Patient Computer Help for Grown Ups Logo


440-476-3351

(Bruce Corson)


440-552-6706

(Karen Poccia)

Patient Computer Help for Grown Ups Header
  • Home
  • About
  • Contact
  • Services
  • Blog
  • Testimonials

New Back Tap Feature in iOS 14 Provides Two Customizable Shortcuts

November 20, 2020 by Karen Poccia

We all have things we do regularly on our iPhones, whether it’s checking the weather, searching Google, or calling our congressperson to voice our displeasure. With iOS 14, Apple has opened up a new and customizable way of triggering such actions: Back Tap.

Back Tap is technically an accessibility feature for those who have trouble interacting with the iPhone physically. But just as curb cuts help both those in wheelchairs and those working on their sick ollies, the Back Tap feature is a boon for everyone.

With a double or triple tap on the back of any iPhone 8 or newer running iOS 14, you can invoke any one of a variety of actions, including custom Shortcuts. Unfortunately, Back Tap isn’t available in iPadOS 14.

Go to Settings > Accessibility > Touch > Back Tap (it’s way down at the bottom), where you can attach actions to both double tap and a triple tap.

Apple provides a broad set of actions, but most of them are focused on helping people who can’t use other iPhone gestures. So yes, you could make a double tap open Spotlight for searching, but unless that’s somehow a lot easier than swiping down on the Home screen, it’s not worth one of your two triggers. Actions fall into four categories:

  • System: Most of the System choices mimic easy Home screen gestures or button presses. Most interesting are Mute, which toggles the ringer volume without forcing you to press the Volume Down button repeatedly, and Screenshot, which takes a picture of your screen without requiring you to press two buttons at once.
  • Accessibility: For those who need these Accessibility options, having them easily accessible via Back Tap will be welcome. The most compelling actions for the general public are Magnifier, Speak Screen, and Voice Control. (Voice Control provides much more capable dictation than Siri.)
  • Scroll Gestures: These options scroll a vertically oriented page or screen. Sadly, they don’t work for horizontally driven page flipping in book reading apps like Libby.
  • Shortcuts: Here’s where Back Tap becomes ultimately useful, at least if you can find or build the necessary shortcuts. Anything Shortcuts can do, you can invoke with a double or triple tap.

First you’re hearing of Shortcuts? How embarrassing! Read on. It’s an automation app that Apple includes with every iPhone. With it, you can chain together multiple actions derived from iOS capabilities or provided by your apps to create custom shortcuts. Other systems call similar collections of commands macros or automations or workflows.

Explaining how to build your own shortcuts is a topic for another day, but you can also download sample shortcuts from Apple’s gallery, both to see how it’s done and to use them. For instance, if you tap the Gallery button in Shortcuts ➊, tap Starter Shortcuts ➋, tap Take a Break ➌, and tap Add Shortcut ➍, you’ll copy the Take a Break shortcut to My Shortcuts. Then you can assign a double tap in Back Tap to invoke Take a Break, which sets an alarm for a specified number of minutes and turns on Do Not Disturb until the alarm goes off.

If you want to learn more about Shortcuts right away, check out Take Control of Shortcuts, a 122-page ebook by Rosemary Orchard.

Give it a try! Back Tap might turn out to be the iOS 14 feature you use more frequently than any other.

Filed Under: Mac, Tech Tips

Share:

Our Four Favorite Features of iOS 14

October 9, 2020 by Karen Poccia

It’s decorative gourd season, friends! We all know what that means – new releases from Apple. Don your flannel shirt and your tattered overalls and get ready to enjoy the technological harvest that has been released upon us. Apple has deemed iOS 14 (along with iPadOS 14, watchOS 7, and tvOS 14) ready for picking. Although the betas have been pretty stable and no major problems have appeared in the first few days, we still recommend waiting at least a few weeks before installing via Settings > General > Software Update. In large part, that’s because many developers were taken by surprise by Apple’s release, so they’re working to release updates that work properly with iOS 14 and take advantage of its new features.

When you decide to take the leap and install—be sure to make a backup first, just in case—here are four features we recommend you check out right away.

App Library

If you’re like us, your first Home screen or two are well-organized, and after that…where did all those apps come from? We find ourselves searching for little-used apps (swipe down on a Home screen from the middle), but wish we could see a list of all installed apps. With iOS 14’s new App Library, we can.

