• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Tech Solutions NC

Your one stop for home and small business computer and network support

  • About Us
    • Knowledgebase
  • Contact Us
  • Appointments
  • Testimonials
  • Subscribe

Featured

Computer Components: What’s important to have?

January 16, 2017 by Mike Ellis 1 Comment

computer components

When you start talking about computer components, just about everyone has an idea of what that means.  As computers age, and new purchases are considered, the thought inevitably turns towards what sort of system you should have.  In this post, I’ll help you weed through the clutter, the keywords, and the confusion. Together, we’ll help you determine the best computer components to look at for your next computer.

Question #1: Desktop or Laptop?

The first question you need to ask yourself is whether you looking to purchase a new desktop or laptop.  For the purposes of this article, in my opinion a system that is an “all-in-one” with everything contained in the monitor is a desktop unit.

There really isn’t a lot to consider in determining whether to go with a desktop or a laptop.  The obvious answer is whether or not you want to take the system with you on the road.  If you do, then you will want a laptop.  If you don’t, then perhaps look at a desktop.  Keep in mind that the computer components in a laptop verses in a desktop are more tightly configured. As a result, it can be more difficult to increase those things. Additionally, space constraints at your house could also lead you towards the purchase of a laptop.  One other thing to consider in the case of a laptop is the size and weight of the laptop.  For example, if you get a laptop with a big 17″ screen, then that may have some hefty weight to carry around as well. The end result of that is that your big laptop may function more as a desktop.

Question #2: CPU Considerations

For the purposes of this post, I’m going to focus on the latest Intel based processors.  Currently, the ones you can find in most systems are the Intel i3, i5, i6, and i7 processors, each with it’s own various speeds of operation.  What really matters, though, is what you intend to use the computer for.  Are you getting this computer to be a gaming computer, or are you intending it to be strictly for typing letters and creating spreadsheets?  The answers you supply to these questions will guide your decision on how much processor you need.  Also, as you probably know, the newer the processor, the more expensive it will be.  For most people, something in the i5 range will be all you will need.

Question #3: How much RAM?

The more RAM (also known as memory) you have, the better off you will be.  The good thing about RAM (Random-Access Memory) is that it is incredibly inexepensive, and is one component that you can easily add more later — although keep in mind that each motherboard has limitations on how much RAM you can add to it.  For most systems, though, the minimum you will want to have is 8GB of RAM. RAM is important is because the more RAM you have, the more programs can be loaded into that space. That increases the speed of the computer because RAM is faster to read from than traditional hard drives.

Question #4: Traditional Hard Drive or SSD?

Recently, the growing trend has been towards replacing your traditional hard drive with a SSD drive. The biggest differences are that traditional hard drives use disk platters and heads to write the data magnetically, and the platters spin at various RPMs (usually 5400 or 7200 RPM).  With a traditional hard drive, you get more storage capacity, but you really are looking at a piece of equipment that will fail over time because of heat buildup.  With SSD technology, the platters and disk heads are replaced with memory chips, so you have the immediate speed increase from that.  For many people, adding RAM and replacing their existing traditional hard drive with an SSD drive will make it feel like their system is brand new.  SSD prices have been coming down, but generally speaking, you will be looking at a smaller capacity drive when compared to a traditional hard drive.  However, if you can, go with the SSD.  You won’t be disappointed.

Final Tally: The Computer Components to strive for

So, with all of that said and done, here are the computer components you should look for in your next system:

  1. For portability and space considerations, go with a laptop.  For ease of access, though, go with a desktop.
  2. Regarding the CPU, stick with i5 or greater.  Don’t go with an i3 processor because those types of systems have been around a while.
  3. For RAM, start with at least 8GB, but try and determine what your system can accommodate.  Most product sheets will tell you the maximum amount of RAM you can have in your system.
  4. For storage, go with a larger size SSD, perhaps a 500GB SSD or greater.  The greater the space for the SSD though the more it will cost, so keep that in mind.  It also depends on how much you data you have to store as well.  If you have to go with a traditional hard drive, start at 1TB and try to get one that is at least 7200 RPM.

Of course, I’m here to help as well.  If you need me to help price out a system for you, just reach out to me.  I’m at 919-606-6725, or you can email me at mike@techsolutionsnc.com.  Also, sign up for our newsletter and you will receive a special coupon to use on your next service.  Just fill in the information below!

[wysija_form id=”1″]

Filed Under: Featured, Tech Solutions Tagged With: Advanced Micro Devices, Central processing unit, Chromebook, Consumer Electronics Show, Gaming computer, GeForce, Intel Core, Intel Corporation, Laptop, MultiMediaCard, Random-access memory

Sign up for our Remind notifications!

