Northern Computer

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 12 December 2011

Data Recovery

Posted on 15:19 by Unknown
There is nothing worse than the feeling you get in your gut when your computer screen goes black and shuts down. When you start your computer back up the black screen comes up and with white writing flashes ERROR across the monitor. Suddenly you panic and you realize all of the pictures, the music, videos or important documents you may have on the hard drive may no longer exist. Before you decide to throw your now overpriced boat anchor off the top floor of your business or home there is the last line of defense: Data Recovery.

Data recovery comes in a two forms: physical data recovery and software based data recovery. Hardware data recovery is the physical components and structures of the hard drive (or storage device) that has decided to break down and stop functioning. This could be replacement of circuit boards, head replacement, motor replacement or physically moving the platter into a whole new brick (hard drive case). This cannot be done by most users or even end users. They drives are usually sent away to data recovery companies that have clean rooms and specialize in this category of recovery. If a user attempted to open up the hard drive and replace these parts by his/her self even the slightest speck of dust or impurity could have catastrophic damage to the already weakened drive. Also note that attempting this without the help of said companies can also void the warranty you may have on the hard drive itself.
Sometimes you get lucky and the hard disc itself is still readable but not by normal methods. That data can usually be accessed by putting the drive into another computer with a working OS (slaving the drive into a machine) and transferring the data onto a portable drive. This is the best case scenario. Other methods would be to run data recovery software to repair partition tables or file system damage. These methods can be run by end users (computer techs) as it requires no physical equipment. Note that these may sound simple enough but the software requires constant attention due to errors and the recovery process itself can take days to finish. This depends on how badly the software side is damaged.

It is even possible to recover files after the hard drive has been overwritten. This is difficult as the drive itself has for the most part been “erased.” This doesn’t mean that ALL the data can be recovered when the drive has been erased and then written over. It’s like someone taking the Mona Lisa, painting over it with white primer and then letting a small child finger paint for days all over the “blank” canvas. It may be possible to scrap the paint off and get the image underneath, but the chances of it being visible are slim.
Now you ask, what could cause hard drive issues? No before you say it, the universe did not do this to you. It is not trying to give you the proverbial middle finger and make your day even worse. Hard drives physically break down over time. Like anything hard drives are not perfect. Because of all the moving parts things will eventually break down. The motor may go if you leave the disc spinning all the time or the circuit board may eventually become fried. Another issue may be power surges or failure that can cause both physical and software based damage.

How do you avoid the happiness vampire that is data lose? Simply become more proactive. Backup your important files onto a flash drive or portable hard drive every week. That way if your drive was to fail you can still have access to these files. Another option could be Northern Computers Online Backup Solution. I use this myself to back up photos of family and friends that I don’t want to lose. It’s simple to use. Once the software is installed and you have selected the folders and files you want backed up, they are transmitted to an offsite, secure location.

- Keenan F, Network Support Technician

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in computer, data, Recovery | No comments

Website Security

Posted on 15:12 by Unknown
Browsing the internet can be a very dangerous place. Every day you hear about groups or people who somehow manage to get individuals personal information. It makes you wonder how secure your web browsing can be. It makes you ask questions when you are checking bank accounts or ordering online. “How secure is this?”

What is meant by "secure"?

Anytime you view a website information is sent from your computer to the web server and from the web server to your computer. The transmission of this information is normally sent in "plain text", meaning anyone would be able to read it should they see it. Now consider this: Each piece of information transmitted traverses many computers (servers) to reach its destination.
Windows Users, to see just how many machines your information traverses, follow these steps:

1) On your computer, click Start, then Run
2) Type "cmd" and click "OK" (or press Enter)
3) Type this in exactly: tracert www.northerncomputer.ca
4) Press Enter
Each listing in the window is a different computer/router/switch (a "node" in networking terms). Each "node" represents a point at which any data you send might be recorded!

So what’s so special about this you ask? Consider this the next time you type in a password or your credit card number. If your connection isn’t secure your credit card information and password are being transmitted in plain text. The solution? Simple, a secure browsing session or connection to the host server/computer.
SSL uses a complex system of key exchanges between your browser and the server you are communicating with in order to encrypt the data before transmitting it across the web. A web page with an active SSL session is what we mean when we say a web page is "secure".

So the next time you are browsing a website, check out the prefix of the website. Is your bank site secure? Is the order window displaying your credit card for the world?

How can I tell if a web page is secured?


