• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

USB Flash Drives Great For Backups At A Low Cost

February 8, 2009

A few issues back I discussed what random access memory (RAM) was, and how important it was to have as much memory as your computer can hold. This month I’d like to talk about memories. Or more to the point the storage and retrieval of memories.

I’ve experienced countless numbers of hard drive failures in computers that belong to our home user clients and as a result of this failure they lose all of their precious photo memories.

Once I tell them that I cannot rescue these photos, a lot of times they get that deer in the headlights look, and it is so sad. I got to thinking about this as just this past holiday season, my wife and I purchased a digital camera. Never having owned one before, I have been taking pictures like crazy and downloading them to my home PC.

In years past, it wasn’t an issue to back up your photographs. You used to take your pictures into the store and have them developed. It didn’t matter which type it was, slides or photos: Once you got them back developed, you could put them in an album and anything short of a major disaster those images will live on for generations. Your “backup” was the negatives that came back with your pictures.

Hard drive failure can lead to a loss of so many memories that many feel this would be a major disaster. We’ve touched on various backup systems for business users, but home users should be just as vigilant in the protection of what they consider to be their important data, their photo memories.

As technology has changed over the years, storage technology has evolved just as quickly. We used to backup onto floppy disks. Then came the writable CD player. And just a few years back came the development of an affordable DVD writer that can store much more data then a CD.

But the latest technology is the USB thumb or flash drive. This tiny portable electronic drive has no moving parts and is small enough to fit on your key chain.

And as companies refine their technology; these drives have become more and more affordable.

The ease of use is one of it’s best features, a truly plug and play device that works instantly on any computer with a current operating system such as Windows XP or Windows Vista. You can move the drive with true ease from computer to computer to copy those memories and have them stored away for future generations.

I’ve seen USB flash drives with 4GB of storage sell for as low as $25. This type of capacity will allow you to store numerous photos and can serve as an electronic photo album. The other nice thing about a USB drive for backup is that you can use them for more than just pictures – any important data you have on your computer can be backed up or copied.

If you’d like more information about how to use a USB drive to backup your memories (and important documents), just give us a call at (734) 457-5000.

Tech Experts Keeps The Sun Shining For Electrik Beach

January 21, 2009

If the winter weather has you missing your tan, chances are you’d love visiting Electrik Beach, Monroe and Toledo’s premier chain of tanning salons.

Since we last profiled Electrik Beach, the company has added two new locations in Toledo, and updated their computers at all four of their stores. Company president Dennis Asmar keeps his fingers on the pulse of the company’s operations by using state of the art computer and network technology from Tech Experts.

“You can go into any of our four locations and tan,” explained Dennis, “ and our staff is able to review your account to make sure you receive the best service possible.”

Being able to use any of Electrik Beach’s facilities is accomplished through the company’s proprietary tanning management software. Using secure Internet connections, each store communicates with the central server, keeping each customer’s account information up to date.

The company recently upgraded all of their servers and workstations to the latest high speed equipment available from IBM. The company’s servers have super fast and highly redundant RAID 5 arrays, using drives that operate at 10,000 rpms. The speed difference between the old system and the new is remarkable.

“Fifteen or twenty seconds doesn’t sound like a lot of time to wait,” continued Dennis, “but when you have several clients waiting, it can seem like an eternity. With our new systems from Tech Experts, our client wait time has gone way down, while our customer service has gone way up.”

Downtime just isn’t an option for Electrik Beach, so Dennis opted for Tech Experts’ “Experts Total Support” service for the salons. With Experts Total Support, all of the servers, workstations and connectivity equipment are monitored for problems 24 hours a day, seven days a week. As soon as a problem is detected, a ticket is raised, and it is immediately checked.

“Before hiring Tech Experts, our network would sometimes go down, run slow, and we’d sometimes run into just weird problems we couldn’t figure out,” said Dennis. “Since signing up on their support plan, we haven’t had any network problems. I’m VERY glad we hired these guys to support our systems.”

Visit Electrik Beach on the web at www.ElectrikBeach.com.

