• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Alphabetizing your Start Menu

January 23, 2007

If you’re like most Windows users, you’ve probably installed many programs…. So many, in fact, that you can have trouble finding the program you’re trying to use in the Start Menu list. New programs are loaded at the end of the list. Here’s how to alphabetize your Start Menu list of programs:

  1. First click on the Start button.
  2. Move your mouse to “All Programs.”
  3. Move your mouse to any of the folders there.
  4. Right click.
  5. A box will open up. Scroll to “Sort By Names” and click.

All of the folders and programs will be alphabetized. This is one of those simple but useful tips that will help you organize your computer.

Windows XP On Screen Keyboard

January 23, 2007

This might seem like a silly tip or even a silly function, but we’ve already found a use for it once. Windows XP comes with a built in on screen keyboard. Basically a graphic of a keyboard comes up and acts like your keyboard, you can use your mouse to hunt and peck around.

What uses does this have? Well, it’s good for people with disabilities, where it would be easier to use a mouse than trying to type or it’s great to use if your keyboard goes crazy.

Here is how you launch it:

  1. Go to start
  2. Go to run and type OSK, then press ENTER

Then the keyboard comes on. It’s just that simple! It’s best to make a desktop icon for it or a shortcut, because if your keyboard should malfunction, it would be handy to have it.

All you do to create the shortcut is to:

  1. Right click on the desktop
  2. Click the new shortcut button
  3. Type osk, click next twice

Chrysler Expands IPod Integration

January 23, 2007

Mopar, DaimlerChrysler’s original equipment manufacturer, announced it has expanded availability of its factory engineered IPod integration kits for most Chrysler Group vehicles.

The kit provides direct connectivity between the customer’s IPod and the vehicle’s audio sound system, attaching to a cable port in the vehicle glove box.

The adaptor module is concealed under the vehicle dash, translating and then sending the signal to the vehicle’s radio receiver.

Once attached, all IPod control functions are available through the vehicle’s audio sound system. The kits range from $139 to $215. More at www.mopar.com.

Tech Experts Now Authorized To Sell, Install And Service ESI’s IP-Enabled Telephone Systems

December 29, 2006

Tech Experts recently became a factory authorized dealer for the ESI line of advanced communications business telephone systems. The ESI product line fits very nicely with our IT and computer services.

ESI telephone systems offer many features small and medium sized companies will find useful, but our primary motivation in taking on this product line was ESI’s converged voice and data platform. This is the future of business communications, and we’re excited to work with a company that is in the forefront of that technology.

What does “converged voice and data” mean? Simply, it is the combining of your data services, such as e-mail and Internet access, with your voice services, like voice mail, remote telephones and branch offices.

Here are some examples of how this system would work with your data infrastructure:

Remote telephones: Through the ESI telephone system, you can “Internet-enable” your phone system through a very secure VPN. You would then take a system feature telephone (just like the one that sits on your desk at the office) home, plug it into your high speed cable or DSL Internet at home, and the phone will connect to the office telephone system.

You have 100% of the features, services and extension capabilities at home, just as if you were sitting at your desk. This is perfect for taking orders at home, or for spending time working from home.

ESI-Link branch offices: If your business has multiple locations, you can connect ESI telephone systems together through the Internet – eliminating long distance charges between offices, or expensive tie-lines.

The systems interoperate as one unified system.

Unified Messaging: Receive your voice mails through email. This lets you forward them to others, keep copies on your computer for future reference, reply through e-mail, etc. This is a very cool feature.

Of course, the system offers a ton of other features any business would find useful. Take a quick look through these built-in features. How many would help your business?

Live call recording: With the touch of a button, record a conversation, conference call or personal reminder memo for later playback, as well as moving or copying to others’ mailboxes.

Perfect for making sure orders are correct.

Scalability: ESI Phone systems grow with your business. Most systems use the same telephones. As your business grows, you add to – not replace – your ESI telephone system.

