• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Laptops

Consider A Spare Or Second Battery

March 23, 2010

One option you may not have considered when you bought your laptop was getting a spare  battery. This item is a must for someone who is seriously on the road or in a remote location, where a long time is spent away from the power socket. Before you use a spare battery, ensure that it’s fully charged.

If your laptop has some type of quick-swapping ability, when the power gets low, you can just eject your laptop’s original, spent battery and quickly insert the spare battery.  But be sure that your laptop can survive such a transplant before you attempt it! Perform a test swap in a noncritical situation, just to be sure.

If your laptop doesn’t have the ability to hot-swap batteries, just turn off (or hibernate) the laptop when the original battery is nearly spent. Remove the old battery, insert the fresh one, and then turn the laptop on again. Keep the following points in mind:

• Label the batteries so that you don’t get the two (or more) batteries confused and accidentally insert a dead battery.

• You can buy a spare battery from Tech Experts, or from online stores that sell extra batteries, such as iGo or Batteries.com.

Be wary of generic batteries! Always try to get a manufacturer’s (or manufacturer-approved) battery for your laptop. Get anything less, and you run the risk of setting your laptop ablaze!

Laptop Or Desktop? It Depends On Your Application

January 21, 2009

I have noticed an interesting trend lately in our service department at Tech Experts.

We have been seeing an increase in the number of laptop or notebook style computers in for service. While this may be due to the holiday season and students returning home from school to visit family, I also feel that the falling prices have lead to laptops being much more affordable then in the past.

This got me to thinking about the comparison of laptops versus desktop and the advantages and disadvantages of both.

Many times I have been asked “Which one is better laptop or desktop?” The short answer is “It depends.” It basically boils down to what you plan to do with the unit.

Laptops are obviously an advantage for students who must travel not only back home and to school, but they also travel between classes and dorm rooms and restaurants. This portability is also an advantage for business travelers and mobile offices. It is hard to carry a desktop with you in your travels.

And with the popularity of wireless “hotspots” in almost every public place, laptops will continue to grow in popularity.

Some of the disadvantages I have seen with laptops are the ease at which the power jack on the unit can become loose and the power adapter cannot charge the battery, because the connector is broken and separates from the board – meaning no power is getting to the computer.

This is typically caused by applying some type of force to the plug when it is plugged into the jack. Tipping the laptop so the weight of the unit rests on the plug will cause this problem and care should always be taken not to do this.

While I am on the subject of power adapters, this is another disadvantage of a laptop. We had a call just the other day from a couple travelling from their home in Louisiana that forgot to pack their power adapter.

No power adapter means you cannot charge the battery which means a useless laptop after a few hours of operation. In this case the couple purchased a couple of extra adapters from EBay and discovered it still did not work. After coming into our service department it was quickly discovered that their power jack in the laptop had broken.

Another disadvantage to laptops is the ease at which careless operators can spill liquid onto the keyboard. If you do this on your desktop computer it is really not that big of a deal to purchase a new keyboard at the local computer shop, plug it in and off you go.

Laptop keyboard replacement is much more difficult and can be a costly repair. You can’t just rinse the liquid out. Often the liquid that is still in the keyboard will dry and cause the keys to stick. Care should always be taken to keep all liquids away from laptops.

Desktop computers, although they are not so portable seem to have longer lifespan then laptops. This is mainly due to the fact that they do not get moved very often. If you are going to move your desktop take extra care to treat it very gently as they do not take jolting and jarring well.

I have had people mention to me they don’t like to type on a laptop. I prefer the feel of a laptop keyboard to a traditional keyboard, and all laptops can accept USB keyboards if you prefer.

So it “depends” on your situation and requirements for your computing needs. Call us at Tech Experts and we can provide you with the expert guidance needed to make the right decision.

How To Keep Your Laptop Safe and Secure

May 11, 2008

You can’t beat the convenience of checking e-mail and hopping on the Internet at (Wi-Fi) hotspots found in airports, coffee shops, and bookstores. For the uninitiated, hotspots are areas where you can use your wireless laptop to surf the Web.

But the question you have to ask yourself is, just how safe are hotspots? With the proliferation of hackers, viruses and identity theft at an all time high, you’re smart to be concerned. Wi-Fi spots are very attractive to hackers because they can use what’s called an “evil twin” connection to access your laptop.

An evil twin is a hotspot set up by a hacker to lure people from a nearby, legitimate hotspot. For example, when you log in at your favorite coffee shop, you might actually be logging onto the evil twin Internet connection set up by the innocent-looking person working on a laptop at the next table. The most dangerous evil twins remain invisible and allow you to do business as usual. But in the background, they record everything you are typing. Buy something online and they are recording your credit card information. Log on to your bank account, and they can grab your password.

So what can you do to make sure you are not giving an evil twin access to your laptop?

First, know the name of the hotspot you’re going to use by asking someone who works there. Some businesses will give you printed instructions that include the hotspot name. But be careful. Hackers will name their evil twin network by a very similar name as the real hotspot, and may even show up as a stronger signal.

