Posts Tagged ‘ circle computer resources ’

Optimizing Productivity

Studies have shown that interruptions of all sorts take up around 3 hours of an employee’s workday. There are many things that hinder productivity including working with a single monitor, manually filtering spam, and unmonitored instant messages.

We all agree that there is a level of interruption that is important to keep everything moving forward. According to the Institute for Advanced Management Systems Research,

“. . . once there is an interruption, statistics tell us that it takes 20 minutes to get back to the level of concentration that we were at prior to the disruption. . . social interruption has the highest impact on our ability to return to our original task. We are often placed in a position of being overtly rude or enduring the added stress of missed deadlines . . . caused by well-meaning ‘cubicle intruders’.”

 Social interaction between employees is beneficial in the way it fosters stronger ties among them as well as better teamwork throughout the company. This being said, it should not take up 20%+ of a workday.

Many have speculated that dual monitors or multiple monitors can enhance productivity by 9% to 50%. Even on the low end, this one seems worth it. Invest in an extra monitor for less than $200.00 and make money off of it in a month. Basically, you can keep your employees happier for $200.00

Estimated time saved with an effective Anti-Spam service (which does not require filter tweaking or “white listing”):  26-40 hours. This is a per employee per year average.

  • This costs $800.00 to $1,500.00 per employee per year
  • This costs a 50 employee company: $40,000.00 to $75,000.00 per year
  • Cost to fix the problem? $30.00/year or less per employee

The mother of all interruptions is social interruption, soon followed by calling or instant messaging.  It can take over 20 minutes to return to the level of concentration you were previously  at. All together, it takes you at least 90 seconds to refocus your attention on the person asking the question and the 20 minutes to return to your previous state of concentration.

Internally monitored instant messenger can improve productivity dramatically. Instant messenger only becomes an issue when it’s misused. If rules are enforced and only work related conversation is allowed it can be an extremely effective tool. 

Within our company we have several levels of contact:

  1. Low: Instant Message
  2. Low-Medium: Email Message
  3. Medium: Contact through our CRM
  4. Medium-High: Phone Call
  5. High/Immediate Response: Walk Into Office

This process keeps employees working their hardest at everything they can without all kinds of interruptions. We have found that our employees are significantly more productive when following the levels of contact. Cost to get an internal IM that can be monitored? It’s FREE at www.psi-im.org

All together it is clear there can be improvements made to optimize productivity in many areas. Some of the most effective ways to improve productivity is just establishing levels of contact associated with priorities. We understand that there are many other issues when it comes to improving productivity, but if we addressed them all this post would be novel-length.

What’s your opinion on productivity? What do you waste the most time on? Comment and let us know.

 

The CCR Team
By Monica Kelly
www.ccr.net

Windows Hotkeys: A Helpful Shortcut on a Busy Day

Windows hotkeys can be a very helpful shortcut on a busy day. Instead of having to right click and copy, cut, paste or open a new tab you can just use one of these easy shortcuts on your keyboard:

Ctrl + C or Ctrl + Insert: Copy.
Ctrl + X or Shift + Delete: Cut.
Ctrl + V or Shift + Insert: Paste/Move.
Ctrl + N: New… File, Tab, Entry, etc.
Ctrl + S: Save.
Ctrl + O: Open…
Ctrl + P: Print.
Ctrl + Z: Undo.
Ctrl + A: Select all.
Ctrl + F: Find…
Ctrl + F4: Close tab or child window.
F1: Open help.
F11: Toggle full screen mode.

Finally! An Easy Way for You to Lower Your IT Support Costs While Practically Eliminating Frustrating Computer Problems, Glitches, and Downtime

Our New “Total Network Management” Package is Designed to Lower Your IT Costs While Making Your Network Run Faster and With Fewer Problems

Thanks to our new Total Network Management plan, you can now get all of the computer network support you need for one low, fixed monthly rate without any surprises, hidden costs, or the expense of a full time IT staff! Just look at the benefits:

