February 5th, 2016

First Friday Funny

Andertoons Cartoon

Topic Newsletter
January 31st, 2016

Let’s get one thing straight…we all begin as a NOVICE.

No one – let me repeat that – NO ONE starts as an expert. We all have to learn to walk, talk, eat, swim, count, write and read. We all start at zero, the bottom, from scratch, zip…with absolutely no knowledge, experience or understanding of the “THING” we are about to learn.

So, then the journey begins: your progression from being a Novice, to being Average, then Skilled, then a Specialist and finally an Expert is all up to you. I really like the title of “EXPERT” because it has to be earned. You can assign someone a title of Vice President or Sales Manager, Boss or Director…but EXPERT – that title is something to be revered, respected and admired.

EXPERTS have put in the time, effort and study to EARN the title. They have dealt with the pains, frustrations, exhaustion and stress that come with obtaining the title of EXPERT. In fact, it’s really not a title at all, it’s a designation or confirmation that the person you are dealing with is very, very good at what they do. I like being around experts, because they have traits in their character that can do nothing but help me.

You see, to be an EXPERT you have to have passion, conviction, focus, discipline, dedication, drive, purpose, commitment, spirit, determination…and the undeniable WILL to perfect your SKILL.

According to the American Society for Training & Development, American workers average 6.5

minutes per day developing their skill. That statistic alone explains why there are so many average-performing people. Most people just aren’t WILLING to put in the time and effort needed to raise their skill level.

Your success has a great deal to do with your level of SKILL, but not everything. I know a lot of talented, smart, well-educated people who have in no way come close to reaching their full potential.

You have the FREE WILL to succeed, if you have the WILLINGNESS to do it.

The big question is WILL you? Who would have ever thought such a simple word as WILL would have so much to do with your success. Here are a few quotes I want to share with you that should hopefully broaden your perspective on how important WILLPOWER is to your success. They are by people you may have never heard of – de Balzac, Min and Crowley respectively – but the brilliance of their words is indisputable.

“There is no such thing as great talent without great willpower.”

“Lack of willpower leads to more failure than lack of intelligence or ability.”

“In the absence of willpower the most complete collection of virtues and talent is wholly worthless.”

Anyone can go from Novice to Expert if they have the WILL to do it. But the “Skill Knob” can only be turned to the “Expert Notch” if you have the WILL to make it happen and the discipline to study, learn and practice.

Guest article provided by:

Author Robert Stevenson 2Robert Stevenson is a highly sought after, internationally known speaker. He is the author of the best-selling books How to Soar Like An Eagle in a World Full of Turkeys and 52 Essential Habits For Success. Robert is a graduate of the Georgia Institute of Technology (Georgia Tech) and is a former All-American Athlete. He started his first business at 24 and has owned several companies. Robert has international sales experience dealing in over 20 countries, and his client list reads like a Who’s Who in Business. He has shared the podium with such renowned names as Generals Colin Powell and Norman Schwarzkopf, Former President George H.W. Bush, Anthony Robbins and Steven Covey.

Topic Newsletter
January 30th, 2016

Microsoft Outlook for iOS and Android – Worth a try?
The new Outlook for iOS and Android connects e-mail accounts, calendars and files all in one place. So what’s the verdict from users? It gets mixed reviews, for an average of 3.5 out of 5 stars on Google Play. On the plus side, it’s got a lean, easy-to- use UI. It sorts incoming e-mail by “Focus” and “Other” with an easy-to-use swipe gesture to move between the two. The scheduler uses color-coding and grays out info you don’t need. On the minus side, some users report syncing and sign-in errors and incompatibility with certain systems. Still, once the bugs are worked out, it’s certainly worth a test drive.  -Computer World, 10.29.15

Star Wars BB-8 Droid Tie- In: The Story and the Tech Behind the Hit Toy
Talk about your dream contract! It was just the second day of Disney’s inaugural tech-development Accelerator. Sphero CEO Paul Berberian and the company’s two founders were invited to chat with Disney CEO Bob Iger in his office. When it’s their time to meet, Iger pulls out his iPhone and shows them dailies from the new Star Wars film, The Force Awakens, then in production – stuff nobody but folks directly involved in making the movie had seen. Iger pointed to the rolling droid, BB-8, and asked Berberian if he and his team could build it. The rest, as they say, is history.  -Wired, 09.03.15

