Rss Feed
Tweeter button
Facebook button
Technorati button
Reddit button
Linkedin button
Delicious button
Digg button
Flickr button
Stumbleupon button
Newsvine button
Youtube button


Archive for the ‘New Technology’ Category

GoDaddy Down – Millions of Websites Down

September 10th, 2012 Comments off

GoDaddy, a large low cost hosting company has been down much of the day today, this also includes all of GoDaddy’s Email and DNS services. If you are a local business affected by this outage give us a call and see how a local webhost can make your life easier. Take a look at all of our hosting plans: and work with with the local experts in hosting.

Meraki MR16 Dual Radio 802.11n Access Point

October 11th, 2011 Comments off

Merak MR 16 Access Point

The Meraki MR16 is an enterprise class, dual-concurrent 802.11n access point designed for high-density deployments in large offices, schools, hospitals, hotels and large retail stores.  The MR16 features dual-concurrent, dual-band operation and advanced 802.11n technologies such as MIMO and beam forming, delivering the high throughput and reliable coverage required by the most demanding business applications like voice and video.

The MR16 is monitored 24×7 and managed through the Meraki Enterprise Cloud Controller, with an intuitive browser-based interface that delivers real-time alerts if your network encounters problems. Remote diagnostics tools enable real-time troubleshooting over the web, meaning multi-site, distributed networks can be managed remotely.  The MR16’s firmware is always kept up to date from the cloud.  New features, bug fixes, and enhancements are delivered seamlessly over the web, so you never have to manually download software updates or worry about missing security patches.  And it self heals, responding automatically to switch failures and other errors.

The MR16 features integrated, easy-to-use security technologies to provide secure connectivity for employees and guests alike.  Advanced security features provide wire-like security while still being easy to configure.  One-click guest isolation provides secure, Internet-only access for visitors.  The policy firewall (Identity Policy Manager) enables group-based, granular access policy control.

Despite its incredible  power  and feature set, the MR16 is  the lowest profile 802.11n access point available – at just one inch thick, it blends seamlessly into any environment.  In addition to looking great, the MR16 is earth friendly: we’ve eliminated excess packaging and documentation, and 90% of the access point materials are recyclable.  A maximum power draw of only 10.5 watts and a cloud-hosted, multi-tenant controller mean that pollution, material utilization and your electric bill are kept to a minimum.

Contact Small Business Technology Solutions, Inc., your Meraki Authorized Reseller during October to obtain a special 30% discount on the MR16 and all other Meraki products.  This offer is good on Meraki products only and expires on October 31, 2011.

Do you know where your website is hosted?

July 7th, 2011 Comments off

Most businesses cannot answer that question, which for something as important as your website we find a bit alarming. We would like to tell you a little bit how we treat our customers different…

We have invested heavily into our systems to make them as reliable and high performance as possible, yet affordable. Our web hosting system stretches across 3 geographically diverse datacenters, giving our customers assurance there website will stay up and have backup servers to take over just in case. Our primary Tier IV datacenter is located in Washington DC connected to one of the highest concentrations of fiber in the US supplying over 20 Gigabits per second to our systems and providing less than 30ms latency to the Midwest. The facility features multiple redundant power connections, 3 2-megawatt generators and 8 redundant UPS units. It features 3 on site 600-ton cooling towers fully meeting N+1 standards.

Backing up our world class DC datacenter is our secondary facility located in Dallas Texas. This Tier III N+1 facility pulls power from 3 separate electrical grids, 6 redundant UPS units and has 5 100-ton cooling towers. The center is connected to a network with over 60 Gigabits per second of bandwidth with less than 40ms of latency to the Midwest, providing our backup web servers with the speed and redundancy you need.

Finally backing up our DC and Dallas datacenters is our own private Janesville WI Tier II facility. This center has bandwidth capacity upwards of 30 megabits per second along with redundant UPS systems.

All of our servers are fully virtualized to protect against hardware failure, and unlike other companies who simply resell hosting we manage and have full control of our servers. What this means for you is no red tape, no waiting on hold for an 800-number to get a setting on your site changed. It also means if there is a problem we have direct remote access to the systems to fix the problem, an being virtualized allows us to recover from hardware failures almost instantly.

All of this starting at less than $10 a month. Basically we got your covered!

For more information about our hosting services including Email, SPAM filtration and offsite storage please visit our website at


MacDefender Removal Support

May 28th, 2011 Comments off

For those of you who have a mac, the whole Malware/Spyware situation has really taken a turn for the worse. If you belive you have been infected by a fake Malware/Spyware program, please follow the instuctions provided below directly from Apples Support Page

Here is more information about is from a cnet postings


A recent phishing scam has targeted Mac users by redirecting them from legitimate websites to fake websites which tell them that their computer is infected with a virus. The user is then offered Mac Defender “anti-virus” software to solve the issue.

This “anti-virus” software is malware (i.e. malicious software).  Its ultimate goal is to get the user’s credit card information which may be used for fraudulent purposes.