There are two general indications of a secured web page:
1) Check the web page URL

Normally, when browsing the web, the URLs (web page addresses) begin with the letters "http". However, over a secure connection the address displayed should begin with "https" - note the "s" at the end.
2) Check for the "Lock" icon

There is a de facto standard among web browsers to display a "lock" icon somewhere in the window of the browser (NOT in the web page display area!) For example, Microsoft Internet Explorer displays the lock icon in the lower-right of the browser window:

As another example, Mozilla's FireFox Web Browser displays the lock icon in the lower-left corner:


THE LOCK ICON IS NOT JUST A PICTURE! Click (or double-click) on it to see details of the site's security. This is important to know because some fraudulent web sites are built with a bar at the bottom of the web page to imitate the lock icon of your browser! Therefore it is necessary to test the functionality built into this lock icon. Furthermore, it is very important to KNOW YOUR BROWSER! Check your browser's help file or contact the makers of your browser software if you are unsure how to use this functionality.
- Keenan F, Network Support Technician

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Internet, security, Tips | No comments

Automatic Disk Cleanup

Posted on 15:03 by Unknown
Do you keep running out of space on your hard drive? Does your system seem sluggish lately? Perhaps what you need is to put your computer to work for you when you're not using it. The article here shows you how to setup a routine to automatically "cleanup" your computer so it keeps functioning well......

Click here to download the pdf file.

    - Harry M, Network Support Techinician

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Backup, computer, Hard Drive, hardware, Service and Repair | No comments

Wednesday, 7 December 2011

What is a Small Business Server and Do I Need One?

Posted on 14:29 by Unknown
Every business uses computers and as your business grows, your business adds on new desktops, laptops, POS (Point Of Sale) systems, smart phones, tablets… Soon you have information everywhere that is only accessible on each separate device.
If this sounds familiar, it may be time for a server – a computer that delivers information and software to other computers that are linked by a network. A network of computers connected to a server is more efficient than employees working on individual non networked computers. If you have 5 or more employees, you need to consider investing in a network server. Below are a few of the reasons to invest in a server.

  • Expensive hardware such as printers and scanners can be shared by users on the network.
  • Data is stored centrally, allowing employees to easily find, share and modify data from their workstations/PCs.
  • Security levels and password protection settings can be created in order to access information. Accounts for individuals and groups can be set up with rights assigned to the data stored on the server. For example, the sales staff could be set up so that they do not have access to employee personal records. 
  • Increased reliability. A server differs from a regular PC because it can be equipped with redundant power supplies and multiple hard drives that work in a RAID configuration. To simplify, this means that if one of the server’s hard drives fail, it can operate on the other drives for a period of time until the failed drive is replaced. Also, if an employee’s work station fails, they can move to a new work station and continue working.
  • Multiple operating systems can be loaded onto one server, using virtualization technology, allowing for less power consumption and much faster recovery in the event of a disaster. 
  • Simpler backup.  Since all data is centrally stored on one system, rather than multiple systems, backup is greatly simplified.
  • Resources can be freed up on all of your other computers. Since data and programs are not necessarily stored on each individual computer/work station, local hard drive space is freed up. 
  • Make your work force more mobile. With the use of a remote server, employees that work from home or on the road, can access files on the server.

So what does a server cost? Many variables come into play, when determining what will work best for your network. A review of the systems that you have in place with one of our technology consultants will help to determine what is best for your situation. 

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Backup, data, Networking, server, software server | No comments

Protecting Vital Company Information - Security Audit

Posted on 14:20 by Unknown
In today's world people want easy access to their business information. Some of this information will be considered sensitive therefore it is important to properly secure access to only those that should have access.

A security audit is really the final step in the implementation of your security defenses. Prior to this you undertake a risk analysis. Then you develop a security policy to define what you are going to defend and how you are going to defend it.
Various protective steps will be put into place to prevent unauthorized access. Perhaps access requires establishing a VPN connection beforehand. Almost certainly access will require a username & password and various policies will need to be in place as well. For instance, a requirement that passwords meet certain complexity rules or that all information on laptops be encrypted with password protection. A good security audit should find any gaps in your existing defenses.

Many people opt to have external security consultants perform the audit. If you are a small company you might not be able to afford security consultants and you also might not have the in-house expertise to do a sophisticated audit on your own. This however does not mean that you can or should do nothing. The exercise of understanding what you are securing and how you are trying to secure it is worthwhile on its own.

