Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Does Media Attention To Twitter Make A Mockery Of Legitimate News?

For several months, the Occupy Wall Street Movement has been going on in New York City.  The protest, currently physically clogging up New York City’s Zuccotti Park, seeks to bring attention to how the 1% of the wealthiest people control the fates of the remaining 99% of the population.  There is a strange disconnect in the literature provided by Occupy Wall Street through their website and the physical protest; it is unclear how the protesters hope to bring change to economic inequality through randomly clogging up a park near the Wall Street financial buildings.

What is fascinating is how every sector of the media is trying to make a statement about Occupy Wall Street.  On November 15, the Wall Street Journal posted a video online in which three reporter/commentators discussed a spike in Twitter activity the night before.  Twitter has been an invaluable tool used by members of Occupy Wall Street to communicate with one another through their smartphones.  The story focused on how Twitter traffic quintupled from about 100,000 tweets with Occupy Wall Street hash tags to 500,000.  This occurred when police came into the park in the middle of the night to clean.

The attention social networking media gets through stories like this is enough to make legitimate journalists and private citizens blanch.  A quick Google search of November 15 and Occupy Wall Street leads readers to surprisingly little information.  Legitimate news sites note that an eviction happened and that authorities allowed protesters back into the park by morning.  In a protest that has had moments when the major news outlets have covered police violence and significant crowd actions, a spike in Twitter traffic pertaining to Occupy Wall Street seems like a non-story.

The Wall Street Journal tacitly admits as much in the podcast when Zachary Seward notes that much of the traffic that contributed to the Twitter spike did not come from people actually in Zuccotti Park.  This is a textbook definition of hearsay and is more an illustration of how fast small events can be blown out of proportion.  When the Wall Street Journal treated what was essentially a high-tech game of “Telephone” as a legitimate news story, Edward R. Murrow rolled over in his grave.

Twitter could be a great asset to the media or to Occupy Wall Street, but the way people who are not involved in stories use Twitter to relay messages as if they were present sets a dangerous standard that journalists today, at the very least at the Wall Street Journal, seem content to follow.  The non-story from the Wall Street Journal calls to mind a brilliant parody done by The Onion News Network about assumed casualties from a train wreck.  At least viewers for The Onion know to expect humor as opposed to serious stories; we expect better from The Wall Street Journal.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


The Social Network That Never Was, But Could Be Again: Elftown

Social networks come and go, especially with changing Internet security concerns stemming from identity theft, but one of the social networks that never truly came of age and is having a slower collapse than others is Elftown.  Elftown – www.elftown.com – is an online artistic community and it was one of the earliest social networks online.  Founded in 2002, it predates both Myspace and Facebook.

Despite Internet security concerns, the site is not dead yet!  Many artists are still discovering Elftown as a viable off-site option for data.  In the last year the reference photography page on Elftown has become a resource for digital artists with tens of thousands of images that users have made available.  Despite concerns over Internet security, Elftowners use the site for data backup of their artistic works.  As a relatively unknown site, Elftown does not have as many Internet security issues, making it an ideal place for artists to store digital copies of their artwork.  This makes it an ideal site for data backup for artists who are storing their works on older systems.  Using Elftown for data backup and data recovery is certainly what Elftowners do with reference pictures.  A simple Google search of “reference pictures” puts Elftown as the second result out of 283 million results!

Elftown is most analogous to deviantART, though Elftown follows a less commercial model.  Elftown has never effectively monetized the site and relies upon donations of funds and equipment to keep the Elftown servers running.  Elftown’s distinction is that it focuses on the creation of art, while protecting artists through reasonable Internet security, screening methods and protected data backup options.

What Elftown has that the other social networks lack is a strong sense of community involvement.  When you sign up for Elftown, your application has to be approved by the site’s founder, Hedda.  After Hedda approves you, Guides greet users, and artists on the site randomly say “hello.”  A bar on the right side of the Elftown page shows a list of the Elftowners who are currently online.

As artists, artistic integrity is very important, as is Internet security to protect their intellectual property. The social aspect of Elftown is visible by Guards who patrol the site to enforce the terms of use and prevent violations to copyright laws, as well as guard against Internet security violations and threats to data backup on the site.  Elftown runs contests where users are encouraged to generate original art for specific themes, encouraging healthy competition.