A new screen to the right of your last Home screen, the App Library collects all your apps into folders. At the top, Suggestions includes four suggested apps based on time, location, or activity, and Recently Added shows the apps you’ve downloaded lately. The rest of the folders, which, unfortunately, you can’t rename or rearrange, organize apps by category. In a folder grid, tapping a large icon opens that app, while tapping the group of four small icons in the lower-right corner opens the folder. To see an alphabetical list of every app, tap the search field at the top. You can type to narrow the list.

The App Library is tremendously useful because it contains every app and is always in the same place. That enables you to more easily find apps that you’ve removed from your Home screen. It also works well if you choose to hide entire Home screens, another new iOS 14 feature. Note that you can copy apps from the App Library to a Home screen, which can aid in creating your own organizational scheme.

You might even find that you like having just a couple of Home screens and leaving everything else in the App Library.

Home Screen Widgets

Nothing prevents you from whittling your set of Home screens down to just one, but another new iOS 14 feature might encourage you to have a few more. For some years now, apps have had widgets. Widgets are little summary interfaces accessible in Today View, which you access by swiping right on the first Home screen. In iOS 14, you can now place some of those widgets directly on a Home screen.

Widgets come in three sizes: a small square that occupies the space of four normal app icons, a horizontal rectangle that’s the size of two rows of apps, and a large square that takes up the space of four rows of apps.

To add a widget, touch and hold any empty spot on a Home screen, tap the + button in the upper-right corner, and drag the desired widget out to the Home screen, where you can continue to drag it to your desired position. When viewing the widget collection, tap a widget to see all its available sizes.

Right now, most widgets are from Apple apps, but we anticipate many developers adding widgets for their apps in the coming months. You can have as many widgets on a Home screen as will fit, and there’s no problem mixing widgets and apps within the available space. Think about what information you like to get from your iPhone, and then go nuts creating custom Home screens that show what you want at a glance.

Shrunken Siri and Phone Call Interfaces

In previous versions of iOS, when you invoked Siri, the interface completely took over the iPhone screen. It turns out there was no need for that, so in iOS 14, Apple shrunk the Siri interface so it appears at the bottom of the screen, on top of whatever app you’re using. If Siri’s response requires giving you feedback, that appears on top of the current app as well.

Plus, when you receive a phone call, instead of the call taking over the entire screen, you see a dark banner at the top of the screen with red Decline and green Accept buttons. Tap either of those buttons, or tap or swipe down the banner to reveal the full-screen call interface, where you can also tap to answer. Want to delay? Swipe up on the banner to shrink it to a button in the top-left corner of the screen.

These small changes make using Siri or answering phone calls feel much more fluid than the approach of taking over the entire screen.

Pinned Messages Conversations

This last item is so simple and so useful we can’t believe it wasn’t there all along. We all have individuals and groups that we converse with regularly in Messages. It’s frustrating to hunt through the list of conversations to find them, so iOS 14 adds the concept of “pinned” conversations. Touch and hold on any conversation in the list to bring up a preview of the last few messages and some commands. Then tap Pin to add the conversation to the top of the Messages screen as a circular icon. From then on, tap that icon to enter the conversation quickly.

iOS 14 sports many other features as well, and we’ll be sharing more about them in future articles. Remember, it’s worth waiting a bit to install, and note that iOS 14 is compatible with the iPhone 6s or later, including the first-generation iPhone SE, and the current seventh-generation iPod touch.

Filed Under: Mac, Tech Tips

Share:

Why Does Your Wi-Fi Suddenly Cut Out?

February 15, 2019 by Karen Poccia

Think back to the last time you had to go without the Internet. Maybe you rolled with the punches, did some laundry, played some Scrabble with your family – good for you. The rest of us were in total chaos, churning butter by hand and spinning yarn into waistcoats (what do we use the Internet for again?). Regardless of your coping abilities, it can be a real headache to lose your connection in the middle of a movie, or during a Super Bowl party, or when you’re up against a work deadline. Many of us know that a quick power-cycling of our modem and router can often do the trick, but why does that even need to happen? Is it too much to ask for things to work perfectly all the time? A little bit of understanding can go a long way to ease frustrations, so let’s delve into what may be going on behind the scenes with your router.