If in preparing for an audit you realize that vital company information is held on laptop computers then this will lead to questions like what happens if the laptop is lost or stolen? How easy can someone access the information on this laptop? We all know or should know that 100% security is impossible. There will always be risks. However often low cost simple security steps will significantly improve your security.

So how would you go about a simple security audit?
Security List

Begin by creating a list of items that potentially need securing. This list should include things like servers, desktop computers, laptops, routers, other networking equipment, printers, data (sales, customer & employee information), smart phones, PDAs, VoIP phones, VoIP or regular phone call recordings and records, email and so forth.
Threat List

Using your security list determine what is sensitive as well as how an unauthorized individual might access the sensitive data. This will constitute your threat list. Look at things like do all computers have passwords? Who knows the passwords? How strong are the passwords? Do passwords need to be changed periodically? Are laptops taken offsite? How easily could computers be removed from the physical premises? Do you have a list of the equipment? Are you creating backups of sensitive data? How are things being backed up, where are the backups kept, and who conducts the backups? How is access being controlled? Can information be accessed from outside the company premises?
Prioritize Threat List

After determining what threats exist you should prioritize the list. Look at the probability of unauthorized access coupled with the potential harm.
Security Threat Response Plan

Starting at the top of this list think about how you might reduce the risk of each item. This will become your security threat response plan. Remember lots of low cost simple steps exist that will improve your security. Stronger passwords, improved physical security (lock the server in a wiring closet), ensuring all computers are patched with security updates regularly, limiting web access, ensuring antivirus products are being used and are updated properly, implementing encryption of data with password protection, etc. If you do not have a backup of sensitive data you will need to devise a backup policy and plan as well. This should include some form of offsite storage for obvious reasons. Now that you have your security response plan you need to implement it.
Implement Security Threat Response Plan

After implementation you will periodically do a security audit, which essentially, is running through the whole process again. Each time you go through the process you will likely unearth new risks as well as cost effective ways of reducing risks.


Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Backup, data, security | No comments

Monday, 21 November 2011

The Ports on Your Computer

Posted on 15:29 by Unknown

What is all that stuff?

This is roughly what the back of your computer looks like. If you have a laptop you may have some of these items placed about the machine. A daunting task for anyone purchasing a new computer is seeing this and connecting the right cabling to the right port. Here is the good news; if it fits, you are probably OK. That doesn't mean forcing anything to fit either (almost all technicians can attest to seeing this at some point in time). 

Knowing that if it fits is also aided by the fact that most cables and connectors are coloured the same as the corresponding port on the computer. 

What do they do?

Starting left to right:

PS/2: These are your keyboard and mouse ports of old. Generally speaking, keyboards and mice use the USB interface.

VGA, DVI and HDMI: These are the video ports, whereby video is transmitted from the computer to your monitor, TV or projector.

Optical drive: This is the lesser used audio port, mostly used for high quality output of audio to home theatre or production level mixing boards.

USB: Where almost all accessories go into. Printers, flash drives, external hard drives, digital cameras etc.

IEEE 1394 (Firewire)/ eSATA: These are faster versions of USB that are lesser used. eSATA devices are gaining in popularity, expect to see more devices using this port in the future.

Of course if this all becomes too much and you have cables going places they likely don't belong, there are convertors available and you can also give us a call.


Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca  or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in computer, hardware, Tips | No comments

Password Protection for User Accounts

Posted on 15:16 by Unknown
If your computer is used in a multi-user environment, such as a workplace, home, or shared dorm-room, you may want to consider password protecting your user account. For most users, privacy is essential - which is why assigning a password to your computer's user-account is an excellent option for everyone. Windows 7 makes account password protection an easy process. To create a password for your account in Windows 7:

  1. Open User Accounts by clicking the Start button, clicking Control Panel, clicking User Accounts and Family Safety, and then clicking User Accounts.
  2. Click Create a password for your account. Note: If your user account already has a password, you can change your password by clicking Change your password.
  3. Type the password in the New password box, and then type the password again in the Confirm new password box.
  4. If you would like to use a password hint, type the hint in the Password hint box.
  5. Click Create password.
- Clay P, Network Support Technician

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in security | No comments

Monday, 7 November 2011

What you Need to Know about Computer Warranty

Posted on 14:19 by Unknown
When purchasing a computer it is important to consider your warranty options, and there are a few. Do you want onsite or depot warranty? How long do you want your warranty to last? What do you need it to cover?
hat’s covered under warranty: Warranty covers hardware defects. It does not cover software issues, viruses or breakage. Let’s say your computer won't boot because your hard drive has failed. Warranty will cover the physical replacement of the hard drive and the labour to replace it, but it does not cover reloading the operating system (Windows), transferring data, installing an antivirus program or any other software you have installed.