  • You’ll eliminate expensive repairs and data recovery costs. Our network monitoring and maintenance will allow us to see and prevent network problems before they turn into downtime and expensive repair bills. As a matter of fact, we guarantee it.
  • You’ll eliminate expensive trip fees while receiving faster support. Our remote monitoring software will enable us to access and repair most network problems right from our offices. No more waiting around for a technician to show up!
  • How does faster performance, fewer glitches, and practically zero downtime sound to you? Under this program, that is exactly what we’ll deliver.  Some parts of your system will degrade in performance over time, causing them to slow down, hang up, and crash. Under this plan we’ll make sure your network receives the critical maintenance it needs for maximum speed, performance, and reliability.
  • You will sleep easier knowing the “gremlins at the gate” are being kept out of your network. If you rely on your computer network for daily operations, it’s time to get serious about protecting it from viruses, hackers, spyware, and even disgruntled employees. Under this plan, we’ll keep watch 24-7.
  • You’ll finally put a stop to annoying spam, pop-ups, and spyware.

Thin Clients: The Alternative To Bulky, Expensive Computers

A thin client is a small device that can be used in replacement of a computer tower. Companies who do not run CPU intensive programs often use thin clients because they are smaller and are less than 10% of the cost of a regular workstation.

A thin client runs as a VM (Virtual Machine) which connects the user to the server. Each thin client has a license which allows it to access the server as if it is its own computer; displaying the desktop the exact same way a normal computer would. The thin client acts as a bridge to connect the user to the server and remote control parts of it.

The simplicity of a thin client is what attracts most companies. Although you do have to have a server in a clean environment to run them off of, the thin clients themselves can exist in quite hostile environments. Having the server run all of the applications is both a positive and a negative. If you have a well run server then it saves a lot of headaches. In the same way, the server also acts as a single point of failure for all users.

All together thin clients are an effective solution for companies who use their workstations for activities such as email, web browsing, Microsoft Office or as POS systems. If companies are willing to buy higher powered servers it is possible to run more intensive programs through the thin clients without problems.

Keeping Your Computer Healthy

Whether a home computer or a corporate network, security is important. Because hackers and those who are fighting to infect your computer are constantly evolving, the software you use also has to be. Three major things that help improve individual computers are an up-to-date anti-virus program, regularly updated patches, and current Windows Updates. Many will ask, “Why do I have to use patches and Windows Updates when I already have an anti-virus?”

Well, here’s why:

  1. An Anti-Virus alone cannot block everything. In addition to viruses, there is spyware, malware and other malicious infections that have to be prevented.
  2. A patch is a software piece that fixes security vulnerabilities and bugs. Patches are necessary to keep areas of your computer up-to-date with the latest security features. Patches are developed in order to ensure the safety of your information. These patches are created by individuals who study hacker’s styles and use the information to develop patches and combat them.
  3. Windows Updates are important in the same way patches are, except for your entire operating system. Keeping Windows Updates current is vital to a computer’s health and security.
  4. Anti-Spyware, & Anti-Malware are also extremely important for computer health. Without these, there are many types of intrusions that come through email and web surfing can infect your machine.

It is also very important to run ALL updates as quickly as possible. Hackers and software writers are constantly fighting each other and the best way to stay secure is to update often.

Microsoft Certified Systems Engineer

An individual who has acquired his MCSE is considered a Microsoft certified specialist.  These MCSE’s go through both classroom and hands on training to acquire it. A total of 7 exams are taken; four in networking, one in design, one client operating systems, and two electives.  Each exam can take hours, and many will not pass on their first try.  Once these engineers gain their MCSE they are required to continue to take exams to test their knowledge every year, or the certification is removed. They experience months of classroom training, usually by centers such as New Horizons.  

Microsoft describes this certification,

“The Microsoft Certified Systems Engineer (MCSE) certification shows clients and employers that you are skilled in designing, implementing, and administering infrastructures for business solutions based on Windows Server 2003 and Microsoft Windows 2000 Server. Implementation responsibilities include installing, configuring, and troubleshooting network systems.”

At CCR, we take very much pride in our MCSEs. They have endured some of the hardest technical training out there. Not only does the training give each of them a better view of how networks operate, but also hands on experience (at least one year). An MCSE is seen as a “badge of honor” in the business world by most professionals.

