Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

The Viral Videos Worth Remembering!

Social development seldom keeps pace with the creation and spread of new technologies.  As we become smarter and more technologically adept, there have been no significant social movements that incorporate developing the human mind in a similar fashion.  Nowhere is the disparity between emerging technologies and stagnant sociological development more clear than on the Internet.  The proliferation of high-speed transfer devices in combination with immense online data storage depots in the hands of people who are often immature has led to the rise of viral Internet videos.

Never before have so many people shared so many ridiculous, pointless or disturbing images as they have within the past five years.  But for every traumatic Internet video phenomenon, there has been a gem that is worth recalling (or experiencing if you haven’t yet).  Some of the most noteworthy (and safe for work!) viral video phenomena include:

Diet Coke And Mentos Eruption.  This viral video was a remarkably simple one wherein Mentos candies were dropped into a two-liter bottle of Diet Coke.  The result was a foaming geyser caught on video that fascinated Internet video watchers in 2006.  Debate over the video’s authenticity persisted until Mythbusters illustrated the reaction.  Now, the video remains a pretty cool bit of footage.

“Debbie’s” eHarmony Video.  Rather hilariously, this seemingly-normal eHarmony dating video takes a turn for the funny when the woman describing herself breaks into tears while discussing her love of cats.  If you haven’t seen this, it is surreal and the type of uncomfortable humor that it is almost impossible to sit through with a straight face.  Even cat lovers will laugh at “Debbie” as she cries over how great she thinks cats are.

The Star Wars Kid.  It is hard not to appreciate the teenager from Quebec whose video of himself pretending to be a Jedi leaked onto the Internet.  The boy uses a golf ball retriever as if it was a lightsaber and hurls himself around as if he was in Star Wars.  This viral video became so popular that parodies of it appeared on Arrested Development and American Dad!  With millions of hits, the Star Wars kid video reassures us that it is cool to play and, when taken out of context, people look ridiculous playing.

Sam And Ren Have A Conversation.  There is a somewhat timeless quality to the video of the two seventeen-month old twins conversing with one another in their own fictional language.  The viral video had thousands of views after it appeared on YouTube and remains popular there today.

Amid thousands of ridiculous, pointless or disturbing video clips that users upload to the Internet, few become a real phenomenon that attracts real attention.  Fortunately, time weeds out the disgusting or less funny ones and leaves viewers with some enduringly interesting online videos.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


The Cult of Apple – Part 1: Identity Formation

Late last year, New York City’s beautiful Grand Central saw the opening of Apple’s latest retail store. By noon on opening day, the store had already gotten more than four thousand visitors, according to The Wall Street Journal. Even before then, over two thousand people waited in line in anticipation of the opening. The phenomenon of long lines outside Apple stores is nothing new; however, it is surprising to see a few thousand people await the opening of a mere store, as opposed to the debut of a new product. After all, beautiful as the architecture of this particular store may be, it still lacks any new Apple products—no sneak peeks, no iPhone 5, no iPad 3, no major announcements about tech support upgrades, nothing of the sorts whatsoever.

Still, even when it comes to the debut of a new product, there seems to be something irrational and odd about the notion of waiting in line for a few days to purchase a product that you can pick up a day later by casually strolling into a pleasant, crowd-free store. So why do people do it? What’s behind the Cult of the Apple?

There is no doubt that the fact that Apple products seemingly require less computer repair work and are less susceptible to Internet security threats has been an influential factor in building the company’s strong following. However—and as controversial as this claim may be—the reason behind the powerful and expansive rise of Apple consumerism has little to do with the products’ durability and impressive capabilities. What makes Apple products so attractive to consumers is their cultural status, their role in forming social identity.

The sociological phenomenon that explains this trend is by no means new or exclusive to Apple products. People and nations throughout history have tried to define other social groups as the “other” in order to discover an identity of their own as the “norm.” In this mercantile setting, Apple users identify those who are not Apple users as the “others,” those who are less hip, less cool, less tech savvy, less rebellious. In doing so, the people who stand in line awaiting the unveiling of the new iPhone, for example, can feel a sense of belonging to an elite social group.

If you’re wondering how the Cult of Apple is any different from Pottermania, for example, then consider the different ways in which people interact with the Harry Potter books and Apple products. Apple merchandise are dynamic products that allow users to form a unique identity by using them, whereas music and books are somewhat static products. People who waited in line for days to get the latest Harry Potter, did so to read, to experience the novel’s content (though of course there was still some element of identity-formation there). When people stand in line to get a new iPhone, whether they know it or not, they are not attracted by the content, but by the ability to express their identities by using the device, over and over, with every app, with every public appearance.