Just like a desktop computer, routers have their own operating system, central processing unit, and memory, among other components. These elements help it manage data traffic to your various devices. Unfortunately, just like a desktop computer, these components can get overloaded. Similar to how your computer can freeze up when you have Word, a few instances of Excel, and 38 Chrome tabs open, pushing tons of data through your router to many devices in your household can also slow it down – sometimes to a complete stop.

Additionally, most home Internet connections use what are called dynamic IP addresses. You can think of IP addresses as street addresses, identifying a given device on a network. Internet service providers will assign a public IP address to each of their routers for only a certain period of time. Once this time expires, your Internet service provider will give the router a new one (this is the dynamic part of the term). In cases where the router is very busy, it might not properly connect to the new IP address, resulting in the router continuing to use the old one. This is sort of like attempting to receive mail that was sent to a previous address.

Yet another issue that can arise is with the private IP addresses within the home network. Private IP addresses are known only to a router and its home network. The router has a pool of these IP addresses that it doles out to the various devices on the network. This assignment process operates dynamically, as well. It uses a network protocol called DHCP (Dynamic Host Configuration Protocol). A computer might be assigned one private IP address for a period of time, removing that IP address from the available pool. Once the computer disconnects from the router, the IP address is thrown back into the pool. Should two devices ever be assigned the same private IP address, the network interface on both of them will get disabled, causing each device to lose connectivity until the conflict is resolved. Why might this happen if the router is supposed to be keeping an eye on this IP address pool? It’s possible, for instance, to unwittingly have more than one similarly configured DHCP server distributing overlapping addresses, a situation that could arise if you have multiple wireless access points or other devices with an embedded DHCP server. For this reason, it’s mandatory to allow only one DHCP server to run at a time. Too many DHCP servers spoil the broth, as they say.

Restarting your modem and router can help to reset the above listed issues and give the devices a little bit of a breather, allowing them to start again fresh with corrected IP addresses and less congestion.

If you have concerns about your Internet connection, please reach out to your friendly specialists at Patient Computer Help for Grown Ups to set up a consultation.

Patient Computer Help for Grown Ups assists people with their Macs and PCs in the Chagrin Falls and Ohio City areas.

Filed Under: Networking, Tech Tips Tagged With: Chagrin Falls Computer Repair, Cleveland Computer Repair, Computer Help, Internet Troubleshooting, Ohio City Computer Repair

Share:

Do You Really Have to “Properly Eject” a USB Drive?

January 4, 2019 by Karen Poccia

It’s a situation with which you may be familiar…You’re at work and you just finished transferring a presentation from a coworker’s computer to a thumb drive. You decide to show off a little and just pull that USB right out. You know you’re supposed to eject it first, but you see yourself as a bit of a John Wayne type and you want your coworkers to know it. You strut away as the office looks on, impressed.

Technology tips

I hate to be a wet blanket, but your party trick may actually cause more harm than admiration. The warning to properly remove flash drives is there for a reason – a proper ejection prevents your data from becoming corrupted in the event that your system is busy writing something to the drive. Think of the data transfer between your computer and your external drive like moving people across a bridge. If you eject the drive mid-data transfer, it’s a bit like removing a bridge while there are still people on it.

Even if your computer shows that the data has already been transferred, it is not yet safe to remove because of something called write caching. Your computer uses write caching for removable devices as a way to improve speed. Any data you are attempting to transfer to an external drive is held in a cache in the computer’s system memory. Rather than forcing your program to focus on a data transfer at the very moment you ask it to, the computer puts the data in the cache and waits until the most opportune time to complete the task. Properly ejecting the drive commands the computer to go ahead and finish the transfer.

If you have a Windows computer, you can disable write caching (File Explorer -> right-click on your external drive -> Properties -> Policies -> select Quick Removal) with negligible performance loss, however this is not a fail-safe. There is still a small likelihood of data loss. On a Mac, you’re better off not messing with the write caching and knowing that it is automatically enabled.

How to Properly Eject a USB Drive

On a Windows device, open My Computer and find the USB device you’d like to disconnect. Right-click on it and select Eject. The computer will notify you when it is safe to pull it out.

If you’re a Mac user, locate the external device (likely either on your desktop or in the left-hand panel of Finder), left-click on it and drag it to the trash (bottom right of the screen). If done correctly, the trash icon should change to an eject icon (a triangle with a horizontal line below it). As soon as the eject icon disappears, you can remove it. Alternatively, you can hover over the device in the left-hand panel of Finder and click the little eject button that appears after the name.

