Blog

ALM Wholesale Logo

GDPR Ruling for data storage

Image result for GDPR

The EU General Data Protection Regulation (GDPR) is a regulation in European Union law that was adopted in April 2016 and became enforceable in May 2018 following a transition period of two years. It addresses data protection and the privacy of individuals within the EU and the export of their personal data outside the EU.

Its main aim is to give control back to individuals within the EU over their personal data as well as to unify regulation within the EU.

The GDPR legislation replaces the Data Protection Directive 95/46/EC and will affect any companies processing or storing personal data of those in the EU. The main changes and how they affect data storage are briefly discussed below.

Main Changes In Legislation

Probably the biggest change is the extended jurisdiction of the GDPR. It now applies to all companies processing the personal data of data subjects residing in the EU, regardless of the company’s own location. The directive was more ambiguous and referred to data process ‘in context of an establishment’.

With regard to penalties, organisations breaching the regulations can be fined up to four percent of their annual global turnover or twenty million euros (whichever is higher). There is a tiered approach to penalties which culminate in this maximum fine. This applies to both controllers and processors, so ‘clouds’ aren’t exempt.

Conditions for consent are stronger and requests for consent must be given in an intelligible and easily accessible form. The purpose for data processing must also be attached to the consent and withdrawal of consent must be as easy as giving it.

Breach notification within 72 hours of becoming aware of the breach will become compulsory in all member states where it is likely to “result in a risk for the rights and freedoms of individuals”. Customer will also need to be notified “without undue delay” after data processors first becoming aware of a breach.

Data subjects have a greater right to access regarding whether or not personal data concerning them is being processed, where and why. They can also request a copy of this data in electronic format free of charge.

Under the GDPR data subjects also have the right to be forgotten, i.e. to have all their personal data erased and to stop it being circulated, including the right to have third parties stop processing their data.

Data subjects also have the right to data portability whereby they can receive the personal data concerning them, as previously provided in a “commonly used and machine readable format”, and can pass on that data to another controller.

Privacy by design is becoming part of a legal requirement with the GDPR. It calls for the inclusion of data protection from the onset of the designing of systems, rather than as an addition.

There are also important changes regarding Data Protection Officers, alleviating the bureaucratic ordeal required under the current directive.

There are very few companies who won’t be affected by the new GDPR legislation so it’s vital that you make sure you’re aware of exactly what is required from you regarding data storage and GDPR, as ignorance is not a defence.

Our sister company Recycle You Tec have the ability to data wipe your sensitive information in accordance to the new GDPR regulations, using military grade software,  full documentation is provided to confirm complete sanitation of the data held on your hard drives.

ALM Wholesale Logo

Upgrading Your IT?

Upgrading Your IT?

Tips For Disposing of Your Old IT Equipment

As one of the fastest growing streams of waste in Europe, old electrical equipment is becoming a landfill nightmare. And with the average lifespan of corporate IT equipment spanning two or three years, recycling computers and ensuring you dispose of old computers correctly is paramount to sustainability, as well as ensuring your company stays compliant with the government’s WEEE directive. So if you’re in the process of upgrading your IT systems, here are some tips for disposing of IT equipment efficiently and in line with current legislation.

1. Secure sensitive data

With data theft a growing concern, ensuring you erase all sensitive data before recycling computers and other electronic devices is paramount. Take reasonable steps to delete all personal data from devices by clearing all files and reformatting hard drives. If you’re unable to do this, Recycle Your Tec offers FREE data erasing as part of our recycling platform, this is fully compliant with the current GDPR rulings.

2. Identify who is responsible for computer disposal

Managing corporate IT assets can be a mammoth task, and when it comes to replacements of PCs, monitors, laptops, or servers, a company’s priority is to reduce downtime during the switchover process, so having someone dedicated to the management of your IT assets is a good way of ensuring that downtime is limited. When you’re at the stage of disposing of computers, your IT asset manager or IT team should have a process for logging all necessary repairs, replacements and disposals. That way you know that the replacement process will go as smoothly as possible, once he items have been identified as to be recycled, documenting a list for Recycle Your Tec is ideal, however if your unable to, a quick count up is more than enough.

