Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Can Businesses Learn from Schofield’s Laws of Computing?

What Can Businesses Learn from Schofield’s Laws of Computing?

We frequently write about topics in relation to business IT, but one that we have yet to cover is Schofield’s Laws of Computing. What are these laws, and what can businesses learn about them?

Introducing Schofield’s Laws

Jack Schofield was born in Yorkshire on March 31, 1947, and he was a writer for The Guardian until his passing in 2020. His work was popular in technology media outlets, but one of his better-known works includes a collection of best practices published through The Guardian. These Laws of Computing are over two decades old, but they still contain valuable lessons that businesses can learn.

These laws are as follows:

  1. Never put data into a program unless you can see exactly how to get it out.
  2. Data doesn't really exist unless you have two copies of it. Preferably more.
  3. The easier it is for you to access your data, the easier it is for someone else to access your data.

We can learn a lot by looking at these laws of computing. Let’s dive in.

Protecting Data Portability

One of Schofield’s Laws of Computing concerns data portability. Let’s say you are working with a service provider and they raise their prices or make changes to your terms of service. This law protects your right to have that data transferred elsewhere if you don’t want to accept those terms of service.

This principle states that businesses should be able to remove their data from any software or service, for any reason, in the above specified conditions.

Endorsing Data Redundancy

Redundancy is a term that you hear a lot in business technology, and for good reason. Schofield claims it’s a necessity, and we’d argue the same. You should have at least one copy to rely on in case your primary data cannot be accessed (of course, we would say you need at least three), and there are so many reasons why you might lose access to your original data that it’s almost mind-boggling.

Consider the possibilities of malfunctioning devices or infrastructure, user error, criminal activity, and so on. These are only the tip of the iceberg. Schofield mentions some other, less common situations, like issues on the provider’s end. What do you do when your cloud data is lost, or if the provider goes out of business?

Raging Against Cybersecurity Challenges

There’s a reason why we take security so seriously, and that’s because it’s more important than ever in today’s ever-online and ever-connected world. Cybercriminals have more opportunities to steal your data, and while your accounts and information might be more accessible and convenient than ever before, the same holds true for criminals.

Simply put, security measures like multi-factor authentication are inconvenient, but they are necessary to preserve your data’s security.

Let Us Help You Implement Security Best Practices

Managed services like those offered by Voyage Technology can help you best utilize your business technology, including leveraging the best practices of these laws to your advantage. To learn more, call us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android Data Recovery AI Upgrade Disaster Recovery VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Automation Artificial Intelligence Information Holiday Facebook Gadgets Cloud Computing Covid-19 Training Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Government Business Continuity Data Management Business Technology Wi-Fi Blockchain Bandwidth Windows 10 Virtualization Apps Two-factor Authentication Data Security Mobile Office Vendor Tip of the week Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking Chrome Mobile Device Management Budget BYOD Gmail Apple WiFi App Computing Conferencing Information Technology Hacker How To Avoiding Downtime Office 365 BDR Marketing HIPAA Applications Access Control 2FA Help Desk Operating System Retail Healthcare Risk Management Computers Managed IT Services Analytics Website Office Tips Augmented Reality Storage Password Router Bring Your Own Device Virtual Private Network Big Data Health Social Going Green Monitoring Excel Document Management Cybercrime Remote Workers Customer Service Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Firewall Vendor Management Solutions Physical Security Display Printer The Internet of Things Paperless Office Windows 11 Infrastructure Data Storage Smart Technology Supply Chain Settings Video Conferencing Machine Learning Managed Services Provider Printing Wireless Saving Time Content Filtering Virtual Machines Professional Services Customer Relationship Management YouTube Managed IT Service Cryptocurrency Maintenance Downloads Antivirus Hacking Presentation iPhone Licensing Virtual Desktop LiFi Entertainment Wireless Technology Vulnerabilities Data storage Data Privacy Images 101 Outlook Multi-Factor Authentication Robot Mobility Money Telephone System Cost Management Word Humor Sports IT Management Meetings Mouse VPN Employees Integration Safety Modem Administration User Tip Processor Computer Repair Mobile Security Holidays Websites Mirgation Hypervisor Displays Application Shopping Cortana Nanotechnology Optimization PowerPoint Alt Codes SharePoint IBM Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Navigation Downtime Management PCI DSS Hosted Solution Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Typing Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Superfish Bookmark Competition Knowledge Identity Theft Smart Tech Memes Co-managed IT Google Drive Download Net Neutrality Twitter Alerts SQL Server Technology Care 5G Error History Business Communications Financial Data Unified Communications Browsers Smartwatch Experience Connectivity IT Social Engineering Break Fix Scams Google Docs Bitcoin Running Cable Upload Procurement User Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Google Wallet Social Network Telework CES Tablet IoT Communitications Dark Web Cables Windows 8 IP Address Laptop Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Drones Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Halloween Gamification Flexibility Recovery Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Organization Hard Drives Techology Fileless Malware Digital Security Cameras Domains Google Maps Smart Devices Ransmoware Hacks Scary Stories Content Remote Working Wearable Technology Memory Vendors Fun Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Refrigeration Deep Learning Unified Threat Management Directions Videos Public Speaking Assessment Electronic Health Records Permissions Workforce Lithium-ion battery Wasting Time Threats Trend Micro Entrepreneur Network Congestion Specifications Security Cameras Workplace Strategies Education User Error Microchip Internet Exlporer Software as a Service Fraud Meta Mobile Computing Username Managing Costs Amazon Undo Search Point of Sale eCommerce Black Friday SSID Best Practice Database Surveillance Virtual Assistant Outsource IT Media Buisness Network Management Tech Support IT Technicians Virtual Machine Environment Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Legal IT solutions Business Growth Tactics Development Hotspot Transportation Small Businesses

Blog Archive