• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

What Is RAID, And Why Should Your Server Have It?

March 31, 2011

Did you know you can increase storage functions and reliability through the redundancy of RAID?

RAID is an acronym for “Redundant Array of Independent Disks.”

RAID was first developed in the late 1980’s because servers were encountering a dramatic increase in the amount of data they needed to store.

Storage drives were really expensive then and would cost a fortune if ever you needed to replace one.

By having RAID on your server you were able to use a large number of low cost hard drives and link them together to form a single large capacity storage device, which offered greater performance, storage capacity and reliability over older storage solutions.

It has been used mainly in the server markets, but over the past few years RAID has become much more common in end user systems.

There are three major advantages by having RAID.

 

Redundancy
This allows for a form of data backup in the storage array in the event of a hard drive failure.

If one of the drives in the array failed, it could be easily swapped out for a new drive (without the need to turn the system off, this is referred to as “Hot-Swappable”) or you could continue to use the other drives in the array.

Performance
Depending on which level of RAID you are using and how many hard drives you have in the array you can increase the read/write speed of your drives.

Lower Costs
You can set it up so that you have several inexpensive (low capacity) hard disk drives brought together to make up one big (high capacity) disk drive.

Also in the event you need to replace a hard drive you will not have as much down time if you chose a RAID level that supports redundancy.

Types Of RAID
There are several different RAID levels, and each has advantages over the other. Depending on what you’re trying to accomplish, you can choose between (these are just the most common choices) RAID 0, RAID 1, and RAID 5.

RAID 0 is a base confi guration called striping, which requires a minimum of 2 disks. With RAID 0 all of the drives in the array will appear as one drive with the sum of all drives adding up to make one big hard drive.

The logical disk is then created with “stripes” which run a crossed each disk in the array. The advantage of having RAID 0 is that you gain storage space as each disk is seen as one giant logical disk. However if one drive goes bad, then all of the data is lost and there is no way of retrieving it.

RAID 1 is the second base configuration and it is called mirroring. Like RAID 0, this level of RAID also requires a minimum of 2 disks and can only be used with an even number of disks. RAID 1 provides data integrity. Instead of each disk showing up as one giant logical drive as with RAID 0, RAID 1 will mirror any data that is written to one of the disk’s in the array, and copy the data to all of the other disks in that array.

Therefore if one of the mirrored drives goes bad, no data is lost as it is on the other drives in the array. The bad drive can then be replaced and the data can be copied back over automatically (if set up to do so).

RAID 5 is the most commonly used RAID level. It combines the features of RAID 0 and RAID 1. It requires a minimum of 3 disks in the array.

RAID 5 uses the same striping aspect as in RAID 0, however not all of a stripe is made available for data storage.

Part of each stripe is reserved for parity. Parity is used to ensure the integrity of the array by comparing two bits of data and then it forms a third data bit, in which each bit is on a different physical disk drive based upon the fi rst two bits, leaving you with 2/3 of your storage.

However depending on which disk dies, each triplet will lose one of the bits built by the RAID level.

Either bit 1, bit 2 or the parity, but with the other 2 existing on a different disk, the third can be quickly calculated and replaced onto the replacement drive.

 

5 Things You Need To Know If You Buy A New PC

March 31, 2011

Great Tips To Keep In Mind When Shopping For Your Next Computer

When you are ready to buy a new computer, one of the first questions you may ask yourself is, “Where can I get the best deal?”

Obviously you don’t want to pay more than you have to, price shouldn’t be the only thing you consider before making your decision.

If you shop the local electronics superstores for weekly specials, you can easily get a standard machine at an ok price. This option would work best for you if you’re not too picky or if you don’t have any special requirements for gaming, graphics, or your special business software.

If you buy over the Internet from a major manufacturer, you’ll get more choice and customization on the components, chip speed, RAM, hard drive size, and video components, but you’ll pay a slightly higher price. But, the biggest downside to buying online is that you’ll have a hard time getting technical support if something goes wrong.