3. Dedicate some storage space for IT recycling

Disposing of IT equipment doesn’t always mean that you’ll be able to get rid of the old assets straight away. As the new PCs arrive, will your IT team immediately be on hand to collect and dispose of your electronic waste? If that isn’t the case then you may need some suitable storage space for the equipment before recycling can be arranged. For an effective and swift IT recycling process, compartmentalise your old IT equipment in accordance with the WEEE directive. This can help you to organise the equipment into different types of e-waste while in storage so that removal and disposal is as efficient as possible, once everything is ready to go, a quick call to us here at Recycle Your Tec and we’re arrange a FREE collection.

4. Work with a suitable computer recycling organisation

The WEEE (Waste Electrical and Electronic Equipment) directive is a set of regulations brought about by the European Commission in order to properly manage the disposal of all electrical equipment, ensuring that treatment and recycling is improved and also to ensure that hazardous substances emitted from electrical equipment are dealt with safely. Working with a reliable recycling organisation can remove the worry that you’re not in compliance with recycling regulations dictated by the WEEE directive. They will be able to organise the collection, and responsible recycling or disposal of your IT equipment, taking the pressure off your internal IT team and saving your company valuable time, we ensure that everything is collected, data wiped for FREE, while looking to provide value back to the school, best of all we guarantee the items won’t end up in a landfill. There isn’t many that can make these promised.

5.Have you got the correct documentation?

This point directly follows on from working with us. With our knowledge, you won’t have to worry about getting hold of and completing the documentation needed for proof of compliance, we provide this all FREE as part of our recycling program. Data ersings certifications will be provided once the hard drive are completed wiped to military guarding.

Here at Recycle You Tec, we want to make recycling as easy as possible, even for the less technically minded personnel, simply

Identify and document the items needed to be recycled, contact us at Recycle Your Tec, sit back in the notion that the item will be taken care of ro current GDPR regulations, and provided a new home in schools and business worldwide.

All this for FREE, while potentially earning the school some money to help with upgrades, what are you waiting for.

 

www.recycleyoutec.com

ALM Wholesale Logo

Core Processors Explained

Core Processors Explained.

 

Looking to buy wholesale laptops ? But not sure what the best Core processor is, we look into what is a core processor, the difference between them and how they work depending on what you shall be using them for.

What is a core in a processor?

A quad-core processor is a chip with four independent units called cores that read and execute central processing unit (CPU) instructions such as add, move data, and branch. Within the chip, each core operates in conjunction with other circuits such as cache, memory management, and input/output (I/O) ports.

What’s the difference between i3 i5 and i7 processors?

For the most part, you’ll get faster CPU performance from the Core i5 parts over Core i3. Some Core i5 processors are dual-core and some are quad-core. Most of the time, a true quad-core CPU will perform better than a dual-core processor, especially on multimedia tasks like video transcoding or photo editing

 

The most confusing part of buying a computer is the bewildering array of CPUs (also known as processors) on offer. Which? explains what you should be looking out for and what sort of processor is best for which task. If you’re buying a computer, chances are it’ll have an Intel processor on board, although a small number come with AMD chips. In this guide, we’ll explain what different Intel processor models mean and what sort of user they’re best suited for.

Intel Atom –

Tiny tablets Atom processors heralded the arrival of ultra-thin, ultra-light laptops in the mid-2000s. These chips offered four cores for sprightly everyday computing performance. Nowadays, these chips are generally relegated to very cheap Windows tablets costing under £200. They’re not fast by any means, but they make up for their lack of oomph with impressive battery life figures and their ability to fit into very thin devices.

Intel Celeron and Pentium –

Cheap laptops and very cheap desktops Celeron and Pentium processors are at the very bottom of Intel’s range. You might be familiar with the Pentium brand, with the name being a mainstay of more powerful computers of the late 1990s. Nowadays, it sits just above Celeron in terms of performance. Newer Pentium models, such as those launched in 2017 onwards, are becoming more common on laptops costing between £250 and £300. These chips are power-efficient, meaning they’re great when you want a laptop with a long battery life. They’re perfectly usable for web browsing and basic office work. You can also find Celerons inside some very cheap desktops. These machines tend to score very poorly in our tests and negate many of the advantages you get from having bought a desktop in the first place. We don’t tend to recommend them.