In the end, it’s not just about the technology; and it’s not merely about social identity— Apple’s success is the result of a complex array of reasons. The next blog (on January 6th) in this series will explore the second component of Apple’s success.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Digital Music May Or May Not Save The Music Industry.

According to the IFPI Digital Music Report from 2011, the music industry is a 15.8 billion dollar industry.  In 2010, legal digital music downloads generated $4.6 billion.  That number, which represents 29% of the music industry, has a vast number of analysts reaching very different conclusions.  The report, which notes that the music industry suffered a 31% loss between 2004 and 2010, is enough to give audiophiles pause.

Digital music in the form of digital downloads – audio files traditionally found online – have been on the market for over fifteen years.  However, the music industry started more carefully tracking the market share of digital downloads in 2004, following the collapse of Napster.  The influence of digital music in the marketplace has only increased; since 2004 the value of the digital music market increased 1000%!

Even with the convenient access to music that digital music affords its listeners and the lower production cost digital music offers producers, the music industry has seen widespread revenue losses.  Most in the music industry want to attribute the loss of revenue to pirated digital downloads.  Trends of pirating of digital music vary with every country, but some areas with less stringent intellectual property protections contribute more to the loss of revenue from pirating.  In the UK, 76% of music obtained online in 2010 was obtained illegally.  Industry experts estimate that digital music sales would be 131% greater if all piracy ended.

But the industry analysts may be making too many stretches in blaming digital music piracy for the industry’s woes.  The Digital Music Report attributes the 12% drop in global Top 50 concert revenues to pirating.  That connection may be a false one.  There is no evidence to suggest that those who pirate music either were attending concerts before they became music pirates or are less inclined to attend concerts once they begin pirating.  A much more likely factor contributing to lower concert attendance is the global financial crisis which has left many without the disposable income to spend on attending concerts.

Moreover, the report acknowledges that at 30% of their revenues, the music industry invests more heavily than any other entertainment sector in marketing and A&R (artists and repertoire, which is essentially talent scouting and artist development).  The report and analysts are quick to blame music piracy as the overwhelming cause of 31% drop in the value of the music industry since 2004.  Again, this is a simplistic view.  In that same time frame, pop music has all but died, replaced by rap, hip-hop and R&B on most Top 40 stations.  It is just as likely that the A&R sector of the music industry radically misjudged what music customers would pay for as it is that the piracy of digital music has precipitated the loss of revenues.

New services like Google Music continue to bolster the legal propagation of digital music downloads; there is no corresponding A&R avenue to so vigorously promote new, quality artists.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Dancing Elves are the Season’s “in”

You may already be familiar with the poplar flash-based holiday entertainment website, “Elf Yourself,” but if you have not looked at it in a few years (when it was oh-so-popular) or if you have forgotten what it is, take a few minutes to try it out again–you’ll find that it really doesn’t get old. Besides, the site has many new features that make it a great deal more entertaining.

Using a simple interface, the website allows you to plug in a photo of yourself, or even several ones to include friends or people you know, and then mounts the facial pictures onto dancing Christmas elves. The result, as you can imagine, is a fairly hilarious clip of you dancing in absurd and wild Christmas settings surrounded by snowmen and other holiday critters.

The process is very simple and well worth the short amount of time it takes to get things ready. First, the site asks you to upload a picture of yourself. To do so, you can choose a saved picture from your computer, or you can link to your Facebook account and choose one from your profile. If you have a webcam and would prefer to take a picture on the spot, you can do that too. Of course, doing so requires the dreaded Facebook permission option, but once you’ve had your fun, you can simply remove the application from your Facebook account to eliminate (or at least reduce) threats to your Internet security. Uploaded pictures have to be in either JPEG or PNG format and are limited to 3MB in size (which might be a problem for photos shot with high-resolution cameras that produce much larger file sizes).

The interface also allows you to zoom in and accurately outline or rotate your face within the picture you upload. You are also required to outline the area between your jaw line and upper lip to allow for the singing animation effect that accompanies the dancing in the final clip.

Once you add all the pictures you want, you can select what kind of dancing you want your elfed-self to perform. Choose from disco, 80’s, country, singing, hip hop, surf, and classical. The site allows you to link the short clip of yourself dancing in elf costume to your Facebook account or email it to friends. The online video has an expiration date, so once it’s over, the site prompts you to download it, naturally, for a small fee.

