Attend IT Limited Blog

Tip of the Week: Turn It Off and Turn It On, Again

Tip of the Week: Turn It Off and Turn It On, Again

The people that support a business’ information systems are widely renowned as a bunch of nerds sitting in a basement office waiting for someone that matters calls them upstairs. Now, we think this characterization is unfair (of course), but since our jobs are so technical, it can be hard to relate with clients all the time. Fortunately for us, the most useful tool we have in our repertoire is excruciatingly simple. To fix your computer problem, have you tried turning it off, and turning it back on? 

Is It as Simple as a Reboot?

To answer this, let’s consider what actions you take with your computer (or any other network attached electronic device). You start your computer, it loads programs, you download more programs, not considering just how much work goes into this. Often times, part of an action doesn’t function the way you’d expect it to. Activities run in the background. You keep using the device. Your system’s resources are being taxed by all these actions. Yet, you keep using the device. Ultimately, you’re working with a RAM-stuffed machine that is crawling along at a speed you don’t recognize. 

Then you reboot.

Suddenly, all those unnecessary processes stop. Once your machine is back up and running again, your RAM is clear, the processes that were dragging down the performance of the technology are no longer running. Your computer works as you expect it to.

You turned it off and you turned it back on, and now your computer is fixed. Simple, and funny in the right context. It’s no wonder that since this fixes a lot of problems that people think IT professionals are condescending nerds. 

On a side note: In no way will rebooting your computer fix a major problem with your computer. You can turn it off and on again, and if it still has an issue, you likely have something else wrong. Then, go ahead and give the nerds a call.

For more great tips, call our IT professionals today at 020 8626 4485, and stop back to the Attend IT Limited blog to learn more about IT.

What You Need to Know About Bloatware
Any Business Can Benefit from Digital Signage
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, February 18 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Network Security Technology Business Computing Tip of the Week Cloud Best Practices Managed IT Services Privacy Hosted Solutions Malware Disaster Recovery Data Recovery Hackers communications Productivity Data Backup Outsourced IT Backup Data Business Innovation Cloud Computing IT Services Productivity Software Cybersecurity Mobile Devices Email Computer IT Support VoIP Business Continuity Small Business Internet of Things Saving Money Business Management Efficiency Hardware Internet IT Support Upgrade Information Technology Microsoft Managed IT Managed IT services Automation Server Phishing Mobile Device Management Smartphone Collaboration BDR Mobility Risk Management Windows 7 Budget Artificial Intelligence Avoiding Downtime Save Money BYOD Quick Tips Cost Management Virtual Private Network Hosted Solution Communication Password Data Management Remote Computing Spam Compliance Network Ransomware Firewall User Tips Gadgets Managed Service Provider History Smartphones Hybrid Cloud Hard Drives Conferencing Business Technology MSP Value Audit Workplace Tips Remote Workers Solid State Drive Printing Saving Time Automobile Data Breach Redundancy Data Security Personal Information Tech Term Windows 10 Passwords Computers Networking Android Telephone Systems Router IT Service Document Management Marketing Paperless Office Manufacturing Recovery Managed Service Content Filtering Devices iPhone Computer Repair Lifestyle Meetings Save Time Smart Technology Cybersecurty Travel Management Printers Project Management Students Utility Computing Two-factor Authentication VPN Windows 10 Cybercrime SMB Active Directory Smart Tech Vendor HIPAA Training Windows Server 2008 Encryption Electronic Medical Records Transportation Facebook Development Operating System Break/Fix Window 10 Software as a Service Spyware The Internet of Things Virtualization Microsoft Office IoT Google Downtime Financial Technology Unified Communications Social Media Advertising Windows Server Commerce Connectivity Employee-Employer Relationship Proactive IT Private Cloud Employees Going Green Update Help Desk Upgrades WPA3 Telephony Mobile Computing Applications Online Storage Apple Shadow IT Big Data Legal Business Intelligence Wasting Money E-Commerce Copiers intranet Remote Monitoring Human Resources Instant Messaging Evernote Streaming Media Wireless Internet Administration File Storage Antivirus Customer Relationship Management User Error Dark Web Wireless Technology App Computing Amazon Payment Cards Word Voiceover Internet Protocol Payroll Browser Machine Learning Mobile Content Filter Gamification Education Cleaning Colocation Bandwidth Holiday Government Voice over Internet Protocol Data Loss Social Engineering Money SaaS Managed IT Service Analysis Virtual Assistant Work/Life Balance Employer-Employee Relationship Vulnerability Regulation Business Telephone Mobile Device OneNote Hacking Black Market Professional Services Workers Monitoring Phone System Nanotechnology Application Hacker Azure Data Protection Chromebook Entertainment Samsung e-waste Fiber Optics Disaster End of Support Flexibility Mobile Office Proactive Alexa for Business Office 365 Backup and Disaster Recovery Music Video Games Smartwatch Identities Text Messaging Updates IT solutions Patch Management Root Cause Analysis Battery Users Adobe Wireless Charging IT Management Reputation YouTube Microsoft Excel Gmail Wasting Time Scalability CRM Websites Unified Threat Management Screen Mirroring Mobile Security Information Wi-Fi Computer Accessories Analytics Health Server Maintenance Inventory Legislation Settings Office Tips Myths Tablets Microsoft Word Windows 10s Outlook File Sharing Augmented Reality Keyboard Shortcuts Point of Sale WannaCry Company Culture Holidays PowerPoint Accessory Safety Internet Exlporer Keyboard Gifts Data Theft Cast Identity HaaS 5G Tech Support Computer Fan Windows Investment Communitications Comparison Language Business Strategy Identity Theft Office Google Drive Threats NFL Maintenance Hard Disk Drive Shortcut Display Storage Chrome Security Cameras Processor Licensing Testing Politics Charger Social OneDrive Peripheral Managing Stress Emergency Humor Micrsosoft Consultant Data Privacy Vendor Management Alert Medical IT Fraud USB Books Search ROI Hosted Desktop Specifications Worker Commute Scam Scams eWaste Excel Google Assistant Co-Managed Services Sabotage Sports IT budget Television CrashOverride Financial PDF Best Practice Benchmarks Emails IT Solutions Camera Experience Wireless Access Control Robot How To Digital Signage Credit Cards HBO Hard Drive eCommerce Edge Computer Care Telephone Virtual Reality Windows Server 2008 R2 Smart Devices Sales Virus Employee Managed Services Provider Windows Ink Device Security Twitter PC Cortana Blockchain Bring Your Own Device Apps Webinar WIndows Server 2008 Projects Relocation Unsupported Software Memory Admin Worker Current Events FAQ Touchscreen Law Enforcement Google Docs Ciminal Computer Forensics Hyperlink Troubleshooting Retail WiFi Data Storage App store Miscellaneous Facebook Privacy Google Maps iOS Sync