Patient Computer Help for Grown Ups assists people with their Macs and PCs in the Chagrin Falls and Ohio City areas.

Filed Under: Tech Tips Tagged With: Chagrin Falls Computer Repair, Cleveland Computer Repair, Computer Help, Ohio City Computer Repair

Share:

A Critical Look at Your Cyber Security Hygiene

December 6, 2018 by Karen Poccia

Many years in the future, when today’s 30-somethings are old and gray, taking a break from virtual reality deep sea diving in their space retirement homes, they’ll tell visiting great-great-great-great grandchildren about how they are the last generation to remember life before the ubiquity of the Internet. Maybe they’ll recall humorously how naive and adorable we all were in the early 2000s, generally trusting the email in our inboxes, reusing passwords across multiple accounts, believing the videos that we saw on the internet were real. At this point in time, we’re mostly still learning this stuff. We’re still wrapping our heads around the fact that the Internet IS the real world, and our digital lives require as much protection as our physical ones.

Let’s spend a moment critically evaluating what we are doing to protect ourselves, and how we can potentially do better.

1. Keep Everything Up to Date

When possible, keep your operating software up to date with the latest release (provided you’ve waited a couple of weeks to let the guinea pigs report back with any issues and solutions). Using outdated operating systems leaves you vulnerable to malicious attacks. Along the same vein, make sure your antivirus software and browsers are kept up to date as well.

2. Encrypt Your Data 

On a Mac, go to the Apple Menu -> System Preferences -> Security & Privacy -> FileVault. Turn this on. This encrypts the startup disk, keeping your files safe if a thief were to steal your device. As you will be warned when you go to turn it on, be sure to remember the password to your device and/or the recovery key it asks you to set up – otherwise your data could be lost.

On Windows, BitLocker is a program that can accomplish something similar. To enable it, go to the Control Panel, locate the BitLocker Drive Encryption system preferences, and click the link to Turn On BitLocker.

3. Store File Backups Offsite in a Secure Location

In recent years, ransomware has grown to be one of the biggest threats on the web. It’s a type of malware wherein cyber criminals encrypt a victim’s data and charge a ransom for its release. One of the best protections against this is having an offsite backup of your data. Carbonite is a good one we recommend, but do your research (or let us help you) to decide what’s best for you.

4. Create Strong, Unique Passwords

As we’ve recently discussed, the password situation is becoming dire for some. A great solution is to use a trusted password manager. Use it to keep all of your passwords, change them regularly, and enable TFA (two-factor authentication) when possible.

5. Monitor Your Online Presence

Check to see what non-friends/followers can see of your social media accounts. If your birthday, address, and mother’s name are all linked to your profile and easily found by a stranger, it’s time to consider changing your privacy settings. It’s also not a bad idea to Google yourself every so often to see what comes up. Create a Google Alert to automatically let you know as soon as your name appears online.

6. Stay Off Public WiFi

Unless absolutely necessary, we recommend never connecting to public WiFi. Public WiFi is inherently less secure than your private network because you don’t know who else is connecting to it. A better option is to use your phone as a hotspot and connect to the internet that way.

7. Watch for Phishing Attempts

Cyber criminals have gotten quite sophisticated in posing as reputable companies that you might otherwise trust. If you receive an email or a phone call from someone claiming to be from a company you have an account with, be very cautious of giving them any information. If they do need something from you (and they are who they say they are), they’ll be okay with you navigating to their webpage yourself and signing in that way.

8. Get an Annual Checkup

By law, you are allowed a free copy of your credit report from each of the three major credit reporting companies per year. Take advantage of that and ensure that the information on your credit reports is correct and up to date.
Additionally, we recommend you face the music and get a dark web scan report on your email address or domain name. An annual or twice yearly scan can alert you to any major personal data compromises before they get any worse. Give us a call and we can send you your report.

As mentioned, cyber security is still a relatively new concept for a lot of people. Unfortunately, its necessity is only growing and it won’t be going away anytime soon. With the adoption of a comprehensive cyber security approach incorporating some small, manageable habits, it is very much possible to keep yourself safe. If anything mentioned in the list above was unfamiliar to you, please reach out to your friendly Patient Computer Help team to set up a consultation.