Pain Relief Gets a New Look
A new wearable electronic device named Quell is designed to relieve pain without popping pills. Yet it doesn’t look like a medical device. Resembling an athletic band, it’s worn on the leg, just below the knee. It connects to your smartphone so you can track therapy sessions, control features, monitor quality of sleep and store data to the Quell HealthCloud. 67% of Quell users report a reduction in their use of pain medication. Some users experience relief in as little as 15 minutes. Tapping into your body’s natural pain-control system, it can block pain signals, providing widespread pain relief. Just bear in mind, it doesn’t work for everyone – your results may vary.  -MedGadget 08.17.15

World’s Smallest Camera Drone

Curious about camera drones, but not sure where to begin? For under $30 you can get a tiny “quadcopter” that fits in the palm of your hand. The Cheerson CX-10C claims to be the world’s smallest drone with a camera. You’ll get a flight time of no more than about three minutes, less if you use the camera. Which, of course, is the point, isn’t it? Still, it’s a good way to get the hang of playing with one of these things without a whole lot of cash out-of-pocket. Use it for aerial shots of you and your family skiing, on the beach – or just buzzing around the house for practice.  -Drone Arena, 11.06.15

Topic Newsletter
January 30th, 2016

Protect Your Network Security Free ReportThis report will outline in plain, non-technical English common mistakes that many small business owners make with their computer network that cost them thousands in lost sales, productivity and computer repair bills, as well as providing an easy, proven way to reduce or completely eliminate the financial expense and frustration caused by these oversights.

Download your FREE copy today at or call our office at (408) 483-1881.

Topic Newsletter
January 29th, 2016

sos buttonIf you often fly for business, a satellite messenger may be just the thing to stay in the cloud when you’re above the clouds. And if your travels for fun take you into the wild, it could literally be a lifesaver.

Just ask retired Houston firefighter Michael Herrara. After breaking three ribs and his collarbone in a hard fall from his dual-sport bike in a remote area in Alabama, he hit the SOS button on his messenger. Within 40 minutes an ATV was on hand to transport him to a trauma center.

Features to look for in a satellite messenger include data speed, battery life, coverage areas, size, weight and ease of use.

And, of course, an SOS button.

Topic Newsletter
January 29th, 2016

Hearts on keyboardIn today’s fast-paced, data-driven world, backups are mission critical to your company’s survival and success.

Yet your data may be just one damaged drive, lost laptop, natural disaster, accidental deletion, malware attack, equipment failure, power spike or petty theft away from a profit-sucking, heartbreaking disaster.

So what measures must you take to keep your data safe, secure and where you need it, when you need it? While there’s no one-size-fits-all-guns silver bullet, there are some general principles to be aware of.

Image-Based Backups

An image-based backup or “clone” serves like the spare tire for your car. If you get a flat, the spare will get you to a tire shop.

If the hard drive on any device in the network goes kablooey and its user is in a time crunch to complete a project, an image-based backup allows them to get right back to where they were. It saves all files, apps and settings that were on that device, exactly the way were at the time of the last backup. And generally, that means the user can get right back to work with no need to reconfigure everything all over again.

But, just as a spare tire isn’t designed for long road trips, an image-based backup may not perform as well as the original drive. It may, for instance, take a little longer to access data from the server, slowing down user workflow.

An image-based backup will be useful only to the extent that it has backed up data recently. For servers, daily or even multiple backups per day are recommended.

Archive Backups

Archive backups don’t replace image-based backups, but are an efficient way to reduce the size of these backups because they take less-frequently-used data off the main computer or server.

You can’t reboot from an archive, but if you’ve accidentally deleted a file, you can retrieve it from an archive. If any device on the network goes down, you can simply plug the external hard drive into another computer and regain access to the archived files.

Cloud Backup

Backing up to the cloud can serve as an alternative to a rotating off-site backup and eliminates the human component of having to remember to rotate drives. However, for complete protection, you’ll want a cloud backup that makes a nightly copy of the image-based backup files. Should the absolute worst happen, the cloud backup image can be “spun up,” allowing access to your applications and data using just about any computer or tablet.

Automated cloud backup systems offer a variety of feature sets. Some only backup files, while others backup entire image-based backups and can even spin them up. Select a system that’s simple, continual, fast, secure, easy to restore from, inclusive of different devices and operating systems, cost-efficient and, most importantly, provides the kind of protection and redundancy you need for your operation to run even if things go south.

A Fail-Safe System

So, can you rest assured that your company’s backup system is built to minimize downtime in the event of data loss or equipment failure?

If you’re 100% certain you can answer yes, congratulations – you are one of the few! If not, NOW is the time to take action – rather than after you wish you had.

Not only is our Recover-IT full business continuity solution highly affordable, it continuously backs up your entire server every 15 minutes – but you can decide if that’s too often or not often enough. You’ll never lose a whole day’s work. Then, every night, it automatically backs up a snapshot of your entire server to an off-site military-grade data center where it’s held safe and secure until you need it.