Overall, elfyourself is an easy way to laugh hard and get a last minute dose of the holiday spirit. If you like your video so much that you want a permanent souvenir, you can buy a DVD of your elf dancing to all the available options, custom mugs, mouse pads, and other items. To create other funny animated clips starring yourself, check out Jib Jab’s website.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Interfolio: Technology Solutions for Grad School Applicants

For students and professionals getting ready to apply for academic jobs or graduate programs, December is an especially hectic time of the year because it marks the arrival of those dreaded deadlines. Applying for graduate school is a long and tiring process that often involves endless hours of putting applications together. This includes preparing and writing admission essays and personal statements, customizing writing samples, battling with ETS over test score deliveries, and requesting and sending out letters of recommendation. If you’re getting ready for some big January deadlines or know a friend or family member who’s going crazy juggling applications, take a look at Interfolio—an online resource that makes the application process considerably less dangerous to your mental health.

Interfolio is an online system that stores supplementary application materials and sends them out for you. For example, instead of relying on professors to send out recommendations to a dozen or more schools, using your Interfolio account you ask them to upload their confidential letters to your account where it’s stored. Then, in place of entering a recommender’s email address in an application, you simply enter a code that Interfolio generates. Next, Interfolio receives the request and sends out the letter for you. Of course all this happens for the modest fee of $6 per letter per school (+1$ for each additional letter). So for example, if you send four letters to UCLA, the total cost for electronic delivery would be $9 (6+1+1+1).

If you’re worried about the credibility of letters sent by Interfolio because of Internet security concerns or similar privacy issues, rest assured, Interfolio is secure and keeps your letters confidential. Besides, most schools are already familiar with the service and know what to expect.

Interfolio is also idea for sending other documents like resumes, writing samples, or portfolios for job applications. Those preparing for a career in teaching will find the service very useful, as it allows you to collect and save letters of recommendation from employers or site-supervisors before they forget you.

The service offers a variety of different accounts from which to choose, and they’re all priced very reasonably. Additionally, Interfolio offers several options for delivering the material to colleges or potential employers such as online deliveries (which are the fastest) and many ground-shipping options. Many of these, in turn, come with real time tracking and FedEx online tech support.

Documents you upload to your account are stored for five years, even when your account expires! Along with the simple and user-friendly interface, Interfolio has wonderful and accommodating customer service. When you need documents rushed, the service crew is always understanding and ready to help. So make your application process a little less stressful with this amazing service or refer a friend to Interfolio.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


The Protect IP Act Puts The United States At The Forefront Of An International Quagmire.

The Internet has the capacity to be many things from an entertainment source to an off-site data storage facility to a powerful tool for education.  The Internet remains one of the most powerful resources for communication and understanding from people of all ways of life, all around the world.  But the Protect IP Act threatens that freedom, and it does so under the guise of improving Internet security to intellectual property owners.

Right now, the United States Senate is considering S. 968, the Protect IP (Intellectual Property) Act.  The Protect IP Act bolsters Internet security by creating new punishments for Internet providers who have any pirated material pass through their servers.  This means that the United States government would begin policing the Internet and making online data storage sites of material it believes are pirated inaccessible before prosecuting those accused of pirating.

The Protect IP Act empowers the United States Federal Government to punish service providers who may not know about the contents of their data storage units.  In fact, the more popular a site is, the less likely the service provider is to know about all of what is on the servers.  Given the vague language of the bill, the U.S. Government potentially becomes the biggest threat to Internet security by assuming a Big Brother type role.

But the Protect IP Act version of Big Brother comes armed.  Sites that welcome photo sharing or other online data storage are particularly vulnerable.  Hypothetically, the Protect IP Act could allow the U.S. Government to shut down Facebook because a photo a user posted infringed upon the copyright.  Given that copyright laws, data storage agreements and Internet security protocols are not uniform throughout the world, the Protect IP Act could easily force the U.S. government into a police action in a place where it has no jurisdiction.  Perhaps the Senate has forgotten that the first two “w’s” in “www” stands for “World-wide.”

For sure, Internet security is important and due vigilance must be maintained in defending intellectual property rights.  Unfortunately, the Protect IP Act is a dramatic overkill, analogous to chopping a person in half to remove a tick on their arm.  The bill commits the U.S. to wield such a large machete to the world and with such flimsy language in the bill and the lack of a reasonable way to enforce it overseas or where the data storage hardware is inaccessible or dangerous to reach, it is hard to see the passage of the bill as anything but disastrous.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Have You Googled Yourself Recently?