Intel Core i3, i5 and i7,

More complicated than they seem This is where things start to get a little bit confusing and is where Intel’s naming convention disguises how powerful a laptop actually is.   When looking at what sort of processor a computer has, be sure to check the full specification sheet to see the precise processor model. This makes a big difference to how powerful your PC will be. For example, a computer that’s labelled as having a ‘Core i5’ processor could have any number of different specifications. Taking the Core i5 example, your computer could have any of the following, and many beyond that as well: Core i5-7400, Core i5 7600K, Core i5 7300U, Core i5-7500HQ, Core i5-7400T and Core i5 7Y57. The trend applies to i3 and i7 chips, too. Note the different four-digit number and the trailing letter (or the Y in one case). It’s the trailing letter (suffix) that gives you the most information about what sort of processor you’re looking at. No suffix: This is a standard desktop processor, generally with four cores and a high clock speed for excellent everyday performance and the ability to edit videos and photos at high speed. T suffix: Found in smaller desktops and AIO PCs. These chips are functionally the same as those without a suffix and have the same number of cores, but with a slower clock speed. K suffix: The highest-performance processor you’ll find in a computer you can buy on the high street. Similar to a chip with no suffix, but generally with a higher clock speed. These chips can be ‘overclocked’ by those with technical knowledge. U suffix: ‘Ultra’ low power. These chips generally have two cores (although newer models now have four cores) and are among the slowest processors with Core i branding. These chips can often be found in cheaper AIO PCs and in many laptops. They can be suitable for photo and video editing, but tend to be a lot slower when performing tasks such as exporting files to disk. If you’re looking for a photo-editing machine, pick a Core i5 or even try to stretch to an i7. HQ suffix: Generally found in powerful laptops and normally come with four cores. Perfect for video and photo editing, but sacrifices battery life and portability. Y in the middle: Y are the lowest-power chips you can find. They aren’t really suitable for photo or video editing but will be fine for lighter tasks. The advantage of choosing one of these is very good performance for lighter tasks, coupled with a longer battery life. Laptops that use this chip tend to have fanless designs, meaning they’re totally silent and very thin.

Plus In April 2018, Intel announced Intel Core i3+, i5+ and i7+. This new naming convention shows when an Intel Optane SSD is installed in a computer. Optane works out which files and programs you use most and moves them to an ultra-fast SSD for better performance. You don’t have to manage this yourself; it’s done completely automatically and doesn’t affect where you’ll find your files on your PC. Core i9 In 2017, Intel introduced the Core i9 product lines. These are hugely expensive processors for PCs that cost in excess of £800. The company also introduced i9 chips to laptops in 2018. Again, these are reserved to powerful laptops designed for high-end work such as video editing.

At ALM we sell a wide range of Core wholesale laptops, ranging from i3 to i7 4th generation, so no matter what you are looking for, we can provide high end core processors at low wholesale value.

Visit our website here to check out our used laptops deals.

ALM Wholesale Logo

Tech History – Windows 95

Windows 95 Released

Kicking off one of the largest product launches in technology history, Microsoft releases the highly anticipated Windows 95. More than one million copies was sold in the first four days of its release, Windows 95 release included a commercial featuring The Rolling Stones’ 1981 single “Start Me Up” (a reference to the Start button)

Windows 95 merged Microsoft’s formerly separate MS-DOS and Windows products, improvements over its predecessor, Windows 3.1, most notably in the graphical user interface (GUI) and in its simplified “plug-and-play” features. There were also major changes made to the core components of the operating system, such as moving from a mainly co-operatively multitasked 16-bit architecture to a 32-bit preemptive multitasking architecture.

Dependence on MS-DOS
To end-users, MS-DOS appears as an underlying component of Windows 95. For example, it is possible to prevent the loading of the graphical user interface and boot the system into a real-mode MS-DOS environment. This sparked debate amongst users and professionals regarding the extent to which Windows 95 is an operating system or merely a graphical shell running on top of MS-DOS

User interface
Windows 95 introduced a redesigned shell based around a desktop metaphor; the desktop was re-purposed to hold shortcuts to applications, files and folders.

In Windows 3.1 the desktop was used to display icons of running applications. In Windows 95, the currently running applications were displayed as buttons on a taskbar across the bottom of the screen. The taskbar also contained a notification area used to display icons for background applications, a volume control and the current time.

The Start menu, invoked by clicking the “Start” button on the taskbar, was introduced as an additional means of launching applications or opening documents. While maintaining the program groups used by its predecessor Program Manager, it also displayed applications within cascading sub-menus.

Windows 95 originally shipped without Internet Explorer, and the default network installation did not install TCP/IP, the network protocol used on the Internet. At the release date of Windows 95, Internet Explorer 1.0 was available, but only in the Plus! add-on pack for Windows 95, which was a separate product. The Plus! Pack did not reach as many retail consumers as the operating system itself.

Legacy
Many features that have since become key components of the Microsoft Windows series, such as the Start menu and the taskbar, originated in Windows 95. Neil MacDonald, a Gartner analyst, said that Windows 95 “was a quantum leap in difference in technological capability and stability.” Ina Fried of CNET said that “by the time Windows 95 was finally ushered off the market in 2001, it had become a fixture on computer desktops around the world.

Three years after its introduction, Windows 95 was succeeded by Windows 98. Microsoft ended support for Windows 95 on December 31, 2001.

Happy 23rd Birthday Windows 95.

This blog was completed by ALM Wholesale Ltd
Visit our website here.

ALM Wholesale Logo

Tech History – Apple Lisa

Before the iMac or even the iMac Pro, came the Apple Lisa, the desktop computer was developed by Apple, released on January 19, 1983. It was one of the first personal computers to offer a graphical user interface in a machine aimed at individual business users.
Originally intended to sell for $2,000 and ship in 1981, the Lisa is delayed until 1983 and sells for $10,000. Utilizing technology that is ahead of its time, the high cost, with a 5 MB hard drive, relatively low performance and unreliable Apple FileWare, or “Twiggy” floppy disks, led to poor sales, with only 100,000 units sold ultimately sink the success of the Lisa.

Much of the technology introduced by the Lisa influenced the development of the Macintosh as well as other future computer and operating system designs, as in 1982 Steve Jobs joins the Macintosh project, at that time developing a much more limited machine with task-switching interface. Jobs redirected the Macintosh team to build a cheaper and better version of Lisa, releasing it in January 1984. quickly outstripping Lisa sales.

Newer versions of the Lisa were introduced that addressed its original faults and had lowered its price considerably, but it failed to achieve favorable sales compared to the much less expensive Mac. The final revision of the Lisa, the Lisa 2/10, was modified and sold as the Macintosh XL.

The Lisa operating system features protected memory, enabled by a crude hardware circuit compared to the Sun-1 workstation (c. 1982), which featured a full memory management unit. Based, in part, on elements from the failed Apple III SOS operating system released three years earlier, the Lisa’s disk operating system also organizes its files in hierarchical directories, as did UNIX workstations of the time which were the main competition to Lisa in terms of price and hardware. Filesystem directories enable the use of GUI “folders” with the Lisa, as with previous Xerox PARC computers from which the Lisa borrowed heavily. Conceptually, the Lisa resembles the Xerox Star in the sense that it was envisioned as an office computing system. Consequently, Lisa has two main user modes: the Lisa Office System and the Workshop.

The Lisa Office System is the GUI environment for end users. The Workshop is a program development environment and is almost entirely text-based, though it uses a GUI text editor. The Lisa Office System was eventually renamed “7/7”, in reference to the seven supplied application programs: LisaWrite, LisaCalc, LisaDraw, LisaGraph, LisaProject, LisaList, and LisaTerminal.

The operating system – rather than the applications themselves – is incapable of supporting the demands of advanced users and is prone to crash then restart under heavy load from large, complex spreadsheets or graphs produced from
them. Apple’s warranty said that this software works precisely as stated, and Apple refunded an unspecified number of users in full for their systems. These operating system frailties, and costly (to Apple) recalls, combined with the very high price point led to the failure of the Lisa in the marketplace.

BYTE wrote in February 1983 after previewing the Lisa that it was “the most important development in computers in the last five years, easily outpacing [the IBM PC]”. It acknowledged that the $9,995 price was high, and concluded “Apple is not unaware that most people would be incredibly interested in a similar but less expensive machine. We’ll see what happens”.

Apple sold approximately 100,000 Lisa machines at a price of $9995, generating sales in total close to a billion US dollars, against a development cost of 50 US million dollars.

An often-overlooked feature the Lisa system used is its early approach of document-centric[citation needed] computing instead of application-centric computing. On a Macintosh, Windows, or Linux system, a user typically seeks a program. In the Lisa system, users use stationery to begin using an application. Apple implemented stationery documents on System 7 in 1991 and attempted to further advance this approach on the Mac platform later with OpenDoc. Microsoft also later implemented stationery in a limited fashion via the Windows Start menu for Microsoft Office.

 

Today’s Mac is faster and more powerful than ever, iMac is now equipped with seventh-generation Intel Core i5 and i7 processors and the latest high-performance graphics. Storage kicks into high gear as well, with the speedy and spacious Fusion Drive now available in standard configurations of both the 27‑inch and 21.5‑inch Retina models.