October 26, 2016 by Mike Ellis Leave a Comment

Remind

In the world of computer support, the more information you have, the better your chances of being able to put your computing device to the best possible use.  As a result, at Tech Solutions NC, we make sure that we do as much as we can to teach you about your computers.  For us, training our clients on how to get the most out of their systems is as much of a priority as making sure that their systems work the way they should.

To that end, today we are pleased to announce that you can sign up for notifications from us using the Remind app.  For parents of school-aged children, you’ll know Remind as one of the tools that your child’s teacher uses to help you stay informed on things that are going on in the classroom that everyone needs to know about.  Remind is uniquely positioned as a great way for people to receive little tidbits of information quickly, easily, and in such a fashion that they can act on that immediately or hold off on it for a little while.

If you are interested in signing up to receive Remind notifications from Tech Solutions NC, here are the steps to follow.

Sign up via Text Message

remind-app-text-instructions

Sign up for email messages

Remind

In addition to those means of signing up for Remind messages, you can also sign up using the link below:

https://www.remind.com/join/techsolu

This is a new communications mechanism for us, so we haven’t sent many messages yet.  A sample of one we did send is this:

There was a huge data breach of Yahoo! accounts affecting 500 million users. Click to read this post about it: https://techsolutionsnc.com/breaking-news-yahoo-data-breach/

Give it a try — you may find that this becomes a great source of information to you!

Thanks for stopping by, let us know how we can best serve you in the comments below.

Filed Under: Featured, Tech Solutions Tagged With: Areal density (computer storage), Austin, Booting, Business model, Business operations, Business travel, Code division multiple access, Computer, Consumer, Data breach, Facebook, Internet, IPhone, Texas, Text messaging, User (computing), Yahoo!

Are you getting the Computer Support you deserve?

October 25, 2016 by Mike Ellis Leave a Comment

img_1128

When it comes to computer support, are you getting the level of service and support that you expect?  Far too often, a company offers up great support, great service, and you, the consumer, is left to wonder whether or not that claim is, in fact, a true one.  There are so many computer support companies out there, how do you know which one to go with?  With that in mind, here is my list of the top five qualities to look for in your support company.

Top five qualities to look for in your support company

  1. Does your support company have the experience to tackle all of your problems quickly and efficiently? At Tech Solutions NC, LLC, we have 22 years of experience in the IT arena, and we can help you with virtually any support issue that crops up.
  2. What do you know about your support company? Do they have the integrity you should demand of someone that is working on your computer systems?  Can you trust them to take care of the problem and not invade your privacy while doing so? I am a Christian, a husband, and a father.  When I am called to work on your computer, I will do so knowing that my word is my bond, and you will know that I can be trusted with your computer information.
  3. Does your support company work on your schedule or theirs?  At Tech Solutions NC, we know that not all of our clients can be expected to be at their house during normal business hours.  As a result, we are flexible in our support offerings.  We can come to your home at a time that works for you, we can connect to your computer remotely, or you can bring your device to our location for service.
  4. Does your support company provide a good value for what you pay them?  We take pride in the value that we offer to our customers.  We have a 30 day satisfaction guarantee policy on any service we perform.  If your system acts up within that 30 day window, and we are unable to correct the issue, then you will receive a complete refund of what you paid. At Tech Solutions NC, your satisfaction is everything to us, and you’ll know that by the time we are finished working on your system.
  5. Does your support company try to up-sell you with things you don’t need? At Tech Solutions NC, we know that everyone’s hard earned money is important to them.  We don’t recommend things you don’t need, and we make sure that you understand what we are doing and why so that you can learn some things about your system in the process.

So there you have it, folks, my list of the top five things you should look for from your computer support company.  Does your list compare with mine? Please let me know in the comments, and let me know how I can help you with your home or small business computing needs!

 

Filed Under: Featured, Tech Solutions Tagged With: Active duty, ActiveX, Adult contemporary music, Amazoncom, Appellate court, Bert and Ernie, Christian Institute, Information technology, Limited liability company, Northern Ireland

Holiday Gift Cards

October 24, 2016 by Mike Ellis Leave a Comment

Holiday Gift Cards

With the holidays fast approaching, what better way to show your special loved one just how much you care for them than with one of our Tech Solutions NC holiday gift cards? Available in any of these four patterns, you can load them up with 1 hour of service, 2 hours of service, or you can choose any amount you like!

