• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Microsoft Teams With Nasa On World Wide Telescope

April 30, 2009

In an effort to catch up with Google, Microsoft has signed an agreement to make planetary images and other data available to the public.  This will all be made possible thanks to the World Wide Telescope.  Also known as WWT, the computer software program allows end users to view high detailed satellite imagery, photography, and interactive 3-D models outer space.

Microsoft is getting the bulk of its images from The Hubble Space Telescope, NASA’s Mars Reconnaissance Orbiter, (MRO) NASA’s Lunar Reconnaissance Orbiter, (LRO) as well as ten other earth bound telescopes.

World Wide Telescope is currently offering five main modes.  The modes are sky, earth, planets, panoramas, and solar system.  The planets mode actually allows users to view 3-D models of celestial bodies like our moon, Venus, Mars, Jupiter, and four of Jupiter’s larger moons; bringing a virtual observatory directly to your desktop or laptop computers.

Microsoft and NASA will be working toward providing tools for real-time weather visualizations and forecasting.  The space shuttle launch pad, and other facilities at Kennedy Space Center in Florida will be available along with high resolution 3-D maps of the moon, sun, stars, Earth, Mars, and more to come.
Real time tracking of the International Space Station (ISS) and space shuttles will be available later this year.

Ames Research Center in Moffett Field, California will be responsible for the processing and hosting of more than 100 terabytes (TB) of data.  That’s enough to fill over 20,000 DVDs!

NASA intends to deliver a huge amount of upgrades to the WWT project in the Fall of 2009, as surface data of our solar systems become more and more popular, while Earth bound data is losing its excitement.

World Wide Telescope is a free download available to all users at www.worldwidetelescope.org.

The home page provides links to interactive tours that walk you through the software, and show you the ins and outs of navigating your way around the program.

There are also video/audio guided tours made by astrophysicists such as Dr. Alyssa Goodman of the Harvard/Smithsonian Center for Astrophysics. WWT allows users to create their own tours containing music, voice overs, and much more.

A web based version is available for those who don’t want to download and install the software on your local system, but the web client version does not have the full functionality of the software, but it sure is a great way to take a test drive across the universe.

Powerhouse Gym Keeps Their Computers in Tip Top Shape With Tech Experts’ Monitoring & Off-site Backup Service

March 28, 2009

Richard and Sharon Orndorf opened Powerhouse Gym in the Monroe Shopping Center in 1997. Since then, the business has steadily grown, now occupying the former Baisley grocery store.

The Orndorf’s purchased and renovated the building to provide their members with more than 15,000 square feet of state of the art muscle building, cardio equipment and free weights. The gym offers personal trainers for circuit training, weight lifting, and counseling.  A fruit and juice bar offers quick, healthy treats for gym clients.

Tech Experts recently worked with Powerhouse to upgrade their company’s network, servers and workstations, and we asked Sharon to talk about the experience.

“Our business is totally reliant on computer technology,” explained Sharon. “We utilize our computer system for point of sale and complete client profiles for billing and history purposes.  If our system is down we are at a total shutdown of operations.”

Powerhouse upgraded their server to an IBM xSeries 3200 machine, running Microsoft Windows Small Business Server. Their proprietary member management software relies on Microsoft SQL server for it’s database. The new workstations are Lenovo ThinkCentre desktop computers, all optimized for speed and reliability.

Sharon continued: “One of the advantages to working with Tech Experts is that the company is available 24/7. Their remote monitoring and off-site backup service helps eliminate computer problems before they escalate into something major.”

Tech Experts monitors Powerhouse’s server 24 hours per day, 7 days per week, and is immediately notified if there is a problem with the Gym’s server or network. Tickets are automatically generated and problems resolved, many times before Powerhouse’s staff is even aware there was an issue. This let’s Richard and Sharon concentrate on running their business, instead of worrying about their computers and network.

“Working with Technology Experts definitely has contributed to the success of our business,” Sharon explained. “We rely on the expertise of Tech Experts to keep us in the forefront of our business in this competitive market.”