Not a week goes by where we don’t get a client who wants to pay us to fix a warranty-covered machine simply because the manufacturer is making it next to impossible to get the problem taken care of. In many cases, these companies have help desks located outside of the US, which means you might have a hard time communicating with them.

Sometimes only a component (like the hard drive) will go bad. When this happens, you’ll have to ship the entire machine back wait a couple of weeks for them to repair it and ship it back. You also run the risk of losing all your data and configurations.

If you have special requirements, need help in selecting a machine, or if service before, during, and AFTER the sale is important, then you’ll want to buy from a local shop like Tech Experts.

Here Are 5 Big Reasons To Buy Your Next PC From Tech Experts:
1. You’ll get a senior technician who will take time to explain your options, answer your questions, and help you make a good buying decision based on what YOU need, not what we have to clear off the store shelves. At an electronics superstore, there’s a good chance you’ll end up talking to a teenager working on commission who doesn’t have any real technical expertise.

If you buy online, you’ll get very little or no help in selecting the right combination of components and options, so this works best ONLY for those individuals who really know what they are buying.

2. Superior technical support and service after the sale. If you’ve ever dealt with a manufacturer’s technical support in the past, you know how frustrating it can be. After waiting on hold for days, you’ll end up speaking with a “technician” who doesn’t have a clue. Most ofthe time they’re just reading from a script and taking you through a series of system checks that won’t help.

Whenever you have a problem with a machine that you purchased from us, we’ll troubleshoot it for free. Plus, you won’t have to wait on hold when you call, which brings me to another point…

3. If you need technical support on a computer that you bought from us, you won’t go through voice mail jail or be transferred to another country. You actually get to speak to a friendly, local technician.

4. We’ll set up your e-mail account, Internet access, check your virus protection, set up your firewall, and upother preferences and settings. When you buy from a superstore or online, it’s up to you to configure your new machine.

5. We’ll custom build or upgrade your PC here in our office. Maybe you just need more memory and a video card added. If you simply want to “upgrade” your PC to save a few dollars, we will gladly do it for you.

The bottom line is this: if you are shopping solely on price and aren’t too picky, then watch the weekend papers for sales at your local electronic superstore. They can offer a great price on a standard machine. Usually you can save anywhere from $100—$200 this way.

For semi-customization at a decent price, check the Internet. There are hundreds of online resellers offering PCs at competitive prices.

For the best customization, service, and support after the sale, buy from Tech Experts. You’ll pay a little bit more but we’ll make sure you get exactly what you need without any hassle or problems. Give us a call today at (734) 457-5000.

 

Three Things You Need To Know Before You Hit “Send”

February 2, 2011

It’s everyone’s favorite application. Since its introduction, it has revolutionized the way we communicate, both personally and professionally.

It has had a major impact on how companies market themselves, communicate with vendors, and send out press releases, rally employees and alert clients to their latest and greatest promotion.

The ease, low-cost and speed of e-mail in marketing are the biggest reason why our inboxes are overflowing with spam.

In response to the ubiquitous outcry, “I hate spam,” governments have crafted new regulations surrounding the use of e-mail; and if you are one of the millions of companies using it for marketing, then it’s important that you familiarize yourself with these laws, but the danger doesn’t stop there.

Even if you don’t get caught by the feds for violating the rules of e-mail usage, you can still end up blacklisted with the major ISPs such as Yahoo!, AOL, and MSN.

Once you get blacklisted, you are considered guilty until proven innocent, and ALL the e-mail you send won’t go through, even to people who want to receive it – a consequence that could end up hurting your business more than a fine.

So what are the basic guidelines of e-mail marketing?
First and foremost, make sure you are only sending e-mail campaigns to people who have solicited (requested) to be on your distribution list.

This is called “opting-in” or subscribing, and e-mails sent to this folks are considered “solicited e-mail.”

You are perfectly within your rights to send them messages; but if you got their e-mail address by any other means and they did NOT specifially request to be on your list, that’s considered “unsolicited e-mail” or spam.

Sending promotional e-mails to people who have not requested it is not only illegal, but annoying..so don’t do it!