Don’t put this off another minute! Contact us right now through the end of February to claim your Free Backup System Audit. Let us make sure your backup system never lets you down. We can fix broken computers but a broken heart is another thing entirely. Call TODAY!

Topic Newsletter
January 21st, 2016

Many of us, who have had an opportunity to work with IT guys, have probably experienced their not so nice characters when it comes to fellow employees. It is understandable that this department is sensitive when it comes to factors like security. However when they become hash their work becomes harder. Here is why they should play nice;

To Avoid Loss of Data

Desperate times call for desperate measures, this statement would best describe a co worker who is eager to share information on the web that exceeds the company limits. He will look for alternative channels to do so without the it department knowing and in so doing open back door access to the company’s network which can be utilized by cyber criminals to steal the company data.

To Prevent Total System Collapse

It is understandable that most it departments restrict use of company systems to access their private information like emails. It is also understandable that these systems are protected with the best antivirus software’s. But when employees use their phones which are less protected and later plug them into the company computers there is high chance of malwares being transferred to the hard drives which can cause system in severe cases.

TO Ensure Productivity in the Work Force

Most employees will use their work computers to conduct their private affairs and when done they will resume to their day to day work. For some it is their daily routine. When the IT guys impose restrictions then the level of productivity goes down the drain. The worker will spend most of the day trying to go against the restrictions or hiding what he is doing something that will greatly affect his productivity.

Call us for better IT.

January 21st, 2016

benefits of adopting cloud computing The cloud system has been in use since the 1950s. But it is not until recently that humanity has fully embraced its advantages especially when storage of information is concerned. The only question that is on the mind of any user is simply if he can trust the service. The answer would be yes and no depending on several factors that include.

Individual Country Laws

Companies that offer cloud storage and server services like Google and Amazon are subjected to laws that govern how data is stored. In order to trust any service providers with your information first of all consider the rule and regulation the company is subjected to. A good example is the patriot act in America that allows the United States government to access your data. Other countries have no such laws which keep your data safe.

Type of Data Being Stored

The type of information being stored can raise security concerns especially if the information is high value. High value information is always a target of government and even cooperates which will look at all possible means to access it. This moves us to the third factor which is;

Security of the Service Provider

In order to trust your data with service providers like Dropbox and Google be sure they have the necessary infrastructure to hold your information in terms of correct software’s that can withstand any forms of unauthorized access no matter how long


Before trusting a cloud systems with your information always look at possible alternatives to the service and even yourself in terms of your passwords. Myers can help you stay on top of your business in the cloud.

January 20th, 2016

Loss of data especially important business data can be disastrous to any business especially through cyber attacks. This era of technology has simplified the way people conducted business but it has come with a challenge of data theft and loss through hard disk fails and malwares, natural calamities. However technology still gives you a way to fight back and win through the several back up ways that include;

  • Encryption and strong password protection of vital data backups to ensure it’s safe from those who wish to access it from outside.
  • Spread the risk of you backup data by storing in several satellite location. So that in the event one is lost you can always access the other ones.
  • Ensure the data backup is working by occasional restoration
  • Make sure your backup plan involves natural disasters like floods and fires. Even if their chances of happening seem unlikely because you can’t be sure where the damage will originate.
  • Ensure your vital data is backed up always and that you have several copies of the same over a period of time .this means it should be something occasional.

Data backup is not an expensive process therefore you shouldn’t be afraid of maintaining it on long term basis.

January 20th, 2016

Protect yourself from cyber securitySmall businesses are facing an increased risk of disasters happening than it was ever thought before=particularly where hacking is concerned. That is why they need to fortify their defense preparations. These do not become cheap that is why they need planned budgeting and this articles is meant to provide the much-needed insights.

How much do they need to invest?

For large companies, this would take nearly 15% of their IT budget. For small businesses, the amount to be invested should depend upon collected revenue employees and the level of risk expected. If the risk is small and the business output is small then it’s pointless to have a big budget for cyber security. However, you should also access what damage even a small breach can do to your business in the end.

What resources do you have?

Budgeting depends upon many factors among them the resources availability. Once you assess your business vulnerability it time to look upon the resources available for developing an elaborate cyber security plan that your resources can manage. Remember it may involve hiring professionals and setting up new infrastructure which can be expensive if not fully thought through. You may consider involving your insurance company as it can help with your planning.

Myers can help to prepare your company for IT disasters not limited to natural calamities. Check out the range of services we offer in the Bay Area.