Computer repair Los Angeles- How do I find a good repair service?

Q. I am a business owner with offices in Santa Monica, CA and Los Angeles. I want to form a relationship with a technically competent and reliable Los Angeles computer repair company. This IT Support Los Angeles company must be good at malware removal which includes skills in virus and spyware removal. They also must be experts in hard drive recovery or data recovery Los Angeles. So what characteristics would you recommend in a PC repair Los Angeles or Santa Monica company?

A. I am also a business owner with experience in dealing with Santa Monica computer repair companies.

Here are the characteristics to look for:

1. Be an independent company not a chain or big box store so the computer repair solutions can be tailored to your needs and not colored by affiliate or supplier relationships with certain companies.

2. Be available up to 24 hours per day 7 days a week. Since you have a business, you cannot be tied to fixed operating hours when you have a computer emergency. Your income is tied to your computers. PC Repair must there when you need it.

3. Use a company with multiple credible references. Preferably video client feedback. Video testimonials are difficult to fake if the person identifies him or her self. The more videos the better. Minimum of 5 or more video client feedbacks.

4. Provide a 100%, no questions asked, money back guarantee. No excuses. Just get the job done.

5. Be a 1 call/1 stop solution provider. This includes IT support, malware removal, new computers, onsite repair, computer training, desktop and mobile websites, make those websites rank high in the search engines, computer networking and whatever else your computer, PC or laptop needs may be.

6. Provide detailed invoices that include spreadsheet style accounting for the time spent on your issues. Each repair action should be explained. This way you are not in the dark about what the IT problem or the solutions were.

7. Provides a comprehensive, reliable backup solution that includes online, offsite backup. Also includes cloning or mirroring of hard drives to recover quickly from a hard drive crash. A hard drive crash is a matter of when, NOT if. As the Boy Scouts say, BE PREPARED.

8. Be a company in business for over 15 years. This proves their reliability and likelihood of being around when you need them. No fly by night operators.

9. Be a skilled and dedicated spyware and virus killer as you expressed in your original question. This means the techs at the company do not depend on 1 anti-virus or 1 anti-spyware program to protect your precious company financial, client and other data from the computer criminals out there.

10. Computer techs must also be seasoned business persons and not computer geeks. This means your computer repair Los Angeles or Santa Monica Company will offer IT solutions to increase the number of your clients or customers. It also means they will offer procedures to make your job easier.

11. Provide laptop repair. Laptop repair is a specialty. Only a few do it well. Therefore, expertise in laptop repair Los Angeles or laptop repair Santa Monica (you said you have offices in both locations) is a requirement if you have a mixture of laptops and desktops in your business.

12. Your Los Angeles computer repair company must return calls, show up when promised and make your repairs on your schedule, not theirs (If possible. To be fair, sometimes a replacement part must be ordered).

13. Network security. It is likely you have a computer network. Your computer consultant must secure your network from outsiders. This includes both wireless and wired networks.

14. Remote repair over the Internet. You Computer Repair Santa Monica company must be able to access your machine remotely and make repairs. This means they do not have to be physically present to make some repairs.

There are my more than bakerâs dozen tips on the type of characteristics for IT Support Los Angeles and Santa Monica. I have been in business in this area for many years. I hope my tips were helpful to you.

You also asked for a recommendation.

I recommend No Sweat !!! Computer Consultants at 310-392-4840. On the web at http://www.computerrepairlasantamonica.com.

I've been their client for over 15 years. No Sweat !!! saved my business bacon on a number of occasions by being responsive, proactive and planning for computer disasters. No Sweat !!! performs the 12 tips above far better than any other computer repair company I tried. I give them my highest recommendation. Referring back to Tip # 3 above. No Sweat !!! has 7 client video feedback videos (as of this writing) on its website.

John Dawson

What is the best, most expensive data recovery program?
Q. My information is really vital to me and I need to get a real professional program that works. My Job depends on it. Help!!!