The best protection you can have is connecting via your company’s VPN (virtual private network). A VPN will protect your online information by encrypting your data and activity even if you’re connected through an evil twin.

If you don’t have a company VPN, you should assume that someone is looking over your shoulder and recording everything you type in. Therefore, the BEST protection without a VPN is to never type in information such as credit cards, passwords, or social security numbers when connected to a public Wi-Fi hotspot.

The Best Laptop You Shouldn’t Own

October 26, 2007

For about $200 you’ll soon be able to buy a laptop that comes with a web browser, a word processor, camera, built-in wireless, flash memory, open source operating system, and more.

But this laptop, called the XO, wasn’t made for you, no matter how small your business is. It was “designed for the poorest and most remote children in the world,” by the non-profit group, One Laptop Per Child (OLPC).

Its 433Mhz energy-efficient AMD processor is slow. It has no hard drive, CD, or DVD drive.  Your hands are too big for the child-size keyboard. You’d go nuts trying to run a business using this machine and its puny 7.5” screen.

But you can and should consider making a purchase. The XO will be available to buyers in the U.S. for a two-week period, from November 12  – 26.

Under a program called “Give 1 Get 1,” buyers can purchase two laptops for $399. One would be shipped to a child in a developing nation, and the other to the buyer.  If you have the budget, buy them – just have both units shipped overseas, to kids who can really use them.

On the web: www.laptop.org.

Why You Need A File Server Right Now

May 26, 2007

If you’re the owner or manager of a small- or medium-sized business that still uses peer-to-peer networking, it’s time to consider upgrading your network by installing a dedicated business server.

Due to recent technology advances, particularly the availability of Microsoft Small Business Server and Windows Sharepoint Portal Services, the pros definitely outweigh the cons. In fact, the upgrade may result in some benefits you hadn’t counted on.

How do you know when it’s time to upgrade to a server-based network? Here’s a simple checklist you can use to assess your needs, followed by a more detailed discussion.

It might be time to upgrade if:

  • Your staff is moving to laptop PCs.
  • Your staff is specializing and you need to start to segregate data.
  • You want critical data backed up securely and automatically.
  • Your office needs to use collaboration software, such as shared calendars.
  • Your staff requires remote access to shared data
  • Moving to Laptops

One characteristic of a peer-to-peer network is that individual member PCs share resources, such as files, printers, and fax modems, with each other.

Unfortunately, several recent technology trends are making peer-to-peer networks difficult to use and manage.

For example, many of today’s knowledge workers are switching to highly mobile laptop computers which may or may not be in the office at any given time.

When a PC is disconnected from the network, its resources aren’t available other users in the office.

Data Segregation
One of the most compelling reasons to upgrade your basic network to a server-based configuration is data security.

Even small companies have a legal responsibility to protect payroll, human resources, and other sensitive information from misuse, but the file sharing schemes used in peer-to-peer networks don’t provide the high level of control offered by server operating systems.

Automatic, Secure Backups
Along with access, backup is also an important part of any data security scheme. Regular and dependable backups are difficult to manage when data is stored on multiple desktop PCs because even the most sophisticated backup software can’t back up a PC that’s been turned off.

Once you move your critical data to a file server, regular automated backups can be scheduled to take place during off hours. Since the office staff doesn’t typically have access to the server’s operating system, it’s unlikely that anything will “interfere” with backup, and even if the network is down, a file server can faithfully back itself up to tape as long as it has power.

Collaboration
Although shared calendars and other collaboration tools are available from a number of Internet-based sources (Yahoo, Google, and others), your data is much more secure when it’s stored on your own file server.

You’ll also find that the selection of privately hosted collaboration software is broader and the applications are more customizable than those apps available online.

Remote Access
The increased use of laptop computers mentioned above eventually results in the need for remote access to company data. While this can be accomplished with products such as Symantec’s pcAnywhere, Citrix’s GoToMyPC, and even Windows XP’s built-in Remote Desktop Connection, secure remote access is built into most file server operating systems and remote users are subject to the same access restrictions and privileges as locally connected users.

In the past, one of the main deterrents to server-based networking has been the complexity of server operating systems, but this is rapidly changing. Once installed and properly configured, Windows Small Business Server (SBS) 2003 requires about the same day-to-day technical expertise as Windows XP or Windows Vista.

And later this year Microsoft will release a “server appliance” product called Windows Home Server (WHS) that will provide many file server features with almost no human interaction. In fact, the device won’t even require a keyboard, mouse, or monitor — just plug it in and you’ll have an instant file server!

Another traditional objection has been the cost of dedicated file servers, which often out-weighed the budget – and the benefits for many small offices. Fortunately, technology advances are making low-cost, easy-to-operate servers available to offices that wouldn’t have considered them just a few months ago. Server equipment from IBM and HP, combined with Microsoft’s Small Business Server software, is now more affordable than ever for small companies.

In summary, if you’re still using a basic peer to peer network, you’ve probably outgrown it! Consider adding a dedicated file server to your suite of office tools to improve data access, security, and usability.

« Previous Page

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.