Some manufactures have local depots that do warranty repair for you, but others don’t. So it’s important to find out who can do warranty work for your brand of computer and where they are located. Here at Northern Computer we are warranty authorized for the following computer brands: Integra, Lenovo, Toshiba, business line HP computers as well as other server and printer brands. If you have a laptop that you travel with it’s important to make sure your warranty is international. But on top of that find out how many international depots there are. For instance if you buy a Toshiba laptop, you will have an international warranty, but in Canada there is only one international Toshiba depot and they are located in Ontario.  You would have to ship your laptop to them.  An onsite warranty option means that a technician will come to your site of business or home location (within a 100km radius of a Lenovo service center) and repair the problem there.

When you are buying a new computer it will come with either a one or three year base warranty. From there you can choose to extend to four or five years. You can also decide to add a warranty upgrade that covers breakage. Different manufactures call it different things such as Systemguard or Protection Plus. This covers breakage, spillage and basically anything that goes wrong with your hardware, even if it’s caused by you! At Northern Computer we are the warranty depot for Lenovo’s Protection Plus coverage.

If you live in a remote area, and there are no repair depots near you that can do warranty work, there is yet another option for you that some manufacturers offer. Lenovo calls it Easyserve. This allows you to call the manufacture yourself and explain your problem to them. From there Lenovo will arrange for a courier to pick up the computer and deliver it to a Lenovo repair depot. Following its repair, Lenovo will arrange delivery of the computer back to the same location. Shipping is included with the Easyserve warranty!

Since there are so many options to consider, be sure to have one of our Northern Computer Sales reps help you customize the best warranty that fits your needs and budget.

- Francine F, Warranty Coordianator

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Service and Repair, warranty | No comments

Home Security and the Internet

Posted on 14:15 by Unknown
Some people live with the illusion that they have protected their home networks from internet attacks by purchasing a firewall.  Manufacturers even promote this by identifying their products as firewalls. Sadly, most users are not protected by a firewall, but by the simple router. 

What’s the difference between a router and a firewall?  Without complicating it too much, a router acts as a junction point between the computer (or computers) in your home and the internet.  It has the ability to route your computers requests to the internet and route the responses back to your computer.  A firewall has this ability as well, but also offers another level of security by actually inspecting all the information and making some decisions about if it should allow it or not.    Since most routers are relatively simple devices, they act as a firewall because they are not capable of complex tasks, like routing internet requests back to your computer without some assistance. 
A very common attack on the internet is called a DOS (Denial of service) attack.  A hacker floods a website with requests for information that don’t exist and the website becomes overrun with requests, and service degrades.  Hackers have been known to exploit this attack to gain access to a site. How is it done? Usually a hacker will gain control of unsuspecting computers around the world, and use them to launch these attacks.  Your home computer could be infected and used as a pawn.  A router would simply pass your computer’s requests on but a sophisticated firewall could identify the traffic as suspicious and notify you.

So, how concerned should you be? It really comes down to your personal comfort level.  A basic router provides adequate protection.  Make sure if you have wireless access on your router, that you encrypt this as well.  Keep your computer’s antivirus updated and run a regular scan.  When you do have problems, deal with it promptly.  The old saying “locked doors keep honest people out” is pretty a good analogy.  You leave in the morning and lock your front door, as you head to work.  If someone wants access to your house, it’s fairly easy for a professional to gain access.  The same is true with the internet, if someone wants access, they will get it.  With millions of computers on the internet, and thousands of unprotected machines available, your chances of attracting attention are pretty slim.
- Mark S, Network Support Technician
Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca  or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in data, Email, Internet, Networking, security | No comments

