CelLogic Systems

Green Tech Is Now!

CelLogic Systems is dedicated to providing companies with information on the best eco friendly tech options on the market. With our friendly staff and hands on approach you'll find what you're looking for with us!

Computational Systems Inc.

Latest Posts

Security Tips For The New Year

onlinesecurity2015 has brought attention to the fact that internet and computer security is more important than ever.  There are so many new threats out there that you have to stay on top of.  Thankfully there are some new technologies out there that can help you in the fight to protect your personal information.  Here are some tips on staying safe in 2016 when it comes to your electronics and the internet:

1.) Ensure that you allow updates and enable automatic updates.  Software companies are constantly patching their software in response to new threats.  Even the best of us, however, can get behind or lazy when it comes to downloading and installing the updates.  This is why we highly recommend allowing automatic updates.  Most of the time these updates are in regards to security and fixing security holes.  This is why it’s essential to update.  Hackers and cyber-thieves will often have ways to sniff out who is still using old versions of software so that they can attack.

2.) Enable an anti-spyware software program.  Sometimes spyware can sneak its way onto your computer and avoid detection from antivirus software.  Spyware is not quite the same as a virus – it’s actually a program that can sometimes be discreetly installed – with or without your knowledge.  Sometimes spyware piggybacks with other software, and other times it can install itself from a website.  There are many good programs out there that can help you to detect and remove spyware, such as Spyhunter and Malwarebytes.  We Hate Malware has a great writeup of Spyhunter, including its pros and cons.  You don’t want to leave spyware on your computer for very long as it could have the potential to sniff out your personal information.

3.) Enable a password manager.  Many people are skeptical of password managers such as Lastpass because they think that the password manager will get hacked.  While this is a distant possibility, LastPass uses a very sophisticated method of encryption that should be very effective against any sort of hacking.  While too difficult to explain here, the small risk of using a password manager such as LastPass is much less than the other method that many people use — using the same password for many sites.  Let’s face it, we can’t keep track of different passwords for all the sites we use so most people just use the same one.  However, LastPass will enable you to use a unique, difficult to crack password for all of the sites that you visit.  In other words, if a cyber criminal manages to get one of your passwords he won’t be able to log into ALL of your accounts.  It’s something to think about.

4.) Stop visiting bad internet neighborhoods.  It’s time to stop downloading files from file sharing sites and using torrent sites.  It’s time to stop the online gambling and the adult sites.  Most malware and viruses come from these bad internet neighborhoods and it can be almost impossible to stop them sometimes.  They can come directly from the website itself, and you might not have control over it at all, especially if it’s an infected pop up window.

Some PC History


It’s easy to forget just how far we’ve come in the last 20 years in terms of computing power.  Back in 1994 $3,000 got you a computer with barely the technology that goes into a low end cell phone these days.

The PowerPC chip represents a fairly new approach to microcomputing. Computers with this Motorola chip are an early result of the alliance between Apple and IBM. Both companies are producing computers based on the new chip, called the Power Macintosh and the Power System, respectively. Power Macs were the first to be available early this year, followed by the Power Systems in the fall.

The PowerPC uses RISC (reduced instruction set computing) technology, a concept developed in the minicomputer and UNIX workstation environments. In theory at least, RISC processors, like the PowerPC, are more efficient than 80×86 processors, because they have a smaller set of instructions that the CPU can execute, making them “leaner.” The PowerPC also has several hundred thousand fewer transistors than the Pentium, making it cheapter to manufacture. Plans for the future of PowerPC-based computers call for more independence of the hardware and software. IBM especially wants to reduce the dependence of software on machine-based “firmware,” such as the need for the BIOS portion of DOS to reside in a ROM chip within an 80×86 PC. This strategy will help make it simpler to change hardware and software to match each other as they evolve. To support this goal, IBM has issued an interesting “standards” document called PReP, the PowerPC Reference Platform. PReP defines the requirements that a computer manufacturer must meet in order to build a compatible PowerPC clone. In addition to basic compatibility issues, PReP also defines different classes of computers, such as desktop, notebook, server, etc. It remains to be seen how many manufacturers will adhere to the PReP standards.