Elftown started as a virtuous idea: to connect artists of all mediums with one another to encourage art and the free spread of ideas.  As Myspace.com and Facebook decline, perhaps the Elftown model will have its day simply by enduring through Internet security threats and by providing reliable data backup for artists.  Social networking is about connecting, not monetizing, and Elftown has endured when others on the Internet have not.  Elftown is still ahead of its time.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


What If You Threw A Party And No One Came? Myspace Is Dead.

Right about now, Justin Timberlake must feel like he has egg on his face.  In June of 2011, Justin Timberlake and Specific Media bought Myspace.com and began to retune the website to place more of an emphasis on music.  Myspace now features popular and up and coming musical artists and if you did not know that, it is no surprise: Myspace.com has fallen to the 88th Top Site in the U.S., below The Drudge Report and CBS Sports.

Even in its heyday, Myspace was not exactly a haven of Internet security.  More than suffering from spreading viruses, Myspace users found the Internet security threat of stalkers.  As the first online social network for many users, Myspace users quickly found that the key component to Internet security is simply not putting deeply personal information about yourself on your page.  As well, the lax Internet security measures on Myspace allowed adult predators to gain access to children eighteen and younger.

In addition to basic Internet security concerns embodied by Myspace publishing users’ birthdays and birthplaces, which allowed some crafty criminals to divine portions of users’ social security numbers, Myspace users have found there is simply no good reason to go back to Myspace.  Unlike other social network sites that provide archives for online storage, Myspace encouraged users to link to external sites.  As a result, Myspace quickly turned into a portal to other, cooler sites, as opposed to one where users built an online storage depot of their own, cool works.

It is clear that Justin Timberlake is trying to change that now.  But intensifying the Internet security to Myspace and rebranding the site as an online storage option for the music and music videos of musical artists has not turned around Myspace’s slide in popularity.  The artists who are using Myspace as an online storage venue often repost their music and videos to other sites, leaving little unique content to draw users back.

More than Internet security concerns and the desire to combine social networking with online storage, a hook that photo sharing social networks have found effective, much of the demise of Myspace simply comes from the fact that it is not cool anymore.  Social networking is following the same long term ebb and flow of every trend and it is clear that Myspace is in the unenviable flow wherein the network is not cool to mainstream users.  Counterculture users are not yet using Myspace, even ironically.

Justin Timberlake is just a victim of bad timing, buying into a network that has already jumped the shark.  More than fear of Internet security threats or the desire to start up an online storage folder on a network that they have already left, users are stating that they are happy to get their music on other sites and no amount of rebranding Myspace will make them come back.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Sewell SW-9393 VGA To HDMI Converter

Portability does not need to be a trade-off with quality with the Sewell SW-9393 VGA To HDMI Converter.  Today, consumers use their telephones to take pictures and are encouraged to download digital downloads of movies, digital textbooks and audio performances to their laptop computers.  While this may appeal to tweens and those whose only computer device is a portable phone, serious movie lovers and large groups of people need something more.  For that, they need a converter.

Virtually every computer and laptop computer on the market today features a VGA port.  The video port allows users to export images and sound to devices that project those media.  The current standard, since mid-2009, is High Definition.  High Definition televisions and projectors, however, do not accept VGA or less refined video signals.  For that, users need the Sewell SW-9393 VGA To HDMI Converter.

The Sewell SW-9393 VGA To HDMI Converter is a gadget that converts the VGA signal from a laptop computer or desktop computer port to a High Definition signal.  By connecting a standard VGA cable from the computer to the Sewell SW-9393 VGA To HDMI Converter and an HDMI cable from the Sewell SW-9393 VGA To HDMI Converter to the HD device, users may watch movies, share pictures or present computer-based presentations on much larger devices.

The Sewell SW-9393 VGA To HDMI Converter transforms a laptop computer into an educational tool when it is connected to an HD projector.  A home PC may similarly stream movies from the Internet to an HDTV or through a digital projector when connected to the Sewell SW-9393 VGA To HDMI Converter.  As a business tool, one needs only their laptop and the Sewell SW-9393 VGA To HDMI Converter to connect to common devices and share information with large groups.