By doing so, you are showing that you care for them, and that you want them to get the best possible service when they have a computing need.  Your gift card can be used as payment for any of these technology needs:

  • Computer diagnostics
  • Data backups
  • iPhone repairs
  • Application training
  • Network setup/diagnostics
  • and more!

As always, drop in service receives a 15% discount, but we also can travel to your home or business if that is more convenient for you.  Service typically starts at $75 per hour, but some services, such as email or printer configuration issues, cost less, typically $40 for a half hour block of time.

So stock up today on all the gift cards you’ll need to give as presents this holiday season.  Your family will appreciate it, and you’ll have peace of mind knowing that a) they aren’t calling on you for help all of the time, and b) they are getting top notch service at a reasonable price.  Remember, our core values are integrity, experience, flexibility, and value.

To purchase your gift card, start by giving us a call at 919-606-6725, shooting me an email at mike@techsolutionsnc.com, or stop by our location at 4900-B Craftsman Dr., Raleigh, NC!

Tech Solutions NC, LLC — your one stop location for all your computing needs!

Filed Under: Featured, Financial, Tech Solutions Tagged With: Amazoncom, Apple Inc., Apple Store, Australia, Best Buy, Build-A-Bear Workshop, Cabela's, Canada, Gift card, ITunes

How email hacks teach us what email is used for.

July 26, 2016 by Mike Ellis Leave a Comment

email hacks
Image ©Google

How email hacks teach us what email is used for.

Email hacks have been around for quite a while.  Take a look at these dates.

  • January 2012: Rupert Murdoch’s News International admits they hacked emails as well as phones.
  • February 2013: Former President George H. W. Bush’s personal email account was hacked.
  • 2010 – 2014: Then Secretary of State Hillary Clinton has her own private email server that is used for conducting government business.  The server had reportedly been attacked, perhaps even hacked from China, South Korea, Germany, and perhaps even Russia.
  • 2015 – 2016: Democratic National Committee email servers are hacked; emails disclosed favoritism from DNC to Clinton campaign in presidential race. It is presumed that the hack started around the same time that the U.S. State Department and White House servers were hacked.

People, the list goes on and on, and could be a mile long with all of the hacks that are out there.  The simple fact is this:

When it comes to email, the rule is simple: never put something in an email that you would not want to see posted on the cover of the New York Times.*

Why do you think so many people fail at this very simple rule? What causes the Hillary Clinton’s of the world decide that they can circumvent proper channels and check their common sense at the door?  Here’s my thoughts on that.

  1. At some level, people think that the normal rules don’t apply to them.  They believe that they can do what they want because of the position they hold.  This is not the case.
  2. Far too often, IT staff jump to the conclusion that they can keep the hackers from committing their email hacks on their people.  The simple fact is if the target is high profile enough, the hackers will keep at it until they succeed.
  3. Society has become too dependent on computers and technology.  What used to take place via a phone call or an in person meeting is now being handled by an email. Technology is great, but it has it’s place in society. We have blurred the lines way to much, and it is proving costly.
  4. The financial gain is so great.  What causes email hacks to happen is partly because there is so much profit to it.  In the News International experience, it was to drive ratings and insider information to sell papers, among other things.  In government hacking situations, it was to discover state secrets that could lead to one country having an advantage over another.  In the Clinton email server, I believe that was done so that she could maintain the power she sought more easily.  In the Target hack, which didn’t involve email, the motivation was in making money off of identity theft.  In all of these instances, there is a perceived gain to be had, and it is a significant gain.
  5. Lastly, far too often security is an afterthought in many organizations.  Security should be one of the factors in determining the cost of doing business on the Internet.  However, in many organizations, it is the first thing cut from the budget.  Training organizations such as SANS and GIAC are fighting an uphill battle to secure the infrastructure, but when budgets are tight, training money is cut.  The end result is that too much is expected with too little investment, and that leads to email hacks.

Remember, people, there is a time and a place for email.  There is also a proper way to secure it.  It’s time to learn that, and use email the way that it is intended, not for something it’s not meant for.

*h/t to my friend and former boss Kim, who was the first person I heard use that phrase.

Filed Under: Featured, Security, Tech Solutions Tagged With: ABC News, Beet, Bernie Sanders, Bill Clinton, Bruce Willis, Democratic National Committee, Donald Trump, George H. W. Bush, Hillary Clinton, Republican Party United States

Alert: Phishing Attacks via Text Message

July 22, 2016 by Mike Ellis Leave a Comment

Text Message

Today I received a very unusual text message.  In the message, I was notified that my “account” was disabled, and that I should go to the link in the text message to unblock the account.  Just like any email phishing attempt, there are things here that you can decipher to give you clues about the message to determine it’s legitimacy.