Auto Attendant: Perfect for over flow call situations, or for a busy office. Provides extensive call routing, including directories, automatic day/night operation, off-premises transfer, pager notification and more.

Automatic Call Distribution: If you have a busy service or sales department, this is the feature for you. ACD places sales or service personnel in departments and either (a.) routes a call to the longest-idle agent or (b.) places the call on hold if all agents are busy and then immediately connects when the first agent is available. Constantly updates Feature Phone display regarding queues and wait times.

Voice Mail Delivery: You can program the system to call your cell phone when you have a voice mail, saving you from having to call in and check your voice mail.

Enhanced Caller ID: Lets you see who’s calling, screen calls going to your voice mail, and return calls with a single key press.

Verbal Help and Verbal User Guide: This is the most unique feature of any telephone system we’ve seen. A full, spoken tutorial is available at any time, as well as feature by feature help. No more looking at programming books!

These are just some of the interesting highlights. The system supports most all features you’d find on a business telephone system, at an affordable price. If you’ve been considering a new business telephone system, we’d appreciate the opportunity to talk with you about the ESI systems and how they can help your business grow.

Data Security And Theft Top IT Concerns For 2006, Continuing Into 2007

December 29, 2006

The number of personal records exposed in data security breaches surpassed 100 million this year.

So says the Privacy Rights Clearinghouse, which has been keeping count ever since a high-profile data leak at information broker ChoicePoint in early 2005. It keeps track of thefts and losses of gear such as laptops, storage tapes and drives, as well as of hacking incidents and insiders who leak data.

The count climbed throughout 2006: Boeing, the Department of Veterans Affairs, Hewlett-Packard, McAfee, the University of California, and many others made headlines as a result of breaches.

Most incidents come to light because of laws requiring public notification of data loss in cases where data is unencrypted. In response, security companies are increasingly pitching encryption products for secure storage–for example, Seagate Technology is building it into its drives. Microsoft is also getting into the game: business versions of Windows Vista have a full-disk encryption feature called BitLocker.

But encryption technology still lacks usability, a panel of industry experts said at an event celebrating the 30-year anniversary of cryptography.

Meanwhile, banks and credit agencies are hawking credit-monitoring services. In September, researchers named several banks as a consumer’s best bet in terms of offering protection against identity theft.

Breaches are only one way people’s identities can be compromised. Phishing scams are getting more widespread, and fraudsters are getting trickier in their attempts to con Internet users. People with high incomes attract more phishing e-mails and lose more money to them than other Internet users, according to a November Gartner report.

Scammers are helped by an apparent influx of cross-site-scripting bugs. These Web security flaws could let attackers craft a URL that looks like it points to a trusted site, but serves up content from a third, potentially malicious site. This year, this type of bug was found in many popular Web sites and in Google’s search appliances.

Phishing shields are now common. Microsoft has built one into its latest browser, IE 7, and Mozilla offers a similar feature in Firefox 2.

Alternative approaches to combat phishing include a new DNS service, OpenDNS, whose free address-lookup service blocks phishing sites and other threats.

Yahoo added an antiphishing feature to its site that displays a custom image on the log-in screen to verify that it is indeed a Yahoo page.

But if confidential data isn’t exposed through data breaches or pilfered through a phishing scam, there’s still malicious software. Criminals are crafting more-targeted Trojan horse attacks that seek to sneak onto PCs through zero-day flaws, experts have warned. In addition, some malicious software is now designed to let cybercrooks surf into online banks with you to steal your money.

You could also be exposed while on the go. Privacy watchers warn that people carrying passports equipped with radio chips could have the information in the document read from a distance. The solution: keep the passport closed and in a foil bag.
— from CNET News Service

Parents More Worried About TV Time Than Children’s Internet Use

December 29, 2006

About 80 percent of children responding to a recent survey said the Internet is important for schoolwork, although three-quarters of the parents said their kids’ grades hadn’t gone up or down since they got Internet access.

Forty-seven percent of the adults said they have withheld Internet use as a form of punishment. Banning television is still more popular, though.