Performing a Google search on people has become a normal, even necessary, way of doing an amateurish background check. Employers use Google to verify information about job candidates or check if anything noteworthy comes up like encouraging (or discouraging) reviews, pictures of excessive and unflattering partying, or significant past achievements. Likewise, friends and potential dates are frequently turning to the simple Google search for information about others. Of course, no discussion of Google searches would be complete without mentioning the searches that we perform on ourselves!

Curious about the strength of their own Internet security and the public availability of their information, many people Google their names to see what they get. In fact, this is an easy and powerful practice that many people frequently ignore. For those who have not done this before, now is the time.

Even if you are too scared to find out what’s out there about you, Google your name as soon as possible because whatever you can see, other people like friends, employers, and worst of all, creepy stalkers, can see too. By performing a Google search on your name, you can empower yourself by working to clean up messy and undesirable links that find their way online.

Perhaps a Google search of your name brings up old or unflattering pictures, or perhaps your results contain a link to a blog you wrote in high school that you now regret. Regardless, there are several ways to approach deleting links to blogs, articles, pages, pictures, or videos that you don’t want to be available to the public.

The easiest way, naturally, is to try to delete the content yourself if you still have access to it. If it’s a blog comment that you don’t like, see if you can retrieve the user name and password for that particular blog and manually erase it. When this isn’t an option, try contacting the webmaster and polity ask that he or she take down the negative content.

When it comes to extensive online activity that you just can’t even begin to tackle and delete manually, consider using an app like “Exfoliate” which works on iPhones and Smartphones to delete old Facebook content like comments, likes, and posts.

Sadly, it is often the case that despite having a lot of tech support skills and being highly computer savvy, some links are too stubborn and will continue to linger in cyberspace, even when you might not want them there. The best solution to such problems is monitoring what you allow to get online in the first place. Being information paranoid isn’t necessarily a bad thing. So go ahead and freak-out about sharing anything online. After all, it’s better to be safe than sorry.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Facebook for College Professors: The Ten Commandments

We’ve searched the web for articles, blogs, and lengthy school policies on how professors should use Facebook and created a condensed version of the multitude of those tips. Here are the Rescuecom Ten Commandments of Facebook for College Professors (violate them at your own risk):

1)   Thou shalt never, ever, send a friend request to an undergraduate student still enrolled at your institution. Almost every online resource that provides information of Facebook ethics for academics insists on this point. It’s by far the most important rule, so please abide by it.

2)   Thou shalt accept student friend requests consistently. That is to say, either accept all requests from your students or accept none. Picking and choosing is a blatant display of favoritism, not to mention an easy way to get a zero on the “Instructor is impartial” question on your evaluation. (Nota bene, this doesn’t apply to students who have graduated. Once they’re out, feel free to reject and accept as you please.)

3)   Thou shalt not comment on your students’ photos, especially embarrassing ones. Remember that you need to maintain formality, even when Facebook tries to do away with whatever formality is left.

4)   Thou shalt not poke your students. No one likes pokes. They’re annoying and awkward. Imagine how awkward they are when they come from a professor.

5)   Thou shalt be friendly and encouraging—albeit proper—when students share links with you or write on your wall.

6)   Thou shalt not post anything you wouldn’t share with your students in person. Make sure you adjust your Facebook Internet security settings to limit what students can see.

7)   Thou shalt not use your students’ profiles against them. When a student emails you with an excuse for missing class, don’t snoop around his or her profile to check the claim. That’s just creepy and cumbersome.

8)   Thou shalt maintain an academic and professional tone to your Facebook—be an example to your students.

9)   Thou shalt not post class material, syllabi, grades, or announcements on Facebook. Even if you are Facebook friends with every single one of your students, Facebook is still not a reliable way to make announcements because it lacks formality. Also, do you really want to give your students yet another excuse to be on Facebook.

10)  Thou shalt not use social network services like Facebook in place of email communication. Email correspondence, once again, is infinitely more formal than Facebook correspondence—and you want to keep communication serious and academic. Besides, email can provide you with official records of correspondence if you ever need them. Imagine how odd it would look if you were to use Facebook transcripts in a plagiarism hearing, for instance.

It may be unfair to place so many restrictions on how professors and educators use Facebook, but it’s just another job hazard. Sorry, professors.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Why Are We Still Stuck in QWERTY-land?