E-Mail Trouble? Here Are Some Things To Check

January 21, 2009

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Have you ever wondered whether someone got your email? You send a message, you wait to hear back, and…nothing. Did it arrive, or did it get lost along the way?

One of modern life’s greatest conveniences and frustrations, all in one, is email. When it works, it’s near-instant communication. But when it doesn’t, you’re left hanging.

How is it possible for such an important form of business communication to be so unreliable? Sadly, spam is to blame – I long for the good old days of reliable e-mail! As companies work to combat junk e-mail, chances are your mail may have some problems getting delivered. Fortunately, a little knowledge will increase the odds that your message gets through.

Bad Address
A common problem is simply an out-dated or mistyped email address.

With hard-to-remember addresses, frequent job moves, and changing internet service providers, your contact list should be updated regularly.

If you send something to a bad address, you usually get an error message sent right back to you. This is called a “bounce-back message” because the email was sent (“bounced”) right back without getting through.

Check for typos in the address line; if it looks right, pick up the phone instead. Be sure to update your address book with the new email.

Blacklists
A more serious problem occurs if your address is added to a blacklist. These are lists managed by a variety of spam-prevention services that flag people, websites, and servers that are known spammers.
Many anti-spam programs rely on these lists to filter out bad email. If you are caught on one, you will undoubtedly have problems delivering your message. Since different email servers rely on different lists, you may find most email gets through and only a few people have problems. Get on a big enough list – or several lists – and the number of issues will increase.

Even the innocent get blacklisted. For example, a spammer may “spoof” your email, making it appear that you are a spammer even though messages come from a completely different source. If you start getting bounce-back messages as mentioned above, that make it appear you sent large batches of obscene or get-rich-quick emails to people you don’t know, that’s the most likely cause. There’s no way to prevent this; wait a couple of days and it will usually subside.

Greylists
A less serious but equally frustrating list is the greylist. Many large organizations will use these to filter email from senders they haven’t seen before.

As long as your message isn’t spam, this will more likely delay your message than completely block it. However, if you need quick response and the email doesn’t arrive for a full day, it creates a significant communications obstacle.

When the delay is a one-time occurrence and your next message gets through, there’s no need to do anything. Keep in mind you may encounter delays with several recipients; it’s only cause for concern if you run into multiple delays with the same person, or even the same company.

Other Spam Filters
There are a number of additional triggers that can flag your message as spam. Excessive use of the word “free,” for example, is commonly associated with spam messages.

Google “spam checker” and you’ll find a variety of tools (free!) that will scan your message and tell you how spammy it is. Use these tools when you have an email you plan to send to a large group.

Info Overload
Human error is also a factor. With the sheer volume of email coming into our computers each day, it’s challenging to keep email organized.

If your message has been missed, it’s always a good idea to follow up with a phone call. Perhaps it didn’t arrive, but more likely it came in at a busy time and was accidentally overlooked.

A Convenient Excuse
If you take all these precautions and still your email doesn’t get through, and there’s no bounce-back message, you may be the victim of a convenient excuse.

If your email isn’t rejected, isn’t in any spam filter, and yet doesn’t show up despite a “careful review”…and all your subsequent tests work just fine…well, let’s just say technology may not be your problem.

Laptop Or Desktop? It Depends On Your Application

January 21, 2009

I have noticed an interesting trend lately in our service department at Tech Experts.

We have been seeing an increase in the number of laptop or notebook style computers in for service. While this may be due to the holiday season and students returning home from school to visit family, I also feel that the falling prices have lead to laptops being much more affordable then in the past.

This got me to thinking about the comparison of laptops versus desktop and the advantages and disadvantages of both.

Many times I have been asked “Which one is better laptop or desktop?” The short answer is “It depends.” It basically boils down to what you plan to do with the unit.

Laptops are obviously an advantage for students who must travel not only back home and to school, but they also travel between classes and dorm rooms and restaurants. This portability is also an advantage for business travelers and mobile offices. It is hard to carry a desktop with you in your travels.

And with the popularity of wireless “hotspots” in almost every public place, laptops will continue to grow in popularity.

Some of the disadvantages I have seen with laptops are the ease at which the power jack on the unit can become loose and the power adapter cannot charge the battery, because the connector is broken and separates from the board – meaning no power is getting to the computer.

