734.905.7800

LiveZilla Live Help

Tech-Plus Blog

Tech-Plus has been serving the Livonia area since 1992 , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Let’s Buy a Computer, Part V

Let’s Buy a Computer, Part V

You should be well on your way to getting your new computer. We’ve gone over the processor, the memory, the storage, and the display, and should be confident about what you are looking for. For our final part of our computer buying guide, we are going to focus on topics that are important to mention, but maybe didn’t seem to fit in other parts of our guide.

Recent comment in this post
Epicfollowers
Learning how to build a PC is already intimidating enough, let alone actually doing it for the first time. However, as long as you... Read More
Friday, 23 August 2019 08:02
Continue reading
1 Comment

Let’s Buy a Computer, Part IV

Let’s Buy a Computer, Part IV

After you’ve got the machine’s core specifications worked out, you then have to turn your attention to your displays. In part four, we take a look at how you are going to broadcast the information from the computer, what you should know about modern displays, and what considerations you need to take.

Continue reading
0 Comments

Let’s Buy a Computer, Part II

Let’s Buy a Computer, Part II

The second part of our desktop buying guide will focus on RAM, or random-access memory. Many users might not understand the importance of this, or they might have the impression that memory is the same thing as the amount of data your computer stores, which is certainly not true. The truth is that understanding RAM will have a major impact on the way you purchase devices. We’ll help you determine the best options for your device.

Continue reading
0 Comments

Dire Days Ahead for Huawei

Dire Days Ahead for Huawei

As the world’s top telecom supplier and a major phone manufacturer, Huawei has been placed in a precarious situation due to its close ties with China’s government. In response to potential spying allegations, many countries have banned the use of the Chinese company’s networking equipment, throwing a wrench in the manufacturer’s plans to become an even bigger global force in the telecom industry.

Continue reading
0 Comments

Tip of the Week: Figuring Out Why Your Sound Isn’t Working

Tip of the Week: Figuring Out Why Your Sound Isn’t Working

Do you know what’s just as jarring as your computer’s volume suddenly being way too high? Suddenly not having any volume at all. Sound problems on your computer can be a real pain, especially if you have something important you need to listen to for one of your responsibilities. Here, we’re offering some tips to help you do some basic sound troubleshooting.

Continue reading
0 Comments

Spreading Botnet has Years-Old Flaw to Thank

Spreading Botnet has Years-Old Flaw to Thank

When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems, if a patch has been successfully developed. Unfortunately, the recent spread of the BCMUPnP_Hunter botnet is evidence that not enough people are appropriately patching their systems.

Continue reading
0 Comments

Why a Chromebook Can Be a Great Investment

Why a Chromebook Can Be a Great Investment

Chromebooks have provided businesses with a different option for their computing needs, if it fits with their practices. Here, we’ll explore the different factors that make Chromebooks a good choice, and some of the more appealing features that they can provide.

Continue reading
0 Comments

Tech Terminology: Processor

Tech Terminology: Processor

The word “computer” actually originated in the 1600s, when it was used to describe a person who carries out calculations and the requisite processes. Today, those processes are carried out mechanically. Let’s examine the piece of the computer that allows it to do so, the CPU.

Continue reading
0 Comments

Holiday Shopping Just Got Easier--Check out These Gadgets!

Holiday Shopping Just Got Easier--Check out These Gadgets!

It can often be difficult to figure out what to get someone for a holiday gift. Fortunately, there is almost always a new gadget or gizmo that can make someone with particular interests happy. In this blog, we’ll go over a few cool gadgets that make excellent special-interest gifts.

Continue reading
0 Comments

A Beginner’s Guide to Running Cables in Your Office

A Beginner’s Guide to Running Cables in Your Office

Arguably one of the most important parts of running a business is the physical infrastructure of your office environment. This involves ensuring that the cabling of all network assets is properly implemented. Unfortunately, this is easier said than done, as no two businesses will utilize the same setup. We’ll walk you through some of the variables that you’ll need to consider during the cabling process, and what you can do to make it easier to handle.

Continue reading
0 Comments

Tip of the Week: How to Get Wi-Fi in Your Car and Track its Whereabouts

Tip of the Week: How to Get Wi-Fi in Your Car and Track its Whereabouts

The Internet of Things is quickly becoming a major part of today’s consumer-based industry. One of the best examples of this is the use of smart car technology. A great example of this comes from a company called Zubie, which sells a handy device meant to provide car owners with tracking analytics, access to diagnostic systems, and even the capability to connect to Wi-Fi.

Continue reading
0 Comments

Intel’s Confusing Name Change Shows Why Researching Products is Important

Intel’s Confusing Name Change Shows Why Researching Products is Important

Renowned tech company Intel has announced their next line of laptop processors, but an unfortunate aside caused significant frustration amongst the IT market. Intel has broken from the tradition of releasing new processors each September which will be improved upon later. Instead, Intel has jumped the gun and released a new processor, rather than improve their Skylake processor from the previous year.