We Can Beat The Recession!

March 28, 2009

As we all watch our revenues and expenses during this tight economic time it is inevitable that you will have to forecast worst case scenarios in your business and create plans to adjust if worst case becomes reality.

I am still very optimistic that smartly managed businesses can continue to grow at a healthy rate in 2009. I just believe in contingency planning as well.

I think the most important thing is to involve your people in the decision making process. It may take some quick and dirty education about the P&L and how the company runs but ultimately your group will come up with some creative answers you may not think about.

Toward that end, we’ve created a special website:

www.WeCanBeatTheRecession.com

Log on and share with me the creative ideas you have employed or have heard about other using to control costs, boost margins or increase sales during these times.

And more importantly, what ideas your vendors, customers and employees come up with.

There is too much doom and gloom on the nightly news. Let’s face it, good news doesn’t sell newspapers or airtime – so we’re creating some of our own good news on the web.

Visit our special website:

www.WeCanBeatTheRecession.com

or e-mail me at:

tfox@expertsmi.com

7 Tips For Working Securely From Wireless Hotspots

March 28, 2009

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Wireless hotspots are changing the way people work.

These wireless networks provide high speed Internet access in public locations—as well as at home—and require nothing more than a notebook PC with a wireless card.

From coffee shops to restaurants, airports to hotel lobbies, hotspots are ubiquitous. They range from paid services, such as T-Mobile or Boingo, to free connections at your local restaurant or library.

But they all have one thing in common: These are all open networks that are vulnerable to security breaches. And that means it’s up to you to protect the data on your PC. Here are a few tips to make working in public locations more secure.

Encrypt your files.
You can protect your files by encrypting them, which requires a password to open or modify them. Because you must perform this procedure on one file at a time, consider password-protecting only the files that you plan to use while working in a public place.

Choose more secure connections.
It’s not always possible to choose your connection type—but when you can, opt for wireless networks that require a network security key. The information sent over these networks is encrypted, which can help protect your computer from unauthorized access.

The security features of different networks appear along with the network name as your PC discovers them.

Make sure your firewall is activated.
A firewall helps protect your mobile PC by preventing unauthorized users from gaining access to your computer through the Internet or a network. It acts as a barrier that checks all incoming information, and then either blocks the information or allows it to come through. All Windows operating systems come with a firewall.

Monitor your access points.
Chances are, there are multiple wireless networks anywhere you’re trying to connect. These connections are all access points, because they link into the wired system that gives you Internet access. So how do you make sure you’re connecting to the right one? Simple—by configuring your PC to let you approve access points before you connect.

Disable file and printer sharing.
File and printer sharing is a feature that enables other computers on a network to access resources on your computer. When using your mobile PC in a hotspot, it’s best to disable file and printer sharing because when enabled, it leaves your computer vulnerable to hackers. Remember, though, to turn this feature back on when you return to the office.

Make your folders private.
When the folders on your mobile PC are private, it’s more difficult for hackers to access your files.

Consider completely removing sensitive data from your PC.
If you’re working with extremely sensitive data, it might be worth taking it off your notebook PC altogether. Instead, keep it behind the corporate firewall and use your company’s VPN to access it when necessary. This way, you have multiple safeguards in place.

A few simple precautions can help make working in public places more secure. And by selecting the best connections and adjusting settings, you can enjoy productive and safe work sessions no matter where you are.

It’s Always A Good Idea To Investigate Computer Noises

March 28, 2009

In this article I would like to talk about one of the more scary aspects of computers and computer repairs, “Things that go bump in the night.”

As I was lying in bed the other night I heard a noise, and I wasn’t sure where it was coming from. As I got up to investigate, the sound suddenly stopped. When I laid back down the sound started up again, this time I was able to track the sound down.

It was a low level moan coming from my computer.  Thinking I could deal with it later, I shut the computer off and went back to bed.

