Frequently Asked Questions

GENERATORS

What maintenance does a generator need?

At 100 hours or every year, change the oil and inspect/clean the spark arrestor. The spark plug should be changed every year. Valve clearance should be checked either every year or at 300 hours. For every 200 hours, the air filters need to be cleaned or replaced.

What is the maintenance checklist for a generator?

View full list on our Maintenance Service page

How often should generators be maintained?

Depending on the make and model of your generator, the frequency of maintenance may vary, but a rough guide is to get it serviced every 6-12 months or every 500 hours of operation, whichever comes first. A portable generator needs a spark plug change every 100-150 hours!

What is the lifespan of a generator?

The General Lifespan of a Generator – How Long do Generators Last? If you would buy a generator today, it would generally last you 15 to 20 years depending on the availability of the repair components. The repair is an important part of the life of the generator.

Can you overuse a generator?

Overusing a generator can cause a fire. Plugging in too many cords can overwhelm the machine and damage it.

STRUCTURED CABLING

What are the challenges of structured cabling?

Planning and Design, Cable Management, Compliance with Standards, Quality of Components and Installation, Future Scalability, Interference and Noise, Documentation and Maintenance.

What is the most frequently used category in structured cabling?

Structured cabling design and installation is governed by a set of standards that specify wiring data centers, offices, and apartment buildings for data or voice communications using various kinds of cable, most commonly Category 5e (Cat 5e), Category 6 (Cat 6), and fiber-optic cabling and modular connectors.

What is the lifespan of structured cabling?

The minimum life span to plan for is 10 years, the average life expectancy is 15 years, while you should probably strive for a lifespan between 10 and 20 years.

VIDEO SURVEILLANCE

What are some of the biggest challenges with surveillance?

One of the main challenges is data loss, which can occur if the cameras are not properly configured or if the recordings are not securely stored. Additionally, it is important to keep in mind that while security cameras can help to protect against physical threats, they are not always effective against cyber threats.

What are the limitations of video surveillance?

Cybersecurity risks: Networked video surveillance systems are vulnerable to hacking and data breaches, which could compromise the privacy and security of the monitored area. Reliability: Technical issues, such as power outages or camera malfunctions, can temporarily render a video surveillance system ineffective.

What is the most common system used for video surveillance?

IP-based video surveillance systems are the most common choice today due to the compatibility to integrate with most devices. IP-based cameras provide higher image quality, scalability, and cloud-based access compared to traditional, analog CCTV systems.

How far back can video surveillance go?

One of the more common questions we hear is “how far back can CCTV go?” It makes sense that people want to know how long these cameras keep footage. The answer is different for each system and each set up but, in general, most organizations retain security footage for at least 90 days.

ACCESS CONTROL

Why is access control important?

Security is the main reason why access control is important. Its aim is to protect a building and its occupants, data and assets by reducing the risk of unauthorized intrusion, while making access convenient for authorized users and approved visitors. These techniques can provide other important benefits, too.

What are the basics of access control?

The basic concept of Access Control is a system that either grants or denies entry to a lock or door by determining the identity of the person; this can be done by biometrics, passwords, key cards, and everything in between.

What are the 4 types of access control?

There are four types of access control methods: Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Discretionary Access Control (DAC), and Rule-Based Access Control (RBAC or RB-RBAC). A method is chosen based on the level of access needed by each user, security requirement, infrastructure, etc.

VoIP

What is VoIP?

VoIP stands for Voice Over Internet Protocol, a system that allows devices connected to the internet to make and receive phone calls using the internet.

What is the cloud?

The cloud is software installed on a server in another place in the world that users can access anywhere they are via the internet. With the cloud, users can access a specific software anywhere there is an internet connection.

Is call quality better with VoIP phones?

The quality of most VoIP calls is generally better or equal to the call quality of traditional phones. Since it relies on an internet connection, the quality of a VoIP call largely depends on the quality of your internet connection. However, there are still some things users can do to improve VoIP call quality.

Can I use my computer when I’m on a VoIP phone?

Yes, VoIP allows users to use their computer that’s connected to the internet at the same time as their VoIP phone.

What are the advantages of VoIP?

VoIP offers many benefits for businesses including lower costs, better accessibility, portability, higher scalability, and it can make working remotely much easier for workers and employees.

IT SERVICES

What does IT services include?

Cloud Services, Backup & Disaster Recovery, Network & Security, Help Desk Support, Managed Print Services, Computer Training, IT Consulting.

What are 3 examples of IT?

Examples of information technology include computer hardware and software, networks and telecommunications systems, databases and information management systems, and Internet and web-based technologies.

What do IT service providers do?

IT service providers will run regular tests, update operating systems and software, and constantly monitor your network to ensure your confidential data is safe. This helps ensure your company is always one step ahead of potential cyber threats.

Let’s connect!

or call (610) 615-7300

Hear from our clients...

Lou evaluated our needs, gave several options, and completed the job in a timely fashion. He was cost conscious and provided high quality work. We are very satisfied with his work and would definitely use him again. We highly recommend Lou to all of our family and friends.

ANDREA RYAN | Chester Springs

I cannot say enough good things about Lou from Lightning Technologies. Not only was he knowledgeable and professional, but he was punctual and tidy. And our generator runs likes a dream, quiet as can be. I highly recommend if you are in the market for a generator or any electrical work!

IRENE | West Chester

Best team and customer service. Would highly recommend Lightning Technologies. Tim and Chris were very knowledgeable, trustworthy and made sure the job was done right. 5 stars all the way.

MEGHAN VANSPRIEL | PA

A TRUE 5 STARS! We have used Lightning Technologies now for several jobs both at home and for our business. They are knowledgeable, professional, courteous and appropriately priced. Low voltage or high these are your guys!



DAN STANGO

We use Lightning Technologies regularly for our camera systems, access control and wifi at all of our properties. They are easy to deal with and show up. In this day and age those qualities are invaluable to us with contractors. The techs are also extremely knowledgeable and friendly.

GMCC REAL ESTATE

Get your custom quote

Our most popular plan includes two service requests per year.