• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

admin

Desktop or Laptop? What To Consider When Choosing

October 15, 2010

Are you out shopping for a new computer, but are unsure of what to buy as far as a laptop or a desktop? If so, here are some simple factors to keep in mind to make that decision.

Price
Because of the higher cost of computer components and assembling them, a laptop computer will be more expensive than a desktop model with the same specifications.

If you are only going to be using the computer for basic tasks such as word processing and surfing the Internet, a laptop would be perfect for you.

If you are more into playing video games or running video editing software, a desktop computer would be suited more towards your needs.

It will have the memory to run those programs and the hard drive space to store everything.

Space
It may seem like a contradiction, but while desktop computers are getting smaller, laptops are going in the other direction because of the greater number of functions they are being asked to perform.

A laptop is still more easily stored out of the way than a desktop. The laptop is the obvious choice if space is an issue.

The real question to ask is whether the space which the computer will be occupied can be permanently sacrificed for housing information.

Portability
If you are looking for portability then there is only one obvious winner here. However, it should be asked whether a computer is likely to get the most use out of it being placed in one spot or when it is moved around for use in different rooms.

If you are going to use your PC at home, at work, and on business trips, then a laptop would definitely be the better value.

Ergonomics
The most important thing is being comfortable while using your computer; especially if you are going to be using it for long periods at a time.

So a big question that you must ask yourself is “Can the existing area where my laptop will be used be made comfortable if I’m going to be using it for long periods of time?”

This can be a vital consideration in the choice between a laptop and desktop model. Their very lightness and portability work against people adopting a suitable posture when using a laptop.

The name suggests they are more suited to being used sitting anywhere other than at a desk, which is not true.

A bad case of hand, wrist, back, neck, or eye strain is too high a price to pay for portability and style.

Upgrade/Repair Cost
Laptops are less robust and more difficult to upgrade than their desktop equivalents. In general, your upgrade options for a laptop are limited to increasing the memory or replacing the hard drive for more storage.

Desktop computers, on the other hand, offer almost unlimited upgrade options.

An important thing to remember is damage to a laptop keyboard or screen will be much more serious than to a desktop because the vital working and moving parts have far less protection.

Wireless Fidelity Expands Its Broadcast

October 15, 2010

Every day, technology advancements are changing the way we live our lives.

From the way we communicate with family, friends and co-workers to the way we shop, provide healthcare, and even land that dream job.

Now, thanks to advancements in the standard known as “WiFi” or wireless fidelity, we can now add the way we watch television to that list.

A recent study shows that by the end of 2011, more than 20 million television sets equipped with WiFi connectivity will have been shipped worldwide to mainly North America, Western Europe, and a handful of selected Asian countries.

So you might ask yourself, “What is WiFi equipped television?” To better understand this new rising technology, we need to take a look at what WiFi is.

WiFi, which stands for wireless fidelity, is a communications standard that allows WiFi enabled devices such as laptop computers, MP3 players, smart phones, and soon televisions to connect to an access point (a wireless router or hotspot) which then connects your device to the Internet.

From there, the possibilities are almost endless as to what you can access.

TV industry producers now understand the power of this technology. They are also realizing how many people would love to be able to stream their favorite media websites such as YouTube, Metcalfe, CNN, Facebook, and MySpace directly to their television sets.

One of the big trends this year has been the rise of Netflix, (which seems to be why we’ve seen the fall of Blockbuster and any other video/media rental business).

Why would you ever leave your home if you could simply connect to a site like Netflix, or any of the other super popular media sites, and browse their thousands of movie titles right from the comfort of your own home, without having to leave the couch? You probably wouldn’t.

This is why giants like Sony, Samsung, and Toshiba are working closely with technology gurus to make what could be the next big thing in television. As of right now, the people who already have this technology in their homes are pretty limited to what content they can stream to their sets.

However, as this begins to boom in the marketplace, the evolution of full web browsing on your TV is something I’m sure we can look forward to seeing in the future.

