Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Desktop Buyer’s Guide 2019, Part V: Other Considerations

Desktop Buyer’s Guide 2019, Part V: Other Considerations

In parts one through four we talked about choosing the right specifications for your desktop, depending on its role. We talked about selecting the right CPU, RAM, storage, and display options. This final post we hit a few other tips and ideas we came up with that didn’t fit into the other posts.

What Brand is Best?

Honestly, it’s going to depend on the day of the week and the exact specifications you want. Even then, when it comes to desktops, all computer manufacturers have access to the same parts. Dell, Asus, Lenovo, HP, Acer, and the countless other manufacturers out there will use the same basic components to make a desktop. Things don’t start to make a difference until you get way up there on the higher-end of computing, like gaming rigs and video production, and then you have plenty of companies that specialize in that.

Where the brand does start to stand out is for laptops and all-in-one devices. This is where companies can differentiate themselves. For example, HP and Microsoft both have high-end graphic design all-in-one desktops. Microsoft, HP, and Lenovo all have laptop options with pen inputs for artists. At this point we are talking about heavily specialized hardware that make these devices stand out, so we’re leaving the realm of the desktop.

When it comes to specialized hardware, we suggest reading a lot of reviews, sampling the device at your local big box store, and if it is for your business, having a chat with the experts at Central Technology Solutions.

Full-Size Desktop vs Compact Desktop

This is in reference to the size of the desktop case itself. Full-size desktops tend to be easier to upgrade and maintain, and can sometimes cost less. Compact desktops, also known as slim desktops, might still have upgrade capabilities but they will be more limited. 

The smaller design tends to be suitable for most office workstations, where gaming PCs and video production needs more space within the desktop for hardware and cooling.

Read Reviews and Benchmarks

There are plenty of sites that are dedicated to reviewing specific models of desktops and other computer hardware. If you are looking at a specific desktop at the store, go online and see if it has any reviews, including user reviews. Higher-end systems will usually have more in-depth reviews with benchmark scores, and you’ll want to pay attention to that when spending more money.

Be Aware of Bloatware

This can be a big problem when buying pre-configured desktops from some brands. Computers will come pre-installed with software. Some of it will seem pretty helpful, like Microsoft Office trials or antivirus. Keep in mind that if you are buying a device for your office, you’ll want to clean out the extra software, so you are only using your centralized antivirus and your licenses of Office, etc. 

Getting Rid of Your Old PC?

First, you’ll want to migrate the data and wipe the old drives thoroughly. It’s best to leave that to professionals, unless you plan on destroying the drives. Even then, depending on your industry and the compliances you need to fall under, you may need it done professionally. 

Otherwise, there are lots of options for recycling your PC, but we encourage you to not just throw it away, as a computer contains many harmful elements that can cause a lot of damage when not processed properly.

We also highly recommend not donating a PC used for your business unless you have professionally wiped or replaced the drives. It’s a great gesture, especially if the PC can help out a student or shelter, but you’ll want to make sure your data is absolutely unrecoverable.

Purchasing Workstations for Your Business?

Let us help. We can help you purchase one or many desktops, and make sure they are configured, optimized, and licensed so your staff can work effectively. We can also help with the infrastructure and networking side to make sure your office can handle your growth. 

On top of that, we offer 24/7 monitoring and maintenance to keep your computers running smoothly, and we can even provide tech support for your end-users.

Want to talk about how we can help you grow your business? Reach out to us at 1-844-237-4300.

