Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Desktop Buyer’s Guide 2019, Part V: Other Considerations

Desktop Buyer’s Guide 2019, Part V: Other Considerations

In parts one through four we talked about choosing the right specifications for your desktop, depending on its role. We talked about selecting the right CPU, RAM, storage, and display options. This final post we hit a few other tips and ideas we came up with that didn’t fit into the other posts.

What Brand is Best?

Honestly, it’s going to depend on the day of the week and the exact specifications you want. Even then, when it comes to desktops, all computer manufacturers have access to the same parts. Dell, Asus, Lenovo, HP, Acer, and the countless other manufacturers out there will use the same basic components to make a desktop. Things don’t start to make a difference until you get way up there on the higher-end of computing, like gaming rigs and video production, and then you have plenty of companies that specialize in that.

Where the brand does start to stand out is for laptops and all-in-one devices. This is where companies can differentiate themselves. For example, HP and Microsoft both have high-end graphic design all-in-one desktops. Microsoft, HP, and Lenovo all have laptop options with pen inputs for artists. At this point we are talking about heavily specialized hardware that make these devices stand out, so we’re leaving the realm of the desktop.

When it comes to specialized hardware, we suggest reading a lot of reviews, sampling the device at your local big box store, and if it is for your business, having a chat with the experts at Telesys Voice and Data.

Full-Size Desktop vs Compact Desktop

This is in reference to the size of the desktop case itself. Full-size desktops tend to be easier to upgrade and maintain, and can sometimes cost less. Compact desktops, also known as slim desktops, might still have upgrade capabilities but they will be more limited. 

The smaller design tends to be suitable for most office workstations, where gaming PCs and video production needs more space within the desktop for hardware and cooling.

Read Reviews and Benchmarks

There are plenty of sites that are dedicated to reviewing specific models of desktops and other computer hardware. If you are looking at a specific desktop at the store, go online and see if it has any reviews, including user reviews. Higher-end systems will usually have more in-depth reviews with benchmark scores, and you’ll want to pay attention to that when spending more money.

Be Aware of Bloatware

This can be a big problem when buying pre-configured desktops from some brands. Computers will come pre-installed with software. Some of it will seem pretty helpful, like Microsoft Office trials or antivirus. Keep in mind that if you are buying a device for your office, you’ll want to clean out the extra software, so you are only using your centralized antivirus and your licenses of Office, etc. 

Getting Rid of Your Old PC?

First, you’ll want to migrate the data and wipe the old drives thoroughly. It’s best to leave that to professionals, unless you plan on destroying the drives. Even then, depending on your industry and the compliances you need to fall under, you may need it done professionally. 

Otherwise, there are lots of options for recycling your PC, but we encourage you to not just throw it away, as a computer contains many harmful elements that can cause a lot of damage when not processed properly.

We also highly recommend not donating a PC used for your business unless you have professionally wiped or replaced the drives. It’s a great gesture, especially if the PC can help out a student or shelter, but you’ll want to make sure your data is absolutely unrecoverable.

Purchasing Workstations for Your Business?

Let us help. We can help you purchase one or many desktops, and make sure they are configured, optimized, and licensed so your staff can work effectively. We can also help with the infrastructure and networking side to make sure your office can handle your growth. 

On top of that, we offer 24/7 monitoring and maintenance to keep your computers running smoothly, and we can even provide tech support for your end-users.

Want to talk about how we can help you grow your business? Reach out to us at (800) 588-4430.