Text Message

Look to the following tips when determining whether a message is legitimate or not:

  1. First of all, I turned my phone sideways in order to realign the screen in order to pick out more details.
  2. Ask yourself whether or not you have a Wells Fargo (in this example) account.
  3. Take note of the information — the domain is actually cityinno.com, not wellsfargo.com.  That’s a red flag right there.
  4. Look at the account ID — usually an account ID is a username, not a series of numbers.  Of course, that’s not always the case, but usually it is.
  5. Note that, while the link in the text message does reference wellsfargo.com, it is not an encrypted website.  The link is http://, not https://, and thus, isn’t secure.
  6. Lastly, one trick you can do on your smartphone is to hold your finger on the link.  This will show you whether the link referenced actually goes to a different website.  In this case, it doesn’t, but if it did, you would see a window with the domain listed.

Most people realize that a smartphone often has an email address associated with the phone number.  So, while this message came in via my text message app on my phone, it was actually emailed to me, as the email address in the details screenshot reveals.  Despite that, the message reminds us that we can receive phishing attacks from any device, whether it is our laptop, desktop, smartphone, even something like an iPod Touch or an iPad.  Anything that can connect to the internet can be susceptible to a phishing attempt, so keep that in mind when you see a link in a message.

Do you seem to receive an unusually high number of phishing attempt emails? If so, I can help — just reach out to me via email at mike@techsolutionsnc.com, phone at 919-606-6725, or make an appointment via our online appointment page.

Filed Under: Featured, Financial, Security, Tech Solutions Tagged With: 12-hour clock, 401(k), IOS, IPad, IPhone, Microsoft Windows, Mobile phone, Personal computer, The Bank, Wells Fargo

Watch Out for Pokemon Go Scams!

July 15, 2016 by Mike Ellis Leave a Comment

Pokemon Go
Image ©Pokemon.com

Pokemon Go is seemingly all the rage since it’s release this week, but beware – there is a great risk in spending all your time with this game and losing track of your surroundings in the process. There have been reports of robberies in the St. Louis area, reports of two men falling off a cliff while playing the game, reports of a player coming across a dead body, and now, from our friends at the NC Department of Justice, concerns over Pokemon Go scams. From the alert email I received today:

WANT TO CATCH ‘EM ALL? HAVE FUN BUT AVOID POKÉMON GO SCAMS

The new mobile game Pokémon Go has attracted millions of excited new users, but unfortunately scammers aren’t far behind. A new scam is out to trick Pokémon Go users into giving up their personal information and paying money to play the game that’s actually free. If you’re trying to catch ‘em all, make sure you know how to avoid Pokémon Go subscription scams.

The scam begins with a phony email claiming that because of a record-breaking number of users, game developer Niantic has begun charging players $12.99 per month to play Pokémon Go. The email claims that anyone who doesn’t pay the upgrade fee immediately will have their game accounts frozen within one day. Concerned users who click the upgrade link are asked to provide their email login credentials, giving the scammers access to information in their email accounts that can be used for identity theft.

Remember:

  • Don’t be fooled by logos, websites, or links that seem like the real thing. Many scam emails use real company’s logos to seem authentic. Past phishing emails have claimed to come from major companies like Paypal, eBay, banks, credit card companies, non-profits, charities, and even government agencies like the IRS.
  • Report phony emails to the legitimate business directly. Contact the company using a telephone number or web address you know to be right, not using the contact information in the phishing email. Also, forward the entire email to the Federal Trade Commission at spam@uce.gov.
  • Never share your personal or financial information by email. Be wary of any email that asks you to key in login credentials to one of your personal email or financial accounts. Instead, use legitimate, secure login websites to access your accounts, not links included in questionable emails.
  • If you receive one of these phony emails, report it to the Attorney General’s Office at 1-877-5-NO-SCAM or online at ncdoj.gov.

This message brought to you on behalf of North Carolina Attorney General Roy Cooper.

The point of all of this is to remind you that you need to make sure that you are aware of your surroundings, make sure that you are not falling into some sort of scam, and you need to make sure that you use good old common sense when playing games like this and others.  Remember, there are a lot of different apps out there that track location, Pokemon Go is not the first by any stretch, so just be thoughtful when playing these games.  Have fun, but don’t do something that could end up getting yourself or someone else hurt.