One in five American parents believe their kids are spending too much time on the Internet, though most say the online activities haven’t affected grades either way. In a study by the University of Southern California’s (USC) Center for a Digital Future, 21 percent of adult Internet users with children believe the kids are online too long, compared with 11 percent in 2000. Still, that’s less than the 49 percent who complain their kids watch too much TV.

Internet Use Peaking
The study, meanwhile, found that although only 27 percent of cell phone owners use them for text messaging, photo transmitting and other non-voice functions, the figure grows to 54 percent among those 18- to 24 years old and 45 percent among those under 18.

The study has been conducted most years since 2000. Over that time, researchers have seen Internet use grow to 78 percent from 67 percent. Access at home increased to 68 percent from 47 percent.

Net Dropouts
In one of the few surveys to look at why people are offline, the study found the lack of a working computer most often to blame. Of the 22 percent of Americans who do not currently use the Internet, more than a quarter are former users who dropped out.

“Almost nobody drops out out of dissatisfaction,” said Jeffrey Cole, director of USC’s Center for the Digital Future. “The reason most people drop off is they change jobs or their computer breaks.”

However, more than half the former users have no intention of returning online — the most ever. Overall, 60 percent of nonusers have no plans to go online within the next year.

Cole said the numbers raise the prospect of a permanent subclass of nonusers. “Internet penetration has largely plateaued,” he said.

Elderly Are Least Connected
Americans 66 years old and over remain the most disconnected, with only 38 percent online. For all other age groups, at least 74 percent are online, with penetration hitting 99 percent for those 18 and under, likely because most U.S. schools now have some form of publicly-usable Internet access.

On average, users spend 14 hours a week online, compared with 9.4 hours in 2000.

Thirty-seven percent of home Internet users still have dial-up accounts, compared with 26 percent for high-speed cable modems and 24 percent for DSL. Eleven percent of Internet users go online through mobile devices – not necessarily exclusively – averaging two hours a week.

Internet vs. Television
The study revealed little change in the effect on television. Thirty-six percent of home Internet users say they have spent less time watching TV since they started using the Internet, roughly the same as the 33 percent who said that in a 2001 survey.

Cole said the increased use of high-speed connections has a lot to do with that.

When people were on dial-up, they were accessing the Internet 20 or 30 minutes at a time – “generally time not spent watching television,” Cole said. “Broadband changed all that. They are on 30, 40, 50 times a day for two or three minutes at a time. It’s not a big bucket of time displacing television.”

People may be paying less attention to television commercials, though, fitting in online use during program breaks, he said.

That said, 41 percent of veteran users – those online for more than nine years – say they have spent less time watching television, compared with only 23 percent among those who have joined the Internet within the year.

The study found nearly a quarter of online users – especially newcomers to the Internet – say they spend less time reading.

The telephone survey of 2,269 U.S. households was conducted in English and Spanish from February to April and included follow-up interviews with respondents to previous USC studies.

The study has a margin of sampling error of plus or minus 3 percentage points.

Sleep Easier With Automatic Off Site Backup Services From Tech Experts

December 29, 2006

Off-site backup service from Tech Experts eliminates the risk of fire, flood, theft, hard drive failure, or even human error! Your precious data is automatically and securely sent across the Internet to Tech Experts’ backup server.

Your files remain on our server, for easy, instant retrieval. In fact, you can get any file as it existed in the past 30 days within five minutes.

Try that with a tape drive!

The best part is you don’t have to do anything. It happens automatically in the middle of the night.

No swapping tapes, no remembering to hook up the backup drive. Even on holidays!

And it’s secure enough for health care/HIPAA companies, law firms, and other sensitive data. Backup Service starts at only $59.95 per month!

Call us today for more information.

What You Need To Know When Considering Windows Vista Options

November 29, 2006

It’s official! Windows Vista will hit the shelves in early 2007.

You’ve probably already heard plenty of details about this new version of Windows. As with past Windows releases, the question for small- and medium-size businesses isn’t if they’ll upgrade, it’s when.