While at its time the machine looked state of the art, looking back being able to compare it to today’s Imac, it’s amazing to think how far technology has come in 30 years.

ALM Wholesale Logo

Tech History – Compact Disk

In a new blog we will be looking back at periods in history when the newest craze or groundbreaking technology was released.

wholesale laptops

cd

August 17, 1982

“The Visitors” by ABBA becomes the world’s first commercial music compact disc (CD) manufactured, pressed in Langenhagen, Germany by Polygram Records, a subsidiary of Royal Phillips Electronics.

Phillips and Sony co-developed the CD standard, which was designed to be the successor to the phonograph record. By the time the CD went on sale in November of that year, about 150 titles had been produced.The album gain worldwide recognition, winning a Platinum award in the United Kingdom ( 300,000 sales ) and Germany ( 500,000 sales ), compare that to today when all album are downloaded onto a smart phone instantly.

Digital music singles downloaded in the United States In 2017 we’re approximately 553.5 million, down from 743 million a year earlier, it’s crazy to think that you had to stack all the cd case up or even have a folder for easy storage. Now you just need good phone memory, or even stream them from a cloud based app like Google Play Music, Amazon Music, Spotify and SoundCloud.

Compact disc (CD) is a digital optical disc data storage format that was originally developed to store and play only sound recordings (CD-DA) but has later been adapted for storage of data (CD-ROM). Several other formats were further derived from these, including write-once audio and data storage (CD-R), rewritable media (CD-RW), Video Compact Disc (VCD), Super Video Compact Disc (SVCD), Photo CD, PictureCD, CD-i, and Enhanced Music CD. The first commercially available audio CD player, the Sony CDP-101, was released October 1982 in Japan.

Standard CDs can hold up to about 80 minutes of uncompressed audio or about 700 MiB of data. The Mini CD we’re sometimes used for CD singles, storing up to 24 minutes of audio, or delivering device drivers. At the time of the technology’s introduction in 1982, a CD could store much more data than a personal computer hard drive, which would typically hold 10 MB. By 2010, hard drives commonly offered as much storage space as a thousand CDs, while their prices had plummeted to commodity level.

In 2004, worldwide sales of audio CDs, CD-ROMs and CD-Rs reached about 30 billion discs. By 2007, 200 billion CDs had been sold worldwide. From the early 2000s CDs were increasingly being replaced by other forms of digital storage and distribution, with the result that by 2010 the number of audio CDs being sold in the U.S. had dropped about 50% from their peak; however, they remained one of the primary distribution methods for the music industry.

Do you still buy CD’s ?

 

This short blog was completed by ALM Wholesale LTD.

Visit Our Website HERE

ALM Wholesale Logo

What is the most downloaded Application in the World ?

Tik Tok, Known as Douyin in China is a music video and social media app. The app lets you shoot and edit short clips, then add music and special effects to them. Tik Tok is owned by the same parent company that bought social video app Musical.ly for $1 billion last year.

According to Sensor Tower, Tik Tok has become a “total phenomenon” in China in recent months. In the first quarter of 2018, the app was downloaded an estimated 45.8 million times.

The app reached 150 million daily active users (500 million monthly active users) in June 2018, its seen as the most downloaded app in the world, beating Facebook-owned apps like WhatsApp, Messenger, Instagram, even the powerful video-sharing application YouTube.

Recent History

  • On 23 January 2018, the app ranked No.1 among free mobile app downloads on App stores in Thailand. In February 2018,
  • Tik Tok launched a partnership with Modern Sky to monetize music.
  • On August 2nd, 2018, Tik Tok merged their app with musical.ly to create a “bigger and better video community”. They kept the name Tik Tok and both app users joined to continue creating on one platform.
  • Aug 2018, TikTok’s global talent campaign One Million Audition is in Russia for the first time.

 

Available on Android and the App store, just search for Tik Tok, just it out today.

 

This blog was completed by ALM Wholesale LTD, visit our website here.

ALM Wholesale Logo

Whats better, Laptop or Tablet ?

It’s not really a matter of whether tablets are better than laptops or vice versa. It’s about what type of device is right for the job at hand, which is why plenty of people own a laptop and a tablet, we list some pros and cons for both devices.