The processor has been named Kaby Lake, which is optimized for 4K video handling and editing and can improve battery life. However, it’s not these changes that have resulted in confusion; rather, it’s something as simple as a name change that has IT professionals up in arms. Prior to Intel’s most recent release, there were two lines of processors which were given the titles of Core i and Core M. The 'i' line of processors is the stronger of the two, while the M processors were reserved almost exclusively for tablets. The confusion came when the Core M processors were renamed to represent the 'i' series.

Keep in mind that there has been no change in the capabilities of the processors. The change is in name only. The difference can only be seen in the product numbers. What this means is that when someone is researching components for a workstation, they may accidentally purchase the wrong i7 processor (a significantly less powerful one). The only way they can really determine the change is by digging into the product’s specifications--which, if you’re not technically inclined, won’t mean anything.

This leads to our next point; while the average consumer may not notice a difference in performance, business owners want technology that meets the specific needs of their organization. Granted, this is assuming that a business owner has the time and resources available to research the available solutions. The problem here is that the average business owner probably doesn’t have this time available to them, and it takes much more than identifying the proper product number to make educated decisions about your IT infrastructure.

If your business doesn’t want to waste time sifting through product numbers and specifications, Tech-Plus is happy to help. Our skilled technicians can help your organization procure only the best technical assets that are designed to meet your business’s specifications. To learn more, reach out to us at 734.905.7800.

Continue reading
0 Comments

Managing Your Computer Equipment Doesn’t Have to Be a Headache

Managing Your Computer Equipment Doesn’t Have to Be a Headache

Every business has hardware, like workstations, servers, and other devices, that are critical to its operational efficiency. However, managing your hardware can be tricky, especially if you’re a small or medium-sized business that has limited time and resources. If your business doesn’t have a process put in to place to handle hardware inventory and deployment, perhaps it’s time that you consider implementing one.

Continue reading
0 Comments

Tip of the Week: Find Out the Ideal Amount of RAM Your Workstation Needs

Tip of the Week: Find Out the Ideal Amount of RAM Your Workstation Needs

If your computer is underperforming, then it may not have enough RAM to do what you’re asking it to do. When selecting a PC, how do you know if you have enough RAM?

Continue reading
0 Comments

The 3 Major Ways Managed IT Beats Break-Fix IT, Every Time

The 3 Major Ways Managed IT Beats Break-Fix IT, Every Time

Every business has crucial IT systems that are imperative to its continued functionality. Usually these systems are maintained by an internal IT department, but many small businesses don’t have this luxury. Therefore, they have traditionally relied on break-fix IT companies to handle their technology problems when they hinder operations.

Continue reading
0 Comments

Tales from the Haunted Server Room

b2ap3_thumbnail_shock_n_awe_it_400.jpgIt was a dark and stormy night, as it sometimes is on Halloween. It’s a time when kids and adults alike enjoy dressing up as scary monsters and partaking in some good old-fashioned trick-or-treating. You’re pulling a late night at the office, and you hear a sound emanating from your server room; an unsavory clicking sound that echoes through the recesses of your office. What do you do?

Recent comment in this post
Jake Spragg
This is sounding very interesting for those people who want to hear something new about horror places of the world. Writers offer ... Read More
Saturday, 19 January 2019 05:09
Continue reading
1 Comment

What Happens to a Hard Drive When It’s Stored Away for Several Years?

b2ap3_thumbnail_cold_storage_for_server_400.jpgOne of the most common questions we are asked by our clients is, “What’s the best way to store my business’s data?” Questions like these are imperative to the survival of any business endeavor, as they force you to think in the grand scheme of things. So, what’s the best way to store your data long-term?

Continue reading
0 Comments

The Problem with E-Waste is Worse Than We Thought

b2ap3_thumbnail_ewaste_is_a_problem_400.jpgSo you got yourself a shiny new laptop. That’s great, but what are you going to do with your old device? The right thing to do is to dispose of it with a company that handles e-waste properly. Otherwise, if you just chuck it in the trash, you’ll be contributing to an already serious environmental problem.

Continue reading
0 Comments

Tip of the Week: How to Protect Yourself from IT Equipment Theft

b2ap3_thumbnail_it_equipment_theft_400.jpgHow often do you deal with your company-owned IT equipment? Some businesses keep detailed records of their equipment and use security measures and policies to prevent theft; but if your business doesn't protect its equipment, you could be digging a hole into your budget without realizing it.

Recent Comments
Kieran Knox
You have to get know that how you have tto protect yourself that was for the IT equipment theft that has the desertion. I have to ... Read More
Sunday, 12 May 2019 06:13
Cody Crombie
You need to protect yourself that was from the IT equipment theft that was going to be format on this it has many tips on this. I ... Read More
Monday, 24 June 2019 08:13
Continue reading
2 Comments

The Threat Level for BadUSB Malware has Increased

b2ap3_thumbnail_badusb_is_dangerous_400.jpgThis past August, we reported on a new vulnerability with USB firmware called BadUSB. This vulnerability was discovered by Karsten Nohl of SR Labs. The BadUSB vulnerability was presented at the Black Hat security conference as a theoretical risk, but now, the code has leaked and this risk has become a reality. Oops.

Continue reading
0 Comments