The current structure of most keyboards is neither intuitive nor mechanically necessary. The layout of most keyboards today is a remnant of the days of typewriters. The first typewriters had letters arranged alphabetically, but because hitting adjacent keys often jammed the machines, manufacturers rearranged the keys in order to distance letters that frequently occurred consecutively in language. The result was what today we know as the QWERTY keyboard, named after the first six letters on the top row.

We are so used to typing on the straight rows of QWERTY’s keys that an alternative way of typing probably seems impossible. But in reality, if you take a moment to look at your hands the next time you type on your keyboard, you’ll notice that your wrists are bent outwards. Most people never realize the awkward movement involved in typing on a keyboard. Human hand form favors typing at a slight angle. In fact, take a minute to look at how your wrists. Notice their awkward typing angle.

Learning to touch type can help increase your typing speed, reduce neck-related injuries, since you do not need to look down at the keyboard all the time, and increase your typing accuracy. Still, even touch-typing places unnecessary strain on your wrists. If you’re at a job where you spend all day typing, consider switching to an ergonomic keyboard, that is, a keyboard whose keys are structured to reduce the risk of Repetitive Strain Injuries associated with typing and to allow your wrists to remain in an more ergonomically sound position as you type.

Think of ergonomic keyboards as a means of supporting your body. We spend plenty of money on providing tech support for out machines, so why not get some for our wrists?

Ergonomic keyboards can range in price from affordable to very expensive, but that doesn’t mean you can’t get a good deal. Many online websites offer discounts on ergonomic keyboards. Amazon, for example, is offering the Microsoft Natural Ergonomic Keyboard 4000 for under $30.00.

Most ergonomic keyboards provide added support for hands, wrists, and forearms by splitting the keys down the middle and positioning them at an outward angle to allow you to type more naturally. Some also elevate the keys in an inward curve.

Switching to an ergonomic keyboard might take some getting used to, though. After all, just like switching between playing the piano and the electric organ or between typing on an Apple keyboard and a standard keyboard, your fingers need some time to adjust to the heaviness of the keys, the different spacing, and the angle. Once the adjustment period is over, you will find that your wrists and hands are much happier typing at an angle.

Ergonomic keyboards work normally with any computer device that requires a standard keyboard and require no additional computer support. So take advantage of online sales, and get yours today.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Privacy or Progress: Where Should We Draw the Line?

Yet again, big names in the technology world are getting heat for wandering into the still grey area of online privacy. As most of our communication rapidly shifts into the cyber medium, and as we continue abandoning communication methods that can’t keep up with the powerful, interconnected nature of smartphones, tablets, and computers, we might as well get used to constantly hearing about privacy and Internet security issues.

In a milestone step in the debate over data collection and transparency, Facebook recently reached an agreement with the Federal Trade Commission about how Facebook now has to clearly ask users to opt-in to its new programs, as opposed to changing privacy settings without anyone knowing. The move doesn’t affect the social network giant’s past actions, but it does threaten to fine the company $16,000 a day for future violations. Well, that’s a relief, at least partly. It’s good to know that someone in the government is looking out for us. Similarly, the Irish Data Protection Commissioner’s office is currently subjecting the company’s international headquarters in Ireland to an audit based on user concerns over the amount of information that the company stores on users. Once, again, good on you, Irish authorities.

Android developer Trevor Eckhart recently exposed an equally serious threat to user privacy. The threat comes in the form of a built-in app called CarrierIQ that runs on most Android, BlackBerry and Nokia devices. The app records immense amounts of data on smartphone users such as keystrokes and locations without asking permission first. The supposed aim of the app is to provide carriers and developers with data to better manufacture their products, according to The Atlantic Wire.

After an intense back-and-forth between Eckhart and the app’s developer in which the latter denied Eckhart’s claim and ordered him to cease-and-desist from discussing the app in the blogosphere, Eckhart finally showed in detail how the company was violating users’ privacy. So now we are faced with a new problem; not only are companies spying on people under the guise of product development, but they’re also denying it. This adds a whole new level of eeriness to the increasingly powerful technological big brother.

In many ways, the invasion of our Internet and technological privacy is necessary for the continued development of technology based on user trends and the likes. Atlantic Wire’s article presents a very interesting dilemma that we now face. The question, then, becomes, where do we draw the line? Do we stop now and slow down technological advancement, or should we let Facebook, Google, apps likes Carrier IQ, among many others to read us like open books, all in the name of progress? You see, there’s no easy answer.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending