Get Started Today!  (415) 295-4898

croom new

415 IT Blog

415 IT has been serving the San Rafael area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Tip of the Week: The ABCs of Windows Shortcuts

Tip of the Week: The ABCs of Windows Shortcuts

Windows has no shortage of capabilities to offer its users, with many of these tools coming with an associated Windows shortcut. Since keeping track of all of them can be a challenge, we wanted to assemble a list of most of them for you. This blog will serve as that list, so make sure you add it to your browser’s favorites for quick reference!

  0 Comments
0 Comments
Continue reading

The Power Button is Capable of More Than On/Off

The Power Button is Capable of More Than On/Off

If you’ve ever used technology, the power button has had a pretty consistent appearance, and an even more consistent use. However, there’s a reason that the power symbol we’re so familiar with looks the way it does. Furthermore, there’s more that the power button can ultimately do.

  0 Comments
0 Comments
Continue reading

More Than 70 Percent of PCs Run Windows 10

More Than 70 Percent of PCs Run Windows 10

Ever since Windows 10 debuted in July of 2015, it has slowly risen in its market share. This has continued throughout the tumultuous times that 2020 has provided, as the OS has now reached a market share of 72.2 percent as of October. Let’s go over why this matters, and why—if you haven’t done so yet—you need to add your organization’s PCs to that number.

  0 Comments
0 Comments
Continue reading

Warning Signs That Your Computer Is on Its Last Legs

Warning Signs That Your Computer Is on Its Last Legs

It is no secret that a computer that doesn’t seem to want to behave (or seems to experience constant issues) is something that most people just want to replace, no questions asked. However, by nature of how computing devices are put together, it is entirely possible that your device could simply be in need of a (much less expensive) repair.

  0 Comments
0 Comments
Continue reading

Tip of the Week: Extremely Useful Tips

Tip of the Week: Extremely Useful Tips

All Windows machines are capable of leveraging built-in shortcuts. While it might sound ludicrous, using keyboard shortcuts can eliminate the eight days that the average employee spends every year moving between the keyboard and mouse. Shocking, right? Keyboard shortcuts let you retake all of that lost time and use it to be more productive.

  0 Comments
0 Comments
Continue reading

Desktop Buyer’s Guide 2019, Part V: Other Considerations

Desktop Buyer’s Guide 2019, Part V: Other Considerations

In parts one through four we talked about choosing the right specifications for your desktop, depending on its role. We talked about selecting the right CPU, RAM, storage, and display options. This final post we hit a few other tips and ideas we came up with that didn’t fit into the other posts.

  0 Comments
0 Comments
Continue reading

Desktop Buyer’s Guide 2019, Part IV: Videos, Graphics, and Monitors

Desktop Buyer’s Guide 2019, Part IV: Videos, Graphics, and Monitors

Your new desktop isn’t going to do you much good if you don’t have a screen to plug into it. Let’s talk about considerations to make when purchasing a new desktop when it comes to your display.

  0 Comments
0 Comments
Continue reading

Desktop Buyer’s Guide 2019, Part III: Choosing Storage

Desktop Buyer’s Guide 2019, Part III: Choosing Storage

We’re on to part three of our Desktop Buyer’s Guide. When comparing all of your options when shopping around for desktops, one of the main features you’ll see is how much storage they have. We’ve seen this with smartphones and tablets as well - you can buy an iPhone with 64 GB (gigabytes) of storage or 128 GB of storage, etc.

  0 Comments
0 Comments
Continue reading

Desktop Buyer’s Guide 2019, Part II: How Much RAM Do I Need?

Desktop Buyer’s Guide 2019, Part II: How Much RAM Do I Need?

In part two of our desktop buying guide, we talk about one of the most confusing specifications you’ll see whenever you purchase a computer. We’re going to demystify memory, also referred to as RAM.

  0 Comments
0 Comments
Continue reading

Desktop Buyer’s Guide 2019, Part I: Choosing the Right CPU

Desktop Buyer’s Guide 2019, Part I: Choosing the Right CPU

Are you looking to purchase a new desktop for your business (or for home)? We’ve put together this handy guide to help demystify the computer-buying process. This is the first part of five in our series, selecting the right CPU.