Speed up Your Computer's Startup Time

Posted on 14:09 by Unknown
One of the most irritating issues when using a computer is a slow start up time. For most it is as quick as hitting the login button, but for others, it’s a dreadful time. If you ever Google “how to speed up my computers start time” you will come across thousands of articles, all with different suggestions and ideas on what to do. Though I don’t agree with all of them, I went through and compiled a list of my top 7 suggestions that I find to be the most helpful.
7)      Disable Start-up Programs:
The first thing I do when I hop onto a user’s computer for the first time is check out what programs they have loading on startup. To check this out in Windows XP go into your start menu, click run and type in MSCONFIG. If you are running Windows Vista or Windows 7 open up your start menu and in the search box type MSCONFIG and enter. Now click on the STARTUP tab. This will tell you what each application is so that you can decide which you would like to turn off.
6)      Uninstall Unused Applications:
Your system is greatly affected by the amount of hard drive space available to it when it starts up. If you notice your computer’s hard drive is getting full or is in the red, it is time to clear out some of those programs. Go into the Start Menu, and press Control Panel; for Windows XP -  Add and Remove Programs, and for Windows Vista/7 - Programs and Features. Right click any applications you don’t use and click Uninstall. 
5)      Remove Unused Fonts:
This one I had never heard of before, but after looking at countless articles and blogs suggesting their removal I am a believer. When windows starts it loads EVERY font you have installed. Go to the Control Panel and find Fonts. For Windows XP if you find fonts you do not use delete them. With Windows 7 you can now hide fonts from start up. While holding down the CTRL key you can click on each font you don’t use. When done just click hide on the top of the window. Note that disabling a few fonts won’t make a difference but with Microsoft Office installed Windows will have over 300 fonts installed. Fonts to keep? Arial, Helvetica, Tahoma and any other fonts you like the previews of. 
4)      Installing New RAM:
As the saying goes after you buy a new PC it is out of date. But for most users, their computers can be between 3 – 5 years old and may have not been upgraded to meet the new requirements of applications and operating systems. RAM is a cheap and effective way to not only speed up the start up of your computer but the overall experience as well. 
3)      Scan For Viruses:
Many people are unaware that their computer has been infected with a virus. They take up computer resources to run and propagate. Running antivirus software and scanning software found online can remove the infection and bring your computer back up to speed.
Alright so you have tried all of these, but your computer is still running slow. There are two more suggestions to help make your computer run faster. 
2)      Reinstall the Operating System:
Yes it is what we like to call a wipe and reload. Erase the hard drive and start from scratch. Before you do this make sure you have backed up all your data to an external hard drive for safe keeping. This allows a baseline installation with no overheard to start over and only install the programs that you need. 
If this is not doing do the trick then there is only one more thing you can possible do...
1)      Buy a New Computer:
This day and age computers are mass produced and cheap. Often, for the price of a technician’s time to look and fix these issues, you can have yourself a nice new computer tower or laptop. If you purchase a system from Northern Computer, we can transfer over your data with your purchase. It may take some getting used to, but once you, do you will love it!
-Keenan F, Network Support Technician

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in computer, Service and Repair | No comments

Thursday, 3 November 2011

Healthy Networks are Happy Networks, Part II

Posted on 11:40 by Unknown
In the first article we explored what comprises a network, and how maintenance is important.  In this article, I want to expand on what is involved in the maintenance of a network.

Network health needs to be maintained.  An unhealthy network will eventually begin to experience problems and performance will be affected, to the point where significant down time will be experienced. 
Physical structures:

These are the visible parts of the network - workstations, switches, servers, printers and any other devices that make up the network.  Ensure workstations are replaced at the end of life.  A single slow computer can pull down the performance of the entire network.  Switches are notoriously reliable and can last for years and years, but a faulty or poor performing switch can be difficult to diagnose.
Backup systems:

Backups are like insurance.  Nobody seems to care about them until they are needed.  Check your backups regularly.  You should regularly verify a backup by restoring a file, and also monitor the size of the backup and how long it takes to complete. 
I once discovered that a client had not been getting a backup for over a year because of changes that were made in the system.  The problem was not detected because the backup was completing successfully. When the client reviewed the logs, he had failed to notice that the size of the backup had dropped to almost zero.  Backups are a great way of monitoring network health.
Updates:

This is a more difficult aspect of a network to maintain.  All computers, INCLUDING the server need to have windows updates applied regularly and event logs checked for errors.  Many updates are security fixes for weaknesses and potential faults that hackers will explore and exploit.  Failing to keep up with these updates can have serious consequences.  New viruses often take advantage of these faults and can consume the entire network, resulting in days of downtime while the problems are resolved. However, there can be a downside with installing updates. Sometimes the updates result in changes to the system, and various services need to be adjusted.  Windows updates, or even software updates, can fail to install correctly and cause problems.
Monitoring:

It is very common to overlook checking the event logs on a workstation or server.  Often everything seems to be working correctly and it can be several days, weeks or even months before an underlying problem causes the network to degrade. A common problem that I have seen is when a hard drive, which is used to store information, begins to fill up.  One of the first problems that occurs is the inability to print.  You restart the computer, and printing is restored for a period of time, only to fail again.  The event logs are full of errors, but they aren’t always visible to the user.

