KCS offers the tools and resources to build scalable, durable, and secure businesses that work with your current solutions, or replace your existing infrastructure with state of the art technology solutions to help your business worry about the business and not the technology.
Since 1993, KCS has spent years working with businesses locally and internationally, solving a variety of IT challenges. KCS made it a priority to provide its customers with the best IT Solutions and Support for any given industry.
Just because the typical work day ends, that doesn't mean KCS is clocked out. With 24/7 support, 365 days a year, KCS provides its clients with support no matter the time or day. KCS knows how important it is to minimize any down time and prides itself in understanding client needs.
CPU (Central Processing Unit) is the brains of a computer. Its performance is determined by the number of transactions it performs per second measure in gigahertz (GHZ) which is 1,000,000,000 cycles. Mainstream modern computers usually have CPUs capable of at least 3.0GHZ speed. Speed is also determined by the number of cores. Each core is like a separate processing unit within the CPU. Personal computers usually have two or four core CPUs. Servers can have as many as 26 cores per CPU. Servers also come with multiple CPUs. The other major speed determiner is the number of threads. A thread is a path that data for data to be processed. Each core can have more than one thread. It’s the combination of all the above factors that determines the speed the CPU processes data.
RAM (Random Access Memory) stores data and machine code electronically for use by the CPU. It is very fast and does not permanently store information. Size is measure in gigabytes (GB). A GB is 1,000,000,000 bytes or units of data such as a number or character. Most personal computers have at least 4 but preferably 8GB of RAM or more. Servers can utilize much more RAM – 2TB (1,000GB) or more. More RAM means better performance.
Hard drives are devices for permanent storage of data. Data can be written and erased from them There are two major types – mechanical and solid state. Internally mechanical drives look like phonograph players with a spinning disc and a read/write arm.
Solid state drives (SSD) are electronic devices with no moving parts. They come in various forms including USB drives commonly called thumb drives. Those used in computers resemble their mechanical counterparts but are usually smaller. SSDs are much faster and will eventually replace mechanical drives in most applications.
For a monthly fee a managed service provider takes responsibility for managing some or all of the IT (Information Technology)equipment and software of the contracting firm.
The cloud refers to a system whereby data and/or programs are stored on computers that are accessed through the Internet rather than or in conjunction with equipment in-house. Some cloud services such as accounting programs or office suites are not free and are billed, usually as a monthly fee and may be tied to the number of users requiring the service.
Cyber-security is a collection of hardware and programs put in place to protect a computer system from intrusion, data theft and damage from outside sources primarily through the internet.
Good security requires security routers, anti-virus programs, email monitoring and screening, web filtering, insistence on strong passwords, user account maintenance, two factor authentication for remote users, remote monitoring, in-house and on-line/cloud backup and employee training.
A server is a high power computer that serves as a repository of data and programs that are accessible to other computers through a network. The network could be local or the internet, wired or wireless.
Virtualization is the act of building a virtual machine on an actual physical computer that acts just like it was a separate physical computer. This means several machines of different types can reside on one physical computer. Not only does this reduce the amount of hardware required but a backed up virtual machine can be completely and quickly restored if the primary image is corrupted or hacked.What do you do if you get a popup window telling you your computer is infected?
Virtualization is the act of building a virtual machine on an actual physical computer that acts just like it was a separate physical computer. This means several machines of different types can reside on one physical computer. Not only does this reduce the amount of hardware required but a backed up virtual machine can be completely and quickly restored if the primary image is corrupted or hacked.What do you do if you get a popup window telling you your computer is infected?Do not respond or click on any links on the window. Do not call any numbers shown. Take down the message as it appears then close out the window. If it will not close then turn off your computer. Call you IT support person and relate the message to them. They will let you know what to do.
I have been working at KCS for over 13 years. I do everything from design and implementation of networks and systems as well as upgrades and repairs to existing ones to setting up new computers and fixing small issues. I mainly deal directly with our clients to ensure all their needs are met and they are able to function normally with their IT systems.
I have worked for KCS for 9 years. Customer service is very important to me. Creating a healthy work environment is essential and enables our employees to give the best and most efficient client experience.
I have been working at KCS for over 2 and a half years. I initially started as a repair technican and eventually moved to become a full-time IT technician, assisting all other technicians with their clients in the field and remotely.
I've been working at KCS for over 3 years, working with storefront customers and helping wherever I can for our business clients whether it's renewals or monitoring their backups.