A. First of all you should stop using your disk/computer that needs to be recovered, to avoid overwriting potentially recoverable data. But I guess you know this.

For recovery program idk. You should really provide more info on what type of files it is you need to recover, and what you have done / how you lost this data..

What are non-conventional jobs for someone with a computer science degree?
Q. Obviously, there are "traditional" jobs for people graduating with a BA in Computer Science, such as jobs as a software engineer. I'm wondering - what types of "non-traditional" jobs are there for Computer Science BAs willing to get a graduate degree, either in computer science or another field?

A. The obvious CS degree jobs are programming related but there are many other IT jobs like these:

Computer Technician - Works on computer hardware at user location or in service center. (entry level IT Job)
Service Center Coordinator - Schedules the repair of user community computers, orders spare parts, schedules staff, establishes priorities, maintains loaner laptops and non-US laptops for travel outside of US.
Help Desk Staff - answer questions and resolve problems for the user community. (entry level IT Job - Tier 1 support)
Storage Administrator - in charge of mass storage servers and devices.
Network Administrator - Works on routers, switches, hubs, cables, load balancers and all the other hardware that handles LAN and WAN network traffic. Also, may be responsible for IP phone service.
Systems Administrator or Systems Engineer- Works with servers, laptops and desktop computers to keep them free of problems and secure the data they contain. Responsible for Security group creation and memberships, server patching, anti-virus protection updates, password changes and any automated mechanisms that make these changes. These positions may be divided into server and desktop teams. Tier 2 support.
Enterprise Administrator - Handles Enterprise support and design issues. Tier 3 support.
Active Directory Administrator - Designs and administers Active Directory infrastructure, AD policies, access permissions, roles, group policies, separation of duties.
Exchange and Messaging Administrator - maintains mail systems servers, other mail related devices and the company messaging infrastructure.
Backup Administrator - Maintains backup devices and determines backup strategies so data that was deleted accidentally or intentionally can be recovered. Design and control how and when data is backed up, where the backups are stored and how long the backups are retained. They will test to be sure backups are valid and usable.
Disaster Recovery Specialist - Plans for disaster events so the company data and infrastructure can be brought back online as quickly as possible after a fire, flood, earthquake, terrorism or other disaster event. Plans for failover of services to alternate locations, if the primary location is not available.
Database Administrator - Maintains the company databases which may include customer and sales records, billing information, inventory and other data.
Computing Security Specialist - A company's biggest asset is its data and the Computing Security Specialist will work to try to keep that data protected from loss. They may be dealing with and defending against viruses, hoaxes, malware, keyloggers, phishing attacks, internal attacks and domestic and foreign intrusion. Develops monitoring and interception systems, filters and strategies and works with appropriate government agencies.
Ethical Hacker â performs intrusion and vulnerability testing of systems. Works with Computing Security to insure intrusion prevention systems are working correctly.
Corporate IT Acquisition Specialist - Works with acquired outside companies to establish migration into the corporate computing infrastructure.
Data Center Administrator - Maintains the data center facilities where the company's servers and other devices reside. They are responsible for physical security and may review badge reader and camera information to be sure that only individuals with proper access are getting close to the company's servers and other critical devices. Also, maintain backup power devices (UPS or generators).

In a small business the list of jobs above might be performed by one or two people doing all these jobs. In a large Enterprise environment this could be hundreds of people.


Computer Technician, Service Center Coordinator, Help Desk Staff, Storage Administrator, Network Administrator, Systems Administrator, Systems Engineer, Enterprise Administrator, Active Directory Administrator, Exchange and Messaging Administrator, Backup Administrator, Disaster Recovery Specialist, Database Administrator, Computing Security Specialist, Corporate IT Acquisition Specialist and Data Center Administrator, just to name a few.

In a small business the list above might be one or two people doing all these jobs. In a large Enterprise environment this could be hundreds of people.

Best wishes!




Powered by Yahoo! Answers