In addition to the relatively low expense – the Sewell SW-9393 VGA To HDMI Converter is available online for $56 – $80 – the Sewell SW-9393 VGA To HDMI Converter is exceptionally easy to use.  It requires no software to transform the signals from a video card to the HD device.  Moreover, by using physical connections instead of wireless means, one maintains data and network security.  The Sewell SW-9393 VGA To HDMI Converter allows users to share information, presentations and art with a lower risk of being hacked or requiring virus removal.

For a comparatively low investment, the Sewell SW-9393 VGA To HDMI Converter allows portable devices to become effective presentation tools.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


A Mobile Network That Runs on Freedom

Most mobile phone networks run on traditional radio wave technology. But one emerging carrier plans to run on freedom. At least that’s what the carrier, Republic Wireless, is calling its mobile phone service plan. Republic Wireless is offering a plan that covers voice, text, and data for $19 a month. The plan offers unlimited talk, text, and Internet with no annual contract.

In a time where average mobile phone plans by T-Mobile, AT&T, and Verizon are roughly four times the price of Republic’s, it seems just too good to be true. Rest assured, it’s not. Republic is truly offering an unlimited plan for $19. Whether or not there’s a catch to all of this depends on how you feel about the technology that the carrier is employing to make this possible.

To bring down the costs of operation to a point that allows the company to offer a $19 unlimited, monthly, no-contract plan, Republic Wireless utilizes “Hybrid-Calling” technology that works by automatically switching to Wi-Fi to make calls, text, and surf the web whenever a wireless connection is available. When Wi-Fi is not accessible, Republic’s system automatically switches to traditional cellular service, and so on. When Republic users aren’t connected to a Wi-Fi network service, their phones switch to Sprint’s cellular service.

Because the carrier is just emerging, its services are still limited. The company refers to customers as members, which gives it a nice egalitarian feeling that the big four (Verizon, AT&T, T-Mobile, and Sprint) lack. Republic is slowly admitting new “members” to its ranks, but right now, available spots are limited. Interested users can subscribe to an announcement service on the carrier’s website that informs them when more spots become available.

To start using the service, users are required to enable at least one Wi-Fi network on their devices. This is where the nuances of the “unlimited” plan emerge. Republic users will have unlimited everything whenever they’re tapped into the Wi-Fi end of the hybrid service. According to the carrier’s website, even if users have 0% Wi-Fi usage, relying only on the cellular usage, they’re allowed approximately 550 minutes and 150 texts.

For some critics, this seems like a pretty serious catch, but Republic maintains that the plan is in fact unlimited for several reasons. The first is that given most people’s access to Wi-Fi, there won’t be that big of a need to switch to cellular. The second is that there are no actual overage fees. If members use too much cellular service, they receive several warnings. Eventually, users who do not comply with what Republic calls the “community fair use” threshold, get the boot.

If you’re ok with these guidelines, then it’s a pretty sweet deal. If you don’t think you’re around accessible Wi-Fi enough, then maybe Republic isn’t your best choice.

For now, Republic is only offering one, low-end Android phone, the LG Optimus with Android 2.3 “Gingerbread.” The initial cost is to join and get the phone is $199, though a special ongoing promo currently gets you the phone for $99.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Laptop and Smartphone Thieves, Beware!

PREY is a free open-source program that’s a great way to track lost or stolen laptops and smartphones. PREY is quite brilliant. PREY anti-theft software lets owners play private investigator for free. The software helps users keep track of their phones or laptops and can help users find their devices if they are ever stolen.

The software, described as silent but deadly by its creators, works by remaining dormant on its host device until it is activated by a signal. Disgruntled victims of thefts can activate PREY on a lost laptop by logging into the connected PREY account online. Those who want to track their lost smartphones can do so by sending a text message to the phone to activate its resident PREY. The standard activation message is “GO PREY,” though this can be customized.

According to PREY’s website, once the software is activated, it allows users to gather information about their lost or stolen devices’ location, hardware and network status. Users can also trigger specific actions on the device. Outlook or Thunderbird data on a missing laptop can be remotely hidden. Users who use PREY to track a stolen laptop, for example, can remotely activate the missing device’s webcam and use it to take pictures of the culprit. A user can also see how his or her stolen device is being used, and look at the screen. Ideally, a PREY user would get a glance of the thief logging into a facebook page or email account to get his or her information.