Tablet Pros & Cons
Apple’s iPad’s tablets are ideal for consuming content. They’re great tools for surfing the web, checking e-mail, Facebook, playing games, reading digital magazines and books, all while enjoying movies and music too, these devices turn on instantly and tend to last longer on a charge than your typical notebook.
The most popular tablet size is 9 to 10 inches, which is similar in dimensions to a magazine, but you’ll also find plenty of devices with 7- or 8-inch screens. These models are more portable, and can more easily fit inside a purse or jacket pocket. The iPad and similarly sized competitors tend to weigh 1.6 pounds or less, while 7- to 8-inch models weigh about a pound or less.

Regardless of the size, tablets are lighter and easier to carry than laptops.

Nevertheless, the keyboards on traditional laptops are bigger and more comfortable, and notebooks are simply better at some things, including word processing and video editing.

Laptop Pros & Cons
If your looking to get real work done, a laptop continues to be your best bet. For one, they offer a superior text input experience, especially for those who touch type.

Laptops also offer better viewing comfort, as they tend to feature larger and sharper screens. For example, the average notebook has a resolution of 1366 x 768 pixels, which fits a lot more information on the display than the 1024 x 768-pixel iPad.

You also shouldn’t overlook the fact that notebooks make it easier to multitask. That’s because you can more quickly switch between applications and see all of your open apps at once.

The taskbar in Windows and the Dock on Mac OS X make it a cinch to toggle between programs. Windows 10 goes one step further with Snap, which allows you to compare open windows side by side.

In terms of weight, notebooks are heavier than tablets, but another area where notebooks excel is software. Yes, tablets offer access to lots of apps, but laptops pull ahead with the wealth of available productivity programs

Conclusion.  
So what’s best, It really comes down to what you plan to do with it. Tablets are better for play and some work, and laptops are better for work and some play.

The great thing is there’s loads of choices out on the market right now, even buying from a seller like ALM Wholesale LTD, where you can pick some some great laptops for a great price.

 

This blog was completed by Recycle Your Tec
Visit our website here.

ALM Wholesale Logo

Tips To Prevent Cyber-Attacks

Use advanced passwords
This may be the most obvious yet overlooked tip. A strong password includes uppercase, lowercase, numbers, punctuation, Don’t make the password a personal reference, and don’t store a list in a saved file. Most importantly, don’t use the same password for multiple accounts. There are some great tools like LastPass and 1Password that securely store passwords. Also, it’s crucial to change passwords frequently — especially for vulnerable accounts like email and banking.

Use a two-factor authentication
The most pro-active method to prevent a hack from occurring is by utilizing two-factor authentication. The process involves using your password and another step, such as a text message PIN that is sent to your smartphone. The best part of this process is that it is offered for free from most online companies, but sadly less than 10% of users take advantage of this service.

While Facebook calls it login approvals, Google and Microsoft call it two-step verification and Twitter names the process login verification. The process takes a few minutes to set up. Two-factor authentication is the best thing you can do to protect your accounts online, Even if your password is stolen or compromised in a breach, the hackers will not be able to access your account. Besides your social media and email accounts, ask your bank and insurance companies if two-factor authentication is available.

On public Wi-Fi? Don’t share personal data
Thinking about buying that plane ticket or checking your bank account while sitting at the coffee shop? You may want to think twice about that, as you have no idea how secure that connection is.The same goes for places like hotels and conference centers. Security researchers just uncovered a vulnerability that made Wi-Fi traffic at some of the world’s biggest hotels vulnerable to attack.There is no way for an individual to know if this is happening, so it’s best to be judicious with where you are surfing.

If you must access private information while on these networks, it would be good to use tools like virtual private networks (VPNs), which encrypt traffic so the Wi-Fi network can’t see where you’re surfing. Or, better yet, just set up a hotspot using your mobile data.

Use a VPN when necessary.
If you’re not at home and need to get online, use a virtual private network (VPN). However, be careful. Most of them are not as secure as you hope. Unless you can setup your own VPN, which you can do with Algo VPN from Trail of Bits, you may want to look into Cloak, Freedome, or PIA.

Be wary of the cloud
Here’s a good rule of thumb — if you don’t want people to access your information, don’t share it. This includes cloud storage. No matter how secure a platform says it is, you ought to keep in mind that you’re giving it to someone else to watch over. While it’s in the company’s best interests to keep it secure, many privacy experts maintain that anything you put online stands the chance of being published online.