This is typically caused by applying some type of force to the plug when it is plugged into the jack. Tipping the laptop so the weight of the unit rests on the plug will cause this problem and care should always be taken not to do this.

While I am on the subject of power adapters, this is another disadvantage of a laptop. We had a call just the other day from a couple travelling from their home in Louisiana that forgot to pack their power adapter.

No power adapter means you cannot charge the battery which means a useless laptop after a few hours of operation. In this case the couple purchased a couple of extra adapters from EBay and discovered it still did not work. After coming into our service department it was quickly discovered that their power jack in the laptop had broken.

Another disadvantage to laptops is the ease at which careless operators can spill liquid onto the keyboard. If you do this on your desktop computer it is really not that big of a deal to purchase a new keyboard at the local computer shop, plug it in and off you go.

Laptop keyboard replacement is much more difficult and can be a costly repair. You can’t just rinse the liquid out. Often the liquid that is still in the keyboard will dry and cause the keys to stick. Care should always be taken to keep all liquids away from laptops.

Desktop computers, although they are not so portable seem to have longer lifespan then laptops. This is mainly due to the fact that they do not get moved very often. If you are going to move your desktop take extra care to treat it very gently as they do not take jolting and jarring well.

I have had people mention to me they don’t like to type on a laptop. I prefer the feel of a laptop keyboard to a traditional keyboard, and all laptops can accept USB keyboards if you prefer.

So it “depends” on your situation and requirements for your computing needs. Call us at Tech Experts and we can provide you with the expert guidance needed to make the right decision.

Simple Tips To Keep You Out Of Computer Trouble

January 21, 2009

As you can imagine, we see a lot of computer and network issues . Sometimes, they’re pretty difficult to diagnose and repair, but in some cases, a simple fix is all you need. Here are some tips you can refer to the next time your computer goes a little crazy, and some advice to keep you out of trouble.

Reboot!
Nine times out of ten, rebooting your computer and connected equipment will solve the problem you’re having. Do a full restart, which means go to your Start menu, shut down the computer, and power down your peripherals and computer. Then, restart it fresh.

We know what you did
A good computer consultant can tell if you’ve been bad or good on your computer, and usually pretty quickly. Tell us what you really did right before the computer crashed – this will save time and aggravation. Your consultant will figure it out eventually – why not make the repair quicker?

There is no free lunch
Downloading free music, movies and games from the Internet can open holes in the security system of your computer, making it easy for other people to access your files. Be safe… Only use legitimate sites like iTunes and Netflix for your downloads.

Use strong passwords
We walk a fine line in recommending passwords. If they’re really easy to remember, that means they’re also really easy to guess. If we make the password very hard to guess, it’s also going to be very hard to remember.

Here’s a suggestion: Create a “main” password which you then modify for each site you use. A good main password would consist of numbers and letters (but not your birth date!).

Try using your first dog’s name combined with the address of the first house you lived in, and then add to the password for each site. For example, buffy1944 could be a good base password. Then, you’d add AMZ at the end for your login to Amazon.com – buffy1944AMZ.

Update your antivirus
Hackers don’t care that you’re too busy to renew your antivirus and anti-spyware software – in fact, they hope you don’t! Set your software to update at least once a day and run a full system scan at least once a week.

Public wi-fi is public
If you don’t have an urgent need to check your online banking or private e-mail at the coffee house, don’t do it. While you’re on a public network, even if it is encrypted, a nearby hacker can capture your passwords and other personal information.

Tired Of Cell 411 Charges? Check Out Google’s 411

January 21, 2009

If your cell phone bill keeps creeping higher and higher because of calls to directory assistance, we’ve got a time and money saver for you. Google’s at it again. They are known for easy and free, and GOOG-411 is no exception.

This time they’re eliminating those expensive cell phone calls to 411 directory assistance. Their free service helps you find what you need fast and easily, and they’ll even connect your call or send you a map to the location.

It’s completely voice-activated. Program 1-800-GOOG-411 into your cell phone favorites and you’re ready to go. When you’ve found the business you want, say “text it” to send full details to your phone, or say “map it” to get a mobile map (assuming your phone has mapping capabilities).