 

Securing Your Network

Securing your network can be a very challenging task, especially without professional help. There is an overwhelming amount of information about network and data security. Four things that will help prevent hackers, viruses, and other potential threats are these:

  1. Anti-Spam filter
  2. Anti-Virus/Anti-Malware/Anti-Spyware software
  3. Firewall
  4. Data Backup

An anti-spam filter can ease a lot of headaches for both employees and management. Some individuals receive hundreds (sometimes thousands) of spam emails every day. This over-load of email messages slows down your internet, puts your network at risk of viruses. The issue with a poorly running anti-spam filter is not only that it does not filter out all spam and put your network at risk, but also that it sometimes blocks good email – which can result in angry customers and lost sales.

Anti-Virus/Malware/Spyware software can help weed out the things that leak in through surfing the web. Think of running an anti-virus scan as the same as an oil change for your car – it just keeps everything running smoothly.

A firewall helps prevent hackers and malicious activity more than anything. A firewall blocks unauthorized access and communication to your network and protects your data. It is a dedicated appliance running on a computer that inspects network traffic and denies or allows passage based on a set of rules. It ensures that no private data goes and nothing malicious comes in. It regulates the flow of traffic between computer networks of different security levels.

Data backup ensures that even in the event of a disaster such as a flood, theft, hardware or software failure your data is safe and recoverable. Only 6% of businesses survive a major data disaster. Backing up data keeps it safe and secure no matter what.

www.ccr.net

SPLA Licensing – No More File Type Frustrations

 

Have you ever been annoyed by the “x” on the end of a Word document (.doc) or Excel spreadsheet (.xls)? Many Microsoft Office users do not want to pay the price to upgrade to the newest version right away or merely forget to and end up having issues opening documents. They email documents and spreadsheets to clients and coworkers only to find out they have Word 2003 and cannot open a “.docx” file, or vice versa. This can cause a day or more of delay in communications and is very irritating to both the sender and receiver.

Microsoft provides (through its partners, such as CCR) SPLA (Services Provider License Agreement) licensing. SPLA licensing is a subscription to Microsoft Office which provides every new update and version at one low monthly rate. This can be purchased per user, or per processor (computer). This product automatically updates your version of Office and eliminates the possibility of dealing with a file type issue again.

CCR Contest 2010 – Win a 16GB iPad

http://www.ccr.net/contest

CCR is giving away a 16GB iPad with WiFi ($499.00 value) for one lucky winner/fan on Facebook when we reach 300 fans or the contest runs for 4 weeks (whichever comes first). Read on for instructions to enter and Official Rules.

To enter the contest follow these steps:

Step 1: visit www.facebook.com/circlecomputerresourcesinc and “Like” us by clicking

Step 2. Post the following on your wall or as your status, “Just entered CCR’s 2010 contest to win a 16GB iPad! https://circlecomputerresources.wordpress.com

Step 3: Watch for “TechTips” or words/acronyms on our wall at 2:27pm CST (think about texting – it’s CCR o’clock!)  and be the first to send us all five definitions and win a weekly prize worth up to $50.00.

Tell your friends and speed up the process!

Why are we doing this? Because we’re tired of the same old stuff! We’re interested in you, and we’re hoping you’ll be interested in us once you hear what’s going on. CCR has been seen as a small Midwestern break-fix technology firm for many years, when in fact we provide service throughout the United States and Canada and will soon be reaching the Philippines, Ecuador, Kathmandu, and Vietnam. The expansion of our business has brought us into many services beyond IT. We specialize in Broadcast Monitoring Infrastructure, Managed Broadband, Disaster Recovery, and Network Optimization. We want to show you who we are and what we do from a newer, bigger perspective.

Got a question about the contest? Contact Monica at 319-734-3342 or email contests@ccr.net

Official Rules:
No purchase necessary to play or win. Purchases will not improve chances of winning. This giveaway is intended for individuals in United States only.
Eligibility

You must be 18 or older at the time of entry and a legal resident of the fifty United States to enter. Employees and immediate families of CCR and all subsidiaries are not eligible for this Giveaway. Void where prohibited or restricted by law. Giveaway is subject to all applicable federal, state, and local laws, and regulations.
Winner Selection & Notification

The contest will officially close when we reach 300 fans or the 4 week period has ended with an announcement on our Twitter & Facebook accounts. Any entries entered after the “End of Contest” tweet/post will not be counted. Winner will be randomly selected on the following business day. If you are chosen as the winner, you will be notified via Facebook Direct Message; you will have 24 hours to claim your prize by Direct Messaging us before you’re disqualified and another winner is chosen. You’re free to repost the contest more than once but each account will only count as one entry to the contest. Odds of winning depend on the number of entries received.
Agreement to Official Rules

