Connect Two Computer To A Single Screen

BY STANLEY ZAROWIN

Key to Instructions
To help readers follow the instructions in this article, we use two different typefaces.
Boldface type is used to identify the names of icons, agendas and URLs.
Sans serif type indicates commands and instructions that users should type into the computer and the names of files.

Q. I use two computers in my office—a desktop and a small laptop. When I work on the laptop, I usually plug it into the desktop’s large screen and comfortable keyboard. But the wiring setup is awkward: I have to plug and unplug all those connections each time I move from one computer to the other. Short of setting up a small network, is there another solution?

A. Indeed, there is. It’s not only an easy solution; it’s relatively inexpensive. For about $50 you can buy a device called a KVM switch that links two computers; and for $100 a KVM switch can connect up to four. KVM stands for keyboard, video, mouse.

Here’s how the switch works: You plug your keyboard, video monitor and mouse into the KVM switch and then run cables (which are included) to each computer. There’s no complicated configuration or software to install. Once you connect the plugs, a simple keystroke determines which computer is accessed.

To learn more about them, just type KVM switch into your search engine and you’ll find loads of products and information.

SPONSORED REPORT

Year-end tax planning and what’s new for 2016

Practitioners need to consider several tax planning opportunities to review with their clients before the end of the year. This report offers strategies for individuals and businesses, as well as recent federal tax law changes affecting this year’s tax returns.

QUIZ

News quiz: IRS warning on cyberattacks and a change in pension rules

Once again, the IRS sounds the alarm about a threat from cyberthieves. See how much you know about this and other recent news with this short quiz.

CHECKLIST

Bolster your data defenses

As you weather the dog days of summer, it’s a good time to make sure your cybersecurity structure can stand up to the heat of external and internal threats. Here are six steps to help shore up your systems.