What exactly happens when I drop off a computer and ask you to make it work better?

 

Ooh! I love this question!

It’s not super frequently asked, if ever, but I’m going to answer it anyways.

Firstly-

If you’re dropping off a device, I get you to fill out a form. This helps me understand more about your usage of the device, and the device itself. I like to understand the following:

  • Is it currently working to your expectation?
  • Has it ever broken or been repaired before, and/or how old it is?
  • What drives you crazy about its behavior
  • How long has it been driving you crazy
  • Have you noticed it changing recently in terms of symptoms

The form also helps with a couple other things

  • Who you are, and that this device is yours
  • How to contact you
  • If anyone else uses this computer, which may mean that there would be additional user accounts, or if someone else may have been doing things on there.
  • An ongoing health record if the machine comes back
  • Accountability so I retain notes of any actions I took

So, once your machine is checked in, and each part marked with a little tag that goes onto your form, the checklist begins. (Currently 3rd page of the form). I look at the following:

  • Physical condition. I often open up the computer and show you. I look at age and health of parts.
  • Mental condition. What is the computer currently at in terms of processor usage, memory usage, hard drive storage.
  • Software. Are there things on the machine installed that do not belong? Things that are known to let malware in? Is there evidence of malware itself?
  • Protection. Is the antivirus working, is there enough protection installed? Does the browser usage indicate a higher level of protection would be good. Is the browser itself slowed by extensions?
  • Backup and Security. Is the device backed up? Is there personal data easily accessible on the device, and does the user know and realize the risk. Can risk be mitigated.
  • Future planning. Is this device going to continue serving well, or should it be replaced soon, or portions thereof replaced.

Now, if I have a lot of machines, I will focus on the critical machines, before the non-critical machines. Some actions really are time sensitive. Data loss is a terrible terrible thing, and so I really want to protect against it.

Hopefully this describes a basic computer visit.

About Me

Mel Bryce has lived and worked in the Kootenays for over a decade. She takes her coffee black, and still supports Nvidia graphics cards.

 

 

 

 

 

Mel Bryce - 14 posts

Experienced Owner with a demonstrated history of working in the information technology and services industry. Skilled in Anatomy, Documentation, Command, First Aid, and Supervisory Skills. Strong business development professional graduated from Selkirk College.

FAQ, Shop talk