Next, make sure you provide directions on how a person can remove themselves from your distribution list in EVERY e-mail.

The best place to put this information is at the very bottom of your message. You should also include your full company name and contact information at the bottom so no one can blame you for cloaking your identity –another legal “no-no” of e-mail marketing.

Finally, when sending an e-mail, we recommend using a service such as iContact. Check it out at http://www.icontact.com/?cobrand=310189

These web based applications will help you manage your e-mail distribution list with automatic opt-out and opt-in tools and will keep your e-mail server off ISPs blacklist.

Naturally, you want to make sure the information you are sending is interesting and relevant.

No one wants more junk filling up their inbox so the better you are at marketing, the better your results will be.

E-mail is not a magic marketing bullet that will solve your marketing problems, but used correctly, it can certainly help you reach more customers and build stronger relationships with the people you already do business with.

Fall In Love With Your Computer All Over Again!

February 2, 2011

“This computer is driving me crazy!” Have you ever shouted at your computer because it froze up, crashed, and caused you to lose work? Have you ever whacked it with your hand, kicked it, or smashed the keyboard out of frustration?

If so, you’re not alone. Problems with a computer, cell phone or other gadget can be so frustrating that it has been called “computer rage” by some psychologists, and it’s on the rise.

How Violent Do They Get With Their Computer?
According to a recent poll, three quarters of computer users have admitted to shouting, swearing, or committing acts of violence towards their computer (we think the number is much higher).

While some simply curse the darn thing, others have admitted to hitting it throwing it across the room.

One computer user was quoted saying, “You feel so helpless. All you can do is sit there and watch the stupid thing freeze up and there’s nothing you can do about it. Errors may only cause a few minutes delay, but it feels like a lifetime when you need to get things done.”

Deadlines are missed, work is lost, customers angered – all because of computer trouble.

And the vast majority claim that problems like this happen on a consistent basis.

It’s Not Just The Computer Causing Stress
Technical problems are only the start of most peoples’ anxiety. Many report that they are further angered by the time and process it takes to get the problem fixed, and some employees claim computer problems are their number one source of at-work anxiety and stress.

IT related problems further compound employee dissatisfaction since it often forces them to work late or take work home. If you are an employer, take note:

Your unstable computer network could be elevating your employees’ anxiety and job dissatisfaction levels, not to mention interfering with their productivity.

How To End “Computer Rage” And Fall In Love With Your Computer All Over Again

Thanks to our Super Value System Checkup, we have helped dozens of clients end “computer rage” at their company and with their home computers.

Our comprehensive, 27 point problem prevention tune-up lets our technicians dive deep into your system and check for hidden problems, viruses, spyware and system-slowing hardware problems.

This isn’t just a simple look at your system! We use special software tools and our own, proprietary methods to check things other computer companies just don’t know how to check!

You’ll get a written report detailing what we found, and our professional recommendations for any updates you need to bring your system back up to speed.

Sign Up Today And Get Priority Access and Pricing
Since it’s Valentine’s Day, we want to “show you the love” by offering you this Super Value System Checkup for only $69.

We’ll get your system running so nicely, you’re guaranteed to fall back in love with your computer again. Plus, we’ll give you priority scheduling in our shop – no point in making you wait to feel the love!

If you have a business with 5 or more computers, we’ve got an even more LOVEly offer for you! We’ll send our Microsoft Certifi ed technician to your office, saving you the hassle of bringing your computers to our shop.

We’ll do the same 27 point problem prevention tuneup, and check your network for trouble at the same time.

You’ll need to hurry, though – this offer is only valid during the months of February and March, and limited to the first 25 people who call.

To Find Out More call 734-457-5000 Or, Visit Us Online: www.LoveYourComputerAgain.com

 

Helpful Microsoft Office Keyboard Shortcuts

February 2, 2011

Ctrl Z is the magic undo combo. It simply undoes your last action, say, the paragraph you accidentally erased (it works in other applications, too).

