Welcome to The
CDO TECHNOLOGY NEWS BLOG
Smart Way to Use Remote IT Support Quickly & Safely
We all seem to be in a constant online battle to protect our data from hackers. Without the proper protection, you are at risk every time you go online. Finding the right company to help educate you and protect your business may seem hard to find, but...
read moreHow to Use Managed IT Services in Your Business
The online world today is more dangerous than ever. Business and personal computers are susceptible to being attacked. Hackers can steal your most valuable data or encrypt it. And if your data gets encrypted, it will prevent you from accessing your files, data,...
read moreHow to Protect Your Business from IT Threats
Hackers are always improving their methods to get the information they want. If the necessary precautions aren’t in place to protect your information, it can affect your business, employees and your customers. This includes personal information, work history, critical...
read moreGuide for Creating Your Dream Computer
It has been a long time coming and you are ready to own a computer that stands the test of time. You may have the vision of what it is that you want but not exactly sure what is required to make this vision become a reality. Building your dream set up will depend on...
read moreFive Tips to Keep Yourself Safe Online.
The current technology market is adapting so quickly that it can be hard to keep up with. In 2017, we had one of the worst data breaches in history when Equifax was hacked and the information of 143 million users including social security numbers was exposed. The most...
read more5 Tips for Protecting Your Small Business from Cyber-Hackers
Gone are the days when free, downloadable antivirus software could keep your business safe from outside threats. In our new age of increasing cyber vulnerability, you need hardy software to protect the business you’ve worked so hard to grow. While there…
read more20 Years! Happy Birthday CDO Technology!
HAPPY BIRTHDAY CDO – 20 Years! CDO Technology has been a custom-builder of business and consumer computers, a parts retailer, and a service center in Greenville, SC since 1998. From a humble beginning, CDO now keeps well over 20,000 parts …
read moreBenefits of Purchasing Non-Proprietary Workstations
Before delving into the benefits to be gained from purchasing non-proprietary workstations for your company, an explanation of what is meant by proprietary is necessary. Many people don’t realize the difference prior to choosing new workstations but …
read moreWhat Graphics Card is Right for Me? – How to Choose.
When determining which kind of graphics card would be ideal for a particular computer system, one must consider for what purpose the system is to be used. There are two primary classifications of graphics cards: professional and consumer. The professional cards are…
read moreHow to Choose Parts for a Professional Workstation
Creating the perfect Performance Workstation that will do what you need it to do can be very difficult. To do this, you have to understand how the different hardware parts affect workstation performance for your specific work tasks. The key hardware choices you have…
read moreWhat is RAID? – The Benefits and Types of RAID Explained
Here at CDO Technology we are often asked; “What is hard drive RAID?”, “Do I need a RAID array?”, “What is the difference between the types of HDD RAID arrays?”. So we have prepared the following post explaining what a RAID array is…
read moreWell Spec’d-out PC is a Must for VR Gaming in 2016
For gamers and tech-addicts, 2016 is shaping up to be a storm of incredible leaps forward in virtual reality technology. Although many consoles are taunting potential virtual reality players with cheap models, those who want the full experience know that a spec’d-out PC …
read moreRansomware Explored: CryptoLocker/CryptoWall
Perhaps one of the most frustrating malware infections found today is file encryption ransomware. The two notable ones are CryptoLocker and CryptoWall. These are classified as malware; they are not technically viruses. Ransomware often infect a computer by being…
read moreSSD vs SATA HDD – How to Choose the Best Hard Drive
CHOOSING BETWEEN HARD DRIVES AND SSDs Today’s workstations come with more options than ever before. Once you’ve determined the specifications that you need for your business, there is one more decision you must make: should you get an SSD drive or a SATA/HDD…
read moreHow to Configure the Perfect Gaming System
Game Enthusiasts understand that no other platform can match the quality and intensity of the game-play that you can get from a correctly configured Gaming Desktop. These Game Enthusiast Desktops are very specialized high-performance systems where …
read moreHow to Properly Clean a Keyboard
One of the most common computer peripheral that requires thorough cleaning is the keyboard. Keyboards tend to require cleaning quite often due to the propensity of people to eat and drink while they type a document, play a game, or watch a movie. Regular collection of…
read moreWhat is a KVM Switch? How will it make life easier?
One of the most useful technological devices for home and business situations is the KVM switch. The name is technically “keyboard, video, and mouse switch.” KVM switches save time by allowing one to view multiple computers on one monitor by switching among …
read moreIntel Releases New CPUS: Is It Too Early to Get Excited?
The one constant in the world of technology and computers is change. No matter how innovative a product is, there always comes a time for updates. So naturally, when Intel initially announced its plans to update its i7 and Xeon CPUs, the news was met with interest. Now …
read more