By entering the Giveaway, entrants agree to be bound by the full official rules and agree to release and hold harmless the Giveaway Entities from and against any claim or cause of action arising out of participation in the Giveaway or receipt or use of any prize. In the event of a dispute, the potential winner may be required to provide proof that he/she is the authorized account holder of the identified Facebook account, and CCR’s decision will be final. CCR assumes no responsibility for any error, omission, interruption, deletion, defect, delay in operation or transmission, communications line failure, theft or destruction or unauthorized access to, or alteration of, entries, including any error that may result in an erroneous appearance of qualification for a prize. CCR is not responsible for any problem or technical malfunction that results in loss of entry. CCR reserve the right to cancel, suspend, modify or terminate the Giveaway in event of any technical malfunction, including any unauthorized tampering or other interference beyond the control of CCR.

5 Steps To Protect Your Company From Disaster

While it’s impossible to plan for every potential computer disaster or emergency, there are a few easy and inexpensive measures you can put into place that will help you avoid the vast majority of computer disasters you could experience.

Step#1: Make Sure You Are Backing Up Your System

It just amazes me how many businesses never back up their computer network, OR only keep an onsite copy of their data. Imagine this: you write the most important piece of information you could ever write on a chalk board and I come along and erase it. How are you going to get it back? You’re not. Unless you can remember it, or if YOU MADE A COPY OF IT, you can’t recover the data. It’s gone. That is why it is so important to back up your network. There are a number of things that could cause you to lose data files. If the information on the disk is important to you, make sure you have more than one copy of it.

Second, it’s absolutely critical that you keep an offsite copy of your data. No one expects a flood, fire, hurricane, tornado, or other natural disaster. But did you ever consider theft? What if someone breaks into your office and takes every single piece of computer equipment you have? It has happened.

What if a neighboring office catches fire or if a faulty sprinkler system waters your server room? Here’s another onsite disaster most people never consider…

What if your data becomes corrupt or a tape drive hardware failure erases your data? Again, your data is nothing but a memory. That’s why you want to not only keep an onsite copy of your data, but also an offsite copy. Your data is just too important to not do everything possible to protect it.

Step #2: Perform A Complete Data Restore To Make Sure Your Backups Are Working Properly

This is another big mistake I see. Many business owners set up some type of backup system, but then never check to make sure it’s working properly. It’s not uncommon for a system to APPEAR to be backing up when in reality, it’s not. Many companies have shelled out $40,000 to recover data they THOUGHT they backed up. Don’t let this happen to you.

Step #3: Keep An Offsite Copy Of Your Backups

What happens if a fire or flood destroys your server AND the backup tapes or drive? What happens if your office gets robbed and they take EVERYTHING? Having an off-site back up is simply a smart way to make sure you have multiple, redundant copies of your data.

Step #4: Make Sure Your Virus Protect Is ALWAYS On And Up-To-Date

You would have to be living under a rock to not know how devastating a virus can be to your network. With virus attacks coming from spam, downloaded data and music files, web sites, and even e-mails from friends, you cannot afford to not be protected.

Not only can a virus corrupt your files and bring down your network, but it can hurt your reputation. If you or one of your employees unknowingly spreads a virus to a customer, or if the virus hijacks your e-mail address book, you’re going to make a lot of people very angry.

Step #5: Set Up A Firewall

Small business owners tend to think that because they are “just a small business”, no one would waste time trying to hack in to their network, when nothing could be further from the truth. I’ve conducted experiments were I connected a single computer to the internet with no firewall.  Within hours, over 13 gigabytes of space was taken over with malicious code and files that I could not delete. The simple fact is there are thousands of unscrupulous individuals out there who think its fun to disable your computer just because they can.

These individuals strike randomly by searching the internet for open, unprotected ports. As soon as they find one, they will delete files or download huge files that cannot be deleted shutting down your hard drive. They can also use your computer as a zombie for storing pirated software or sending spam which will cause your ISP to shut YOU down and prevent you from access the Internet or sending and receiving e-mail.

If the malicious programs can’t be deleted, you’ll have to re-format the entire hard drive causing you to lose every piece of information you’ve ever owned UNLESS you were backing up your files properly (see 1 to 3 above).