Why Microsoft 365 is a Solid Option for Businesses
Desktop Buyer’s Guide 2019, Part IV: Videos, Graph...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, June 03 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Privacy Hosted Solutions Data Network Security IT Services Data Backup Email Internet Malware Hackers Software Efficiency IT Support Outsourced IT Innovation Microsoft Business Computer Data Recovery Mobile Devices Productivity Hardware Managed IT Services IT Support Small Business Upgrade Google Business Continuity Cloud Computing Backup Ransomware Cybersecurity User Tips Communication Collaboration Phishing Tech Term Managed IT Services Disaster Recovery Business Management Windows 10 Managed Service Provider Workplace Tips Internet of Things VoIP Smartphones Smartphone Android Paperless Office Social Media Data Management Remote Monitoring Encryption Managed IT Mobile Device Managed Service communications Facebook Browser Artificial Intelligence Office 365 Save Money Windows 10 Windows Server Quick Tips Network Saving Money Virtualization Miscellaneous BDR BYOD Holiday Risk Management Help Desk Wi-Fi Passwords Automation Windows 7 Business Technology Government Healthcare Document Management Apps Vendor Management Compliance Password App Health Mobile Device Management Employer-Employee Relationship Firewall Users Microsoft Office Chrome Recovery Bandwidth Laptops Avoiding Downtime Bring Your Own Device Unified Threat Management Going Green Gmail Robot Remote Work Training Analytics Big Data Applications Mobility Computers File Sharing Storage Infrastructure Apple Two-factor Authentication Processor Data Security Data loss Vulnerability Hosted Solution Website Money Data storage Computing Blockchain Content Filtering Wireless IT Management Redundancy SaaS Tip of the week Information Telephone Systems Scam Project Management Office Antivirus VPN Machine Learning Company Culture Unified Communications Customer Relationship Management Software as a Service RMM OneDrive Tablet Meetings Virtual Private Network Social Router Maintenance Downtime Files Proactive Flexibility Customer Service Politics Work/Life Balance Budget Access Control Virtual Reality Information Technology Operating System Printing IoT Remote Computing Gadgets Regulations IT Service Settings Augmented Reality Employees Monitors Payment Cards Business Growth Dark Web Monitoring Electronic Medical Records Time Management Networking Alert Patch Management Spam Mobile Office Mobile Computing Co-Managed IT The Internet of Things Recycling YouTube Hacker Utility Computing Consulting WiFi Solid State Drive Professional Services Managed Services Network Management Smart Technology How To Samsung Assessment Current Events Wireless Technology Net Neutrality Legal How To Chromebook Private Cloud Server Management Managed Services Provider Administration LiFi Tech Support Employee-Employer Relationship Education Management Consultation Remote Monitoring and Management Uninterrupted Power Supply Internet Exlporer HIPAA Digital Payment IT solutions Bitcoin Cooperation Websites Identity Theft Remote Workers Upgrades Mobile Security Twitter Licensing Word Search Outlook Social Network Mouse Hard Drive Sports Display Google Drive End of Support File Management Covid-19 Electronic Health Records Downloads High-Speed Internet Update Voice over Internet Protocol Heating/Cooling IT Consulting Google Wallet Motherboard Star Wars Unsupported Software Virus GDPR Outsourcing User Error Hard Drives Language Google Docs Conferencing PowerPoint Value of Managed Services GPS Cyber Monday technology services provider Asset Tracking 5G IT WannaCry Cyberattacks Windows Server Migration Humor MSP Social Engineering USB Hacking Smart Tech Crowdsourcing Operations Backups Development Zero-Day Threat Telephone Supercomputer Servers Data Breach Data Warehousing Drones Mobile Data Video Conferencing Computing Infrastructure Managing Stress Instant Messaging Tracking Deep Learning Technology Assurance Group ’s 18 OneNote Wireless Internet Business Telephone G Suite History eWaste Read Only Dark Data Personal Information Security Cameras User Management Outsource IT Taxes Technology Tips Chatbots Tech Terms Safety Manufacturing Optimization Google Maps Disaster Trending Mail Merge Multi-Factor Security Wearable Technology Cables Backup and Disaster Recovery Transportation Mobile VoIP IT Budget Technology Laws Alt Codes Microsoft Excel Modem Biometric Printer Cryptocurrency Alerts Enterprise Content Management Finance Virtual Assistant Vendor Touchscreen Techology Distributed Denial of Service Annual Convention Notifications Employer/Employee Relationships IT Assessment Cabling VoIP Sponsor Remote Worker Batteries Laptop Lenovo Comparison Identity Theft Virtual Desktop Black Market Hard Disk Drives Virtual Machines Gamification Point of Sale Address Google Calendar Hacks Wires Human Error Writing Emoji Cyber security Statistics Typing Cookies Cost Management E-Commerce Projects Obstacle Vulnerabilities Authentication Network Congestion Wasting Time Smart Devices Disaster Resistance Best Practice Managed IT Service San Diego Connectivity Proactive Maintenance Digitize Cybercrime Digital Enterprise Resource Planning Bookmarks Computer Repair ROI Remote Working Telephony Superfish Specifications WPA3 Financial Solid State Drives Credit Cards Sync Return on Investment Law Enforcement Legislation IT Technicians Permission Retail Cortana Teamwork Public Cloud Bluetooth Permissions Nanotechnology Features Physical Security Spyware Course SharePoint Windows 8 Staff Save Time Geography Authorization Database Sensors Botnet Proactive IT Break Fix Social Networking Marketing 3D Printing Database Management Shadow IT Travel Unified Threat Management Identities Hotspot Mobile Favorites Buisness Notes Black Friday Roanoke — Central Technology Solutions Fleet Tracking Procurement Processors Options Holidays Mobile Device Managment Software Tips Shortcut Office Tips Active Directory Gadget Firefox Mirgation Test Shared resources Windows Server 2008 Automobile Computer Care Fraud Screen Reader Cache Motion Sickness CCTV Emergency Administrator CrashOverride Relocation Webcam Printers IT Consultant Students Error Web Server Hard Disk Drive Cameras Regulation