Does this mean you shouldn’t store anything in the cloud? Not necessarily, it’s just helpful to remain aware of where your files are going. And to know the practices of your cloud storage provider. Additionally, be sure that if you delete files on your computer or smartphone that they are also deleted on any cloud backups you have too.

Be suspicious of email
A lot of cyberattacks are launched through simple malicious email campaigns. Email is a wonderful communication platform because you can sending anything to anyone, but that means it can be a huge security risk. Phishing, for example, sends victims seemingly innocuous emails that will lead victims to fake websites asking to update their personal information. The best way to avoid being scammed by phony emails is to just make sure the sender is who you think it is.

Check their email address to see if they match with the website you think it’s from. To be extra cautious you can check the IP address of the sender. You can do this by finding the source information from the email and looking for the IP address that follows the line “Received: from.” You can then Google the IP address to learn the email’s source. (Here is a good primer on finding email IP addresses.)

Conclusion.

It is impossible not to be online today if you want to be productive. However, with these systems in place, you can do it with security and peace of mind. It takes as little as 15 minutes to set up the right measures to avoid having your identity stolen, your email hacked, or sensitive photos and other information leaked.

This blog was completed by ALM Wholesale LTD

Visit our website here.

ALM Wholesale Logo

10 Common Laptop faults and solutions.

1. Overheating

Symptom: Computer crashes, freezes

Solution: Clean out air vents, put filtered material over the inhalation vent, or update BIOS

Overheating can rob your laptop of performance and often cause a host of hiccups, such as system crashes and freezing. Every computer generates lots of heat, but laptops are especially susceptible to overheating due to their small size and lack of ventilation. Excessive dust can clog air vents and deprive your system of cold air to cool off the CPU.

You can often solve overheating issues simply by cleaning out these air vents with a cloth or keyboard cleaner.

To prevent further dust buildup, place a piece of filtered cloth, say from a Swiffer, over the inhalation vent. Don’t place one over the exhaust vent, as that’s where hot air is supposed to flow out of the system quickly. If the cloth doesn’t work, you may want to update your system’s BIOS, which controls the laptop’s hardware. Most manufacturers offer an installation file that updates BIOS files automatically, which often address heat management. Just make sure that your notebook is connected to the power supply when updating the BIOS.

2. Slow Hard Drive

Symptom: Excessive program load times, slow file transfers

Solution: Disk defragmentation

Disorganized information on your hard drive can sap performance because the computer requires more time to sift through data fragments and bad sectors on the drive. This problem can be cleared up easily (but not especially quickly; defragging can sometimes take hours) using the built-in Windows tool called Disk Defragmenter. You can access this program through the Programs menu in the Accessories or System Tools folder. Simply click the Analyze button to see if your disk drive requires defragmenting, and then click Defragment to begin.

 

3. Battery Won’t Hold a Charge

Symptom: Your notebook runs only a few minutes when unplugged

Solution: Battery replacement

Over their lifespans, lithium-ion batteries can lose the ability to hold a charge. After a few years, some batteries will last only a fraction of the rated runtime. Replacing a battery is relatively simple; most pop out from the bottom or back of the laptop.

Top tip – Never run the laptop plugged in on a fully charged battery, it will do more harm to your battery in the long run.

4. Bad Keyboard

Symptom: Missing or Loose Keys

Solution: Replace keyboard

Keyboards get the brunt of abuse on any laptop, either from typing or spilled coffee. As a result, keys can often become dislodged or worn out. Thankfully, laptop makers provide quick online guides for replacing keyboards on their support pages; simply type “keyboard replacement” into the search bar or check the manufacturer’s knowledge base.

5. Can’t Connect to Wireless Network

Symptom: No Internet connection, frequent time-outs while Web browsing

Solution: Make sure wireless is turned on, smarter software tools, make sure router is broadcasting network name (SSID)

Part of taking your laptop everywhere on the go is expecting to be able to connect to any wireless network, whether in an airport, coffee shop, or hotel. But wireless networks, by their very nature, are finicky beasts. Some laptops come with an external button or switch, separate from the software settings, to enable wireless connectivity. Always make sure this wireless toggle is switched on. Also make sure that the network you’re connecting to is broadcasting its network name or SSID.

6. Stuck Pixels

Symptom: Green or red dots on your notebook’s screen

Solution: Massage away dead pixels

Nonconforming or stuck pixels can be a nuisance on an otherwise functional laptop LCD. The pixels usually remain green or red without lighting up properly with the other pixels on the display. Unfortunately, manufacturers will not replace an LCD for just one or two stuck pixels; in fact, some require as many as 10 to 18 dead pixels before they’ll take action.

