Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Desktop Buyer’s Guide 2019, Part V: Other Considerations

Desktop Buyer’s Guide 2019, Part V: Other Considerations

In parts one through four we talked about choosing the right specifications for your desktop, depending on its role. We talked about selecting the right CPU, RAM, storage, and display options. This final post we hit a few other tips and ideas we came up with that didn’t fit into the other posts.

What Brand is Best?

Honestly, it’s going to depend on the day of the week and the exact specifications you want. Even then, when it comes to desktops, all computer manufacturers have access to the same parts. Dell, Asus, Lenovo, HP, Acer, and the countless other manufacturers out there will use the same basic components to make a desktop. Things don’t start to make a difference until you get way up there on the higher-end of computing, like gaming rigs and video production, and then you have plenty of companies that specialize in that.

Where the brand does start to stand out is for laptops and all-in-one devices. This is where companies can differentiate themselves. For example, HP and Microsoft both have high-end graphic design all-in-one desktops. Microsoft, HP, and Lenovo all have laptop options with pen inputs for artists. At this point we are talking about heavily specialized hardware that make these devices stand out, so we’re leaving the realm of the desktop.

When it comes to specialized hardware, we suggest reading a lot of reviews, sampling the device at your local big box store, and if it is for your business, having a chat with the experts at Telesys Voice and Data.

Full-Size Desktop vs Compact Desktop

This is in reference to the size of the desktop case itself. Full-size desktops tend to be easier to upgrade and maintain, and can sometimes cost less. Compact desktops, also known as slim desktops, might still have upgrade capabilities but they will be more limited. 

The smaller design tends to be suitable for most office workstations, where gaming PCs and video production needs more space within the desktop for hardware and cooling.

Read Reviews and Benchmarks

There are plenty of sites that are dedicated to reviewing specific models of desktops and other computer hardware. If you are looking at a specific desktop at the store, go online and see if it has any reviews, including user reviews. Higher-end systems will usually have more in-depth reviews with benchmark scores, and you’ll want to pay attention to that when spending more money.

Be Aware of Bloatware

This can be a big problem when buying pre-configured desktops from some brands. Computers will come pre-installed with software. Some of it will seem pretty helpful, like Microsoft Office trials or antivirus. Keep in mind that if you are buying a device for your office, you’ll want to clean out the extra software, so you are only using your centralized antivirus and your licenses of Office, etc. 

Getting Rid of Your Old PC?

First, you’ll want to migrate the data and wipe the old drives thoroughly. It’s best to leave that to professionals, unless you plan on destroying the drives. Even then, depending on your industry and the compliances you need to fall under, you may need it done professionally. 

Otherwise, there are lots of options for recycling your PC, but we encourage you to not just throw it away, as a computer contains many harmful elements that can cause a lot of damage when not processed properly.

We also highly recommend not donating a PC used for your business unless you have professionally wiped or replaced the drives. It’s a great gesture, especially if the PC can help out a student or shelter, but you’ll want to make sure your data is absolutely unrecoverable.

Purchasing Workstations for Your Business?

Let us help. We can help you purchase one or many desktops, and make sure they are configured, optimized, and licensed so your staff can work effectively. We can also help with the infrastructure and networking side to make sure your office can handle your growth. 

On top of that, we offer 24/7 monitoring and maintenance to keep your computers running smoothly, and we can even provide tech support for your end-users.

Want to talk about how we can help you grow your business? Reach out to us at (800) 588-4430.