What To Do When You Drop Your Cell Phone In Water

October 15, 2010

If you’ve ever been unlucky enough to drop your cell phone into water, take some solace in knowing you’re not alone.

Dropping a cell phone into the swimming pool, bathtub or toilet is such a common occurrence that some cell phone manufacturers include a sensor that will detect if it’s been submerged in water, so users can’t return them saying they are defective.

If it happens to you, it’s important to act quickly. First, don’t turn the phone on until it has been completely dried out or you’ll probably end up shorting out some circuits. Cell phone repair services recommend taking out the battery right away and wiping it off.

Shake out any excess moisture from the phone. Unfasten the screws and open up the device. Then use an electrical-contact cleaning spray or rubbing alcohol to remove corrosive moisture. When you think it’s completely dry, wait another day before turning it on.

There are a number of recommended drying techniques, but the key to all of them is to dry the phone as soon as possible.

One proven phone-drying method is to use a hair dryer set on cool. You don’t want to use high heat – that could cause even more damage to the phone.

Another method is to seal the phone in a jar with uncooked rice. The rice absorbs the moisture, but it does take a few days.

Most important: Make sure you always back up your smart phone! Most cell phone providers offer this service, and many phones come with software you can load on your computer to perform a backup using a USB cable.

 

Fall Is The Perfect Time For An IT And Network Checkup

September 30, 2010

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

To make the most of your IT investment,  you don’t need to be a technology whiz. However, you should have a plan in place for making the most of your company’s data. As fall approaches, now is an excellent time to examine your company’s technology to determine what’s working well and what could be improved.

Is It Time To Update?
Technology changes rapidly. While your systems may appear to be working well, you may be missing out on new ways to protect your business information, help your business run more efficiently, and better serve your customers.

For example, to run some of today’s most powerful programs, you need a fast and large hard drive with significant memory capacity.

You might consider adding newer technology – such as wireless capabilities – to older equipment; but the cost of upgrading a computer is often more than the cost of a new model.

Check Your Power Protection
Loss of electrical power and power surges are the most common causes of data loss and weaken computer components. If your business depends on computers, protecting the power source is critical.

This is especially important if your area is prone to power fluctuations or electrical storms.

An Uninterrupted Power Supply (UPS) unit offers both superior surge protection and, depending on the model, anywhere from 15 to 45 minutes of backup power-enough time to save and copy critical files.

The idea of a UPS isn’t to continue your business dealings while the lights are out. Rather, it is to ensure that your data is available when the lights come back on.

Have You Patched Windows?
Have you installed the latest version of Windows on your computer, and do you keep it updated? Do you do this automatically?

It is incredibly important that you keep Windows and your software applications current. Updates improve performance, fix bugs, and many add new features. You should also regularly update and run anti-virus software.

How’s Your Backup?
Consider storage needs in terms of both capacity and physical location. Depending on the amount of data, you can back up to USB flash drives, CDs, DVDs, tapes, or an external drive.

You might also want to look into off-site backup. Our Experts Total Backup System is an excellent backup, disaster recovery, and offsite storage service.

Integrate Your Data
Over the years, businesses tend to produce multiple silos of data. Your inventory, sales data, and marketing information need to be linked together to better serve your customers and increase your company’s productivity and profitability.

Without this integration, you may not know who your best customers are or you could end up agreeing to provide a top customer with an item you don’t have in your inventory.

Avoiding Common Email Security Threats

September 30, 2010

Most companies today rely heavily on the use of email. Emailing is a very fast and cost effective form of communication for many different types of businesses.

Most companies use it as their main source of communication between employees. In fact, most employers do not realize the risk of using email.

Some risks range from viruses, hackers, to someone else just trying to gain a little information.

Here’s an overview of the most common email security threats in today’s Internet world.

Viruses
Viruses cause billions of dollars in damage to businesses every year.

Many corporate email systems are still quite vulnerable to viruses. In fact, in last year alone, an estimated 63 distinct email virus attacks hit the United States. These attacks come quickly and can spread quickly.