Programs vary in the number of times you can undo something, but some will let you Ctrl Z all the way back to the beginning. (And, yes, there is a redo command, just hit Ctrl Y.)

Ctrl B, Ctrl I, or Ctrl U apply bold, italics, or underline to highlighted text, respectively.

Ctrl P prints whatever is in an active window.

Ctrl Backspace erases an entire word at a time, instead of a letter.

Ctrl up or down arrows let you scroll an entire paragraph at a time, instead of one line, and Ctrl Shift up or down arrow will select an entire paragraph.

Ctrl Enter inserts a page break in Word.

Alt Ctrl C inserts the copyright symbol (Alt Ctrl R inserts the registered trademark symbol, and Alt Ctrl T makes the trademark symbol).

In Outlook, you can jump to the section you want: Ctrl 1 switches to the Mail window, Ctrl 2 switches to the Calender, Ctrl 3 to Contacts, Ctrl 4 to Tasks, and Ctrl 5 to Notes.

Ctrl Shift M starts a new message in Outlook. (Use Ctrl Shift C for a new contact.)

In Outlook e-mail, hit Ctrl N to compose a new message, Ctrl R to reply to a message.

In Microsoft Excel, you can select the entire column by pressing CTRL SPACEBAR, and select the entire row with SHIFT SPACEBAR.

 

Why Internet Predators Love Social Network Sites

February 2, 2011

Internet predators have become a fixture of sorts on many social media sites which necessitates the need for users to exercise caution.

Since the advent of the Internet “instances” of cyber crime have evolved into regular and expected occurrences.

Now the growing popularity of social network sites has cyber criminals taking direct aim at them with their Internet scams.

What is it that makes the social networks such an attractive target for this type criminal behavior?

Here are 3 very “inviting” reasons:

Casual Atmosphere
Social network sites are meant for just what they imply and that is to socialize.

This type of atmosphere is casual and relaxed therefore people for the most part are NOT expecting devious behavior.

It is just this type atmosphere that cyber criminals depend upon and thrive in. Their ability to manipulate others is based upon a “blind” trust or having others believe in their own sense of security.

Ease of Use
Most social media sites by and large are set up to be easy to use and navigate. This allows even the less than ‘tech savvy’ to become involved, but they also bring along their own naive nature relative to Internet security issues.

This makes them even easier prey since they are unaware of or unfamiliar with many Internet scams.

This ease of use on the other hand has also made it just as convenient for the “sinister online element” to gain access to their unsuspecting prey.

There are no security systems to work around or advanced coding to decipher therefore the “door” is wide open for the criminal element to gain easy access.

Popularity
As we all know crime always seems to gravitate towards the largest population bases offline and this remains true online as well. The very popularity of social media sites has put them in the “cross hairs” of the devious minded predators that lurk on the Internet.

Safety in numbers is NOT something innocent site members can count on when interacting within online social communities.

Internet predators have settled in quite comfortably on many social media sites to the point that they have almost become accepted “fixtures” to users.

For the 3 reasons we have spoken of above cyber criminals are attracted to many of the online communities.

The structure of these sites offers the perfect opportunity for the criminal element to successfully implement their Internet scams.

For the users they must simply be aware that cyber crime does exist and will continue to do so calling for the need to exercise caution when socializing online.

 

Should You Trust Every App You Install On Your Phone?

February 2, 2011

Nope — some of them are plundering your personal information and beaming it to potential bad guys. (Do hackers ever sleep?)

Two researchers revealed that they’d researched one seemingly benign wallpaper app and found that it was sending phone numbers and subscriber information (like names and addresses) to a remote computer.

The app in question came from Jackey Wallpaper, and it was uploaded to the Android Market, where users can download it and use it to decorate their phones that run the Google Android operating system.

It includes branded wallpapers from My Little Pony to Star Wars.

Essentially, these apps collect your phone number, subscriber identification, and even your voicemail phone number as long as they are programmed automatically into your phone. It sends the data to a website, www.imnet.us. That site is evidently owned by someone in Shenzhen, China. The app has been downloaded anywhere from 1.1 million to 4.6 million times.

