Sunday, June 25, 2017

What is an SSD and how can it help me? - CKP Computers

I made a presentation the other day to a group of local business owners, it went really well so in response to that, here is the same information slightly condensed so everyone can benefit.
The topic today is “What is an SSD and how can it help me?”
You may have heard people talking about this but haven’t really given it much thought as to how you can take advantage of this rather new and exciting technology. What is an SSD and what does it do? How can it help me?
SSD is an acronym for Solid State Drive. It is a storage device that is required by a computer to store data, like the operating system (ie Windows), programs, documents, pictures, that sort of thing. I’ll also explain SSDs in another way, I’m sure everyone is familiar with the humble USB memory sticks, am I right? SSDs in a broad sense are very similar to a USB memory stick, but are far more sophisticated. They have no moving parts and information is stored in microchips.
The main benefit SSDs have over other forms of storage is speed. If you compare them to the traditional hard drive (or HDD), a HDD uses a mechanical arm with a read/write head to access the information from wherever it’s located on a storage platter. It’s the time it takes for the HDD to find this data that makes them much slower in comparison; it simply requires more physical labour (mechanical movement) to retrieve the information.
A typical SSD uses NAND-based flash memory, which is a non-volatile type of memory. What does non-volatile mean, I hear you ask? The simple answer is that whenever the drive looses power it won’t ‘forget’ what’s stored on it. This is essential otherwise the computer would have to be permanently powered on forever, not really practical is it? As a comparison, the RAM or system memory your computer uses is a form of volatile memory, whatever is stored in RAM is lost when power is interrupted. In this case, it’s perfectly acceptable and is by design.
SSDs have come a long way since they were first pioneered, they are able to be read and written to all day long and the data storage integrity will be maintained for many many years.
An SSD relies on an embedded controller processor for the drive to function. The controller is a very important factor in determining the speed of the SSD. There are a number of controller choices that manufacturers could use in their drives and having the right controller is often what separates an excellent SSD from a good one.
Sounds exciting right? I won’t go too much into the working of the traditional HDD, I’m sure we are all familiar; after all, they have been around for nearly sixty years. Yes, you read correctly; IBM introduced the first HDD back in 1956! We’re talking about sixty year old technology, although to give some credit, the technology has been refined over the years.
The pros & cons of each are listed in the table below.
Chart
As you can see, there are many benefits of an SSD over a HDD but it doesn’t automatically make them a better option. SSDs a still a relatively new form of storage and have a little while to catch up. Right now however, HDDs have the upper hand by offering more storage space for less cost. You may still be asking yourself, which drive is right for me?
SSD
An SSD would be the right choice if:
  • You are prepared to pay more for better performance
  • Not concerned with having limited storage capacity or can work around it
HDD
A HDD would be the right choice if:
  • You need lots of storage capacity, up to 4TB for a single drive
  • You don’t want to spend much money
  • Not concerned about performance
HDDs are still a popular choice, most average consumers typically choose a HDD as the storage option in their new computer mainly due to cost. However, as SSD prices continue to fall, more and more consumers are considering these drives as an upgrade, this is a great way to get a more life out of an old laptop that may be a few years old. As they say, a computer is only as fast as its slowest component and for many years, the HDD has always been the bottleneck. At CKP Computers, we specialise in the highest quality components, computer repairs & service, so let us help you by installing a new SSD in your existing laptop. It will unleash a new lease of life to a slow and otherwise unproductive laptop, make your battery last longer and you can also possibly avoid the high cost of purchasing a new laptop prematurely.
When it comes to desktop computers, the ideal situation is to have both; an SSD which has the operating system and software applications installed on it in addition to a large multi GB HDD which is used purely for data storage (documents, photos, etc). Of course this is only possible in systems that have the provision of housing multiple storage devices.
If you would like more information on SSDs, please contact us today on 0447 619 397 or send us an enquiry, either through our contact page, by Facebook or by email, helpme@ckpcomputers.com.au.

