Blog

Northern Computer Blog

Windows 10 Should I Upgrade or Not

Windows 10 Should I Upgrade or Not

With the free upgrade offer ending on July 29th, this is a question we get asked daily. In this article we’ll answer a few of the common questions, explain different scenarios where upgrading makes sense and where it can cause trouble. If I take the plunge, can […]

... more

Image Backup – Backup Strategies – Part 2

Image Backup – Backup Strategies – Part 2

Backing up Files vs Image Backup A regular backup copies your server files and is meant for restoring items on a small scale. An image backup, by contrast, copies the entire server or virtual machine. An image backup creates a snapshot of the operating system and all the data associated […]

... more

Microsoft End of Life Products – What happens.

Microsoft End of Life Products – What happens.

Microsoft End of Life policy is done in two stages, mainstream and extended. The primary difference is in the type of updates that are still offered. Microsoft End Of Life Mainstream support ends: Microsoft no longer provides non-security hotfixes unless the software has an extended support agreement. […]

... more

Backup Strategy for the Modern Office – Part 1

Backup Strategy for the Modern Office – Part 1

No business likes to think about loss of data or technology resources but it needs to be a major focus in your ongoing IT Plan. Data is valuable and you must have a firm plan in place that lets you know where and how often information is backed up, as well as the time needed to restore. Northern Computer works with clients, developing backup strategy and recovery plans that work. From incremental imaging to full off-site backups, we plan, implement, test and monitor to ensure backups are reliable.

... more

Business Phones – 3CX and VoIP

Business Phones – 3CX and VoIP

For the past 50 years businesses have been using conventional PBX business phones which require separate networks for voice and data communications. But with the new VoIP telephony revolution, businesses are quickly migrating to VoIP PBX systems, which offer the huge advantage of converging data and voice networks. VoIP, […]

... more

Microsoft Dynamics – Sales in a digital world

Microsoft Dynamics – Sales in a digital world

Sales, marketing & customer service people often utilize a CRM (customer relationship management) system for tracking contacts, interactions, appointments, opportunities, etc. This “electronic rolodex” is integral in the day-to-day activities of a salesperson. There are many platforms on the marketplace such as Salesforce.com, Sage CRM, Maximizer, Act, […]

... more

Thinkpad L450 Laptop

Thinkpad L450 Laptop

PROFESSIONAL POWER, COMPETITIVE PRICE   Thinkpad L450 The Thinkpad L450 is Lenovo’s lightest L Series laptop to date. Enjoy greater mobility than ever before, all while retaining the professional computing power and attractive price synonymous with the L Series line of ThinkPad notebooks. At Northern Computer we’re excited to […]

... more

Windows 10 – First look and common issues.

Microsoft announced Windows 10 on July 29th, and it’s free if for Windows 7 and 8 users. It is primarily a blend of the Windows 7 interface and the Windows 8 infrastructure. The start menu is looking better and expanded on, Cortana (their new search product) is integrated and the new browser Edge is here (don’t worry, you can still run Explorer).

... more

Northern Computer News Announcement

Northern Computer News Announcement

Exciting news!   Northern Computer and ONE Information Technology have merged.  After much discussion, Jim Condon and Andrew Allin (the owners), have agreed that combining their business and corporate philosophies would be very beneficial to both firms. Jim Condon says, “We are excited about the new organization and […]

... more

Cryptolocker Ransomware: What You Need To Know

Cryptolocker Ransomware: What You Need To Know

CryptoLocker is a ransomware trojan which targets computers running Microsoft Windows. It first surfaced in September 2013. It is one of the nastiest viruses to hit in some time. The severity is high. A CryptoLocker attack may come from various sources; one such is disguised as a […]

... more