“Apps that seem good, but are really stealing your personal information are a big risk at a time when mobile apps are exploding on smart phones,” said John Hering, chief executive, and Kevin MaHaffey, chief technology offi cer at Lookout, in their talk at the Black Hat security conference in Las Vegas. “Even good apps can be modifi ed to turn bad after a lot of people download it.”

 

When Should Your Company Consider Adding A Server?

January 20, 2011

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

If you are like most small businesses, you acquire desktop computers, phone systems, and software in a random, “buy-it-when-you-need-it” fashion as your business operations demand it.

But at some point, this patchwork of stopgap technology you’ve acquired needs to be examined, retooled, and perhaps replaced, depending on your company’s needs.

As your business grows, it makes sense to take a broader view of your technology investments. One of the first things you might consider is the role a server would play in your company.

Servers can take on a lot of tasks for a growing business, from securing data to enabling better sharing of company resources. But it’s sometimes difficult to know when, and if they’re a smart investment.

There are a few common scenarios in which a server can bring real benefits to a growing business – read on and see if any of these apply to you.

You need to share files, printers or other resources
It is technically possible to set up a simple network without a dedicated server, with just a few PCs connected together.

However, if you want to share databases, files, printers or other resources, a server makes it a lot easier.

In fact, servers are specifically designed for sharing, so you’ll get better control, faster access, easier management and improved security. And who wouldn’t want all that?

Your computers are overloaded and you need more storage
If you have a lot of files or multiple databases, it might be time to consider migrating some of these files to a server.

Whether you want to replace your old computers or just improve their performance, a server will give sluggish, data-laden PCs a welcome respite by freeing up memory and storage.

You want to have inhouse company email
While businesses with only a few employees can get by with using an external service for its email, there comes a time when these services aren’t ideal.

Adding a server allows you to bring your e-mail in-house, with the dual benefits of making users’ e-mail access faster and keeping sensitive business information within the company – not on another company’s servers. Plus, you can benefit from shared email productivity tools like Microsoft Outlook.

You want to conduct business remotely
If you have employees that work remotely, or if you’d like the option to work from home, a server will allow you and your employees to remotely access your company network, information and resources.

These are only a sampling of the signs that a server could be right for you. The bottom line is this: if you spend a lot of time moving data around, struggling to access things you need, and are worried about security, then it’s time to consider a server.

SPAM Prevention FAQ: Tips To Reduce Junkmail

January 20, 2011

How can you reduce the amount of junk email you receive? Here are our best tips!

Never Allow Your Email To Be Posted Or Listed
“Spiders” and web “crawlers” routinely “harvest” email addresses from web pages in an effort to build a collection of email addresses to send junk email to.

Never Unsubscribe Or Ask To Be Removed
The only exception to this rule is if you originally signed up for that particular list or asked to receive updates.

If you never asked to be part of a participating mailing list, why would you ask to be removed? Doesn’t make sense does it.

This is a common ploy spammers use to validate email addresses. If you respond, that proves to them that your email address is alive and active, and that you are receiving their emails.

Responding only encourages them to sell your email address to other spammers, and will ultimately increase the amount of junk email that you will receive.

Never Open Or Read Junk Email
Believe it or not, even if you never respond, but merely open a junk email, there could be special HTML code contained in that email message that will report back that you opened or read the message.

This provides validation to the spammer that your email address is alive and active, and you can bet you will start receiving more spam!

Be sure to turn off your email program’s Preview Pane feature, as this is essentially the same thing as “reading” a message.

Avoid Contests, Special Offers, And Chances To Win
These are gimmicks to get you to reveal your email address so they can send you special offers. Many free ecards (electronic greeting cards) are also ways companies collect email addresses.

Never Post To An Email List Using Your Private Email Address
Many spammers watch these posts in order to harvest new email addresses.So be very cautious when posting to these websites.

If you are a contact for a registered domain, do not list you private email address.

Instead of using your personal email address use a generic common mailbox for this purpose, or ask for domain registration privacy.