What is the difference between Viruses, Spyware, Malware & Adware? - CKP Computers

malware
What are viruses? What is spyware? I get asked this fairly often and sometimes it can be difficult to understand the differences between the types of computer infections, so this will be our topic for today.
What is the difference between Viruses, Spyware, Malware & Adware?
There’s nothing worse than turning on your PC and be delightfully greeted (sarcasm) with unwanted content popping up on your monitor. No matter what you do, it won’t go away and in some cases can severely bog down a system or render it completely unusable.
For starters, I’ll list the different types of infections and then highlight measures you can take to avoid becoming a victim. There are many variations of each type and sometimes can be a combination, but here is a brief rundown of each, so you’ll have a better understanding if the worst happens.
Viruses – A virus is a self replicating program that is designed to do damage. They are potentially the most serious out of all the infections a PC can get. Once executed (opened), viruses copy themselves into other programs, data files or onto the boot sector of the hard drive itself. Viruses have the possibility to access personal information, email contact list or corrupt programs. They are installed without the knowledge or consent of the user from an infected file or by being downloaded automatically when a user accesses an infected website.
As an example of the damage a virus can do, a particularly bad virus was doing the rounds a fair few years ago, (the name of it escapes me unfortunately) what it did was on a certain day of the month it would completely erase the system’s hard drive which meant losing everything that wasn’t backed up. Not only that, it would also completely erase the motherboard BIOS chip, which effectively renders the computer useless. The only repair options were to replace the BIOS chip (if possible) or replacement of the entire motherboard and then have the system software reinstalled. Not a cheap fix by any means. Thankfully this particular virus is seldom seen nowadays.
Spyware – As the name suggests, software that spies on you or your browsing habits. Spyware collects personal information about the user which is then sent to another entity without consent. Some spyware can also give hackers the ability to access the computer remotely. There are a number of different spyware types, one example is a key logger, which can record every key press a user makes and with that information, hackers can determine usernames and passwords for websites, bank logins particularly.
Malware – Short for malicious software, malware can be thought of a collective term which can include viruses, spyware and any other combination of the above. Any software that is malicious in nature is malware.
Adware – Most often than not, adware doesn’t do any damage to a PC, but can be used as a vehicle which can allow more serious infections to occur. Adware is considered to be an irritant by many, which results in popup windows opening randomly but otherwise not causing any other issues to the computer. These popup windows can show different information and usually contain links, which if clicked on can cause more problems by allowing viruses or other malware to be installed. In recent times and the advent of online scams, much of the adware these days are used to syphon unsuspecting users of their hard earned cash, example are:
“Your computer is infected, click here, pay x amount to clean your computer” or “Your PC is running slow, click here to fix”. Of course there can by any number of variations of these, but I’m sure you get the idea. Keep in mind though, if you ever get a window which wants you to pay, more often than not, it’s a scam.
Scary isn’t it? It definitely can be. For a minimal investment, allow CKP Computers to install reputable security software as the alternative could be far more costly. In order to protect yourself it is always advisable to have current up-to-date security software which monitors your system. It’s no use having security software that’s expired or out-of-date because it’s simply not doing the job. At the very least, there are a number of free alternatives (Avast, AVG) that can be used. Having free security software, whilst not being as comprehensive as the paid for options is still far better than having nothing at all!
If you’re concerned about your system, require security software or would like more information, please contact us today on 0447 619 397 or send us an enquiry, either through our contact page, by Facebook or by email, helpme@ckpcomputers.com.au.

How dust and dirt can cause a build up of gunk on your computer's heatsink - CKP Computers