No comments yet
Already Registered? Login Here
Sunday, 15 September 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Internet Network Security IT Services Windows 10 Computer Managed Service Provider Productivity Ransomware Backup Innovation Outsourced IT Mobile Devices Data Backup Smartphone Android Managed IT services User Tips Google Social Media Business Continuity Hardware Browser Communication IT Support Disaster Recovery Workplace Tips Data Recovery Upgrade Data Efficiency Cloud Computing Small Business Business Management Managed IT Services Data Management Smartphones App IT Support Internet of Things Phishing Holiday Microsoft Office Server Office Remote Monitoring Facebook Miscellaneous Paperless Office WiFi Network Office 365 Windows Spam Save Money Passwords Encryption communications Tech Term Password Artificial Intelligence Gmail VoIP Big Data Customer Relationship Management Apps Robot Hosted Solution Recovery Collaboration Document Management Employer-Employee Relationship Risk Management Saving Money Unified Threat Management Bandwidth Firewall How To Content Filtering Government Money Chrome Managed IT Infrastructure Work/Life Balance Downtime Wi-Fi Office Tips Apple Avoiding Downtime Windows 10 Compliance Tip of the week Customer Service Mobile Device Management Vendor Management Analytics Cybersecurity Operating System Word Remote Computing Hacker IT Management Education Mobile Device Outlook Cybercrime Virtual Reality Antivirus Training SaaS BYOD Project Management Data loss BDR Social Website Business Technology Health Healthcare Telephone Systems Hacking Mobile Computing Two-factor Authentication File Sharing Tech Support Settings Vulnerability The Internet of Things Applications Automation Going Green Help Desk Computers Alert Data Security Printing Data storage Presentation Business Growth Computing IT service Cortana Specifications Virtualization Computer Care Administration Access Control User IT solutions Tablet Safety Wireless Technology Retail Upgrades Wireless Automobile Best Practice Budget Lithium-ion battery End of Support Business Owner Mouse Managed Service Windows 7 YouTube Unified Communications Marketing Legal Display LiFi Regulations Twitter Patch Management Competition Identity Theft Proactive Politics Scam Monitors Travel Information Technology Net Neutrality Google Drive Remote Monitoring and Management Websites Physical Security Augmented Reality Humor Smart Technology Taxes VPN Assessment IBM Laptops HIPAA Running Cable Botnet Software as a Service Server Management Licensing Analyitcs Router Mobile Security Samsung Virtual Private Network Consultation Digital Payment Meetings Bring Your Own Device Search Storage Maintenance Sports Asset Tracking IP Address Windows Server Mirgation Relocation Comparison Disaster Resistance Webcam Break Fix Electronic Medical Records Bluetooth Alt Codes Google Wallet Cookies Vulnerabilities Remote Worker Language Crowdsourcing Printer Address Dark Data Corporate Profile Quick Tips Remote Workers Mobile Office User Management Migration Private Cloud Black Friday Proactive IT Point of Sale Dark Web Typing Drones History Nanotechnology Geography Professional Services Computing Infrastructure Redundancy WannaCry Buisness Time Management Information Batteries Chatbots Error Cyber Monday IT Consulting Data Warehousing Mobility Cryptocurrency Cabling Knowledge IoT iPhone Staffing Cables Virtual Assistant Alerts SharePoint Network Management Monitoring Remote Work Identity flu season Data Breach Web Server Bookmarks Microsoft Excel Update Bitcoin Experience Utility Computing GPS Wires Voice over Internet Protocol Cooperation Downloads VoIP 3D Printing Touchscreen Google Maps Electronic Health Records File Management Administrator Fort Worth Technology Laws Cameras Favorites Blockchain Chromebook Windows 8 Disaster Tracking Domains Staff Law Enforcement Multi-Factor Security Lenovo Network Congestion Digital Unsupported Software Cyberattacks 5G Entrepreneur flu shot Unified Threat Management PowerPoint CCTV Conferencing Permissions Emoji Shortcut Uninterrupted Power Supply Cost Management Application Users MSP Public Speaking Manufacturing Flexibility Gadget Google Calendar Superfish Spyware Mobile Data Hacks Consumers Fort Worth IT business communications systems Employees Fraud Solid State Drive Recycling Proactive Maintenance Operations Legislation How To Heating/Cooling Current Events Social Networking DFW IT Service Internet Protocol Hard Drives G Suite Zero-Day Threat Processors Hard Disk Drive Laptop eWaste Management Virtual Desktop Supercomputer Processor Wearable Technology IT Sevices Networking Firefox VoIP streamlines Servers Motherboard Motion Sickness Enterprise Resource Planning Refrigeration Backup and Disaster Recovery Internet Exlporer Google Docs Halloween Environment IT Budget WPA3 Writing Distributed Denial of Service business network infrastructure Personal Information Deep Learning Fun Mobile IT Consultant RMM data services Scary Stories Troubleshooting Fleet Tracking Active Directory IT Technicians Machine Learning Technology Tips Techology Social Engineering Managed IT Service Computer Repair Statistics Software Tips Modem Company Culture Undo Phone System Cleaning Procurement Hotspot Notifications User Error Mail Merge

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...