Computer Repair vs. New Computer?

Are you ready to upgrade your desktop and laptop computers?  Expect lots of exciting new changes to come out later this year. Unless your needs are urgent, you may want to wait until the Fall.  Here is what to expect in the new computer market, along with tips to help you squeeze  the most out of your current computers. Intel Ivy Bridge Intel Corporation leads the market share in computer chips and processors. Today Intel started shipping its’ third generation processors called Ivy Bridge.  Ivy Bridge promises faster graphics and longer battery life for new computers.  This new processor is expected to be widely available in desktops and laptops this Summer. Microsoft Windows 8 Microsoft will be releasing Windows 8.  The release date has yet to be confirmed but many believe it will be available in the Fall of 2012.   While the emphasis of the release is on tablet computers, there will be other benefits, including enhanced security and better remote access.  Consider that many new laptops and desktop computers purchased today may be upgradable to Microsoft Windows 8, they may not take full advantage of some of the new features of the new O/S. What’s New from Apple Apple is expected to release a new operating system called Mountain Lion O/S later this Summer.  Also expect a new lineup of the Macbook Pro and possible upgrades to the  Mac Air.  Insiders suggest the new lineup of laptops will be thinner, lighter and have longer battery life. Looking for a Deal? With all this new technology coming to market, you may be able to deal on older models and...

Is Your Network Safer Than The Titanic?

One hundred years ago the ship, called “unsinkable” had its hull breached by an iceberg and caused the death of over 1500 passengers. You may think your network is “invincible” like the Titanic, however, your network security policies may cause vulnerability putting your IT assets and critical data at risk. Here are several steps you can take to avoid compromising your network security: WiFi Access WiFi technology makes it easy for you to network your computers. Your WiFi signal may broadcast beyond the physical security of your office allowing uninvited visitors to access your network and compromise your network security and compliance policies. Make sure your WiFi network connections are password protected and securely encrypted. Also, consider turning off your WiFi during non business hours. By the way, wireless technology (the telegraph) saved the lives of hundreds of passengers on the Titanic. Thumb Drives and USB Drives Sharing data through thumb drives or USB drives may allow unintended computer viruses and malicious software, also known as malware, transfer from other non secure computers and enter the perimeter of your secure network. For this reason, some network administrators set strict IT policies that prevent thumb drives from being used on any office computer. There are plenty of secure services available for files sharing between computers (e.g. remote backup and remote control software). Ask your IT support professional about your policy for using USB drives and thumb drives and the impact they may have on your network security. Security Patches Operating System and Application Security patches are designed to keep your network secure. Your network security is as vulnerable as its’...
Skip to content