Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Desktop Buyer’s Guide 2019, Part V: Other Considerations

Desktop Buyer’s Guide 2019, Part V: Other Considerations

In parts one through four we talked about choosing the right specifications for your desktop, depending on its role. We talked about selecting the right CPU, RAM, storage, and display options. This final post we hit a few other tips and ideas we came up with that didn’t fit into the other posts.

What Brand is Best?

Honestly, it’s going to depend on the day of the week and the exact specifications you want. Even then, when it comes to desktops, all computer manufacturers have access to the same parts. Dell, Asus, Lenovo, HP, Acer, and the countless other manufacturers out there will use the same basic components to make a desktop. Things don’t start to make a difference until you get way up there on the higher-end of computing, like gaming rigs and video production, and then you have plenty of companies that specialize in that.

Where the brand does start to stand out is for laptops and all-in-one devices. This is where companies can differentiate themselves. For example, HP and Microsoft both have high-end graphic design all-in-one desktops. Microsoft, HP, and Lenovo all have laptop options with pen inputs for artists. At this point we are talking about heavily specialized hardware that make these devices stand out, so we’re leaving the realm of the desktop.

When it comes to specialized hardware, we suggest reading a lot of reviews, sampling the device at your local big box store, and if it is for your business, having a chat with the experts at Central Technology Solutions.

Full-Size Desktop vs Compact Desktop

This is in reference to the size of the desktop case itself. Full-size desktops tend to be easier to upgrade and maintain, and can sometimes cost less. Compact desktops, also known as slim desktops, might still have upgrade capabilities but they will be more limited. 

The smaller design tends to be suitable for most office workstations, where gaming PCs and video production needs more space within the desktop for hardware and cooling.

Read Reviews and Benchmarks

There are plenty of sites that are dedicated to reviewing specific models of desktops and other computer hardware. If you are looking at a specific desktop at the store, go online and see if it has any reviews, including user reviews. Higher-end systems will usually have more in-depth reviews with benchmark scores, and you’ll want to pay attention to that when spending more money.

Be Aware of Bloatware

This can be a big problem when buying pre-configured desktops from some brands. Computers will come pre-installed with software. Some of it will seem pretty helpful, like Microsoft Office trials or antivirus. Keep in mind that if you are buying a device for your office, you’ll want to clean out the extra software, so you are only using your centralized antivirus and your licenses of Office, etc. 

Getting Rid of Your Old PC?

First, you’ll want to migrate the data and wipe the old drives thoroughly. It’s best to leave that to professionals, unless you plan on destroying the drives. Even then, depending on your industry and the compliances you need to fall under, you may need it done professionally. 

Otherwise, there are lots of options for recycling your PC, but we encourage you to not just throw it away, as a computer contains many harmful elements that can cause a lot of damage when not processed properly.

We also highly recommend not donating a PC used for your business unless you have professionally wiped or replaced the drives. It’s a great gesture, especially if the PC can help out a student or shelter, but you’ll want to make sure your data is absolutely unrecoverable.

Purchasing Workstations for Your Business?

Let us help. We can help you purchase one or many desktops, and make sure they are configured, optimized, and licensed so your staff can work effectively. We can also help with the infrastructure and networking side to make sure your office can handle your growth. 

On top of that, we offer 24/7 monitoring and maintenance to keep your computers running smoothly, and we can even provide tech support for your end-users.

Want to talk about how we can help you grow your business? Reach out to us at 1-844-237-4300.