Here are some things to think about as you consider your upgrade options.

What You Get with Windows Vista
Windows Vista includes a multitude of new features, and this list isn’t meant to be exhaustive. These are some of the items that should be high on your business’s priority list:

Improved Security: Vista includes Microsoft Defender (antispyware) and Internet Explorer 7 (which includes a phishing filter and antispoofing technology), as well as Microsoft Windows Firewall technology—all essential for maintaining your technology infrastructure.

Improved Software Setup and Maintenance: Vista enables you to create and store “images,” which are system software configurations that can be easily replicated on new PCs. That means the average time to set up a new PC will be reduced, and upgrading software on existing PCs will be a snap. Add those together and you get a reduction in IT costs.

Instant Search: Search is the name of the game for document-heavy companies. This function should make it easier for you and your employees to find files and documents in a data-intensive environment.

Windows Aero: The new graphical user interface is fast and looks very slick.

Here’s a fair warning on Windows Aero: In order to use this feature, you will need to make sure that your computing hardware is “Vista Premium Ready,” as opposed to “Vista Capable.”

The difference between the two will be most striking in the graphical interface: Vista on a Vista Capable machine will look more like Windows 2000, but the hardware requirements for it will be significantly less than for Vista Premium Ready. Chances are that equipment you have purchased in the last two years will be Vista Capable. It’s also likely that very little of your current equipment is going to be Vista Premium Ready unless you’ve already been buying higher-end gear.

Microsoft will offer business-class versions of Vista, giving you the choice of which mode you want to operate in. Be sure to match the hardware, software version, and mode to the features you want in your Vista upgrade.

Different Windows Vista Versions
Microsoft will be marketing multiple versions of Windows Vista: two versions for home use, a business and an enterprise version, and an “ultimate” edition. Most small and medium businesses are likely to opt for the business version. It’s not clear yet whether the business version will come in Vista Capable or Vista Premium Ready packaging. This is important because Vista Capable hardware does not require a DVD drive, but Vista Premium Ready does.
When to Get Windows Vista

Don’t be confused by the fact that Office 2007 is going to be coming out at just about the same time as Vista. The two releases are unrelated: You can upgrade to Office 2007 in your current environment—you don’t need to move to Vista to use the newest version of Office.

Before you take the Vista plunge, think about these three issues:

First, if you’re running an older or unsupported version of Windows, we highly recommend that you think about upgrading as soon as possible.

Second, understand how your current software will operate in a Vista environment. Microsoft has tools available to assist you here, and it’s important to use them to test all your applications and ensure that they can run in Vista before you make your move.

This puts a real premium on not only knowing what applications your business runs on a “authorized” basis, but also what software some of your users may have loaded on their own in order to perform day-to-day tasks. Depending on the nature of your business, this practice may be more common than you think.

Third, and probably most important, you need to understand your hardware environment and your plans for upgrading your hardware infrastructure. We’ve already mentioned the issue regarding DVD drives, but you also need to examine processor speed, memory, hard drive space and graphics cards in light of any plans you have to move to Vista.

Most equipment purchased in the past couple years should be able to support Vista in the Vista Capable mode.

Your Bottom Line
While every small and medium business starts in a different place, here’s our recommendation as to how you approach the Vista-upgrade issue:

Don’t buy Vista the day it becomes available, but don’t wait more than a year to get started.

Time your decision to be in line with any hardware purchasing pattern you’ve already established.

Decide now how important Vista Premium Ready features are to your business, and make any incremental hardware purchase decisions consistent with either these or the Vista Capable requirements.

Analyze some of the new hardware/chip features that provide improved performance and reduce IT costs and match that plan up with whatever conclusion you’ve reached on Vista.

Give yourself a good six months to determine software compatibility with Vista before you begin the migration.

If this sounds confusing or you just plain need help, give us a call. As a Microsoft Gold Certified Partner, our staff is trained to provide you with the guidance you need to evaluate Windows Vista in your organization.