The next day I returned home from work and was just settling down on the couch when my wife informed me there was “something desperately wrong with our computer.” She said she went to turn it on and it is making a loud noise now. She said she just turned it right off.  Sure enough, I turned it on and the cooling fan on the power supply was moaning away. I let it run for a few minutes and the noise seemed to diminish.

But, I knew it needed to be fixed: Not only do we need access to the internet for email and other things, the wife cannot live without her recipe websites.

I shut the computer down and I opened the case and found that the CPU fan was in dire need of a good cleaning. I cleaned it up and got all the dust bunnies out of it and lo and behold noises are gone.

I am sure nearly all of us have experienced noises from our computers. Some noises are normal. Although a computer is mostly solid state electronics, there are a few components that move, and as any computer engineer can tell you, if it is a “moving part” it will eventually fail.

Along with the cooling fan in the power supply, computers have cooling fans on the processor, and case mounted auxiliary cooling fans that provide additional cooling. All of these fans can and do occasionally fail. Cleaning does not always fix them and they have to be replaced.

The next component that moves and is subject to wear and tear is the hard drive. As I’ve explained in previous articles, this is where your important data and files are stored. As the disks inside the drive spins at a very high rate of speed they can eventually wear out and hit what is called the seek head. Once this happens damage to the disk’s surface can result in a loss of data.

We call hard drives with this condition “serious clickers” due to the fact a clicking noise is very audible during the process of the seek head moving across the disks.

If your computer is making any funny noises, make sure not to delay getting it fixed, serious problems can result from failure to address and repair noisy fans and clicking hard drives. Tech Experts has a staff of trained certified professional technicians to help isolate and eliminate these “noises in the night.” Give us a call at (734) 457-5000.

Important Security Alert To Anyone Using Instant Messaging

March 28, 2009

According to the Radicati Group, 85% of businesses—both large and small— are now using instant messaging (IM) as a communication tool.

Unfortunately, hackers are rapidly developing ways to use IM to spread viruses and gain access to computers and networks. Instant-messaging security vendors have reported an exceptionally high spike in attacks in recent months.

IM attacks work similar to e-mail viruses; the sender tries to get the user to click on a link that takes them to a website where they’ll be infected with a virus, or it tries to get the user to download a file. Many of these attacks appear to be from legitimate sources or people on a “buddy” list.

Just recently, researchers discovered a threat on AOL’s instant messenger system, but tens of thousands of computers had already been infected. Hackers then used a program to upload movies to the victim’s hard drive and use their computer as a vehicle for sharing it with others.

These attacks are also getting more complex. Savvy IM users will often reply to an IM and ask their buddy if the link or file sent was safe. However, hackers have now developed an intelligent bot that will actually automatically respond to the message confirming the file or link is safe.

Just like viruses, worms, and other security threats, businesses need to put measures in place to protect themselves from these new threats. The first step is educating your employees about these threats through your employee’s acceptable user policy. However, since there is always a chance someone will click on a link or download a file, education is not enough.

If you currently use IM, we urge you to contact our office about installing the proper software and security measures to make sure you don’t fall victim to these growing attacks.

Expert Advice On Choosing A New Computer

March 28, 2009

Picking out a new computer can be challenging. Questions you might want to ask yourself include: What is my budget, what do I need to use it for, and where do I plan to use it?

After you answer those questions, you need to think of more specific questions like should I get a laptop or desktop, how fast does it need to be, and how much memory or drive space do I need? All these will help get you an idea of what you are going to look for.

When looking for a computer the form factor is one of the biggest decisions. What I mean by that is the size of the computer, whether you want it to be a portable computer or a desktop computer.

The two most common sizes are a regular tower case (the kind that usually sits on the floor) or a laptop. Deciding on one of those will help eliminate half of the choices right away.

Next, ask yourself if your needs will pretty much stay the same, or is there a chance of needing upgrades as your needs and computer use change?

You’ll probably not be able to predict when you’ll need to upgrade your computer, but it’s something to keep in mind. Laptops are generally more expensive than tower computers, and can’t be upgraded as easily.
Most laptops can only have ram and hard drive upgrades. Tower computers have pretty much inlimited upgrade potential. From a new motherboard to just a simple RAM upgrade.

Be careful, though: Some major computer manufacturers like Dell make it so that you can only upgrade your computer with manufacturer parts – limiting choices and making upgrades much more expensive than on standard computers.

When reviewing the specs for your new computer, consider the kind of work you do and how fast you need to get it done. Two of the biggest factors to consider are hard drive space and the physical RAM.

Think of hard drive space like a file cabinet – this is where the computer stores all of your programs, files, pictures, music and so on. You can think of RAM memory as the computer’s working memory – where it does all of the different calculations you ask it to do.

If you do a lot of tasks that have very large files like video editing or pictures you would want to make sure you have a bigger hard drive so that don’t run out of space right away. Hard drive space is very inexpensive – less than $1/gigabyte – so it makes sense to buy as large a hard drive as is practical.

For the speed on the computer you need to look at the CPU type and speed, and the RAM.

CPU type will typically be single or dual core – without getting too technical, you’ll probably want to go with dual core, which makes the computer (in general) able to process twice as much information at the same time. The faster the speed, usually measured in gigahertz, the faster the computer can process information.

RAM is also a determining factor in the processing speed of the computer – the more RAM, the more the computer can process without accessing the hard drive. I recommend at least 2gb, and preferrably 4gb.

These are just a few things to keep in mind when buying a new computer. We’re very proud to offer IBM and Lenovo laptop and dektop computers at Tech Experts, so if you’re in the market for a new machine, give me a call!

The Year Is One-Sixth Over… How’s Your Progress?

February 8, 2009

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

I’m writing this month’s article in the Dallas airport, waiting for my flight home after spending three days in meetings with my HTG peer group. I wrote about peer groups before, but in case you missed it, here’s a quick refresher: Four times a year, I get together with other computer company owners for a two to three day meeting, sharing company metrics, reviewing the business, and setting goals.

We act as each other’s “accountability partners.” We hold each other’s feet to the fire. We start by reviewing how our businesses did the last quarter; we lay it all out on the line, the good, the bad and the ugly. Everyone is here to work “on” their business for a few days – instead of working in it.

A big part of what we do together is sharing goals. Most small business owners talk about setting goals for their companies, but at the end of the day, they almost always get stuck in the day to day, and don’t get a chance to focus on the objectives they have set for the business. That’s what I really like about the HTG experience – there are 11 other business owners who are holding me accountable for what I say I’ll get done.

When we report on our goals for the previous quarter, the group votes on whether we’re “green, yellow or red” on a goal.

Some of the members of HTG16 gather before going to dinner. From left, Jason Hagens from Seattle, Tim Rettig from Cincinnati, Mike Perkins from Boulder, me (checking service tickets), Alex Rodriguez from Borger, Texas, Matt Zaroff from Sherman Oaks, California, and with his back to the camera, Dave DelVecchio from Easthampton, MA.

Green means we nailed it, yellow means we’re almost there, and red, obviously, means you didn’t get it done.

There’s a lot more to the HTG experience, and I’m sure I’ll share more throughout the year. If I had to sum up the value in just a few words, I’d say that the peer group experience forces me to focus on what’s really important for my business, my team and my clients. It is accountability on steroids.

Now that the year is one-sixth over, how are you doing on the goals you’ve set for your company? Are you 10% there? Have you set the world on fire yet?

Part of our job as your IT company is to work with you on the strategic goals you’ve set for your business, and help you apply information technology in ways that will improve efficiency, increase client satisfaction, and reduce costs. Toward that end, we’ll be conducting quarterly business reviews (QBRs) with each of our business clients.

The purpose is to sit down with you and discuss the big-picture aspects of your network, computers and servers as they relate to your business goals. Chances are, there are things we can do to improve operations at your company – and there’s probably some things going on in your business and industry that we should know about.