Why Microsoft 365 is a Solid Option for Businesses
Desktop Buyer’s Guide 2019, Part IV: Videos, Graph...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, September 22 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions Email IT Services Privacy Network Security Malware Internet Data Hackers Software Data Backup Outsourced IT Productivity Managed IT Services Computer Innovation Microsoft Business IT Support Data Recovery IT Support Ransomware Hardware Mobile Devices Efficiency Tech Term User Tips Google Cloud Computing Backup Small Business Internet of Things Upgrade Business Continuity Managed IT Services Collaboration Managed Service Provider Windows 10 Communication Business Management Remote Monitoring Paperless Office Phishing Smartphone Android Disaster Recovery VoIP Smartphones Artificial Intelligence Save Money Encryption Social Media Data Management Workplace Tips Windows 10 Windows Managed IT communications Browser Server Cybersecurity Help Desk Facebook Mobile Device BYOD Saving Money Risk Management Managed Service Office 365 Holiday Wi-Fi Document Management Quick Tips BDR Passwords Automation App Mobile Device Management Firewall Network Government Unified Threat Management Healthcare Chrome Employer-Employee Relationship Robot Compliance Bandwidth Bring Your Own Device Going Green Training Business Technology Apps Vendor Management Microsoft Office Gmail Password Recovery Virtualization Analytics Applications Laptops Avoiding Downtime Big Data Tip of the week Scam Project Management Antivirus Money Infrastructure Miscellaneous SaaS Hosted Solution Data storage Telephone Systems Vulnerability Website Blockchain Information Wireless File Sharing Processor Content Filtering IT Management Customer Service Apple Two-factor Authentication Users Politics Router Unified Communications Social VPN Virtual Reality Work/Life Balance Customer Relationship Management Downtime Computing Data loss Data Security Regulations Office IT Service Information Technology Access Control Computers Mobility Operating System Printing Windows 7 Storage Tablet RMM Remote Computing Files Settings Gadgets Business Growth Redundancy Chromebook Dark Web Flexibility Private Cloud Proactive Software as a Service Tech Support The Internet of Things Mobile Computing Hacker Management Smart Technology Spam Digital Payment Remote Monitoring and Management Upgrades Maintenance Patch Management WiFi Websites Identity Theft Wireless Technology Legal Networking Twitter Net Neutrality YouTube Current Events Licensing Remote Workers Virtual Private Network Display End of Support Health Administration Network Management Internet Exlporer HIPAA Education Budget Assessment LiFi IoT How To Monitors Bitcoin Server Management Cooperation Electronic Medical Records IT solutions Machine Learning Alert Mobile Security Mouse Employees Consultation Outlook Monitoring Uninterrupted Power Supply Company Culture Professional Services Recycling Sports Google Drive How To Samsung Word Downloads Augmented Reality Taxes Google Wallet Managing Stress Instant Messaging Employer/Employee Relationships Buisness Motherboard Google Maps OneNote Bluetooth Virtual Assistant Vendor eWaste Read Only Spyware Course Hard Disk Drives Cyber Monday technology services provider IT Budget Hard Drives Google Docs Tech Terms Proactive IT Notifications Remote Worker Batteries User Error Language Shortcut Migration Cables Backup and Disaster Recovery Black Market Projects Smart Tech Cabling Humor Managed Services Provider Smart Devices Operations Drones Enterprise Content Management Finance Firefox Writing Emoji Proactive Maintenance Data Warehousing Backups Employee-Employer Relationship Wasting Time Deep Learning Network Congestion Solid State Drives Technology Assurance Group ’s 18 Solid State Drive Theft Heating/Cooling IT Consulting ROI Remote Work Computing Infrastructure Point of Sale WannaCry Computer Repair Teamwork Technology Tips Chatbots Wires Human Error Time Management Return on Investment Cybercrime Cost Management E-Commerce Database Sensors Multi-Factor Security Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Retail Cortana Database Management Microsoft Excel Modem Sync Connectivity Hacking Physical Security Enterprise Resource Planning Bookmarks Options Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Notes File Management Printer Alerts Law Enforcement Features Shared resources Comparison Identity Botnet Permission Processors Active Directory Travel Hard Drive Voice over Internet Protocol Google Calendar Typing Geography Authorization GDPR Cookies Mobile Device Managment Software Tips Hacks Disaster Trending Office Tips Gadget Best Practice Mobile Favorites Mail Merge Update 5G Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Value of Managed Services Virtual Desktop Cache Electronic Health Records VoIP Sponsor OneDrive Specifications Test Touchscreen Techology Windows Server Legislation IT Technicians GPS High-Speed Internet Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Staff Conferencing Address Wireless Internet Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Mobile Data Managed Services SharePoint Cyberattacks Digital Obstacle Manufacturing Black Friday Roanoke — Central Technology Solutions Supercomputer Identities MSP Disaster Resistance Security Cameras User Management Unified Threat Management Hotspot Crowdsourcing Meetings Dark Data Personal Information Transportation Marketing Mirgation Tracking Development Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Utility Computing Consulting Search Webcam Students Hard Disk Drive IT Consultant Printers Error Emergency Web Server CrashOverride Payment Cards Cameras Regulation Motion Sickness CCTV Administrator Relocation