For full details, visit the 1-800-GOOG-411 Home Page at http://www.google.com/goog411. Or just program in that number and give it a try.

What You Need To Know About Social Networking

December 22, 2008

Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users.

They are very popular but present challenges to small business owners. You can visit our website, www.MySpaceDisorder.com for our warnings about MySpace.

These sites seem to have come out of nowhere. For example, Facebook was founded in May, 2007, and currently has 70 million users. The rapid growth of such sites is part of the problem – you risk being caught off guard. Here are some of the top risks social networking sites pose to your business, and ways to manage that risk.

Indiscretion
Inadvertent disclosure of confidential information is a large risk. You wouldn’t publish your organization chart and phone directory on the internet; but a head-hunter or identity thief can use information on social networking sites to reconstruct this kind of information.

Reputation risk
There is also a risk to your company’s reputation. Social networking is more public and less formal than company email. It is also easier to use than blog software. It’s easy to imagine employees posting pictures or text that would embarrass their employer.

Cyber-slacking
Social networking sites can be addictive and timeconsuming. Cyber-slacking is a genuine concern, and difficult to control and monitor without security enhancements to your network.

Viruses and spyware
Social networking sites often display advertisements. At Tech Experts, we’ve observed that some of these advertisements have caused virus and spyware infections.

Broken privacy and identity theft
Some sites also allow third parties to run applications that have access to user profiles. This is a potential privacy risk. People publish a wealth of personal information in their profiles. This makes social networking sites a happy hunting ground for identity thieves and conmen.

We recommend that companies give serious thought to social networking and how they want to manage the risk.

Make sure your network is protected against web-borne viruses. At a minimum, every computer on your network should have current and automatically updated anti-virus software. For an enhanced layer of protection, install a firewall device that provides multi-layered protection against existing and emerging malware.

Have a clear and comprehensive Acceptable Use Policy in place. Ensure that employees are aware of what they can and cannot do on your company’s network. Review and update it often.

Set Rules for Personal Use. Use your company policy manual to spell out exactly how much personal web surfing is allowed, when, with whom, and under what circumstances. Of course, we recommend none.

Enforce your policies with an appropriate technology. This mean installing web monitoring and blocking software on each computer, or installing a network-wide security appliance.

No matter which option you choose, make sure you actively monitor usage, publish a usage policy, and keep that policy updated as new sites and threats emerge.

 

The Wrong Things?

December 22, 2008

Close your door. Turn off your computer monitor. Sit quietly and look out the window. Now – ask yourself the following question: “How much time do I spend on the wrong things each day?”

Don’t lie to yourself. Answer it as honestly as you can. 5 minutes? 15 minutes? 30 minutes? 60 minutes? 2 hours? 4 hours? More?

Now, turn on your computer monitor. Scan your inbox, even if it’s 4,137 messages. Bring up the weekly view on your calendar and look at it. Look at your todo list (if you have one).

Turn off your computer. Answer the question again.

Are you spending your time on the wrong things?

Looking Ahead: What’s In Store For Your Company?

December 22, 2008

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Our clients are typically small and medium sized companies, and while some of them are putting the brakes on and slowing down, most are still going strong.

We’re feverishly working with many clients to plan out their IT projects for 2009. Several clients are looking to upgrade their infrastructure with new servers, workstations and higher speed networking equipment. Even more will be enhancing their Internet speed and security and upgrading their websites (look for an incredible web and e-mail service promotion from us next month!).

These clients understand the importance of keeping their network and critical business systems update to date and in great operating condition.

What Is Your 2009 Plan?
By now, you’ve undoubtedly got the framework of your 2009 plan put together. What’s on the agenda?

From our corner of the world, as your computer guys, we’re seeing many companies looking for ways to decrease expenses and increase sales. We think some of the key technologies you’ll see helping with that include virtualization, unified communications, and cloud computing.

Virtualization
Virtualization technologies go back all the way to the 1960s and IBM’s M44 mainframe systems. In essence, virtualization lets you create and run more than one server “system” on a single piece of server “hardware.” The obvious benefit is that you’re able to run distinct servers on one piece of hardware.