Filed Under: Cyber Security, Tech Tips

Share:

The Word on Password Managers

November 24, 2018 by Karen Poccia

The vast majority of us are using weak (or potentially even worse – reusing) passwords across our many online accounts. This behavior makes a great target for cyber attacks. Criminals can use your compromised information to open bank accounts in your name, take out loans, ruin your credit rating, lock you out of your own data…it’s a real grab bag of nightmare scenarios! I know safety and diligence are boring and tedious, but the reality is cyber crime is on the rise – and these criminals are only getting more sophisticated. If you haven’t taken your cyber security seriously before, now is the time.

A huge step in securing your information online is taking a good hard look at your password habits. Last week, we talked about why you probably shouldn’t save your passwords in your internet browser. As an alternative, most security experts recommend using a standalone password manager. Let’s dig into the details of these services to help decide whether they’re right for you.

The Basics

A password manager is a type of software application that stores and manages your online login IDs, passwords, credit card numbers, PINs, answers to security questions, etc. These types of applications can even generate super strong passwords for you – since you won’t be tasked with remembering them, you can afford to get a little wild with the special characters and random letters/numbers. In addition to storing your passwords behind extremely strong encryption, the password manager itself does not have access to your passwords. Only you have the master password to access them (also meaning if you forget your master password, you’re out of luck).

When choosing a password manager, you will likely choose between a local/desktop-based system and a cloud-based one. The main difference between these two systems is how and where your information is stored. Local applications store your encrypted database in a local “vault,” which lives only on your device (and isn’t accessible over the web). Cloud-based systems store your information in the password manager’s servers, meaning you can access it from any device with the proper login information and authentication. The local application is the most secure, but it sacrifices some convenience and usability. Cloud-based is more user-friendly, but requires a level of comfort with having less control over where your information is stored.

The Good

  • The features that make for good passwords – at least 12 characters made up of a random variety of letters, numbers, and special characters – also make them very difficult to remember. A password manager generates strong passwords and remembers them for you.
  • Many password managers offer to scan your passwords and provide a security checkup. You’ll receive alerts if you are reusing passwords anywhere, if any of your passwords aren’t up to snuff, and if you have accounts on sites known to have had security breaches.
  • Some password managers offer a password auto change feature. The application will log in to your accounts with your saved credentials, update your password and save the new login information. Security experts recommend that we update our passwords at least once per year – a very time-consuming process to do manually. Password managers take a lot of the work out of this task.

The Bad

  • Switching to a password manager takes significant effort on the front end. Depending on how many online accounts you have, it could be a decent time commitment to get all of your online credentials saved to the application. The good news is that once you’ve done it, you’re set (and likely much safer) for a while.
  • Putting all of your password eggs in one basket can be a tough pill to swallow for some. If there is a security breach (not unheard of), the worry is that all of your passwords could be compromised. That being said, password managers are extremely secure baskets. We mentioned last week that browsers don’t make the best password managers because their chief concern is not security. The same logic applies to standalone password managers – these companies are in the business of cyber security first. As long as you choose a reputable company and create an extremely strong master password, you’re likely a lot safer than you would be without a manager.

The How

  • Do your research. You will first want to pick a reputable password manager. Experts recommend any of the big name applications (LastPass, Dashlane, and 1Password have the best reviews), but from there it will be depend on your preferences and needs. Wirecutter recently published a great review to help you decide.
  • Create a master password to end all master passwords. Your account is only as secure as your master password is strong. Go crazy with this one – it’s the only one you’ll need to remember. Once you’ve created an account, you’ll need to install any browser extensions and/or mobile applications.
  • Clear your schedule. You’ll need to work your way through adding all of your online accounts to the application. This is the time consuming bit. It may be helpful to keep a running list of your accounts as you think of them. I highly recommend using the password generator to change all of your passwords as you go.
  • Destroy the evidence. Purge your phone/browsers/desktop of any saved passwords. Throw out the post-its stuck to your monitor, delete the notes file in your phone, turn off password saving in your browser. If your application doesn’t offer it, set a reminder in your calendar to change your passwords again in a year (it’ll be a lot easier next time!).

Patient Computer Help for Grown Ups assists people with their Macs and PCs in the Chagrin Falls and Ohio City areas.