PREY is designed to automatically connect to the Internet to allow its host device to be tracked. When no Internet network service is available, the software tries to connect to the nearest Wi-Fi hotspot. PREY takes advantage of its smartphone’s GPS to send information about the device’s location. In laptops, the software uses the nearest Wi-Fi hotspot to triangulate and narrow in on its location according to preyproject.com.

As a free, open-source software, PREY is quite remarkable. For one thing, it works everywhere! There are no geographical limitations on where it can work. Right now though, PREY is only compatible with Android phones and does not work with iPads or iPhones. However, its developers say they’re working on these compatibility issues.

PREY is not a foolproof method of catching thieves and restoring stolen devices, though. The developers recommend contacting the police as the final step in the recovery process.

Finally, users who are concerned about privacy can rest assured because PREY is not a malware, and it does not behave like one. PREY’s website explains that unless the software is activated, it remains dormant with no activity. The developer states that PREY does not collect any private information about its users, nor does it store the information that passes through its servers, so the software doesn’t pose a threat to its users’ Internet security. Now, if only the facebook people would learn to be this nice.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Remember the Days of the Stand-Alone GPS?

A recent article on Yahoo.com named seven gadgets that will die out by the end of the decade. Among the seven gadgets are the stand-alone GPS and the low-end digital camera. According to the article, smartphones will take over both products’ functionality before long. We’ve already begun to see the demise of the stand-alone GPS as smartphone users turn more frequently to the navigation features readily available on their devices. As for cameras, well, the Apple’s iPhone 4S sports an 8 megapixel camera, as does Nokia’s new Lumia 800, which is more than what most people need for casual photography!

With the ubiquity and increasing sophistication of wireless network services, smartphones are able to do what previously took a specialized device to do, like give driving directions. Because wireless network service providers are constantly competing for customers, we’re seeing navigation systems rise to standard feature status along with faster speed networking.

Wireless network services have become such a regular component of modern technology that they have lost their appeal as a hot topic. Inter-device network services are on their way to becoming standard, too. Soon we will forget what it is like to use a wired network service that connects a camera to a computer device, which in turn often depends on a wired network service to connect to a printer.

With wireless network services becoming the standard form of network services, the centrality of smartphones will become fundamental to communication and entertainment. Smartphones are on their way to becoming one of the primary mediums for linking users to a plethora of options ranging from tech support to entertainment, from information to communication.

Of course, as smartphones morph into their new eclectic roles, they will also become more susceptible to breakdowns and may require more frequent tech support. Right now, users require a relatively low level of tech support for their separate products. For example, users may need simple tech support in handling a poor satellite signal on a GPS device. When several devices are incorporated into one, though, users might find themselves in need of more frequent tech support.

Still, the fact that increasingly sophisticated devices are likely to require more tech support should not deter anyone from endorsing them. After all, getting tech support for smartphones and modern electronics is becoming easier by the day thanks to almost instant tech support availability. With a wireless network service, for example, users can get remote tech support in minutes.

Wireless network services are becoming incredibly powerful, and with their help, smartphones are almost certainly going to become the main technological vessel for housing GPS devices and low-end digital cameras.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Mobile Devices: Be SMART!

Everywhere you look these days there are people doing all sorts of cool things with their smartphones.  In fact, the one thing you see them doing least is actually talking on them.  They are availing themselves of the crazy number and types of apps available to them right there in the palm of their hand.  How many of those users do you suppose are worried about who has access to their personal information?  Not just the information they are exchanging with a friend at that moment, but ALL of the information their smartphone (aka Mobile Computer Device) to which their network service is connecting them?

Of course most business users are well aware of the risks associated with using mobile devices and have acted appropriately with their network services to assure that they are adequately protected.  The everyday user may not even know enough to worry about this.  Everyone who uses a smartphone requires a connection to a network service.  There are a number of ways that providers accomplish this connection to a network service, not all of which represent secure computer service.  Then there are all those apps users download, some of which are extremely cool.  Are those apps from a secure network service?  Is any information you share while using those apps protected by secure computer services?