I gave an education talk the other day about the importance of maintaining your PC or laptop and how dust and dirt can seriously cause major problems if not rectified.
First things first, if you don’t have the confidence to do the job yourself, you could make the problem worse and damage your computer (or yourself). Use an anti-static strap to avoid static discharge. If you are not confident, please consult the professionals.
CPU’s (Central Processing Units) are the main brain of a computer and they can produce a lot of heat. To dissipate that heat, a heat sink and fan are required to keep the CPU running cool. There are other ways of keeping the CPU cool (water cooling, etc), but I won’t go into those methods.
Desktops – There are many varieties of heatsink fan (or HSF’s) available but for the purpose of this blog entry, I’ll talk about the most common type. They work by having a fan blow air onto the heatsink and through the fins out the side of the heatsink to get dissipate the heat. This process works extremely well as a way of reducing the heat the CPU produces.
deskhsf
The biggest problem is that over time, dust, dirt, hair and other particles that get carried around in the air get blown onto the heatsink and eventually cause a blockage, a mat of dust in actual fact. When this happens, the fan is blowing air, but due to the dust covering the heatsink, the air has nowhere to go and everything overheats.
dirty
Laptops – HSF’s for laptops work in a similar manner, but due to space constraints, the design is different but fundamentally they work the same. They vary in shape and size, depending on the laptop specifications and are usually designed to remove heat from the graphics processing unit as well as the CPU. Heat pipes are often used (copper tubes) to transfer the heat to the fins so it can be easily dissipated. Air gets sucked in from underneath, which then passes through the fins and blown out the side of the laptop.
laphsf
Same problems can occur as with the desktop configuration. Dust can cause blockages which leads to overheating. Major difference however is that getting access to the fan in a laptop requires a lot more work. More than likely, complete disassembly is required. This is not recommended unless you know what you are doing.
Typically, most of us don’t check our computers every day for dust build up, but a clean out every six to twelve months (depending on environment) is a good way to keep your system running smoothly.
When the problem gets really bad, there are a number of warning signs to let you know something is wrong.
• The fan speed increases to very loud levels. When the CPU is not adequately cooled, the system board senses this and makes the fan spin faster to try and compensate and cool the CPU.
• The computer or laptop is hotter to the touch. Sometimes so hot it can actually do damage to surrounding components. Heat is not good.
• The system runs very slowly. Some CPU’s when hot, shut down areas within the processor in an attempt to reduce the heat. The CPU is not running at it’s full potential which causes the slowness.
• Worst case scenario, the CPU gets so hot it shuts itself down to prevent damage to itself. An audible beeping from the mainboard is usually heard and the computer turns off.
I have heard of fires starting due to overheating computers, so it’s very important that it’s maintained and kept running as cool as possible. As an added bonus, having a clean computer will also increase the life span of the hardware and it will last you much longer.
Cleaning – As always, prevention is better than cure. For desktops, one way to prevent a constant build up of dust and dirt is to have dust filters installed on all the intake case fans so the air that is within the case is always clean. Location of the PC is also important. Up off the ground and away from carpet and other sources of dust are also recommended.
For laptops, using the device on a clean hard surface is recommended to keep them as clean as possible. Due to the way laptops are designed (suck air in from underneath), it is not recommended to use them on carpet, in the bed or on any other like surface.
I don’t recommend using a vacuum cleaner as it can cause static damage to the electronic components. Manual cleaning with a brush is the only truly safe way to effectively remove all the dirt build up. For desktop computers, it’s usually just a simple matter of removing the side of the case and you have easy access to the heatsink and fan. Laptops however usually involve complete disassembly and require more time and technical know how.
If you think your computer is not running as well as it used to or it sounds like a jet aircraft, please contact us before the worst happens. Our number is 0447 619 397 or you can send us an enquiry, either through our contact page, by Facebook or by email, helpme@ckpcomputers.com.au.