They mainly cause slowdowns across the internet. However some have been known to take down major corporation’s entire email systems.

Today’s viruses are very complex and often appear to be harmless such as personal notes, jokes, or promotions. While most viruses require recipients to download attachments in order to initiate infection and spread, some are designed to launch automatically with absolutely no user action required.

Spam
Studies have shown that 20 percent of corporate email is spam. A company that has a thousand employees could receive over two billion spam emails in a full year.

Most do not realize it until a lack of productivity ends up costing the companies billions of dollars each year.

While most spam is just annoying, some of it can be very dangerous. Most trick employees into opening malicious emails to spread faster. Also, many hackers have begun disguising viruses as spam.

Phishing
Phishing is used to trick a person into thinking the email is legit and came from a real website, usually asking the person to verify their password or to change some sort of account information.

Then, taking them to a fake website and stealing what you have typed in. This is the number one way people get their identity and personal information stolen.

Spyware
The main purpose of spyware is to install itself on the victim’s computer. It monitors all key strokes and mouse clicks so that they can later go back and collect usernames, passwords, credit card numbers and bank account numbers.

These infections can stay installed on computers for many months without an antivirus picking them up.  Most are detected and removed instantly if the user keeps their antivirus up to date.

Having a great antivirus that scans files as well as emails can help prevent virus attacks, phishing and spyware.

Users should also have an up to date spam filter that prevents the infection from getting to your inbox to begin with. And most importantly never open an email attachment you didn’t specifically request.

Also, pay attention to links inside emails that appear legitimate. Many times, phishers will send you an email that looks like it came from an official source. After clicking the links, you’re redirected to a site on the hacker’s network. This is often used to collect personal information and passwords.

Configure Free Remote Access With DynDNS

September 30, 2010

With today’s work force relying more and more on information technology, services that allow us to connect to systems remotely is becoming  widely used and very popular.

Granted, not all of us are tech gurus. So, setting up a remote connection to a computer can become a real pain in the neck.

There is a free service called “DynDNS,” which stands for dynamic DNS. This makes setting up your remote connection very easy.

What Is DNS?
DNS is a key part of the World Wide Web.  Think of it as the phonebook of the Internet.  DNS converts a hostname (www.yahoo.com) into a readable machine name or IP address (69.147.125.65).

Think if everytime you wanted to visit your favorite web site, you had to type the IP address instead of the name.  You’d probably not be able to remember too many and it could become very frustrating and time consuming.

With DNS, all that is handled for you. All you have to do is simply tell your web browser I want to go to www.facebook.com and DNS handles the rest.

Getting Started
First, visit http://www.dyndns.com. From there, you will need to create an account with them by registering a username, password, and valid email address.

Be sure to use a real email as you will need to activate your account via a link that will be mailed to that provided address.

There are three options to choose from: 1 (Free) 2 (Pro) 3 (Custom).  You can choose a free account and if you like what you see, you can always upgrade later.

Once you’re registered and signed up, it’s time to log in and setup your device for remote access.

First you will choose your hostname. This is the name you’ll use when connecting to the machine.  For example, you can use (myhomepc.dnydns.org).

Service type for this will be “Host with IP address,” which is selected by default.

Next you’ll need to provide the IP address of your machine which can automatically be done by clicking on the link below the empty field.  It will automatically detect your system’s IP and add it for you.

Dynamic Updater
Most home users have an IP address that is provided by their ISP (Internet Service Provider) and this address changes frequently.

In order to keep your machine’s IP address updated with your DynDNS account, you’ll need to install the DynDNS Updater Tool which can be found at: http://www.dyndns.com/support/clients/windows.html.

Once installed, the updater tool simply asks for your DynDNS username and password.  Then, it automatically will do its job as you never have to touch it again.

The last step is to choose what services you want to include with your free account.

You can add things like VPN, remote file access, remote desktop (always choose this), mail server, web server, chat server, ftp backup, VoIP, bog, ecommerce, webpage, and many more.

Voilà!  You’re all set and ready to remotely access your machine.  Simply open Remote Desktop Connection. It can be found under Start > All Programs > Accessories > Communications.

Enter in the hostname you setup with your account, click connect, enter your username/password for the machine, and you’ll be instantly connected.

Connect World Wide
You’re now able to connect to that machine from anywhere in the world as long as you have an active internet connection.

A  little bit of advice: you should be sure you’re using a broadband or DSL connection. A dial up connection will cause issues with your access.

If you need more information, the website http://www.dyndns.org has plenty of video tutorials, step by step setups with screenshots, as well as several other resources you can use to get an account setup.

Remember, you can call Tech Experts at (734) 457-5000 for assistance setting up your remote access via DynDNS.

Best Steps To Secure Your Wireless Network

September 30, 2010

Do you have a wireless router or wireless access point (WAP) set up in your home or business? If so, is it secured and locked down from hackers and snooping eyes?

There are three basic steps you can take to secure your wireless network.  I recommend performing all of them.

By default, most routers have no security set up right out of the box. This means that your neighbors or anyone close enough to pick up your wireless signal can connect to your wireless network without you knowing it.

They can freely browse the web and without the proper security in place, your router and any network device connected to it (computer, cell phone, etc.) becomes visible to anyone that can see your wireless signal.

From that point on, it is  easy for a hacker to connect to your computer and see your files or steal and delete your data. If you’re not comfortable making changes to your network, then have a trusted IT company such as Technology Experts to make those changes for you.

If you are computer savvy then follow these three basic steps to make your network more secure.

Change Your SSID
Your SSID (Service Set Identifier, which is simply the name of your wireless network) is what you connect to for Internet access.

You want to change the SSID from open security to “WPA2.” This is the most secure setting currently available on most routers. You’ll also need to assign a security key commonly called a pass phrase.

Do not use something common such as your name, child’s name, or any other name that is associated with you. Use a combination of uppercase and lowercase letters, numbers, and characters.

Don’t Broadcast Your SSID
Who needs to know the name of your wireless network? No one other than you. Not your neighbor next door or that guy driving down the road trying to connect to a non-secured network.

There is a setting in your router to disable the broadcast of your SSID.  Again, if you are unsure, then have a trusted IT company perform these changes.

Change Your Router’s Login Password
The last thing to do is  change your router’s management interface username and password.

All routers come with a default user name and password that is easily available on-line for anyone to find.

If you don’t change it, a hacker who gained access to your wireless network (or someone you allowed access), can simply log into your router and play havoc with your network. Be sure to change the password.

Following these three basic steps will make your wireless network much more secure from hackers and from intruders accessing your internet connection.

While a very skillful hacker can still get around even this security, they won’t bother trying.

There are too many unsecured networks out there, so hackers would not waste their time trying to break a network that is configured securely.

Remember, if you need assistance or would like a great IT company to perform these changes, give Tech Experts a call at (734) 457-5000.

Email Is Making You Stupid

August 30, 2010

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

“The research is overwhelming. Constant email interruptions make you less productive, less creative, and, if you’re emailing while you’re also doing something else, just plain dumb.”

That quote – and the headline – comes from an article by Joe Robinson in Information Week magazine. When it arrived in my inbox, I was compelled to read it.

The fact is, as business owners, our lives have gotten incredibly more complex as we become more and more connected. Smart phones keep our email in front of us 24 hours a day, seven days a week – which compels us to be available on the same schedule.

The study Robinson sites was conducted by the University of Minnesota. It found that managing “peripheral tasks” – those things we do while we’re also doing something else – triggered twice the number of errors, and increased levels of annoyance by anywhere from 31 to 106 percent.

Time Is Money
Given our constant state of “connectedness” to clients, employees and prospects, it’s easy to think that we have to respond instantly to a request. I get caught in that trap: Thinking I’m being efficient when I handle something immediately.