Filed Under: Cyber Security, Password Protection, Tech Tips

Share:

Should You Save Your Passwords in Your Browser?

November 15, 2018 by Karen Poccia

If you’re ready to pull your hair out over password management frustrations, rest assured you’re not alone. The average user in the US has over 130 online accounts. Since we all know never to reuse the same password across multiple accounts (right?), that’s 130 unique, complex passwords to remember! I won’t speak for you, but my brain wasn’t built for that kind of task. Consequently, for many of us, storing our passwords is a necessity. One popular option that has cropped up in recent years is browser password management. Whichever browser you use, you likely have been asked the question Would you like us to save your password? If you answered yes, the next time you visited that website it may have autofilled your password for you. How convenient! But is it safe?

Let’s break it down…

Encryption is Key

Browsers often save your passwords in a plaintext list, frequently accessible with only the password to your device (and other times through no password at all), and commonly with fairly weak encryption. Even if the data is strongly encrypted, the cryptography and implementation specifics often aren’t publicly reported, leaving the user at the mercy of the company’s claims and reputation.

Security is Secondary

You might trust a babysitter to make your kid dinner every now and then, but would you hire him as a full time chef? Probably not. Your babysitter’s job is (hopefully) taking care of your kid! Browser companies’ chief focus will always be providing the best browsing experience. Firefox, Chrome, Safari, and Edge are all locked in a battle to win our hearts, and they know what 98% of us care about – an attractive interface and an intuitive user experience. Protecting their users’ login credentials will always be secondary, if that.

Convenience is Costly

On top of potentially weak encryption and subpar security measures, the most convenient feature of a browser password manager – autofill – is inherently dangerous. Most people using a browser password manager are not opening the browser’s vault every time they need a password and copy-pasting it into the login box. Most users allow the browser to autofill login information for them. Unfortunately, recent research by the cybersecurity company Proofpoint discovered that some digital ad companies have been scraping this autofill data to collect email addresses. This methodology could easily be applied to any saved data – including passwords.

It’s Not All Bad News

There is another (slightly less) convenient, vastly more secure option – dedicated password managers. Next week we’ll go into detail on these and help you decide what’s best for you.

Patient Computer Help for Grown Ups assists people with their Macs and PCs in the Chagrin Falls and Ohio City areas.

Filed Under: Cyber Security, Password Protection, Tech Tips

Share:

Two Sides of Net Neutrality

December 19, 2017 by Bruce Corson

Two Sides of Net Neutrality

As the Internet has grown into a vital service for Americans from coast to coast, a number of important issues have come up regarding the operation and management of the networks that comprise it. Chief among these issues is a concept called “net neutrality.” Generally speaking, net neutrality refers to the idea that all Internet service providers should treat all traffic equally, regardless of the content involved or its origin.

[Read more…]

Filed Under: Google, Tech Tips

Share:

How To Use Instagram

December 15, 2017 by Bruce Corson

Instagram is a social network that has distinguished itself from others of its kind with its mobile-first, image-oriented style. Rather than writing text posts, Instagram is designed around uploading images and short videos to your profile. It may take some time to get used to its format, but with practice, it’s a great way to socialize with friends.

[Read more…]

Filed Under: Google, Mac, Microsoft, Tech Tips

Share:

Services

  • Personalized Computer Repair
  • Computer Training
  • Concierge Service
  • Antivirus Installation And Support
  • Data Recovery
  • Remote Support

Testimonials

  • I have worked with Bruce on several occasions and can attest he has an impressive knowledge base and troubleshooting ability. He is also very easy and pleasant to communicate with. He is a great resource. Read More
    Betsy Gustafson
  • Bruce does a fantastic job helping people who may not be completely computer literate. My PC was running really slowly and we couldn’t figure out what the problem was. It turns out we were infected with some sort of virus. He was able to come in and fix it in a short amount of time. Read More
    Terry Dorland
  • Bruce is so helpful, PATIENT, friendly, and knowledgable when it comes to helping people through PC challenges and opportunities! He is my go to resource when I have gone beyond my tinkering capacity and he’s always quick with a suggestion or with ideas to get past many issues we encounter in our connected lives, with... Read More
    OhioFranks

FOLLOW US

Copyright © 2023 · Patient Computer Help for Grown Ups · 16850 Knolls Way, Chagrin Falls, OH 44023 · Powered by Tech Site Builder