You won’t believe what they’re doing at work!

November 29, 2006

Survey Of Over 400 IT Managers Reveals What Employees Are Really Doing During Work Hours… And You Won’t Believe What They Discovered!

According to a survey conducted by 8e6 Technologies (www.8e6.com), employees are using company computers, Internet access, email, and other resources to conduct hours of non-work related activities.

Some of these activities simply waste time, like day trading and monitoring eBay bids.

However, many of the activities are downright malicious and threaten their employers’ existence and security.

Just look at some of these outrageous real-life stories collected from IT Managers polled:

  • One employee was caught running a gambling website and acting as a bookie for his coworkers.
  • To bypass the company’s web filter, one employee was caught using his desktop computer as an FTP server for the other employees. He had downloaded and saved over 300 GB of material.
  • One employee was busted for giving away confidential information such as price lists, contracts, and software code for application development.
  • Another employee was busted for having a side business stealing and selling company inventory on eBay.
  • One woman was caught running an online outcall service from her desk.
  • One employee was caught renting the corporate IP address to hacker friends to generate DOS (denial of service hacker) attacks.

While these scenarios seem outrageous, they are not uncommon. According to a survey outlined in the Seattle Times, of 294 U.S. firms with 1,000 or more employees, almost one-third of companies have fired an employee in the last 12 months for violating email policies, and 52 percent of companies said they have disciplined an employee for violating email rules in the past year.

As an employer, educating your employees as to what they can and cannot do through an acceptable use policy is simply not enough.

If the requirements are not enforced, employees will accidentally (or intentionally) violate your rules. That’s why every company should look at investing in a good email and web filtering system.

Just having it in place will act as a deterrent for such activities, and if something really is going on — like an employee leaking confidential information to a competitor or sending racial or sexist jokes through your company’s email —you’ll be able to nip it in the bud before it comes back and bites you in the form of a lawsuit.

Additionally, a good web filter will prevent employees from accessing inappropriate material online, wasting time on non-work related activities, downloading viruses and spyware, and using up company bandwidth to download photos and music.

Software such as Spectorsoft monitor employee Internet usage, accumulating statistics about how much time is spent on certain web pages, logging sites visited, and can block sites based on keywords, addresses, or time of day.

If you would like our help in choosing and setting up an acceptable use policy and a web filtering system for your company, call us at: (734) 457-5000 or send an email message to at info@expertsmi.com.

Microsoft Offers Financing For Small and Medium Sized Companies

November 29, 2006

Keeping your business running at peak productivity and efficiency has a lot to do with keeping your software, services, and hardware current. Now there’s a way to get everything you need more affordably with Microsoft® Financing.

Microsoft’s approach is unique in that they offer financing for software-centric solutions as well as for more comprehensive solutions that include software, services, and hardware.

Microsoft Financing makes your IT needs more affordable through predictable payments that are spread over the life of your IT investment.

You can now get the benefits of new technology while matching payments to use. In addition, Microsoft Financing helps you:

  • Own the hardware purchased outright.
  • Acquire all your IT needs cost-effectively.
  • Plan your long-term IT investments.
  • Streamline the financing process.
  • Conserve capital.
  • Preserve your financing credit lines.

It is important to note that this is true financing, not a lease, so you own the equipment.

Microsoft will finance a minimum purchase of $3,000, up to $100,000 or more.

For example: A new server, with five new workstation computers, Microsoft Small Business Server software, Microsoft Office, installation, training, and ongoing support can be financed for as low as $235 per month for 60 months.

Give us a call if you’re considering an upgrade – we can run numbers for you.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

The Real Cost Of A Security Breach (It’s Not Just About The Money)

July 22, 2025

How To Automate Daily Tasks And Free Up Your Time

July 22, 2025

Why Sticking With Windows 10 Could Put Your Business At Risk

July 22, 2025

AI Is Already in Your Business – Did You Notice?

June 17, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Twitter Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.