Northern Computer offers two programs to assist with maintaining network health.  IT Manager assigns a dedicated technician and sales associate  to your site that are responsible for looking after some or all of the above tasks.  We assume some of the responsibility for maintaining network health and the cost becomes a fixed monthly price.
We are also offering a new service where we will monitor and advise you of potential problems, allowing you to control what work is performed.  Talk to us about these programs and how we can assist to ensure your business has a reliable network. 
 
- Mark S, Network Support Technician

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca  or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in | No comments

2 x The Monitors = 2 x The Work Efficiency?

Posted on 11:30 by Unknown
Many people spend a good part of their day at their computers and most will have multiple windows open, moving from one screen to the next. I find that I will sometimes have so many windows open that I spend too much time looking for the window that I need. Adding an extra monitor can help to increase productivity when you are multi-tasking. I often compare documents or cut and paste from one document into another and I find it very productive to have two the windows open side by side.

Setting up a second monitor is easy too. If you do not have Windows 7, Vista or XP installed, you may have to install a display driver from your computer’s manufacturer.
Can you really increase productivity with multiple monitors?

1.      Do you ever spread out different items over your desk in order to organize?
2.      Do you often have to flip between an email and a related document?
3.      Do you find yourself having to copy or cut and paste from one document to another?
4.      Do you ever have to review two versions of the same document at the same time?
5.      Do you spend a lot of time switching between programs?
6.      Do you edit photos in a folder and refer back to the originating folder for more pictures?
7.      Do you use information from the web or documents when composing an email?
8.      Do you waste time trying to sort through different widows to find the application or document that you need?
If you answered yes to any of the above, an additional monitor will most likely help you to be more effective at multi-tasking.
Benefits of Multiple Monitors
1.      Eliminate the need to print pages of wasted paper that is thrown away after reviewing it.
2.      Increase efficiency, productivity and save time. Stop wasting time sorting through open applications and documents.
3.      Easy comparison of documents.
4.      Share data easily between applications.
5.      Use multiple programs simultaneously.
6.      Keep your email, POS system or other commonly used program open on one screen at all times and use the other screen for the project you are working on.
Dual Monitor Setup
In order for your computer to support a dual monitor, you must have more than one monitor connection on the back of the computer. The connections will need to match the monitor cables. These may be DVI connectors, VGA connectors, HDMI connectors, or S-Video connectors (for using your TV as a monitor). See the chart below for a description of the different ports. A laptop, if manufactured in the last several years, at a minimum should have a VGA port for setting up another screen.
1.      All that needs to be done at this point is to plug in the monitor cable to the corresponding port on your computer and make sure that the monitor is turned on. Your computer should automatically detect the second monitor. If not you may have to restart your computer first.
2.      Lastly, you may have to configure your displays if you are connecting a laptop or your desktop does not automatically detect the second monitor. For a desktop,  your settings should be set to automatically extend your display, but just in case, follow these instructions for Windows 7 (Vista and XP may vary a bit).
·        On your desktop, right click and select screen resolution or click on the start icon and click on the control panel, then select appearance and personalization. Click on adjust screen resolution.
·        Select extend these displays from the multiple displays drop down menu. This will allow you to spread your desktop over two screens. Other options include only using one of the monitors or duplicating the monitors.
To move windows between displays, click on the title bar of the window and drag the window to a new location.
Monitor prices are much more affordable than in the past (19” LCD for $150.00) and LED monitors are energy efficient. So how do you get your company to implement dual monitors? Start with the boss. Have him/her connect a second monitor and then after a month, ask how he/she would feel about having that second monitor taken away. After discovering how much more efficient they have been, they may panic and tell you that they could never go back to one monitor.
We have both LED and LCD monitors and a variety of mounting options. If you would like help on deciding on a size, mount or setup of an additional monitor, give us a call or send an email and we’d be happy to help out.
- Janet F, Marketing Coordinator

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896 Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in monitor computer video hardware | No comments

What is the Cloud?

Posted on 11:20 by Unknown
“Cloud Computing”.  You may have heard or seen this new catch word that many organizations have adopted in to there line up of services. What is “Cloud Computing”? This can be a hard question to answer as many people have their own definition on this type of computing.