No comments yet
Already Registered? Login Here
Tuesday, 12 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Internet Network Security IT Services Windows 10 Computer Productivity Managed Service Provider Data Backup Ransomware Innovation Backup Outsourced IT Mobile Devices Smartphone Business Continuity Android User Tips Google Disaster Recovery Data Recovery Managed IT services Social Media Hardware Efficiency Upgrade Browser Data Communication IT Support Workplace Tips Cloud Computing Small Business IT Support Business Management Managed IT Services Smartphones Data Management App Miscellaneous Server Holiday Microsoft Office Internet of Things Office Remote Monitoring Phishing communications WiFi Office 365 Windows Network Paperless Office Facebook Spam Passwords Artificial Intelligence Gmail Tech Term Big Data Save Money Password VoIP Encryption Customer Relationship Management Employer-Employee Relationship Risk Management Unified Threat Management Bandwidth Document Management Firewall Robot Cybersecurity Apps Saving Money Hosted Solution Recovery Collaboration Wi-Fi Office Tips Vendor Management Chrome Analytics Managed IT Infrastructure Apple Avoiding Downtime Word Windows 10 Hacker Tip of the week How To Compliance Customer Service Mobile Device Management Government Money Operating System Content Filtering Work/Life Balance Remote Computing Downtime IT Management File Sharing Mobile Device Outlook Antivirus Redundancy Two-factor Authentication Automation Settings Project Management Data loss Going Green BDR Alert The Internet of Things Business Technology Printing Data storage Health Computers Computing Telephone Systems Hacking Healthcare Mobile Computing Managed Service Tech Support Education Virtual Reality Training Vulnerability Cybercrime SaaS Help Desk BYOD Data Security Applications Social Presentation Business Growth Website Legal Mobile Security Specifications Display YouTube Unified Communications Twitter Politics Monitors Travel Laptops User Google Drive Tablet LiFi Websites Physical Security Retail Taxes Access Control Botnet Best Practice Lithium-ion battery Augmented Reality Samsung Business Owner IBM Meetings Running Cable Storage Marketing Bring Your Own Device Search Computer Care Competition Patch Management Sports Scam IT service Identity Theft Cortana Virtualization Windows 7 Information Technology Regulations Administration Proactive Humor Automobile VPN Upgrades IT solutions Safety Net Neutrality Assessment Budget Server Management End of Support Licensing Remote Monitoring and Management Analyitcs Wireless Technology Smart Technology Virtual Private Network Digital Payment Wireless Consultation Mouse HIPAA Software as a Service Router Maintenance Mobile CCTV Disaster Resistance data services Emoji Technology Tips Gadget Backup and Disaster Recovery Bluetooth Windows 8 Fleet Tracking IT Technicians Modem Domains Managed IT Service Processor Address Mobile Data Corporate Profile Hacks Company Culture 5G Hotspot Proactive IT Entrepreneur User Error Quick Tips Comparison RMM History Asset Tracking Mirgation Application Cookies Public Speaking Break Fix WannaCry Current Events Users Vulnerabilities Language G Suite IT Consulting Printer Processors Time Management Black Friday Procurement Mobility Cabling Remote Workers Migration Nanotechnology Dark Web Motion Sickness Active Directory iPhone Staffing Google Docs Geography Computing Infrastructure Data Breach Network Management Cyber Monday Remote Worker Writing Information Laptop Chatbots Hard Drives IoT Data Warehousing Windows Server Personal Information VoIP GPS Virtual Desktop Google Maps Cables Alerts IT Consultant Technology Laws SharePoint Touchscreen flu season Machine Learning Professional Services Social Engineering Disaster Monitoring Halloween Identity Refrigeration Utility Computing Microsoft Excel User Management Lenovo Computer Repair Digital Tracking Deep Learning Wires Fun Cooperation Cleaning Unified Threat Management Downloads Notifications Fort Worth Relocation Virtual Assistant Shortcut PowerPoint Uninterrupted Power Supply Electronic Health Records Scary Stories Blockchain Webcam Batteries Superfish Electronic Medical Records Spyware Google Wallet Dark Data Staff business communications systems Multi-Factor Security Crowdsourcing Bookmarks Consumers Undo flu shot Private Cloud Voice over Internet Protocol Solid State Drive Cyberattacks Cost Management IP Address Permissions Point of Sale Remote Work How To Drones Alt Codes MSP Flexibility Internet Protocol Google Calendar Favorites Heating/Cooling Fort Worth IT Error eWaste Hard Disk Drive Recycling Mobile Office Fraud File Management Networking Firefox IT Sevices Supercomputer Typing Operations VoIP streamlines Legislation Conferencing Servers DFW IT Service Manufacturing Environment Buisness Social Networking Management Web Server Telephone Update IT Budget Cryptocurrency Knowledge Wearable Technology business network infrastructure Employees Administrator Gadgets Troubleshooting 3D Printing Motherboard Enterprise Resource Planning Internet Exlporer Cameras Mobile VoIP Techology Chromebook Law Enforcement Zero-Day Threat Statistics Network Congestion Software Tips Bitcoin WPA3 Experience Distributed Denial of Service Proactive Maintenance Mail Merge Unsupported Software Phone System

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...