QBRs will also give me a chance to check up on our relationship and get a feel for how the services team is performing for you. I’m excited about this new initiative and believe we’ll both get a lot of value from it.

My three goals for Tech Experts for the next quarter – we set three goals in HTG, the thinking being it’s impossible to concentrate on more – all revolve around process documentation and improvement. As Tech Experts grows, it’s critically important that we perform all of our services consistently, so that when Bob works on your network, the flow and process works the same as when Corey or I do.

I also have to admit that I have a fourth goal – one that didn’t get accomplished last quarter. That’s the thing about being held accountable – goals don’t go away when they’re not completed. They just get added to the list of things you’re responsible for in the next meeting.

Big, business changing goals don’t get accomplished in a week or even in a quarter. But being accountable to your goals should happen every day.

Are you working on your business, or in your business? When you look back at January and February, will your goals be green yellow or red?

3 Things You Need To Know About E-mail Marketing

February 8, 2009

It’s everyone’s favorite application. Since its introduction, it has revolutionized the way we communicate, both personally and professionally. It has had a major impact on how companies market themselves, communicate with vendors, send out press releases, rally employees and alert clients to their latest and greatest promotion. The ease, low-cost and speed of e-mail in marketing is the biggest reason why our inboxes are overflowing with spam.

In response to the ubiquitous outcry, “I hate spam,” governments have crafted new regulations surrounding the use of e-mail; and if you are one of the millions of companies using it for marketing, then it’s important that you familiarize yourself with these laws. But the danger doesn’t stop there…

Even if you don’t get caught by the authorities for violating the rules of e-mail usage, you can still end up on a blacklist with the major ISPs such as Yahoo!, AOL, and MSN. Once you get blacklisted, you are considered guilty until proven innocent, and ALL the e-mail you send won’t get through, even to people who want to receive it—a consequence that could end up hurting your business more than a fine.

So what are the basic guidelines of e-mail marketing?
First and foremost, make sure you are only sending e-mail campaigns to people who have solicited (requested) to be on your distribution list. This is called “opting-in” or subscribing, and e-mails sent to these folks are considered “solicited e-mail.” You are perfectly within your rights to send them messages; but if you got their e-mail address by any other means and they did NOT specifically request to be on your list, that is “unsolicited e-mail” or spam.

Sending promotional e-mails to people who have not requested it can be illegal, but certainly annoying…so don’t do it!

Next, make sure you provide directions on how a person can remove themselves from your distribution list in EVERY e-mail. The best place to put this information is at the very bottom of your message. You should also include your full company name and contact information at the bottom so no one can blame you for cloaking your identity—which is in violation of the CAN-SPAM Act.

Finally, when sending mass e-mails, we recommend using a web based service such as iContact (www.iContact.com). These applications will help you manage your e-mail distribution list with automatic opt-out and opt-in tools and will keep your e-mail server off an ISP’s blacklist. Naturally, you want to make sure the information you are sending is interesting and relevant. No one wants more junk filling up their inbox so the better you are at marketing, the better your results will be.Email is not a magic marketing bullet that will solve all your marketing problems, but used correctly, it can help you reach more customers and build stronger relationships with the people you already do business with.

How To Pick A Good Password

February 8, 2009

What’s the most common password? You guessed it…”password.” Obviously this is not the best way to protect yourself against hackers and online thieves. But even if you don’t use the word “password,” you might be using an equally easy password to decipher.
We suggest you DON’T use the following passwords for really important web sites, such as your online banking web site or other financially related sites.
• Your name or your spouse’s name.
• Your children’s names.
• Your pet’s name.
• Your birth date.
• The last four digits of your Social Security number.
• Your phone number.
• Your address.
• A series of consecutive numbers, such as “1, 2, 3, 4.”
• A single word that would appear in a dictionary.
Your best bet for creating a strong password: Use combinations of letters, numbers and special characters.
« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.