Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Can Businesses Learn from Schofield’s Laws of Computing?

What Can Businesses Learn from Schofield’s Laws of Computing?

We frequently write about topics in relation to business IT, but one that we have yet to cover is Schofield’s Laws of Computing. What are these laws, and what can businesses learn about them?

Introducing Schofield’s Laws

Jack Schofield was born in Yorkshire on March 31, 1947, and he was a writer for The Guardian until his passing in 2020. His work was popular in technology media outlets, but one of his better-known works includes a collection of best practices published through The Guardian. These Laws of Computing are over two decades old, but they still contain valuable lessons that businesses can learn.

These laws are as follows:

  1. Never put data into a program unless you can see exactly how to get it out.
  2. Data doesn't really exist unless you have two copies of it. Preferably more.
  3. The easier it is for you to access your data, the easier it is for someone else to access your data.

We can learn a lot by looking at these laws of computing. Let’s dive in.

Protecting Data Portability

One of Schofield’s Laws of Computing concerns data portability. Let’s say you are working with a service provider and they raise their prices or make changes to your terms of service. This law protects your right to have that data transferred elsewhere if you don’t want to accept those terms of service.

This principle states that businesses should be able to remove their data from any software or service, for any reason, in the above specified conditions.

Endorsing Data Redundancy

Redundancy is a term that you hear a lot in business technology, and for good reason. Schofield claims it’s a necessity, and we’d argue the same. You should have at least one copy to rely on in case your primary data cannot be accessed (of course, we would say you need at least three), and there are so many reasons why you might lose access to your original data that it’s almost mind-boggling.

Consider the possibilities of malfunctioning devices or infrastructure, user error, criminal activity, and so on. These are only the tip of the iceberg. Schofield mentions some other, less common situations, like issues on the provider’s end. What do you do when your cloud data is lost, or if the provider goes out of business?

Raging Against Cybersecurity Challenges

There’s a reason why we take security so seriously, and that’s because it’s more important than ever in today’s ever-online and ever-connected world. Cybercriminals have more opportunities to steal your data, and while your accounts and information might be more accessible and convenient than ever before, the same holds true for criminals.

Simply put, security measures like multi-factor authentication are inconvenient, but they are necessary to preserve your data’s security.

Let Us Help You Implement Security Best Practices

Managed services like those offered by Voyage Technology can help you best utilize your business technology, including leveraging the best practices of these laws to your advantage. To learn more, call us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android Disaster Recovery Data Recovery Upgrade AI VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Information Miscellaneous Holiday Automation Cloud Computing Covid-19 Training Gadgets Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Wi-Fi Virtualization Business Technology Mobile Office Data Security Vendor Two-factor Authentication Apps Tip of the week Chrome Managed Services Voice over Internet Protocol Budget Apple Networking Mobile Device Management App Gmail WiFi BYOD Employer-Employee Relationship Hacker Conferencing Avoiding Downtime Marketing How To BDR HIPAA Computing Applications Information Technology Access Control Office 365 Analytics Office Tips Augmented Reality Computers Retail Storage Healthcare Password Website Bring Your Own Device Managed IT Services Operating System Router Big Data Virtual Private Network Risk Management Health 2FA Help Desk Customer Service Excel Document Management Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions The Internet of Things Cybercrime Physical Security Social Display Printer Windows 11 Paperless Office Infrastructure Monitoring Outlook Video Conferencing Hacking Machine Learning Managed Services Provider Virtual Machines Professional Services Presentation Money Saving Time Humor Managed IT Service Wireless Technology Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Administration Vulnerabilities Entertainment Word Data Privacy Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Safety Wireless Printing Content Filtering IT Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays LiFi Customer Relationship Management Data storage Data Storage Smart Technology Supply Chain SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Management PCI DSS Halloween Chatbots Navigation Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy User Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Fun Co-managed IT Superfish Bookmark Deep Learning Download Net Neutrality Twitter Alerts SQL Server Technology Care IP Address Business Communications Financial Data Error History Education Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Recovery Upload Procurement Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Hard Drives Mobile Computing Social Network Telework Cyber security Tablet IoT Communitications Search Dark Web Cables Domains CES Best Practice Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Refrigeration Managed IT Customer Resource management FinTech Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Public Speaking Legal Data Analysis Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Lithium-ion battery Legislation Shortcuts Organization Entrepreneur Travel Social Networking Google Maps Smart Devices Cortana Ransmoware Techology Fileless Malware Digital Security Cameras Alt Codes Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Undo Health IT Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Typing Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Knowledge Fraud Meta Google Drive User Error Microchip Application Username Managing Costs Amazon 5G Black Friday SSID Point of Sale eCommerce Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT IBM Google Docs Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Windows 8 Laptop Websites Mirgation Hypervisor Displays PowerPoint Competition Drones Shopping Nanotechnology Optimization

Blog Archive