There is a solution, though. Take a soft material, like a felt cloth, and gently rub in a circular motion around the stuck pixel. Performing this trick will usually get the pixel to light up properly.

Once you find the right location and pressure to illuminate the pixel, hold your finger there for up to two minutes, and voila, no more stuck pixel.

7. System Crash

Symptom: Notebook won’t boot up

Solution: Remove the hard drive and place it into an external enclosure. Run Checkdisk.

Most people go into panic mode when their computers refuse to boot up. More often than not, however, the problem is as simple as a missing system file or a bad sector on the hard drive. To determine if that’s the case, you can remove your hard drive using the instructions from the manufacturer and place the drive into a USB enclosure–these are external housings for internal hardware.

Next, connect the enclosure’s USB cable to an open USB port on a working PC. If the file system is still intact, the hard drive should show up as an external drive and allow you to transfer data to and from the drive. Next, try running Checkdisk on the drive by opening a DOS prompt (Start/Programs/Accessories/Command Prompt) and typing in X: where X is the letter of your external drive. Then hit Enter. Now type “chkdsk /f.” Your system may ask you to dismount the drive; this is okay, so type Y and then hit Enter.

Your notebook will now display some information about your drive (file system type and serial number) and then scan the drive, fixing any errors it encounters. An error report will print out, so you can see what changes were made to the drive. If all went well, you’ll be good to go once you plug the hard drive back into the crashed notebook and power it on.

8.Virus or Spyware Infestation

Symptom: Excessive pop ups, slow downloads

Solution: Install antispyware programs, use free virus scans

Nothing can cripple your system like malware. The first line of defense is always prevention. It’s best to have a subscription to a service like Norton 360. Norton impresses with it’s unobtrusive security suite that offers stellar antivirus and spyware protection, file backups, and performance tuning without a complex user interface. The Norton suite also offers a firewall option that will silently block most threats while alerting the user to friendly programs requesting Web access.

If you don’t want to spend any money, you can bolster your defenses with free tools like Ad-Awareand Spybot: Search and Destroy. While both are excellent tools, each has its own strengths and weaknesses–Spybot is better at tracking down malicious code like pop-ups, while Ad-Aware does a better job removing cookies (text files that advertisers copy to a user’s computer to track surfing habits). We recommend scheduling periodic scans with both of these tools, just to be safe.

If these tools fail to locate a virus, you may want to try Trend Micro’s free House Call at housecall.trendmicro.com, which is sometimes more adept at identifying viruses than other programs. Trend Micro also offers a free database of viruses and manual removal tips, if automated solutions fail.

9. Outdated Video Drivers

Symptom: Garbled or distorted video

Solution: Download the latest drivers

Video issues are a common complaint among notebook users. The trouble often stems from newer games and software that require the latest video card drivers to work. Even though most laptops ship with the latest driver files, some systems will be outdated by the time the machine is sold. That’s why it’s critical to update your video card’s drivers frequently–sometimes the audio and network drivers may need to be updated as well.

Many notebook manufacturers offer installation packs that will give you the latest drivers and offer automated tools to update the rest of your notebook. Lenovo, for example, hosts its driver files at lenovo.com/support. Alienware tests new drivers for all its machines and hosts them in the support area of its Web site. However, if you fail to find drivers at your notebook manufacturer’s site, you can try the video card’s manufacturer, usually ATI or Nvidia. If your system comes with an integrated graphics chip from Intel, your best bet is the laptop manufacturer’s website, although you can also try Intel’s support and downloads page

10.Downloads Are Taking Too Long

If you have internet connectivity issue, install Speedtest.net and perform the speed test and check your download and upload speed.  Internet speed should be minimum 50 percent of your service provider’s broadcasted speed, with a ping under 100 milliseconds.

If the speed is good, ensure that you’re not downloading or uploading anything inadvertently. Reset your router and modem to boost up your internet connectivity problem. Most routers and modems posses reset buttons, but you can also pull the power cable for few seconds. Do not cut the power for a long time , or the hardware may get reset itself to factory defaults.

If all these fails, then recycle it with our partners Recycle You Tec,why don’t you ask your colleagues and  IT manager to donate there tec too, the item will be given a new home in less fortunate countries, best of all we pay for you each item.

Blog completed by ALM Wholesale LTD.

Visit our website here