Filed Under: Featured, Financial, Security, Tech Solutions Tagged With: Android (operating system), Apple Inc., Australia, awareness, Charitable organization, CNNMoney.com, Confidence trick, email scams, Federal Trade Commission, Florida, Gameplay of Pokémon, Google+, Hillary Clinton, Internal Revenue Service, Internet leak, Japan, Moon, ncdoj, Nintendo, Orlando, pii, Pikachu, Pokémon, pokemon go, security, Silicon Valley, Sun

Choosing the right Internet Device for your child

July 12, 2016 by Mike Ellis Leave a Comment

Internet Device

In today’s world, our children are going to be exposed to technology at a much younger age than we were as kids. I remember my daughter as a toddler being given a LeapFrog type system which she loved to play with and did a great job helping her to learn some stories.  While this wasn’t an Internet device, it was her first exposure to technology, and was definitely a precursor to her exposure to the Internet.

In this day and age, there are a lot of different options available for everyone to get connected, so what type of Internet device should you get for your child so they can connect? This post will explore some of the options you have available and what you should look for in a device.

Computers and Laptops

For most users, when it comes to a computer or a laptop, the main question becomes “Do I want a desktop or a laptop?”  After that question, the followup usually revolves around whether to use Windows operating system or Mac OSX.  The answers to these questions often revolve around such thoughts as the amount of desk space, whether or not your computer will travel with you, and whether or not you want a bigger display than a laptop screen can provide.

  • Desktop Pros
    • Permanent setup
    • Bigger display
    • More natural keyboard and mouse
    • Cost is usually cheaper
    • More easily upgraded as needs evolve
  • Desktop Cons
    • Space constraints
    • Mobility — can’t easily transport to other locations.
    • Usually requires either a computer desk or home office setup
    • Usually requires hard wire connection to network
  • Laptop Pros
    • Small form factor, can work from anywhere
    • Battery power source, less need to be constantly plugged in to wall outlet
    • Wi-Fi enabled
    • All shapes and sizes, very flexible configurations
  • Laptop Cons
    • More rigid in terms of upgrades
    • Price is sometimes more because of small components

Tablets and Phones

When it comes to tablets and phones, the options are many and varied.  In the one corner you have the Apple products — the iPad series of tablets and the various iPhone models.  In the other corner you have the Android line of devices, which includes a whole host of manufacturers.  Then, in a smaller third corner, you even have some devices that are built based on Windows operating systems.

For me, my tablet and phone of choice is from the Apple side of the ring, primarily out of experience and the past history I’ve had with them.  I’ve worked with and on both Apple and Android products, and for me, the reason I choose Apple over Android is because the components work better.  For example, in my experience, on an Android phone inevitably there will some issue with the email and calendar setup that will cause the calendar to stop syncing data with the server.  On Apple devices, I’ve not experienced this issue.

I know that there those that swear by both platforms — those that love Apple products and those that love Android products.  I also know that you aren’t going to change the minds of one over the other very easily, if at all.  So, in the end, the best advice I can give for this is to do your homework, check out multiple products on both sides of the aisle, and try them out to see which one you like best.  When you have that figured out, go with it, and don’t look back.

Other Devices

Lastly, there are other devices besides desktops and laptops, tablets and phones.  There are also internet ready gaming systems such as the Nintendo 3DS, music devices such as iPod Touch, and others.  These devices will also provide access to the Internet, although in my experience that appears to be more limited in scope, although I haven’t explored these as much lately.  For a device that you are going to be using for your schoolwork, though, I would imagine that these wouldn’t be the best choice.

Conclusion

In the end, the device you choose for your child’s Internet activities for school or other use will in large part be determined by three components:

  1. The cost of the device and your budget to spend
  2. The requirements for the school, if any.
  3. The durability and length of use you’ll expect to get out of it.

For my family, when it became time to get an Internet device for our daughter, we ended up going with the Apple MacBook Air.  She has had it for approaching 3 years, and it has been a great system for her.  She uses it for school, she uses it for writing, and by following the rules that we have in place for online safety, I expect that it will last her for several more years.  While it is a more expensive up-front cost, the long term value has been realized and then some.

What Internet device do you have for your child?  Please let us know in the comments, and thanks for stopping by today!

Filed Under: Featured, Financial, Tech Solutions Tagged With: Android (operating system), Apple Inc., Association for Computing Machinery, Communications of the ACM, Google Play, ICloud, IOS, IPad, IPhone, IPod Touch

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

Footer

Archives

Copyright © 2023 Tech Solutions NC, LLC

 

Loading Comments...