Create a public email address such as DNS@yourdomain.com or help@yourdomain.com.

Guard Your Computer Against Trojan Spyware And Software
Never open any attachments you don’t explicitly trust.

Some “fun” emails are often a ruse to steal email addresses or track your behavior on the Internet.

The use of both anti-virus, personal firewall, and or antispyware software is strongly recommended.

Use A Free Account As Your Public Email Address
Reserve your private email address for friends and select associates.

Never sign up for special offers using your private email address. Use your generic common email address for those.

Trick The Spammers
If you post an email address online, disguise its set-up, spelling out ‘dot com’ in place of .com.

Junk Mail Out Of Hand
If your junk mail has reached a level that it is just out of hand and you cannot handle it anymore, consider changing your email address.

If you don’t want to change your email address consider us to take advantage of our advanced SPAM filtering services.

We can make all necessary changes on your computer and with your email service to help prevent those spam messages.

New Technologies Make Proactive Service A Must

January 20, 2011

With today’s workplace relying more and more on information and computer systems, it just makes sense to leverage your IT investments.

Technology in the industry now allows IT professionals to take a proactive approach to network management, providing the entire infrastructure with a complete, secure, reliable, and fully automated solution to protect your IT infrastructure.

Deploying what are known as “agents,” you can add a fully automated virtual worker to your staff, which is working 24 hours, 7 days a week, 365 days a year. This agent will complete a long list of tasks that even a fully staffed IT department couldn’t handle.

You can now start to enjoy your away time when your network is being monitored by these solutions. So what exactly do they do?

Monitoring
When you use system monitoring, you can take the proactive approach to your computers and servers with a set of rules that your administrator defines.

They provide instant notifications of problems or changes such as low disk space on your hard drives, memory leaks, power problems, virus activity, and missing updates. Just about every critical component of a PC or server can be monitored.

Software Deployment
The software engines give us the ability to deploy software out to multiple systems simultaneously, which saves massive amounts of time and causes less downtime for the staff.

Given a set of rules and pre-requisites that are met prior to the install, you can ensure a smooth, fast, and worry free installation across your network.

Remote Control
Give your IT personnel a secure and quick way to remotely access your systems from any place at any time, giving your company its own help desk in a sense.

This increases productivity for staff, reducing the waiting time for a tech to show up at your location.

Patch Management
Keeping your computer systems up to date with operating system updates and security patches is critical to the health and safety of your network.

Given a set of predefined policies, all of your servers, workstations, and remote computers will automatically be receiving the latest security patches and software updates on a schedule that works for you.

Keeping the data traffic on the network during normal operation hours is crucial to the efficiency and productivity of the workplace and this will do just that.

Reporting
The reporting features will provide your administrators’ with quick and easy access to all the details of a network. Tactical and strategic planning become effortless when the agents are accumulating, tracking, and analyzing the way your network operates over time.

Audit & Inventory
Agents let the IT staff perform accurate and detailed reports on every server, computer, mobile device, and piece of equipment on your network.

This gives you a better look at what your network actually consists of and provides you and/or your IT personnel a complete detailed inventory of product specifications, versions.

An accurate network and infrastucture inventory lets you make intelligent decisions about upgrades, replacements, and maintenance.

Scripting
Possibilities are practically endless for what can be done with the scripting options. If you have a routine task that has to be done each and every day, week, or month, let your agents do the work.

They can automatically trigger those tasks to be done for you, on your time, your schedule, with no interaction required.

These are just a handful of the features that are possible, giving everyone a peace of mind when it comes to your IT.

Taking advantage of these technologies will give your IT personnel a complete set of tools to efficiently, securely, and cost effectively manage your systems.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Could Social Engineering Bring Down Your Business?

August 25, 2025

Don’t Let Outdated Tech Slow You Down: Build A Smart IT Refresh Plan

August 25, 2025

Biometrics Are the New Password – But What Happens If Yours Gets Stolen?

August 25, 2025

The Clock Is Ticking: Preparing Your Business For Windows 10 End-of-Life

July 22, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.