Let’s talk processors - what are the differences? - CKP Computers

The processor or central processing unit (CPU) is also known as the ‘brain‘ of your computer. It’s job is to process all the information you give it. The faster & more efficient it does this, they quicker you get your work done. However, they aren’t all created equal with some better suited for particular situations than others.
I get asked occasionally which should I go buy, which is best suited for me, which is best value for money?
Those are relative questions – the best processor for one person may not be for another. By reading this article, hopefully you will have a better understanding how they operate & thus making a decision will be that much easier. Keep reading for a better understanding of the inner workings of Core processors.
die
This is a close-up image of a typical processor, showing the four distinct ‘cores’, the graphics processor along with the cache & other misc controllers.
There are many varieties of processors, for both desktops & laptops and each are targeted for their respective platform. To avoid any confusion we will be focusing on the desktop ‘Core’ range of processors in this article, specifically between the Intel Core i3, i5 and i7.
Within each model range, there are variations and the generational architecture they are based on. Intel periodically releases a new generation of processors, faster and more efficient than the last and along with that comes a new code name.
To start off, it’s important to understand the generation of a processor so you know what you are getting. Previous generations of Intel chips include: Sandy Bridge, Ivy Bridge, Haswell & now we have Skylake, released in August 2015. Determining the generational architecture of a processor is fairly simple; we just have to have a look at the model number.
Sandy Bridge start with a 2
Ivy Bridge start with a 3
Haswell start with a 4
Skylake start with a 6
NOTE: There is also a fifth generation called Broadwell, but aren’t a complete range replacement and are considered an upgrade to the Haswell range.
For example an i5-4590 is a fourth generation processor using the Haswell architecture.
The ‘Core’ processors within a generation are fundamentally the same. The differences come in the extras or features that are either enabled of disabled, clock speed, cache size and the number of cores included.
comparison
Allow me to provide more detail on the above chart and what each means…
Number of Cores: A core can also be considered as an individual processor within a processor. A processor that contains two cores has two internal processors on the one die (silicon that contains all parts of the processor). Processors that contain more cores (the Core i7 Extreme processors have up to eight cores) are generally more efficient, perform better and can handle more tasks (or threads). However the overall performance is determined by the software and how well it takes advantage of the technology.
Hyper-threading: A processor that provides hyper-threading has two virtual (or logical) cores within each physical core. As far as your operating system is concerned, it sees double the number of cores when in reality it only has half that. Performance wise, compared to extra physical ‘real’ cores, it isn’t as efficient but is definitely an improvement over a processor that only has a single core. Applications that make use of multi-tasking can see a benefit and this is where an i7 has an advantage over an i5. To the OS, it would appear that the processor has eight cores, when in actual fact, it only has four.
Turbo Boost: This is technology that can automatically overclock a processor when the need arises. The clock speed is temporarily boosted above its standard only when the processor is running cool enough. There are factors however that determine the maximum amount the clock speed can be raised:
• Active cores in use
• Current consumption
• Power consumption
• Processor temperature
If the limits are reached, the processor will throttle the speed back down again. Core i7’s & i5’s have this technology, i3’s do not.
Cache Size: Cache is a type of memory that is built into the processor. Whenever the processor detects that it’s using the same data constantly, it stores it in the cache to improve performance. The more cache that is available, the more data can be stored and accessed quickly, listed as MB or a Megabyte value. Core i3 processors have 3Mb cache, i5’s have 6Mb & i7’s have 8Mb. Cache is a type of volatile memory, data contained within this type of memory is lost when power is lost. Cache data is similar to system memory (RAM) but is much faster. In a computer system, RAM stores data loaded from the hard drive, reducing the need to access it as often. Cache stores data loaded from the RAM and because it is much faster, performance is greatly improved.
K Models: When researching processors, you may notice that some models have a ‘K’ at the end of the model number (eg. i5-4690K). What that means is that the processor is unlocked and changes can be made in the BIOS settings on the motherboard to overclock the processor past its default speed. By comparison, regular non-K models are locked to their default speed setting and cannot be adjusted. Buying a ‘K’ processor is an attractive option for many people seeking greater performance from their system. There are many pros & cons of overclocking but this is a topic for another day.
S Models: There are also some models that have an ‘S’ at the end of the model number, (eg i5-4790S). These are known as low power mode processors. They are effectively the same at the regular non-S model, but have a lower clock speed, which in turn uses less power & generate less heat.
…and some additional information.
Clock Speed: This is fairly straight forward, the faster the clock speed (MHz), the faster the processor operates. Clock speed used to be the main differentiator between processors. However with the invention of multiple cores and other features, a combination of these will determine the overall ‘speed’ of a processor. Depending what software is being operated on the PC, an i3 operating at a higher clock speed can outperform an i5 at a lower clock speed, running a single-threaded application. Using an application that can take advantage of multi-threading, the i5 will perform better as the four multiple cores are more efficient than the i3’s two cores.
Graphics: All of the Core processors have graphics capabilities built in known as Intel HD graphics. Previously it was up to the motherboard manufacturers to include on board video, but now they don’t have to as it’s in the processor. The Intel HD graphics capabilities are perfectly adequate for everyday use and some light gaming. However if you are seriously into playing games or other high-end graphic, photo or video use then installing a dedicated graphics card specifically for this purpose is recommended.
To summarise this article, it is clear that the Core i7 processors are the top of the line, i5’s are middle ground & i3’s are at the lower end.
Reflecting on the questions at the top of this article, consider what the PC will be used for and you can then determine which type of processor will be best suited for your needs.
In a nutshell:
Core i7 processors are designed for high-end workstations that require a great deal of processing power. Video & photo editing, computer aided design (CAD) and similar applications that will make use of the i7’s capabilities.
Core i5 processors are perfect for the majority of users who like to run multiple applications simultaneously and to have a little room to move (so to speak).
Core i3 processors are suitable for simple day-to-day type operations, including web browsing, office apps and other non-demanding applications. They are also suitable for point of sale (POS) terminals or computers that only need to perform relatively simple operations.
If you’d like further information on processors, or if your computer isn’t running as fast or as efficient as you would like, please feel free to contact us. We are happy to do a FREE PC health check and determine ways your system can be improved. Our number is 0447 619 397 or you can send us an enquiry, either through our contact page, by Facebook or by email, helpme@ckpcomputers.com.au.

