Resources2020-07-24T15:50:29-04:00

Resources & Support

Tech Support Hours

Monday - Friday7am - 7pm1 Hour Response Time
After Hours7pm - 9pm2 Hour Response Time
Weekends & Holidays8am - 5pm2 Hour Response Time

Get In Touch

Support Number
(704) 246-5052
Support Email
support@seedspark.com

Internet Speed Test

FAQ

We love questions

Questions are a driving force behind our mission of self-starting and lifelong learning. To provide you with the most efficient support, we’ve compiled the most common questions we receive and answers that can keep you in-the-know.
Don’t see the answer you’re looking for? Send us a message

Managed Technology Services: When in Doubt, Reboot!

It’s always a good idea to change your password, even when your information is even potentially compromised. When forced to reset a password every 30 days, it’s easy for users to fall into bad habits to remember their new password. Some use simple words, add exclamation points with each reset, or worse – write the entire password on a sticky note and keep it under the keyboard. The key to creating a strong password that you’ll actually remember is to use a password phrase, mixing in numbers and symbols to increase complexity. Phrases are the best defense against basic attacks and, when used correctly, are more secure than frequent password changes!
Big-box retailers are subsidized by software companies funding their operation by loading unwanted software onto in-store prebuilt machines. This software often “phones home”, collecting data on your usage patterns before flooding your email with spam advertising unwanted products and services. Another important fact – not all components are made the same! You may have 16GB of RAM, but it’s often a lower-quality product that won’t actually perform on the level of a business-class computer.
This common question is a common myth. While there are plenty of bad people out there, your technology partner puts security above all else and goes to great lengths to keep your systems secure. While we can’t speak for others, SeedSpark requires higher-level background checks than current TSA guidelines before even considering a prospective candidate for our team. Our systems track every login – even your system activity – to ensure accountability. The probability that anyone is logging in and reading your personal or corporate information is very low.

For SeedSpark clients, system backups are stored on secure out-of-state servers and will not be impacted by local storms. If there is a possibility of a flood at your place of work, make sure to keep all machines and electronics off of the floor. Finally, always backup your data to cloud-based storage.

While security risks rise when traveling, here are some helpful tips when working on the go.

  1. Always lock your machine
  2. Don’t leave USB flash drives laying around
  3. Always try to use your own hotspot rather than a public Wi-Fi network
  4. Don’t leave your technology – laptops or otherwise – unattended

Digital Marketing & Creative Services

One of our primary goals when developing a new brand identity is to create a logo with the flexibility to be used across a variety of platforms, ensuring professionalism and consistency in all areas.

  • JPG – A JPG is considered a “lossy” file, meaning that certain information has been deleted to compress the size of the image. The JPG format is ideal for web and screen use due to its smaller file size but is not recommended for use in print media. It is a raster file, meaning it cannot be enlarged without a loss of quality.
  • PNG – Like the JPG, PNG files are also a common format for web use. They are often considered a better choice for graphics and icons due to higher quality through lossless compression. The PNG in your logo package also has a transparent background, ideal for placing over any background that isn’t flat white or black.
  • EPS – The EPS file is a vector format, allowing it to infinitely scale in size without losing quality. It is the ideal format for use in print and is compatible across different software and operating systems. Most vendors will accept an eps file for use in mass printing, screen printing, and embroidery projects.

If you find yourself in need of an additional format for your logo such as a PDF, Tiff, or Bitmap, please let your AM know at the start of your branding project and we will do our best to accommodate your needs.

Using pictures from Google can be very tricky due to license and usage rights. It’s always better to be cautious, using your own photographs, stock photos, or use photographs taken by our Creative team.

Trademark
Trademark safeguards words, phrases, graphics, symbols, and other advertising devices designed to brand a company, its products, and/or its services in ways that distinguish brand for competitors. The trademark symbol signals that something is being claimed by a specific company, but it is important to note that without a formally approved trademark registration, this claim remains largely unenforceable.

Registered
Only after a trademark has been successfully registered may a company brand its advertising logo and catchphrases, its products, and its services using a ® rather than a ™ symbol. Once a trademark registration is successful, no other company will be able to legally safeguard work that is too similar for as long as the trademark remains active.

Copyright
Unlike trademarks and patents, which require a formal application, copyrights are granted as soon as a qualifying work of creative art or authorship is created and fixed in a tangible form (whether physically or perceptible with the aid of a machine/device). This automatic legal recognition of ownership is extended to original works of music, literature, drama, visual art, architecture, and other forms of creative expression.

Custom designs are created specifically for you through the use of design programs like Adobe Illustrator and Photoshop. This work will not be editable, as deliverables such as logos, promotional materials, print pieces, and more will never be designed in programs such as Microsoft Word.

Application & Web Development Services

Every website we build includes a Secure Sockets Layer – known as an SSL. SSL certificates used to only be required for websites that collected sensitive data – like credit card information – but the recent versions of popular browsers like Chrome and Firefox will warn users if they visit any website without an SSL. Having one also helps raise your site’s rankings in Google search results.

The two crucial differences between custom software and off-the-shelf software are expense and potential risk. Off-the-shelf templated products could save you money, but they likely won’t address every need of your company. Custom solutions will always be tailored to fit your business process, but may include a longer develop time and require a higher budget.

Our development team has experience integrating multiple different systems into our custom web applications. We’ll work with you and your current business processes to create a program that doesn’t disrupt company workflow.

Downtime Cost Calculator

Curious to know how much your downtime will cost you?

Use our calculator to see the impact of a server outage, network failure, or other disaster.

Lost Sales

40%

Lost Productivity

10%
HourlyDailyWeekly
Revenue$650.00$650.00$650.00
Productivity$650.00$650.00$650.00
Total Loss$0.33$0.33$0.33