Interestingly, Intel conducted a study of employee productivity, and found that email overload cost the company almost $1 billion a year in lost productivity. Each day, a typical office employee checks email 50 times, and uses an instant messaging application 77 times.

Interruptions like this not only sidetrack employees from their jobs, but also lower overall attention spans and increase stress by measurable levels. Job satisfaction and creativity also suffer.

Myth Of Multitasking
Again, from Robinson’s article: “Human brains come equipped with two kinds of attention: Involuntary and voluntary. Involuntary attention, designed to be on the watch for threats to survival, is triggered by outside stimuli – what grabs you.

It’s automatically rattled by the workday cacophony of rings, pings and buzzes that are turning jobs into an electronic game of Whac-a-Mole. Voluntary attention is the ability to concentrate on a chosen task.”

As your attention span is bounced around by constant interruptions, your brain changes: Interruptions erode an area called effortful control, and with it the ability to regulate attention.

In other words, the more you check your messages, the more you feel the need to check them – an urge familiar to BlackBerry or iPhone users.

The cult of multitasking would have us believe that compulsive message-checking is the behavior of an always-on, hyper-productive worker. But it’s not. It’s the sign of a distracted employee who misguidedly believes he can do multiple tasks at one time. Science disagrees.

People may be able to chew gum and walk at the same time, but they can’t do two or more thinking tasks simultaneously.

So, how do we crawl out of the attention void? Interruption management. Here’s some things I’m trying:

Turn off all of the alerts that let you know you’ve got mail.

Pick a few times per day – four maximum – to check your email. Outside of those designated times, keep Outlook closed.

Don’t let email be the default communication device. Communicating by phone or face-to-face saves time and builds relationships.

Respond immediately only to urgent issues. Just because a message can be delivered instantly does not mean you must reply instantly.

Severely restrict use of the reply-all function.

Put “no reply necessary” in the subject line when you can. No one knows when an e-conversation is over without an explicit signal.

Resist your reply reflex. Don’t send emails that say “Got it” or “Thanks.”

Use automatic out-of-office messages to carve out focused work time, such as: “I’m on deadline with a project and will be back online after 4 p.m.”

Please email me at tfox@expertsmi.com and tell me about your interruption management methods. I’ll let you know in the next few months how it goes.

Office 2010: Definitely Worth Upgrading Your System

August 30, 2010

Now that Office 2010 is available, companies should consider whether to invest in the latest version of the software. My answer is: It depends, with a strong leaning toward “yes!”

The “it depends” part considers the current state of your business’ hardware, what version of Office you are currently using, how your firm’s other software applications integrate with an upgrade and most importantly, your technology budget.

Office 2010: The Latest
According to Microsoft, the Office 2010 suite is designed to make work flows more efficient; to effectively use Web applications to make work available anywhere; and to make collaboration with others much easier.

When considering whether to upgrade to Office 2010, Outlook’s integration with Exchange Server 2010 may be a consideration or some firms.

Exchange Server 2010 is designed to reduce deployment costs; simplify high availability and disaster recovery, ease administration and provide greater mobility and flexible access.

Your Hardware and Operating Systems
For some, the decision about whether to upgrade to Office 2010 may depend on where your business is in its hardware life cycle. If you have older machines that might not support the increased hardware requirements of Office 2010, it is probably best to wait for the upgrade to coincide with your hardware refresh.

For businesses that still use Windows XP, upgrading to 2010 may not be an option, since the newest software program will probably not run efficiently on the older operating system.

Your Current Version of Office
Many companies are still using Office 2000 or Office 2003, so their choices may be between forging ahead with Office 2007 or jumping straight to Office 2010.

The learning curve is an issue to consider. Office 2007 and Office 2010 are strikingly different from the 2003 version, while Office 2010 has a more similar look and feel to Office 2007.

This is particularly true when it comes to the “ribbon,” the Office Fluent User Interface that replaced the traditional menu and toolbars in Office 2007.

