Category: Computer & Networking Services


  • Discarding Old Equipment

    Here at BCS, we’ll wipe out all data off each device before removing them from the devices to discard. Once those process is complete, we’ll then donate or recycle the device. By wiping the hardware used to storage data and removing it from the devices, we’ll ensure that no data will end up in the…

    Read More


  • Teaching Others

    Not only our goal is to fix the issue but to also provide the customer with new knowledge and skill so that they can avoid having reoccur issues. This would help them grow and become better with minimizing as much downtime as possible.

    Read More


  • vssadmin shadowstorage

    I ran into an issues today with one of our clients backup not running properly.  After checking the log – “There is not enough space on the volume where the snapshot storage is located.”  This log is a bit misleading.  I’ve tried to clean up the hard disk a bit using space mongo.  Re run…

    Read More


  • Disk Clean Up Tools

    Do you have a server or pc that is not working due to disk storage full or almost full? If you are an IT administrator or even a desktop support, you probably have ran into these issues. Sometimes, it’s legit that a person hard drive is full do to legit space usage, but more often,…

    Read More


  • WiFi 2.4ghz vs 5ghz

    Often, you’ll find that your router or access point will give you the option of two Wifi band. There is no better option but just what works best for your situation. 2.4ghz band travels at longer wavelength which will allow the band to travel further distance and penetrate through walls and floor but is prone…

    Read More


  • Endpoint Security

    ,

    An endpoint is a type of communication device that connects to the network. Back then there are desktops, laptops, and handheld devices such as iPad, or cellphone. These devices can be simply protected by installing anti-virus software that scans for the signature-base of the virus and destroys it. Now, as the technology world evolves, endpoints include the…

    Read More


  • NETWORK SECURITY

    Understanding the vulnerability of being attack online by cyber threats is very important nowadays.  As the world runs through networking, sadly say, there are trained IT people that work to disrupt, damage,  and destroy data just to gain information and money they can use for themselves. As simple as clicking an email can allow them to get into…

    Read More


  • THE INTERNET, TECHNOLOGY, AND BUSINESS CHANGES

    The Internet has been very interesting. From the DOT COM to the DOT COM bust, technology have been changing superfast.  Then come the search engine and ecommerce. Then VOIP, SD WAN, now cloud-based servers, software, services, and software as a service.  We use to judge a company credibility by the nice fancy office that they…

    Read More


  • REPLACING AP WITH A ROUTER

    A service was called to troubleshoot an AP issue. The AP device is no longer functional. The customer wasn’t interested in purchasing a new one but instead handed us a Linksys Wifi Router to replace the AP. We went ahead and assign the router IP with an unused static IP in their network. We were…

    Read More


  • RESET ROUTER TO FACTORY DEFAULT, DON’T BE SO FAST TO DO IT.

    We get a few call a month from customer and or potential customer asking us to come help them with their down network. Typically, either their internet is down, their network is down, or both. We have notice from asking customer questions, that the ISP (internet service provider), always ask them to reset the router…

    Read More