The items that Cloud Computing Services provide that intrigue most organizations are the following: saving your company money, access to the latest technical advancements in software, and anywhere access via the internet to your hosted cloud services, that operate on a very reliable/redundant hardware platform.
The infrastructure that allows us to provide Cloud computing is still built on server hardware similar to what you may have in your office. The main differences are the hardware is more reliable, components are redundant, and for the most part, the software is the most feature rich release from the vendors. Small and Medium size business now have Enterprise software available to them that is normally out of reach, as normal IT budgets would not be large enough.

Now the best part of all this technology is you don’t have to purchase any of it. All of the services in the “Cloud” are provided for a monthly fee. These services can scale up and down as your business grows or shrinks. You can think of it as an elastic environment.
Instead of the hardware being in your office, it is now located in a secure building called a data center. Security is of the highest importance in data centers. Data centers should only allow access to individuals that pass criminal record checks and technicians that are highly qualified. All access in and out of the data center should be recorded and monitored via video cameras. You will find that many of these data centers are located in concrete bunkers protected from fire and theft. Multiple levels of access are required to gain entry to the equipment.

If you have a server or application that you need to run that operates your business, in many cases we can host this server in a “Cloud” Environment. There are some applications that require more work than others but for the most part if the application runs on Windows it can also run on Windows in the “Cloud”.
Hosted servers can run Microsoft and Linux operating systems and access to these servers can be provided via multiple secure methods. If the workload increases on the server and it starts to run slow, we can scale up the hardware resources providing a better performing system suited to the workload demand. Your data backups will also be looked after for you with out the need to take home tapes or hard drives.

Storage can also be provided via Cloud hosted servers. There are some applications that require a back end SQL server or database of some kind. These databases can be setup on a server in the data center and secure access can be provided to the resources. We have multiple ways of providing access to these types of data. You can host almost any type of data that resides on a windows environment, from Microsoft Office Documents, to Simply Accounting or Quickbooks Databases.  Dedicated or Secure Shared storage can be provided based on the customer’s requirements.
Cloud hosted servers and applications can be bundled with system maintenance packages. There are some services where all maintenance is looked after for you. Instead of having an Exchange Email server in your office that you have the expense of maintaining, this can all be looked after for you via Hosted Exchange in the Cloud. The maintenance to run any server in your office can be costly over the long run. The ability to have a set cost on your IT/Cloud Services is a very attractive concept for most organizations.

The operational costs vs investment costs should be reviewed when looking at purchasing new equipment. When you acquire expensive hardware to run your services it is considered as a capital expenditure and can be a large one at times.  Also, the acquisition depreciates over the years. The Cloud computing model allows you to spread your expenses over several operational cycles, becoming part of operational costs. Your accountant will most likely tell you this is a much better alternative.
To summarise, cloud computing is growing at a phenomenal rate, both in the range of services offered by cloud vendors and also in the way companies are using these services to improve their own business.

Please contact us at Northern Computer and we can provide a consult to see if Cloud Computing fits your business needs.
- Martin O, Network Support Technician

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in | No comments

Tuesday, 11 October 2011

LED vs. LCD

Posted on 10:52 by Unknown
For many years, we have been supplying our clients with flat screen monitors with the LCD (Liquid Crystal Display) technology. But what about this new technology called LED (Light Emitting Diode)?

LED monitors are a form of LCD monitors that use the same technology but with a different kind of backlight to produce the displayed image. There are many factors to consider when comparing the two. And of course, there are always those who prefer one or another, but we will stick to the facts.

We will start with the black levels and the contrast as one of the more important factors for producing high quality images and then compare color, weight, power consumption, size and cost. I believe that looking at all of these factors should be enough to create the whole picture in the LED vs. LCD monitor comparison.

One of the biggest problems with displaying the proper black color on LCD monitors is that backlight is always turned on during usage which usually results in a low contrast and a pretty poor display of the dark areas and black colors on the display screen. In order to display black color properly, LCD panel needs to block backlight and make it totally black which in most cases is not possible.

In terms of producing good quality colors, both LED monitors and standard LCD monitors are pretty much the same. Color reproduction of LCD displays depends directly on the quality of the particular panel, while LED displays do not have any specific advantage over them. However, if you are using tri color LED monitors, they have the ability to change backlighting colors when needed according to the scene. Only those displays are capable of producing more accurate colors.

Power consumption on LED displays can be as much as 30-40% less than that of LCD’s and thus they are more green- friendly for the environment.

Size is the biggest thing that you will notice. LED monitors are much thinner than LCD units. LEDs also weigh less if you wishing to mount them on a wall or hang from a ceiling in an office waiting room or other areas.

Pricing at the moment is less expensive for the LCD units, but that is not due to the cost of the technology, but the fact that LCD’s are being mass produced compared with LEDs.

Northern Computer recommends LED units when your budget permits, as over time with less energy, your return on investment will be faster.

- Ken H, Account Manager

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca/
Read More
Posted in | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • What the Heck's in Your Computer - Part 1: The Motherboard
    c The motherboard, also known as the main logic board, has been at the heart of every micro computer since its invention. Its function is si...
  • The Impact of Tablets – 5 Ways Businesses Are Using Them
    From just a few short years ago, tablets have gone from being non-existent to becoming a common device that is being adopted by many busines...
  • Power Protection for Your Computer Hardware - Surge Protectors and UPS'
    It's been said that there are two types of computer users: those who have lost data because of a power problem, and those who are going ...
  • Torture Tests of the Lenovo All-in-One PC
    200 test units, 10 torture tests, 20,000 hours of testing-Lenovo ThinkCentre All-In-One desktops are built tough. Northern Computer - Your T...
  • Office Ergonomics - Keyboard Setup & Usage
    The last area in your work station setup (see our articles on mouse and monitor ergonomics) that can cause injury from improper usage is the...
  • Hey Kelowna - Backup – Disaster Recovery – Are you prepared?
    We all know that we should back up our important data, but maybe we don't know what files we should back up on our systems or we don’t k...
  • Northern Computer and Nidana Networks have Merged
    and News Announcement As Northern Computer continues to grow, we are excited to announce our merger with Nidana Networks. This merger allows...
  • Should I Make the Switch to Windows 7?
    Windows 7 has now been out for a couple of years and yet there are still people who are hesitant to upgrade to it. For the most part this is...
  • 5 Reasons to Consider an All-in-One PC
    If you aren’t already feeling overwhelmed by the consumer devices available on the market today, AIO (All-in-One) PCs are striving for a pie...
  • 7 Reasons why it’s Time to give up on Windows XP Once And For All
    Although businesses have been getting rid of Windows XP for at least the last 3 years, the fact remains that as of March 2013, nearly 39% of...

Categories

  • advertising
  • antivirus
  • application
  • Backup
  • battery
  • Cloud
  • computer
  • CPU
  • data
  • digital signage
  • Email
  • Hard Drive
  • hardware
  • Internet
  • IT
  • Laptop
  • marketing
  • monitor computer video hardware
  • Motherboard
  • Networking
  • Office Ergonomics
  • PC
  • Printers
  • purchase
  • RAM
  • Recovery
  • recycle
  • remote desktop
  • security
  • server
  • Service and Repair
  • signal
  • smart phones
  • Software
  • software server
  • tablets
  • tax
  • Tips
  • TV
  • Virus
  • VOIP
  • warranty
  • web
  • Windows
  • wireless

Blog Archive

  • ►  2013 (23)
    • ►  November (1)
    • ►  October (3)
    • ►  June (2)
    • ►  May (2)
    • ►  April (4)
    • ►  March (3)
    • ►  February (3)
    • ►  January (5)
  • ►  2012 (25)
    • ►  November (2)
    • ►  October (3)
    • ►  September (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (5)
    • ►  February (1)
    • ►  January (6)
  • ▼  2011 (56)
    • ▼  December (5)
      • Data Recovery
      • Website Security
      • Automatic Disk Cleanup
      • What is a Small Business Server and Do I Need One?
      • Protecting Vital Company Information - Security Audit
    • ►  November (8)
      • The Ports on Your Computer
      • Password Protection for User Accounts
      • What you Need to Know about Computer Warranty
      • Home Security and the Internet
      • Speed up Your Computer's Startup Time
      • Healthy Networks are Happy Networks, Part II
      • 2 x The Monitors = 2 x The Work Efficiency?
      • What is the Cloud?
    • ►  October (3)
      • LED vs. LCD
    • ►  September (3)
    • ►  August (3)
    • ►  July (7)
    • ►  June (6)
    • ►  May (3)
    • ►  April (8)
    • ►  March (5)
    • ►  February (4)
    • ►  January (1)
  • ►  2010 (29)
    • ►  December (5)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  April (13)
Powered by Blogger.

About Me

Unknown
View my complete profile