Categories: Newsletters

September 2008

September 2008
In this issue:

Video Case Study
Memory Errors
Customer Service
Wireless Threats
Laws to Ignore
Case Study
How Big is Your Mailbox
Opportunities

Excellent
Customer Service

by Jeff Wuorio
reprinted with permission from the Microsoft Small Business Center

In the business world, good customer service often isn’t good enough anymore. Customers and clients are becoming increasingly disenchanted with the merely adequate. For them, extraordinary service is the rule, not the exception. Anything less, and they’re happy to vote with their feet and their wallets.

That makes extraordinary service necessary, not just desirable. And that, in turn, mandates a strategy to help ensure that your business matches that standout service standard on a daily basis.

Here are seven ideas and tips to help your business establish and maintain an ongoing climate of service excellence.

6 Wireless Threats to Your Business
by Christopher Elliott
reprinted with permission from the Microsoft Small Business Center

If you think a promiscuous client is a scantily-dressed customer, you’re in trouble. And I’m not talking about having an affair.

Think an evil twin is a horror-movie villain? Wrong again. The horror you should be bracing yourself for is not on the silver screen — and it’s not from a rolling pin flung at you from across the kitchen, for that matter. Rather, the trouble is in the airwaves and targeted to Wi-Fi users.  Both the “Promiscuous Client” and the “Evil Twin” are two of the latest wireless threats to your small business. If you haven’t heard of them, you probably will soon.

So what’s out there?
Please share this newsletter with anyone who might be interested

Proud member of

eMazzanti Technologies Feature in Microsoft Video Case Study with Original SoupManWith a comedic link to a TV show and the famous “Soup Nazi”, Soup Kitchen International concentrates its efforts delivering customers lines rather than laugh lines. The company wanted technology solutions which provided growth and agility so it could respond to new marketing and franchise opportunities. With the IT expertise of eMazzanti Technologies, the company re-built its user network around several Windows Server products and Windows Vista. See the Video Case Study

How To Avoid Out of Memory Errors
by Christopher Elliott
reprinted with permission from the Microsoft Small Business Center
There comes a time in the life of every computing device when it says “enough!”   Can’t go on. Need . . . more . . . memory. The dreaded “Out of Memory” error is relatively easy to fix when you’re talking storage (short-term solution: delete a file; long-term solution: buy a new hard drive). But when it comes to the other kind of memory, also known as RAM (random-access memory) — that’s the internal kind of memory your computing device uses — things can get a little bit more complicated. “Inadequate memory is a productivity inhibitor,” notes William Kazman, chief executive of iTeam, a Westford, Mass., information-technology outsourcing company for small businesses. “A small business typically keeps a computer for three to five years. During that hardware lifecycle, operating system and application upgrades consume more and more computer resources — memory being key among them.”

In other words, small businesses are mindful of their software upgrades, but often oblivious to their hardware needs. And that goes beyond the computer workstation. It also extends to servers and personal computing devices, such as Tablet PCs.

Your poor, overworked PC
Are you running your machines ragged? OK, there’s no evidence that an insufficient amount of memory will hurt your hardware — at least none that I’ve seen. But you could be running yourself ragged (and compromising your company’s productivity) by ignoring a memory-deficiency within your own organization.

“Most people are too conservative when it comes to planning their memory needs,” says Doug Finke, director at SimpleTech, a Santa Ana, Calif., designer of open-standard memory and storage solutions. “I think it’s a big mistake to assume the base memory size installed by the PC manufacturer when you bought the machine will be sufficient. Manufacturers will sometimes scrimp on base memory to hit target price points.”

So how do you prevent the dreaded error message from putting a crunch on your profits? Here are three tips.


Laws You May Choose to IgnoreMoore’s law describes an important trend in the history of computer hardware: that the number of transistors that can be inexpensively placed on an integrated circuit is increasing exponentially, doubling approximately every two years. The observation was first made by Intel co-founder Gordon E. Moore in a 1965 paper. The trend has continued for more than half a century and is not expected to stop for another decade at least and perhaps much longer. You probably thought you knew every single law of nature, science, and humanity , but we at eMazzanti technologies have uncovered some additional laws that you may not have heard previously.

Law of Mechanical Repair
After your hands become coated with grease, your nose will begin to itch and you’ll have to pee.

Law of Gravity
Any tool, when dropped, will roll to the least accessible corner.

Read on for More Laws


Just for Laughs

SoupMan Finds a Key Ingredient for Business Growth

Soup Kitchen International wanted to implement a technology architecture that would keep it connected to its growing family of franchisees. With the help of Microsoft Gold Certified Partner, eMazzanti Technologies, it discovered that Windows Server® 2008 would work seamlessly with its disparate business-critical applications. Deploying it has improved operational efficiency, has increased employee productivity, and has become part of the company’s for growth.

Read the Case Study

How Big is Your Mailbox?

We have spent a lot of time recently (which translates to a lot of extra expense for our customers) troubleshooting, managing, and working with VERY large mailboxes. From a purely technical standpoint, once a mailbox gets over a GB in size, it starts to become a minor challenge in terms of supporting it, speed of access and search, and management in general. Once a mailbox gets to be over 2 GB in size, we start to run into some very serious limitations that will manifest in support, management, and disaster recovery scenarios.

Believe us when we say we are VERY heavy Outlook users, but using a few simple techniques, it is not much of a challenge at all to keep our own mailboxes under the 1 GB limit we need to keep us ‘light on our feet’ with our own mailboxes.

Continue

Opportunities at
{e}Mazzanti

eMazzanti seeks bright
minds to join the team.

Refer a Network
Engineer to
www.emazzanti.net/jobs
and be eligible for a
shopping spree at
eMazzanti’s online store,
www.emazzanti.net/store.
Qualifying applicants
must receive full time
employment and have
referenced the referring
friend on the original
application in order for the
referrer to be eligible for
the annual drawing.
Shopping spree is limited
to $1,000 in merchandise.


{e}Mazzanti Technologies  *  701 Grand Street  *  Hoboken, NJ  07030  *  201-360-4400
www.emazzanti.net

eMazzanti Technologies

Recent Posts

How to Manage Remote Workers

With a global customer base, eMazzanti Technologies positions engineers and project managers in various locations…

4 years ago

Tips for Transitioning to Remote Work

Over a period of three weeks, most of the workforce in the United States found…

4 years ago

Collaborate with Exceptional Security and Privacy Using Microsoft 365 for Remote Work

Three years ago, Microsoft launched Teams, a powerful component of Office 365 (now Microsoft 365),…

4 years ago

You Look Marvelous! The Sprint to Video-based Team Interaction

In our new work-from-home (WFH) world, the requirement for on demand video conferencing has exploded…

4 years ago

5 Endpoint Security Best Practices When Remote Work Takes Center Stage

With the majority of employees working from home this spring, organizations have encountered new challenges.…

4 years ago

Cloud-based Security Solutions Deliver Powerful, Scalable Protection for SMBs

The average small to medium business (SMB) has most likely migrated at least some essential…

4 years ago