Get Started Today!  (415) 295-4898

croom new

415 IT Blog

415 IT has been serving the San Rafael area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Desktop Buyer’s Guide 2019, Part V: Other Considerations

Desktop Buyer’s Guide 2019, Part V: Other Considerations

In parts one through four we talked about choosing the right specifications for your desktop, depending on its role. We talked about selecting the right CPU, RAM, storage, and display options. This final post we hit a few other tips and ideas we came up with that didn’t fit into the other posts.

  0 Comments
0 Comments
Continue reading

Desktop Buyer’s Guide 2019, Part III: Choosing Storage

Desktop Buyer’s Guide 2019, Part III: Choosing Storage

We’re on to part three of our Desktop Buyer’s Guide. When comparing all of your options when shopping around for desktops, one of the main features you’ll see is how much storage they have. We’ve seen this with smartphones and tablets as well - you can buy an iPhone with 64 GB (gigabytes) of storage or 128 GB of storage, etc.

  0 Comments
0 Comments
Continue reading

Desktop Buyer’s Guide 2019, Part II: How Much RAM Do I Need?

Desktop Buyer’s Guide 2019, Part II: How Much RAM Do I Need?

In part two of our desktop buying guide, we talk about one of the most confusing specifications you’ll see whenever you purchase a computer. We’re going to demystify memory, also referred to as RAM.

  0 Comments
0 Comments
Continue reading

Desktop Buyer’s Guide 2019, Part I: Choosing the Right CPU

Desktop Buyer’s Guide 2019, Part I: Choosing the Right CPU

Are you looking to purchase a new desktop for your business (or for home)? We’ve put together this handy guide to help demystify the computer-buying process. This is the first part of five in our series, selecting the right CPU.

  0 Comments
0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Data Backup Business Computing Data Network Security Privacy Hosted Solutions IT Support Data Recovery Cloud Software Email IT Services Malware Outsourced IT Internet Tech Term Managed IT Services Business User Tips Innovation Computer Efficiency Windows 10 Hackers Microsoft Small Business Cloud Computing Upgrade Business Management Collaboration Hardware Phishing Mobile Devices Ransomware Google Business Continuity Paperless Office Cybersecurity Managed Service Workplace Tips VoIp Android Communication Office 365 Managed Service Provider Remote Monitoring Smartphones Communications Encryption Server Backup Business Technology Vulnerability Passwords Managed IT Artificial Intelligence Internet of Things Holiday Managed IT services Disaster Recovery Healthcare Data Management Wi-Fi Government Document Management BDR Browser Saving Money Applications Laptops Facebook Smartphone Help Desk Mobile Device Save Money Quick Tips Windows 7 Tip of the week Scam Redundancy Compliance Bandwidth Avoiding Downtime Automation Antivirus Processor Microsoft Office Information Blockchain Social Media Project Management Employer-Employee Relationship Data Loss Machine Learning Two-factor Authentication Chrome Analytics Website VPN Vendor Management IT Management Network Customer Relationship Management Access Control BYOD RMM Windows Miscellaneous Data Security Infrastructure Router Operating System Internet Exlporer Dark Web Alert OneDrive Mobility Professional Services Training Smart Technology Employees Maintenance Consulting Downtime Server Management Social Network Recycling Employee-Employer Relationship Company Culture Networking Gadgets Search Mobile Security Assessment Password Unified Communications Apps Remote Workers Files Regulations Network Management IoT Users Consultation Virtual Private Network Management File Sharing The Internet of Things Hard Drive Gmail File Management Risk Management Cooperation Word Proactive Monitoring Software as a Service Net Neutrality Patch Management Storage Bring Your Own Device HIPAA Utility Computing Financial Unified Threat Management Tablet Remote Monitoring and Management Servers Options Telephone Modem High-Speed Internet Politics Return on Investment Remote Computing Augmented Reality Managed Services G Suite Google Calendar Fraud Office Private Cloud Techology Tech Support How To Test Going Green Mobile Electronic Health Records Procurement Bluetooth Database Management Smart Tech Computing Alerts WPA3 Recovery Shared resources Virtual Reality 5G Mobile VoIP Development Travel Instant Messaging Technology Laws Settings Personal Information Emergency Multi-Factor Security Manufacturing Vendor Motherboard Chromebook Bookmarks ROI Outlook Disaster Resistance Virtual Assistant Bitcoin IT Technicians Cost Management Firewall Printer Virtualization Batteries Cyberattacks Social GDPR Connectivity Comparison Licensing Fleet Tracking Zero-Day Threat Data Warehousing Flexibility Managed Services Provider Mobile Device Management Websites Wireless Internet Big Data Cookies Cables Technology Tips Customer Service Unified Threat Management Transportation Active Directory Migration eWaste Wireless Smart Devices Vulnerabilities Legislation Favorites Shortcut Proactive IT Wasting Time Current Events Distributed Denial of Service CIO applications Remote Work Managing Stress Read Only Security Cameras Specifications Asset Tracking Backup and Disaster Recovery Operations Point of Sale Tech Terms SaaS Lenovo Employer/Employee Relationships Apple Nanotechnology Wires Digital Payment Hotspot MSP Finance Windows Server Chatbots Samsung Hard Disk Drives Sensors Mobile Computing Conferencing IT Consulting Database Mirgation Managed IT Service SharePoint Spam Enterprise Content Management Printing Touchscreen Hacking Notes Wearable Technology Star Wars Black Friday Human Error Enterprise Resource Planning Money E-Commerce Theft Time Management Superfish Proactive Maintenance Solid State Drive App Mouse Language Authentication Mail Merge User Error User Management Identity Theft Electronic Medical Records Heating/Cooling Solid State Drives Payment Cards Geography Meetings Data Breach Voice over Internet Protocol Projects Cache Break Fix Downloads Value of Managed Services Social Networking Permissions Remote Worker Trending PowerPoint Display Cyber Monday Staff OneNote Permission Identity Microsoft Excel Features Statistics Cybercrime Cyber security Screen Reader Computing Infrastructure Authorization Address WiFi Teamwork Information Technology Regulation Marketing Windows Server 2008 Twitter Co-Managed IT Education CEO Printers Students Daniel Stevens

Latest Blog

We all know how important it is to protect your desktop and laptop computers from malicious threats. Installing antivirus and security software is one of the first steps you take when you get a new computer, and for good reason. An unprotected device is at great risk. With t...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...