Although PowerPC machines are able to run existing Mac and DOS software (indeed they must, if they are to be viewed as replacements for existing equipment), the real benefits of the new architecture will not be evident until newer, more powerful operating systems take full advantage of them. At this point, it is not clear whether the emerging 32-bit systems, like Windows NT or OS/2, will evolve to match the PowerPC, or if a totally new system will emerge.

Previous attempts to redefine PC hardware radically, as in the IBM PS/2 with its MicroChannel bus, and the NeXT computer, have been expensive and disappointing lessons for manufacturers. The PowerPC initiative, being a well-planned joint venture, seems more likely to succeed. But it is far too early to tell if it will eclipse the 80X86.

Delfino, Erik. “1994: a review of the PC year.” Database Dec. 1994: 91+

It’s always very interesting to look back and see what the history of computers looks like, as it’s easy to take our present technology for granted.


Why You Should Be Green Computing

greenpowerThe aim of green computing is to reduce the damage caused to the environment by changing (radically) the way we approach computing in line with strict energy conservation guidelines.

We live in an Information Age where technological devices outnumber the number of people and it goes without saying that this has a huge impact on the environment: from the extraction of raw materials for manufacture right down to the disposal after the products have served us.

Green computing therefore takes a holistic approach in curbing the impact of computers and related counterparts on the environment, not just saving electricity as some are prone to think. Speaking of electricity…Another aspect of green computing is to come up with innovative and environment-conscious techniques for generating energy.

Benefits of Green Computing

It’s obvious that there are benefits to be harnessed from all this as discussed in these points. Green computing doesn’t have to be boring: there are innovative technologies and tools which make it a viable option for judicious energy usage and environmental conservation.

Cloud Computing

Cloud computing is a form of green computing in that it employs virtual, as opposed to regular, servers which could save a considerable amount of energy. But don’t these powerful servers demand shedloads of energy to run? Well, the secret lies in data centers’ economies of scale mode of operation.

These days, the cloud is applicable in almost every area computing: from operating systems to networking to data storage and software applications.

A company with 100 employees, for example, can cut carbon emissions from computing by as much as 90 percent energy if it embraced the cloud in its everyday operation – this is according to the Carbon Disclosure Project by the WSP Environment & Energy commissioned by the AT&T. This could mean bidding adieu to infrastructure that supports email, content sharing and customer relationship management.

Turning off your Computers

It’s become banal but doesn’t mean it’s any lesser true. Switching off computers (just like your TV without the remote) saves a substantial amount of energy. Whoever said computers can be damaged by turning them off on a regular basis was peddling a myth. While you’re at it, you should also cut off power (including vampire power) to devices like printers and scanners when they are not in use.


The money spent and resources used in manufacturing an electronic item from scratch far outweigh those needed to recycle it. It’s only recently that even developed countries have stepped up efforts to collect technotrash, aka e-waste, but more needs to be done on this front.

Improving Algorithmic Efficiency

An efficient algorithm doesn’t use a lot of resources but the productivity is manifold. And there are green computing measures that can improve computer algorithmic efficiency.

A simple search on your favorite search engine can have an adverse effect on the environment due to the energy consumed and carbon dioxide emitted in the process. As much as we aren’t telling you not to do more research, it is up to the companies concerned to improve their algorithmic efficiency.

Architectural Changes

Remodeling the IT architecture currently in place should be worthwhile in the long term. This involves total infrastructure overhaul, not just adhering to a set of best practices. And this isn’t limited to data center architecture alone: the same goes for IT facilities, communications, business operations and other aspects of computer usage.

As resources deplete and the energy crisis deepens, we need to seriously pay thought to making considerable changes in our lifestyle with respect to energy conservation. Green computing is one such way of dealing with the energy dilemma: we can save energy, reduce carbon emissions and protect the environment.