September 2008

SHARE

September 2008
In this issue:

  Video Case Study
  Memory Errors
  Customer Service
  Wireless Threats
  Laws to Ignore
  Case Study
  How Big is Your Mailbox
 Opportunities

Excellent
Customer Service

by Jeff Wuorio
reprinted with permission from the Microsoft Small Business Center

In the business world, good customer service often isn’t good enough anymore. Customers and clients are becoming increasingly disenchanted with the merely adequate. For them, extraordinary service is the rule, not the exception. Anything less, and they’re happy to vote with their feet and their wallets.

That makes extraordinary service necessary, not just desirable. And that, in turn, mandates a strategy to help ensure that your business matches that standout service standard on a daily basis.

Here are seven ideas and tips to help your business establish and maintain an ongoing climate of service excellence.

6 Wireless Threats to Your Business
by Christopher Elliott
reprinted with permission from the Microsoft Small Business Center

If you think a promiscuous client is a scantily-dressed customer, you’re in trouble. And I’m not talking about having an affair.

Think an evil twin is a horror-movie villain? Wrong again. The horror you should be bracing yourself for is not on the silver screen — and it’s not from a rolling pin flung at you from across the kitchen, for that matter. Rather, the trouble is in the airwaves and targeted to Wi-Fi users.  Both the “Promiscuous Client” and the “Evil Twin” are two of the latest wireless threats to your small business. If you haven’t heard of them, you probably will soon.

So what’s out there?
 Please share this newsletter with anyone who might be interested

Proud member of

eMazzanti Technologies Feature in Microsoft Video Case Study with Original SoupManWith a comedic link to a TV show and the famous “Soup Nazi”, Soup Kitchen International concentrates its efforts delivering customers lines rather than laugh lines. The company wanted technology solutions which provided growth and agility so it could respond to new marketing and franchise opportunities. With the IT expertise of eMazzanti Technologies, the company re-built its user network around several Windows Server products and Windows Vista. See the Video Case Study

How To Avoid Out of Memory Errors
by Christopher Elliott
reprinted with permission from the Microsoft Small Business Center
There comes a time in the life of every computing device when it says “enough!”   Can’t go on. Need . . . more . . . memory. The dreaded “Out of Memory” error is relatively easy to fix when you’re talking storage (short-term solution: delete a file; long-term solution: buy a new hard drive). But when it comes to the other kind of memory, also known as RAM (random-access memory) — that’s the internal kind of memory your computing device uses — things can get a little bit more complicated. “Inadequate memory is a productivity inhibitor,” notes William Kazman, chief executive of iTeam, a Westford, Mass., information-technology outsourcing company for small businesses. “A small business typically keeps a computer for three to five years. During that hardware lifecycle, operating system and application upgrades consume more and more computer resources — memory being key among them.” In other words, small businesses are mindful of their software upgrades, but often oblivious to their hardware needs. And that goes beyond the computer workstation. It also extends to servers and personal computing devices, such as Tablet PCs.

Your poor, overworked PC
Are you running your machines ragged? OK, there’s no evidence that an insufficient amount of memory will hurt your hardware — at least none that I’ve seen. But you could be running yourself ragged (and compromising your company’s productivity) by ignoring a memory-deficiency within your own organization.

“Most people are too conservative when it comes to planning their memory needs,” says Doug Finke, director at SimpleTech, a Santa Ana, Calif., designer of open-standard memory and storage solutions. “I think it’s a big mistake to assume the base memory size installed by the PC manufacturer when you bought the machine will be sufficient. Manufacturers will sometimes scrimp on base memory to hit target price points.”

So how do you prevent the dreaded error message from putting a crunch on your profits? Here are three tips.


Laws You May Choose to IgnoreMoore’s law describes an important trend in the history of computer hardware: that the number of transistors that can be inexpensively placed on an integrated circuit is increasing exponentially, doubling approximately every two years. The observation was first made by Intel co-founder Gordon E. Moore in a 1965 paper. The trend has continued for more than half a century and is not expected to stop for another decade at least and perhaps much longer. You probably thought you knew every single law of nature, science, and humanity , but we at eMazzanti technologies have uncovered some additional laws that you may not have heard previously.

Law of Mechanical Repair
After your hands become coated with grease, your nose will begin to itch and you’ll have to pee.

Law of Gravity
Any tool, when dropped, will roll to the least accessible corner.

Read on for More Laws


Just for Laughs

SoupMan Finds a Key Ingredient for Business Growth

Soup Kitchen International wanted to implement a technology architecture that would keep it connected to its growing family of franchisees. With the help of Microsoft Gold Certified Partner, eMazzanti Technologies, it discovered that Windows Server® 2008 would work seamlessly with its disparate business-critical applications. Deploying it has improved operational efficiency, has increased employee productivity, and has become part of the company’s for growth.

Read the Case Study

How Big is Your Mailbox?

We have spent a lot of time recently (which translates to a lot of extra expense for our customers) troubleshooting, managing, and working with VERY large mailboxes. From a purely technical standpoint, once a mailbox gets over a GB in size, it starts to become a minor challenge in terms of supporting it, speed of access and search, and management in general. Once a mailbox gets to be over 2 GB in size, we start to run into some very serious limitations that will manifest in support, management, and disaster recovery scenarios.

Believe us when we say we are VERY heavy Outlook users, but using a few simple techniques, it is not much of a challenge at all to keep our own mailboxes under the 1 GB limit we need to keep us ‘light on our feet’ with our own mailboxes.

Continue

Opportunities at
{e}Mazzanti

eMazzanti seeks bright
minds to join the team.

Refer a Network
Engineer to
www.emazzanti.net/jobs
and be eligible for a
shopping spree at
eMazzanti’s online store,
www.emazzanti.net/store
Qualifying applicants
must receive full time
employment and have
referenced the referring
friend on the original
application in order for the
referrer to be eligible for
the annual drawing.
Shopping spree is limited
to $1,000 in merchandise.


{e}Mazzanti Technologies  *  701 Grand Street  *  Hoboken, NJ  07030  *  201-360-4400
www.emazzanti.net

UPCOMING VIRTUAL EVENTS

Demystifying Cyber Security for SMBs

sb-cyber-security-master-class

The continually changing threat landscape requires us to update best practices and add new concepts to keep your organization safe.

SESSION 4: Cyber Security Strategy
Watch On-Demand

SESSION 5: Cyber Insurance & MFA
Watch On-Demand

SESSION 6: Threat Detection | JAN. 15

Microsoft Copilot
Master Class Workshop

sb-microsoft-copilot-master-class

eMazzanti will host 60-minute Master Classes, that speak to how AI can help your business streamline and grow.

In each session, you will have Artificial Intelligence and Automation explained, view a live demo of Copilot, and see it live in action in a dynamic format.

RESOURCES

Cyber Security Awareness Hub

sb-Cyber-Security-Awareness-Hub

Cyber Security Awareness Kit, designed to be delivered to your team in bitesize chunks.

We are sharing the resources and highlighting services your organization needs, covering everything from multifactor authentication to software updates, showing your users just how easy it is to improve their security posture.

Resource Library

sb-resource-library

Insights to help you do what you do better, faster and more profitably.

> Tips to Stay Protected Against Phishing Attacks

> Understanding Ransomware 

> The 6 Known Wi-Fi Threat Categories Targeting Your Business and How to Defend Against Them

> Practical Advice for Avoiding Phishing Emails

Recent Articles

NEWSLETTER

Categories