From computer systems operating with vacuums contained in valves though to the creation of artifically intelligent computer systems analysing everything connected to the internet.

Computer systems by design are programmed to take a set of inputs and process them arithmetically or logically to generate an output. The term itself computer systems has multiple definitions. Computer systems can refer to a single computer and its components, a network of computers all linked together in an office or an operating system such as the Microsoft windows server that allows for simple interactivity with the computer’s hardware.

The Colossus was the world’s first electronic computer system. It was developed by code breakers during World War 2 to decrypt German transmissions. However the development of this computer system has always been top secret. The development of ENIAC (Electronic Numerical Integrator and Computer) computer system in America at the same time to create firing tables for the military led to the creation of IBM and the world’s first operating system FORTRAN.

Computer systems such as Colossus and ENIAC were capable of single tasks. Modern computer systems can perform multiple tasks in multiple locations simultaneously. It is considered that modern computer systems have evolved from the SAGE computer system developed by the USA during the cold war with Russia. Unlike these giants modern computer systems are compact light weight and extremely fast.

The internet itself can be considered a computer system. From its beginnings as ARPANET in the late nineteen sixties until its first real commercial use in the early nineties this computer system can now be found in nearly every household. The human race is now at the brink of creating artificially intelligent computer systems. It is estimated that by 2020 50 billion devices will be connected to the internet, creating the biggest computer system on the planet. Objects, animals and eventually even people will be connected to this computer system. It is theorised that one it could be used by an AI to compute the best course of action. Many computer specialists such as Bill Gates and scientists such as Stephen Hawking have reservations about these intelligent computer systems. Remember HAL in 2001: A Space Odyssey.

Embrace Office 365 and Increase Business Agility

Office 365 will considerably boost your Productivity

Microsoft’s Office 365 is its world-famous office suite of applications made for the mobile age.  Since its inception in mid-2013, it has been warmly received by industry, worldwide.  Embracing Office 365 will give you more flexibility, productivity, and give you the capability to complete work while travelling.  You will increase your business agility and with it, business profits.

Let’s take a look at its considerable benefits. Read more

How Cryptolocker and Other Viruses Can Ruin your Business

Computer file encryption viruses such as Cryptolocker pose a very real threat to your business.  There are many varieties and when one of these viruses takes hold it can be very difficult to remove them.  One of the latest incarnations of viruses is known as ransomware.  Here you are locked out of your files or system until you pay a fee, often thousands of pounds.

With this in mind let’s talk about some of the more dangerous viruses that can heap misery on your business. Read more

The Importance of Server Maintenance

Every single computer in your office will run on a network, which is controlled by your server(s), which means you must maintain your server if you want your network and computers to run smoothly.

If you don’t maintain your server you can expect slow performing computers, outdated software causing problems to the day to day operation of the network, server crashes or even complete failures, all of which are a nightmare for a small business owner. Read more

Ransomware: What should I do now?

If your computer becomes infected with ransomware, this can be particularly vicious. If you haven’t got the correct strategies in place, can have devastating consequences. One of the most common questions we get asked about ransomware is, “What do I do now?” Read more

Cyber hackers

10 simple ways to protecting yourself from cyber hackers

Often within our IT infrastructure, we manage our IT issues and frustrations with crisis management rather than a proactive approach. This is frequently the case with data backup and we are quick to find excuses as to why we aren’t taking the best precautions: I’ll do it later; I don’t have time now; it’s too expensive; it’s too difficult; … Read more

Can I have the Wi-Fi password: The risks

We all do it. You go for a coffee with a friend, out for dinner with the family or you’re waiting for a product or service and you ask; ‘Can I have the Wi-Fi password?’

Whilst it seems harmless from the outside and a service which we have become accustomed to when out and about; what are the risks associated to joining a Wi-Fi network? Read more

Advice on what to use to backup company data

Backing up your data is crucial when you consider the risks of losing it. Many businesses after suffering a complete loss of data struggle to stay open after this. There are many ways to backup company data. Whatever the current financial situation of your business, you should always backup your data in some way. Read more

The Best Ways to Prevent Spam on your computer, laptop or tablet

The Best Ways to Prevent Spam on your computer, laptop or tablet

Ever since the dawn of email there have been spam emails that take up a large amount of email space. These nuances try to sell you a range of unwanted products and services. For most people receiving these emails, it can be very annoying as it populates their inbox with emails they don’t want to read. Fortunately for end users, there are spam filters to help prevent spam. Basic spam filters come with most web browser based email services. If you are using a separate email client you can use a third party spam filter. Read more

Sharing a printer in your office

The benefits of sharing a printer in your office

Why would you consider sharing a printer?

There are many advantages to print networking and sharing – one of the most important ones is saving money. Businesses constantly monitor their costs and sharing printers can be an effective money saving. If your staff need to print off several documents then you will probably find it cheaper to purchase one large, good quality laser printer that serves the needs of your entire department. Read more

USB Memory Stick

Is it alright to use a USB memory stick instead as our only form of backup?

We recommend you never use a USB memory stick as your only form of backup. Memory sticks are notoriously unreliable and often stop working with little reason. Their small size might make them convenient but this also works against them as it’s very easy for them to become damaged and anything stored on them to become corrupt. They are a great security risk as they can easily become lost or damaged and you may become accountable if it contained private information. Read more