Three IT mistakes every small business must avoid - CKP Computers

Managing a small business can vary from simple to complex and almost all require the use of computers. In this era where everything depends on the system and computer generated data and reports, an intensive IT background is a must in order to set it up properly. It can be risky if done incorrectly and small business owners can and do make unfortunate mistakes when it comes to their IT system.
Here are some of the most common problems a small business faces when it comes to setting up and maintaining computer systems:
  • Inability To Set Up Firewalls & Virus Protection

Computer security has long been an important concern for small business. Many hackers tend to target small business due to lack of defensive resources. Also, computer viruses are becoming more and more dangerous each year that’s why the need to increase protection is urgently needed.
While most small business owners are aware of the importance of protecting their data security in computers, portable devices are often overlooked. In most cases, employees use their personal computers and mobile devices for work related purposes. It might help the owner’s budget from having to purchase additional equipment; however, it can also increase the risk of security concerns. Different ways to protect different machines used at work must be applied.
  • 2. Failure To Consistently Back up Data

Knowing how to set up firewalls and virus protection programs is a vital aspect in small business. However, learning how to properly back up information is definitely another essential part. Backing up properly can save small business owners from unnecessary pain and regret if the worst happened. When unwanted situations occur such as system failure and security breach, backed up data will still be available for access, allowing small business to keep operating.
Most of the time, small businesses fail to consistently back up data. The process of backing up should be a priority at all times and small business owners should make an accurate schedule for backing up their system’s data. That way, everything can go smoothly and be under control.
  • Failure To Create Secure Wireless Networks

Majority of small business require a reliable and fast wireless network especially when using multiple portable devices. However, wireless networks also come with their own security challenges. An inexperienced small business owner can find it hard to set up a wireless router. In addition, it is also important to ensure strong security is set or else access to the network can be easily obtained.
With many routers, by default, wireless security is turned off, additionally the default username and password is left at the default (ie admin, admin). Hackers know what the default credentials are for the different brands so it’s vital this information is changed to something only you know.
If you’re a small business owner and you are unsure of whether you are secure we recommend giving CKP Computers a call so we can help you out. We can save you time & money and greatly reduce your risks. Our number is 0447 619 397 or you can send us an enquiry, either through our contact page, by Facebook or by email, helpme@ckpcomputers.com.au.

Wednesday, June 7, 2017

What is Ransomware, what is does & how it can be avoided

What is it?
Ransomware is cyber threat that uses cryptographic measures designed to extort money from users. They have been around for a number of years now in many variations such CryptoLocker or Torrentlocker. One of the newest is called ‘Satana’ which not only encrypts your files, but also the master boot record on the hard drive so Windows won’t boot! Another recent variation ‘WannaCry‘ also includes a worm (type of virus) that allows it to spread to other connected computers without any user interaction.
One of the earlier variations was the ‘Police virus’ or ‘FBI virus’ which would display an image on the screen of infected computers requesting the user to pay a certain amount in order to unlock the computer. This was supposedly due to illegal activity the user had done. No user files were affected and the infection was relatively easy to remove. The new versions of Ransomware take it to a new level as they hold your personal files to ransom.
What it does?
We will be discussing Cryptolocker as an example, but the process may vary slightly between the Ramsomware variations. It starts by typically arriving as an attachment from any number of supposedly legitimate companies & appears to be genuine. Once the user double clicks the file, the process begins. First step is that the malware saves the file to the user’s Windows profile and also adds a key to the registry file so it auto starts the next time you log in. It then starts itself twice in case the user tries to kill the process. Next step is for it to contact the malware’s server to obtain the RSA encryption key & then asymmetric encryption begins. Predetermined files are encrypted, anything from Word documents to family photos, emails and a myriad in between. These files are generally encrypted in alphabetical order.
When finished, an image similar to this one is displayed.
crypto
Once this happens, there are a few options of how to proceed. First thing to do is remove the infection with reputable security software but that unfortunately still leaves your precious data encrypted. Without the decryption keys, your files are as good as gone so the next step is to recover the data from your most recent backup. You do have a recent backup, don’t you?
How to avoid it?
Ransomware is not that hard to avoid as long as you take a few precautionary measures. A little education for yourself and any team members you have goes a long way.
1. Don’t open attachments from unknown senders or anyone you suspect looks a little dodgy – use some vigilance.
2. Enable or show file extensions for known file types. By default, Windows hides the file extension for commonly used files (last three characters after the dot ie document.doc). This can be done quite easily in Windows. The malware is typically distributed as an .exe and masquerades to look like a pdf. With the extension hidden, you have no way of knowing the true file type.
3. Create & use a standard user account instead of an administrator account. This is an extra layer of protection to prevent software from installing as it’ll prompt you for the admin’s credentials in order to install anything.
4. Have current and up-to-date security software and updates for Windows. If you are running an unsupported operating system whilst connected to the internet (ie Windows XP) upgrading is essential as no future security patches will be released to fix found vulnerabilities. Doing this is a no brainer for anyone who wants to keep their system secure.
5. Have a consistent & reliable backup procedure in place, preferably offsite. Don’t just rely on an external HDD or cloud based storage (Dropbox, OneDrive, etc) as the malware has been known to encrypt files on those drives also. CKP Computers offers a cloud backup solution and are more than happy to discuss options.
6. Above all else, don’t pay the ransom! If you’ve taken the necessary precautions beforehand, it should never come to this point anyway.
I should point out too, if you suspect you’ve clicked something you shouldn’t have, immediately turn the computer off and leave it off and contact us for support. It takes time to encrypt the files on your system and chances are if you’ve acted quickly enough, only a small fraction of files (or hopefully none) have been affected.
For help with any of these steps, CKP Computers is here to help & keep you safe. Talk to us now for a no obligation discussion on your security needs. Our number is 0447 619 397 or you can send us an enquiry, either through our contact page, by Facebook or by email, helpme@ckpcomputers.com.au.

What is a UPS, what they protect against, the different types & how do I choose the right one?

What is a UPS?
UPS or ‘Uninterruptible power supply’ is an electrical device that’s main purpose is to provide backup power to a computer or other electrical equipment in case mains power fails for whatever reason. Batteries contained within the UPS are used to provide protection from power interruptions by converting the DC (direct current) energy stored in the batteries to AC (alternating current) mains power instantaneously when the need arises.
UPS’s differ from auxiliary power systems or generators as these do not provide instant power fail safes.
The size of a UPS within any given type is usually depicted by its volt-ampere (VA) and sometimes Watt (W) rating. A volt-ampere (VA) is the unit used for measuring apparent power in an AC circuit, in DC circuits, true power is measured in watts (W). The higher the rating, the more power it can provide and the longer the run-time will be (depending on load levels).
The battery run-time for most UPS’s is relatively short (approx 10 mins depending on load) but should be sufficient to either power down the computer safely or give you time to start up an auxiliary power system such as a generator.
Typical UPS in varying sizes

ups

UPS’s can also provide protection against the following power abnormalities in varying degrees, depending on type. Knowing the different power conditions will give you a better understanding of how the correct UPS is vital for your electrical equipment.
Blackout: Term also known as a power outage is when there is no power. This is either due to a fault, natural disaster (storm) or by the electricity provider turning off supply to do maintenance.

Brownout
: Is a term used to describe a voltage drop when the mains supply is not able to provide the rated power typically for a very short period (under a second). Anything longer than that is known as ‘Undervoltage’. Brownouts tend to occur during periods of high power usage such as summer or winter. Many people may be using air conditioners or heaters and this puts a strain on the mains supply. Drops in voltage can cause burnout for many electrical devices, reasons being to compensate for the drop in voltage, the device needs to draws more current and high current leads to failure in devices not designed for it.

Surge
: Term used to describe an increase in voltage that naturally causes an increase in current or vice versa. External power surges are typically caused by lightning strikes but can also occur internally caused when motors startup or shut down. Surges can also occur after the mains power comes back on after a blackout. Surges can also travel over phone or TV cable services. An ADSL modem not properly protected can also cause damage to a computer if physically connected with an Ethernet cable.
Other power issues UPS’s can correct include line noise (sometimes caused from other devices on same circuit), harmonic distortion (change in expected AC waveform) or any other frequency instabilities.

Different UPS types:
There are many different types of UPS and the way they operate but for this article I will focus on the three major types, standbyline interactive & online.
Standby: This is the most common type and has the most basic features typically used for personal computers or where low cost is required. During normal operation, the protected devices are connected to the main power supply and switches over to the battery if the primary power source fails or alters outside the acceptable range. The inverter, which is required to convert the DC battery power to AC only starts up when the power fails, ie “standby”.
The switch over time from mains to battery can be up 25 milliseconds depending on the UPS and its circuitry. The UPS then continues to provide power until the mains is rectified or the battery goes flat.
Pros
  • Low cost
  • Small size
  • Simple design
Cons
  • Next to no power conditioning
  • Slow change over time from mains to battery
  • Battery charger may shorten battery life
  • Limited functionality
Block diagram of a standby UPS
standby_ups

Line interactive: This type is completely different and is more advanced in comparison to the standby UPS. It does away with the battery charger, inverter and change over switch and replaces them with an inverter/converter hybrid device which can both charge the battery & provide output power. The main advantage of always being connected to the output is that it can provide extra protection against power issues and allows for faster response in the event of a power failure. During times when power is normal, the inverter is operating in reverse which charges the battery. If the mains power fails, the inverter switches direction.
Line Interactive UPS’s also contain what’s called an autotransformer. This allows the UPS to handle undervoltage brownouts and overvoltage surges without consuming battery power. It instead automatically selects different power taps on the autotransformer compensating for the increase or decrease in the input voltage to provide stable output power. This leads to greater reliability and less premature battery failure.
Pros
  • Low cost
  • Proper Sine wave output
  • Better output power regulation
  • Efficient
  • Surge, Brownout & other power conditioning
Cons
  • Load protection is minimal
  • Change over time still slow for sensitive equipment
  • Over time protection components can degrade
Block diagram of a line interactive UPS
line-interactive_ups


Online: With this type of UPS, power change over switches aren’t necessary and the batteries are always connected to the inverter. If the mains power is interrupted, the batteries keep the output power steady and the rectifier is removed from the circuit. When mains power comes back up, the rectifier cuts back in and resumes as normal providing most of the power and charging of the batteries. Online UPS’s main advantage over standby or line interactive UPS’s is that it’s able to effectively provide electrical isolation or firewall from the mains power.
Online UPS’s are necessary for equipment sensitive to power fluctuations and provide outstanding power protection.
Pros
  • Zero Change over time, ie nonexistent
  • Constant voltage output
  • Excellent power conditioning and surge protection
  • Provides electrical isolation
Cons
  • More expensive
  • Larger & heavier
  • Efficiency is low
  • Higher heat output
  • Batteries have to be replaced more often

Which type is right for me?
Now I’m sure you have a better understanding of what a UPS is and how the types are different from one another. Choosing the correct UPS is dependent on the situation and what equipment it’s protecting. For a simple home use computer, a standby UPS is fine, for business use whether it be a workstation or server, a line interactive UPS would be a better choice. Then for critical equipment, sensitive to power fluctuations, an online UPS would be the one to go for.
Once you have determined which type of UPS you need, next is to determine is the size or VA rating. It’s a good idea to work out what is critical to keep operating & what’s not then make a rough calculation of the power requirements so a UPS big enough to supply power to those devices is purchased.
As an example, devices that can or should be connected are:
  • Computer
  • Monitor
  • Network switch
  • Modem/Router
  • Other critical devices
Devices that should not be connected include:
  • Laser printers or scanners
  • Any other non critical device to save power
Unless the UPS is large enough to handle it, laser printers and scanners should only be connected to surge protection only outlets (if applicable) due to the high power draw when they start up. This can overload smaller UPS’s and cause damage.
If you need help deciding on the right UPS for your system, CKP Computers is here to help you. Talk to us now for advice and how you can better protect your equipment. Our number is 0447 619 397 or you can send us an enquiry, either through our contact page, by Facebook or by email, helpme@ckpcomputers.com.au.