  0 Comments
0 Comments
Continue reading

When Do You Know When It’s Time For an Upgrade?

When Do You Know When It’s Time For an Upgrade?

Nothing lasts forever; this phrase is true regardless of which industry you’re in or business you run. We all use technology in the office to a certain extent, and the ugly truth is that someday that technology will fail. It’s critical that you monitor technology for warning signs prior to its failure so as to avoid costly repair bills and rushed replacements. You might be surprised by how much you save as a result.

  0 Comments
0 Comments
Continue reading

Tech Term: Responsive Web Design

Tech Term: Responsive Web Design

We all have our favorite websites to visit, as well as those we often have to visit to fulfill our responsibilities. As a result, it isn’t uncommon for us to try and access the same websites on both a desktop workstation and a mobile device, but some websites work better than others while trying this. This is because of something called responsive web design, which we’ll review below for our weekly Tech Term.

  0 Comments
0 Comments
Continue reading

Tip of the Week: How to Speed Up a Windows PC

Tip of the Week: How to Speed Up a Windows PC

The personal computer is a remarkable tool, allowing us to accomplish levels of productivity and efficiency at speeds that were once only dreamed of… at least, that’s how it feels at first. However, it doesn’t take very long for a computer to seem like it drags on and on before performing the task requested of it. Why is that, and how can this be resolved?

  0 Comments
0 Comments
Continue reading

Tech Term: Protocol

Tech Term: Protocol

Computers use quite a lot of different types of protocol to function. In particular, the Internet takes advantage of protocol to a great degree. You might recognize terms like Hypertext Transfer Protocol Secure, Transmission Control Protocol/Internet Protocol, File Transfer Protocol, Internet Message Protocol, and Post Office Protocol. But what exactly is protocol, and why is it important?

  0 Comments
0 Comments
Continue reading

Tech Term: Safe Mode

Tech Term: Safe Mode

Sometimes it can be hard to diagnose a problem with your PC. While it might not be something system-breaking, it’s still important to find the root of an issue before it becomes a major problem. One of the best ways to diagnose an issue with your computer is by logging in using Safe Mode. We’ll talk about when and how you can use Safe Mode to your computer’s benefit.

  0 Comments
0 Comments
Continue reading

Power Off, or Leave It On?

Power Off, or Leave It On?

At the end of the day, do you shut down your computer or do you put it into sleep mode? Depending on what you need from your device the next day, you might want to consider which option benefits you the most. Here are some of the pros and cons of both approaches so that you can pick which one best suits your situation.

  0 Comments
0 Comments
Continue reading

Tech Term: Motherboard

Tech Term: Motherboard

A computer is made up of many parts, one of which is today’s Tech Term: the motherboard. We’ll discuss what the motherboard does for your computer and why it’s such an important part for its continued operation.