Firms that are upgrading from Office 2007 to 2010 will have fewer training issues than those that are still using Office 2003 or Office 2000.

Integration Issues
Integration issues should always be a concern for any business considering new technologies.

Integration with your billing, document management, client relationship management, and calendaring software should all be considered. Often, third-party applications will require patches or updates in order to work seamlessly with Office 2010.

Communicate beforehand with your vendors to ensure that all applications will function without a hitch during and after the installation of Office 2010.

Proper planning is key, but so is testing. Testing should include both compatibility and usability.

The staff that will use the software should have an opportunity to examine it – they’ll be the best judge of how much additional training will be required.

Budgetary Issues
Now more than ever, small businesses need to get the biggest bang for their technology buck. It is not the time to roll out a new software program that may be buggy or have integration issues.

For firms with limited IT budgets, the more-proven Office 2007 could be the smarter choice, especially if the new version of Office is purchased with Microsoft Software Assurance, which gives you upgrade rights in the future to Office 2010.

Regardless of the decision your firm makes about upgrading to Office 2010, preparation is the key.

You’ll need to prepare your staff for any changes and plan for a reduction in productivity during the intial roll out.

Planning is extremely important, to ensure that the integration proceeds smoothly and the firm employees can reap all of the benefits they expect – and that they have paid for.

Many Factors Influence Video Speed And Quality

August 30, 2010

Over the years I’ve been asked by a wide variety of different computer users about video streaming and overall video quality on a computer system.

Websites like YouTube, Flickr, and MetaCafe have taken the online video revolution and turned it upside down the last few years with advances in audio/video technologies and the affordability and availability of high speed Internet connections.

So you are on the Internet watching one of your favorite videos on YouTube, but the video does not play smoothly, seems to skip frames, and sometimes even just sits there and does nothing; why you might ask.

I will go over a few tips and tricks that can either fix the problem, or move you in the right direction to resolving those frustrating video issues.

As you can imagine, there are a number of reasons why this could be happening, but let’s start with your system before exploring other possibilities.

A good quick test is to play a video from either a CD or DVD that you have in your possession or one you have already downloaded onto your system’s hard drive.

If the media plays from your local system with no issue, the problem probably exists outside of your system and other options should be explored, but what if it’s not?

Memory
Ensure your computer has enough memory. If you’re not sure how much you have or you should have, give us a call to have your machine checked over for upgrade options.

Virus/Malware
If your system is infected with a virus or some type of malicious software, it could be consuming valuable resources that your system needs to stream videos.

Try running a scan with your antivirus software and again if you’re not sure we’re here to help with the virus removal.

Internet Speed
If your Internet connection is on the slow side, this could also cause a problem.

Remember when you’re accessing videos from the Internet, the data is transferred across the Internet to your system where it is played, unlike putting a DVD/CD into your disc drive and playing it right from your system. The data is all there and does not need to transferred, compiled, and played.

Congestion
If the video that you are trying to play is out on the Net and there are several hundred thousand other people attempting to stream the same video as you, this can cause the video to be slow.

Although this one isn’t as typical as the others’ it still happens, and the only way to check against this would be to try the video at a later time in the day.

Buffering
Again this applies to the users who are accessing content via the Internet, try pausing the video, and letting the progress bar on the video build up before playing. This is called buffering, which can stop choppy videos from stopping and playing.

These are going to be the top five reasons I’ve come across when diagnosing video quality issues on a computer and via Internet websites.

Remember there are several factors that affect the performance and quality of your video, and many times a combination of factors. But if you keep an eye on these five, your video experience should be a lot less frustrating.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

How To Use A Password Manager And Virtual Cards For No-Risk Holiday Shopping

December 19, 2025

Help Your Team Bridge The AI Gap

December 19, 2025

Is It Time to Rethink Your Phishing Training?

December 19, 2025

Your Best Defense Against A Cyberattack

November 17, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Spyware Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.