An example application for small business would be a company that uses a specialized piece of software that requires a dedicated server. If the company is smaller, chances are a lot of that server’s horsepower is going to sit idle – because not a lot of people are using it. With virtualization, we would simply create another virtual server and install the special business software on that virtual server, saving the cost of an additional server.

Unified Communications
During the next few years, you’ll see the number of different communications vendors you work with reduced considerably. The technology already exists to check your e-mail from your cell phone, and to receive voice mails in your e-mail.

Cloud Computing
“The cloud” is a metaphor for the Internet. In general terms, cloud computing is the concept that your computing resources are no longer located in your office, or on your server, but rather, purchased as a service and delivered via the Internet. More and more, the services your company relies on every day will move to cloud computing applications, eliminating the need for hardware at your office.

The initial cost savings of cloud computing are obvious; the longer term cost savings will come from reduced operating expenses (employees can work from home, or anywhere, lowering the need for expensive office space) and access to higher quality services that are traditionally too expensive for small companies to implement. Salesforce.com is the perfect example of an enterprise-class application made available to small companies through the use of cloud computing.

Thank You!
As we wind down 2008, I’d like to thank the clients and friends that support Tech Experts. The trust and confidence you place in us as your IT company is invaluable, and everyone here is very thankful for your business. Happy new year!

A Great Book To Read
Panic: The Story of Modern Financial Insanity (edited by Michael Lewis) is a brilliant book and a good start to our new “Recommended Reading” list.

Panic covers five modern financial crashes: The Crash of 1987, The Russian Default / Collapse of Long Term Capital Management, The Asian Currency Crisis of 1999, The Internet Bubble and The Subprime Mortgage Disaster.

Each section has a perfect setup – a few articles preceding the actual crash followed by articles that are written as the crash is happening. Lewis finishes off each section with at least one post crash article.

There are some interesting characters throughout the book, but my favorite example is from The Internet Bubble section: Bernard Madoff – yes, the one that’s been in the news lately.

 

 

Free E-mail Accounts? You Get What You Pay For!

December 22, 2008

We’ve all been told there is no such thing as a free lunch; yet it’s hard to resist the siren’s call of “FREE.” That’s one of the reasons why so many people have free e-mail accounts through Hotmail, MSN, and Gmail.

And while you might not be paying out of pocket for these services, there IS a cost. Here’s the price you pay when you use a free e-mail account:

An Extra Helping Of Spam: And loads of it. Are these free services selling your e-mail account? Do spammers have ways of gleaning your e-mail account? No one seems to know for sure (or at least they’re not talking). But the bottom line is you’ll end up with a lot more ads for Viagra than you bargained for.

Your E-mails Aren’t Guaranteed To Be Delivered: The majority of spam messages come from free e-mail accounts. Even though you aren’t sending them, spam filters look at the server sending the message and, if it’s a known source for spam, will block the e-mail from going through. That means your emails might be getting blocked before they even reach the sender.

Customer Service? Non-existent! See you DO get what you pay for! If you have a problem, you’re on your own to figure it out.

Difficulty In Moving, Forwarding, or Downloading: Free e-mail services require that you read your e-mail through their web interface. If you want to move, forward or download your e-mail, contacts or other information, the process is cumbersome and sometimes impossible.

No Archiving: E-mail archiving, or storing old emails in a searchable, retrievable format has become very important (even a legal requirement) in some industries like medical and financial. Email is considered a form of communication and if you use it to support customers, order products, or to negotiate any type of deals, you want to keep a record.

So while these free services are okay for chatting with friends, they are NOT recommended for business purposes or for anything important.

Here’s a question to ask yourself: If your e-mail account was erased tomorrow and all your messages, contact information, and history were gone, would it be a slight inconvenience or a catastrophe? If it’s the latter, then you need to get a “real” e-mail account.

And, while you’re at it, you should also get an account that reflects your own URL, like cbogedain@expertsmi.com. The only reason for keeping a free e-mail account is to provide certain web sites with an e-mail address when you don’t care about getting communications from them, or that may spam you later on – that way, you can simply get rid of it and get a new one when you start to get too much spam.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.