  0 Comments
0 Comments
Continue reading

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing IT Support Data Network Security Data Backup Privacy Cloud Hosted Solutions Internet IT Services Efficiency Software Business Data Recovery Email Managed IT Services Small Business Hackers User Tips Innovation Google Mobile Device Phishing Malware Business Management VoIp Collaboration Hardware Communication Workplace Tips Cybersecurity Outsourced IT Smartphone Computer Upgrade Backup Cloud Computing Android Managed Service Microsoft Quick Tips Tech Term Mobile Devices Business Continuity Windows 10 Disaster Recovery Communications Covid-19 Smartphones Passwords Ransomware Users Managed Service Provider Remote Work Saving Money Paperless Office Browser Network Encryption Remote Monitoring Windows Data Management Artificial Intelligence Office 365 Business Technology Wi-Fi Server BDR Internet of Things Managed IT Compliance Social Media Help Desk Microsoft Office Windows 7 Save Money Healthcare Holiday Vulnerability Government Document Management Managed IT services Applications Blockchain Managed Services Data Security Employer-Employee Relationship Virtualization Chrome Scam Information Facebook Miscellaneous Health Laptops Remote Automation Office Tip of the week Infrastructure Training Machine Learning Vendor Management Gadgets Project Management Avoiding Downtime Wireless Antivirus Two-factor Authentication Analytics Processor Redundancy Mobile Office Bandwidth Meetings BYOD Files Access Control Storage Mobility Information Technology Router Virtual Private Network HIPAA Employees OneDrive Software as a Service Net Neutrality Employee-Employer Relationship IT Management Patch Management Apps Website WiFi Customer Relationship Management Data Loss Password Company Culture RMM Maintenance VPN IoT Time Management Regulations Proactive Networking Hard Drive Remote Worker Operating System Display Gmail The Internet of Things Telephone Utility Computing Electronic Health Records Risk Management Bring Your Own Device Cooperation Consulting Server Management Downtime Money Professional Services Instant Messaging Remote Computing Word Free Resource Data Breach Vendor Managed Services Provider Mobile Device Management Data Storage Mobile Customer Service Assessment Tablet Dark Web Augmented Reality Recycling Images 101 Internet Exlporer Remote Workers Big Data Network Management Social Network Smart Technology Smart Devices Alert Current Events Consultation Computing Conferencing Authentication Monitoring Flexibility Management Holidays Mobile Security File Management Search Co-Managed IT Unified Communications File Sharing Payment Cards Unified Threat Management Financial Voice over Internet Protocol Spam Remote Monitoring and Management Value of Managed Services App Servers Peripheral Operations PowerPoint Identity Theft Enterprise Resource Planning Politics IT YouTube Digital Payment Hotspot Managed IT Service Cybercrime Cyber security Cache Lenovo Optimization Private Cloud CES Teamwork Geography How To Test Laptop Options Samsung Bluetooth Procurement Banking Return on Investment Social Networking IT Consulting WPA3 Recovery Video Conferencing 2FA Black Friday Screen Reader SharePoint PCI DSS Identity Business Telephone Videos Mouse Language Break Fix Database Management Superfish Bookmarks Virtual Machines ROI Shared resources Going Green Modem Mail Merge High-Speed Internet User Error Remote Working 5G Tech Support Mobile VoIP Cyberattacks Social Reviews Permissions Settings Personal Information G Suite Fleet Tracking Zero-Day Threat Biometric Cyber Monday Staff Manufacturing Smart Tech Downloads Websites Microsoft Excel Virtual Assistant Bitcoin IT Assessment Media Computing Infrastructure GDPR Favorites Credit Cards Batteries Address Development Budget Wireless Internet IT Technicians Cost Management Read Only Security Cameras End of Support Google Calendar Fraud Transportation Active Directory Motherboard Chromebook Asset Tracking Backup and Disaster Recovery Gamification Connectivity Point of Sale SaaS Tech Terms CRM Wasting Time Techology MSP Finance Digitize Ergonomics Alerts Virtual Reality Migration eWaste Computers Customer Relationships Travel CIO applications Cookies Cables Employer/Employee Relationships Apple Touchscreen Windows Server 2008 Hacking Printing Gifts Windows Server Vulnerabilities Technology Laws Human Error Firewall Hard Disk Drives Sensors Emergency Multi-Factor Security E-Commerce Theft Content Filtering Database Outlook Managing Stress Disaster Resistance Shadow IT Vendors Comparison Licensing Wires Printer Heating/Cooling Electronic Medical Records Data Warehousing Notes Chatbots Innovations Technology Tips Nanotechnology Proactive Maintenance Mirgation Solid State Drive Trending Hacker Legislation User Management Mobile Computing Unified Threat Management OneNote Permission Outsource IT Distributed Denial of Service Solid State Drives Wearable Technology Star Wars Features Statistics Projects Shortcut Enterprise Content Management Proactive IT Authorization Outsourcing Analysis Specifications Daniel Stevens Regulation Marketing Twitter Printers Education CEO Students

Latest Blog

The first half of this year has seen its fair share of ups and downs, especially on a global scale. With a global pandemic still taking the world by storm, it’s despicable that hackers would take advantage of the opportunity to make a quick buck using phishing tactics. Yet, ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...