The most common names for this malware are MacDefender, MacProtector and MacSecurity.

In the coming days, Apple will deliver a Mac OS X software update that will automatically find and remove Mac Defender malware and its known variants.  The update will also help protect users by providing an explicit warning if they download this malware.

In the meantime, the Resolution section below provides step-by-step instructions on how to avoid or manually remove this malware.

Products Affected

Mac OS X 10.4, Mac OS X 10.6, Mac OS X 10.5


How to avoid installing this malware

If any notifications about viruses or security software appear, quit Safari or any other browser that you are using. If a normal attempt at quitting the browser doesn’t work, then Force Quit the browser.

In some cases, your browser may automatically download and launch the installer for this malicious software.  If this happens, cancel the installation process; do not enter your administrator password.  Delete the installer immediately using the steps below.

  1. Go into the Downloads folder or your preferred download location.
  2. Drag the installer to the Trash.
  3. Empty the Trash.

How to remove this malware

If the malware has been installed, we recommend the following actions:

  • Do not provide your credit card information under any circumstances.
  • Use the Removal Steps below.

Removal steps

  • Move or close the Scan Window
  • Go to the Utilities folder in the Applications folder and launch Activity Monitor
  • Choose All Processes from the pop up menu in the upper right corner of the window
  • Under the Process Name column, look for the name of the app and click to select it; common app names include: MacDefender, MacSecurity or MacProtector
  • Click the Quit Process button in the upper left corner of the window and select Quit
  • Quit Activity Monitor application
  • Open the Applications folder
  • Locate the app ex. MacDefender, MacSecurity, MacProtector or other name
  • Drag to Trash, and empty Trash

Malware also installs a login item in your account in System Preferences. Removal of the login item is not necessary, but you can remove it by following the steps below.

  • Open System Preferences, select Accounts, then Login Items
  • Select the name of the app you removed in the steps above ex. MacDefender, MacSecurity, MacProtector
  • Click the minus button

Use the steps in the “How to avoid installing this malware” section above to remove the installer from the download location.

Note: Apple provides security updates for the Mac exclusively through Software Update and the Apple Support Downloads site. User should exercise caution any time they are asked to enter sensitive personal information online

Microsoft to buy Skype for $8.5 billion

May 10th, 2011 Comments off

NEW YORK (CNNMoney) — Microsoft has agreed to buy Internet phone service provider Skype for $8.5 billion in cash, the companies announced Tuesday.

The deal gives Microsoft (MSFT, Fortune 500) access to the market for real-time video and voice communications. The software maker said it plans to use Skype to support such products as the Xbox gaming system and Windows Phone.

As the largest acquisition in its history, the deal marks a significant change in strategy for Microsoft, which has not bought another company since 2006.

“Skype is a phenomenal service that is loved by millions of people around the world,” said Microsoft chief executive Steve Ballmer.

Behind the deal

In 2010, Skype had 170 million connected users who logged over 207 billion minutes of voice and video conversations. The company reported a $6.9 million net loss last year, on nearly $860 million in revenue. It reported $686 million in long-term debt, and slightly more than $1 billion in liabilities.

Under the terms of the deal, Microsoft will assume Skype’s debt.

Skype will become a new business unit within Microsoft, to be run by current Skype CEO Tony Bates, who will report directly to Ballmer.

Skype filed for a $100 million IPO last year. But the actual offering was delayed, and rumors surfaced last week that the company was in talks with Microsoft and Facebook.

“The deal is strategically sound,” said Christopher Hickey, an analyst at Atlantic Equities. “There are clear revenue opportunities for Microsoft.”

He said the price was “slightly expensive,” but added that Microsoft plans to use its offshore cash balance to cover the cost. “It’s expensive, but it’s not the end of the world.”

For consumers, the look and feel of Skype should remain the same, said Hickey. Microsoft is mainly interested in incorporating Skype’s functionality into its existing products, and leveraging the company’s user base.

“The advantage of Skype is that it’s just as applicable to Microsoft’s consumer base as its business base,” he said. “Most of Microsoft’s challenges are traditionally on the consumer side of its business.”

Google is killing the voice plan

Founded in 2003, Skype was bought by Ebay in 2005 for $2.6 billion. But the partnership did not work out and eBay sold its 65% stake in Skype to an investor group for $1.9 billion in 2009.

The group was led by private equity firm Silver Lake, but eBay retained a small stake in the company.

Microsoft shares fell more than 1% in early trading Tuesday. The stock is down nearly 9% so far this year.

Hickey said the deal raises questions about Microsoft’s acquisition strategy going forward.

“Investors are wondering whether this signals a change in M&A strategy for Microsoft, which hasn’t been very acquisitive in the last ten years,” he said.

BlackBerry maker Research In Motion (RIIM) is one of the companies that has been mentioned as a possible Microsoft target


Categories: New Technology, Small Business Tags: