Northern Computer

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 23 August 2011

Northern Computer and Nidana Networks have Merged

Posted on 14:57 by Unknown
and
News Announcement

As Northern Computer continues to grow, we are excited to announce our merger with Nidana Networks. This merger allows us to expand into new markets, while adding adjacent skills. The companies will operate as one under the name of Northern Computer.

The combined knowledge and experience in unified communications (including VOIP telephone systems), Hosted Services (the “Cloud”) and Network Support will provide a new level of expertise in the Okanagan Valley.

“The transition will be smooth and former clients of Nidana will have immediate access to the business and technical resources that Northern Computer offers,” said Jim Condon, owner of Northern Computer. Condon also said that Nidana’s expertise in Voice over IP phone systems will help them expand into this fast growing market.

Northern Computer is celebrating its 30th year in business and provides business computer solutions to the Okanagan Valley and beyond.

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in | No comments

Wednesday, 3 August 2011

OMG, My Computer is doing Something Weird

Posted on 14:40 by Unknown
Finding a good antivirus package can be a daunting task for anybody with a computer.  There are a lot of choices and as many opinions.  Once you have chosen a package there are no guarantees you will be problem free.

Antivirus applications today deal with three basic classifications; Spyware, Malware and Viruses.  Spyware monitors internet usage and reports this to companies for marketing purposes. Malware entices users to click on links to ‘fix’ problems for a cost, or buy services. Actual viruses allow remote access to systems and try and look for and infect other computers. It becomes even more complicated in a corporate environment.  Business owners require that their networks run reliably and fast.  A small network of 5 computers can cost hundreds of dollars an hour in lost productivity when they are not functioning. 
There are some criteria that need to be considered when choosing a package;

Installation                                                                            
Some packages are very easy to install, and some are much more complicated.  Existing problems on the system and removal of the existing package can complicate the task.  Often people will attempt to install a package when they believe they have a problem, or a problem becomes evident during the install.

Operation
Antivirus applications often operate silently in the background.  Users can scan their computers, or this process can be automated to run on regular schedules.  The same is true for updates.  When an infection is found, user intervention may be required.
Performance

Performance can be a key selling point.  Obviously customers want the best protection, but some antivirus applications can seriously affect performance.  It’s important to find the right blend.  In addition, some client applications perform better with certain configurations, particularly when running network applications like accounting and pos software. 

Infection
Inevitably systems will become infected.  Some antivirus applications can become as big a problem after an infection as the original infection.  There are a lot of tools available to fix problems and an experienced technician will be aware of the most effective treatment.  It’s important to balance the labour cost of trying to fix the problem, versus just erasing and reloading the entire computer.  Sometimes, after a long and frustrating attempt, a decision needs to be made to simply erase the computer and start from scratch. Unless you are part of our IT Manager program, all costs are your responsibility.

In our work with various clients, we see a number of different solutions and are constantly discussing what is best for our clients.  Many of the ‘free’ antivirus applications available are not licensed for business use and even fewer have any kind of support for network environments.  It’s important to install a solution that supports networks and also allows for centralized management.  Updates need to be monitored, and notification of infections documented.  Some systems will provide automated notification via email which allows us to respond, often before a customer is even aware of a problem. Northern Computer has been using Symantec Corporate Edition on many installs for some time now but we have a number of customers with other systems that are already in place.  The cost of switching from one product to another needs to be balanced against the cost of support.
If you are not paying for monthly monitoring and support it’s important to be aware of some key points. Updates on all your workstations and servers need to be checked as well as running regular scans.  Log files need to be checked since repeated infections can be a sign of other problems.  Sometimes a particular user is blamed for constantly getting infected, but the reality is that older systems, and systems with faults, will be prone to infections.

- Mark S. Network Support Technician, NPA

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca  or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in antivirus, Software | No comments

Are you Concerned about Security while Remotely Accessing the Office?

Posted on 14:23 by Unknown
Remote Desktop Services (RDS) in Windows Server 2008 R2, formerly known as Terminal Services in Windows Server 2008 and previous versions, is one of the components of Microsoft Windows. RDS allows a user to access applications and data on a remote computer over a network, using the Remote Desktop Protocol (RDP). Remote Desktop Services (RDS)  allows remote computers to run desktops and applications on a server as though it was running locally. The keystrokes and mouse action information is sent from the client to the server over the network and visual display information is sent back to the client from the server. The client can be a full-fledged computer running any operating system (as long as the RDS protocols are supported), a tablet, a thin client, or an internet device powerful enough to support the protocol.

RDS is a cost-effective infrastructure platform for any type of organization, most often selected by business with a roaming workforce, structured task workers, and/or knowledge workers with a need for flexible desktop or application access. Businesses utilizing contractors, offshore workers, and office workers or have a need to work from home, also benefit from RDS.

By using Remote Desktop Services, organizations can squeeze more life out of their desktop computers. As all processing occurs at the server end, desktops are essentially acting as dumb terminals. Therefore, using existing desktop hardware remains a viable option for much longer than it would if applications were run locally. Running applications on a Remote Desktop Server can also equate to additional cost savings as organizations can purchase lower-end/less costly desktop hardware.
Remote Programs make system administration easier because there is only one copy of a program to upgrade or to maintain as opposed to multiple copies installed on individual computers. An application-level patch to every desktop is now a redundancy.

The majority of the workforce today is often mobile, working from home, hotels or customer sites.  With Remote Desktop Services, an organization enables an employee’s productivity virtually anywhere and increases effective user collaboration without compromising security features. Remote Desktop Services offers a secure access to desktops and applications from any device and via a low bandwidth connection, as no data is sent over the network. Instead, employees experience a consistent set of applications and can access their own data regardless of location.

Microsoft itself explicitly states that Windows 2008 Remote Desktop Services are only to be used in “low complexity” environments and that 3rd party add on tools (such as Citrix ) should be used for higher complexity environments. In reality “low complexity” in Microsoft’s terms means that all of your servers are the same, all users have access to all applications and you only want to load balance based on session count rather than on actual performance data. 

Citrix provides additional functionality that a Microsoft 2008 Server simply cannot. Citrix  can publish applications rather than install them locally. You can tunnel an application, control what users access what applications and publish apps to a web interface. There is a load balancer available (that utilizes real performance data), as well as automatic redundancy and it can support association of file extensions. It also allows for a single sign-on, has multiple monitor support and handles URL/Mail redirection. Citrix helps you prevent data from leaving the data center without your explicit permission, supporting regulatory compliance and security objectives.

Built-in endpoint scans and policy controls take into account each user's role, device characteristics and network conditions to determine which applications and data they are authorized to access. These dynamic attributes also define where users may store and print sensitive information. Such strong data and application security measures decrease the potential for inadvertent exposure, and enhance your ability to back up and restore information from one place for greater fault tolerance and disaster recovery.
Citrix also improves productivity for end users with extensive new high-definition HDX technology enhancements and simplified self-service access to apps from any device. The HDX technology enhancements allow customers to deliver real-time media applications like voice and CD-quality audio with a rich, high-definition user experience. New HDX enhancements in Citrix also expand support for a broad range of USB devices, including webcams, microphones, digital cameras and scanners.

In addition to supporting PCs, thin clients and laptops, Citrix now makes it easy for users to access Windows apps from Macs and popular smart phones such as Apple iPhone, Google Android and BlackBerry and Windows Mobile. Citrix is also supporting the new tablet mobile devices as well like iPads, and PlayBooks.

Today’s workforce is experiencing a strong trend in which employees are encouraged to Bring Your Own Device (BYOD).  Some see this trend of “unregulated” devices as more aptly name as “Build your Own Disaster”.  Regardless, the trend is picking up momentum and it is through technology such as Remote Desktop Services and Citrix that the market demand for immediate, synchronized, and protected data can be satisfied. 

- Lauren G, Account Manager
Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in application, remote desktop, software server | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • What the Heck's in Your Computer - Part 1: The Motherboard
    c The motherboard, also known as the main logic board, has been at the heart of every micro computer since its invention. Its function is si...
  • The Impact of Tablets – 5 Ways Businesses Are Using Them
    From just a few short years ago, tablets have gone from being non-existent to becoming a common device that is being adopted by many busines...
  • Power Protection for Your Computer Hardware - Surge Protectors and UPS'
    It's been said that there are two types of computer users: those who have lost data because of a power problem, and those who are going ...
  • Torture Tests of the Lenovo All-in-One PC
    200 test units, 10 torture tests, 20,000 hours of testing-Lenovo ThinkCentre All-In-One desktops are built tough. Northern Computer - Your T...
  • Office Ergonomics - Keyboard Setup & Usage
    The last area in your work station setup (see our articles on mouse and monitor ergonomics) that can cause injury from improper usage is the...
  • Hey Kelowna - Backup – Disaster Recovery – Are you prepared?
    We all know that we should back up our important data, but maybe we don't know what files we should back up on our systems or we don’t k...
  • Northern Computer and Nidana Networks have Merged
    and News Announcement As Northern Computer continues to grow, we are excited to announce our merger with Nidana Networks. This merger allows...
  • Should I Make the Switch to Windows 7?
    Windows 7 has now been out for a couple of years and yet there are still people who are hesitant to upgrade to it. For the most part this is...
  • 5 Reasons to Consider an All-in-One PC
    If you aren’t already feeling overwhelmed by the consumer devices available on the market today, AIO (All-in-One) PCs are striving for a pie...
  • 7 Reasons why it’s Time to give up on Windows XP Once And For All
    Although businesses have been getting rid of Windows XP for at least the last 3 years, the fact remains that as of March 2013, nearly 39% of...

Categories

  • advertising
  • antivirus
  • application
  • Backup
  • battery
  • Cloud
  • computer
  • CPU
  • data
  • digital signage
  • Email
  • Hard Drive
  • hardware
  • Internet
  • IT
  • Laptop
  • marketing
  • monitor computer video hardware
  • Motherboard
  • Networking
  • Office Ergonomics
  • PC
  • Printers
  • purchase
  • RAM
  • Recovery
  • recycle
  • remote desktop
  • security
  • server
  • Service and Repair
  • signal
  • smart phones
  • Software
  • software server
  • tablets
  • tax
  • Tips
  • TV
  • Virus
  • VOIP
  • warranty
  • web
  • Windows
  • wireless

Blog Archive

  • ►  2013 (23)
    • ►  November (1)
    • ►  October (3)
    • ►  June (2)
    • ►  May (2)
    • ►  April (4)
    • ►  March (3)
    • ►  February (3)
    • ►  January (5)
  • ►  2012 (25)
    • ►  November (2)
    • ►  October (3)
    • ►  September (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (5)
    • ►  February (1)
    • ►  January (6)
  • ▼  2011 (56)
    • ►  December (5)
    • ►  November (8)
    • ►  October (3)
    • ►  September (3)
    • ▼  August (3)
      • Northern Computer and Nidana Networks have Merged
      • OMG, My Computer is doing Something Weird
      • Are you Concerned about Security while Remotely Ac...
    • ►  July (7)
    • ►  June (6)
    • ►  May (3)
    • ►  April (8)
    • ►  March (5)
    • ►  February (4)
    • ►  January (1)
  • ►  2010 (29)
    • ►  December (5)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  April (13)
Powered by Blogger.

About Me

Unknown
View my complete profile