192.168.1.1/main.html you have to replace main with diag; that is: http://192.168.1.1/diag.html

This page will bring the internal settings page of the SonicWALL, and from here you can uncheck “Enforce Host Tag Search with for CFS”.