As we all know, providers of apps and services often do not have the consumers’ best interests at heart, in fact, many prefer that we not use secure computer services.  The truth is that a virus or thief has victimized pretty much anyone who has been using a computer in any form for any length of time.  A network service who intends to stay in business over the long run will probably be a secure computer service, but a look into their records and comments from users is still a good idea.  Still, the user should not become so paranoid about suspicious providers and network services that they stop using their smartphones entirely.

Awareness is the key here.  If you are in doubt about the integrity of a particular app, do not download it until you can check it out through a reputable network service.  If you are not sure what kind of personal information your provider is sharing with whom, contact them directly and ask.  It is best to use secure computer service, especially as the use of mobile devices increases at such a rapid pace.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Analytics and BIG Marketing

So just what is “analytics” in the world of computing today?  According to the impeccable Wikipedia, “analytics is the process of obtaining an optimal or realistic decision based on existing data.  Business managers may choose to make decisions based on past experiences or rules of thumb, or there might be other qualitative aspects to decision making; but unless there are data involved in the process, it would not be considered analytics.”  Therefore, business people are using computer support to gather vital information.

Most savvy members of the business end of Internet use, marketing, and Internet security are already busily using analytics to keep their competitive edges, just one of the many reasons that intellectual property and Internet security are such hot issues.  Here is an interesting twist though.  What if a behemoth of online marketing began allowing lesser competitors to use its giant market to market their goods?  What if this behemoth even provided lots of computer support and increased Internet security for them?  How could this be good for the behemoth’s bottom line?  Analytics is the answer.

If a giant online marketer can collaborate with a lot of lesser marketers, the giant marketer can then watch these marketers much more closely without violating any Internet security protocol.  This watching is possible since sales and demographic data of the smaller marketer will be a part of the giant’s business now.  This collaboration will essentially remove any issues of Internet security and spying.  The giant is cutting out the middleman – the computer support analytics guy who used to have to chase all over cyberspace getting this same information, sometimes even violating Internet security.

At the same time, the giant is improving its upfront profile by providing access to and computer support for all of these products and services without the consumer ever having to leave the giant’s site.  In addition, at least in the short run the smaller vendors are getting a potential boost in sales based on their greater visibility, not to mention a greater sense of Internet security for their customers and for themselves.  Unfortunately, it is difficult to see this as a mutually beneficial relationship for the long run.  In the business of Internet marketing and competition, the object seems to be to always to come out on top.

That is not to say that these larger operators are merely victimizing their smaller competitors.  For right now, it seems as if both are benefitting in good ways, sharing computer support and Internet security.

Just for the sake of argument though, before a smaller competitor signs a contract with one of the “big guys,” it would be good for them to consider exactly what sort of access to information they are giving the bigger entity in exchange for their greater visibility.  How much computer support and Internet security are they gaining or losing for the sake of some perhaps temporary increased sales?

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


The Supposed Gender Gap in Social Networking

In an interesting blog on September 24, 2011, Sharon Machlis discusses a recent “study,” (Harris Interactive/Rebtel survey).  The study suggests that women “dominate” men at a rate of about 3 to 2 in their use of social networking.  Ms. Machlis takes issue with some of the study’s methodology, and thus its results.  From a purely pedestrian standpoint, the study seems as if it is probably close to accurate.  After all, women are indisputably more communicative than men are in general.

That is not the point here though, because this is the sort of information and data upon which crucial management, networking and marketing decisions are based Ms. Machlis suggests that the ways in which the surveyors worded and asked the questions may have skewed the results somewhat.  Many of us use, say, Facebook, as a business tool, so even though we are on it almost daily, we are not actually doing social networking.  We are using it as just another handy computer service.

A myriad of computer services and social networking options are presented to us daily.  Most of us cannot do business effectively without these services and options.  How we choose which computer services and social networking to use has little to do with gender and much more to do with what we need.  The casual computer user who wants to keep in touch with a friend or loved one probably chooses based on what the friend or loved one is using.

The serious business person who is maintaining contacts, tracking trends, marketing, and just “watching,” certainly has to be more discriminate in his or her choice of “social networking” sites to pay attention to and to use.  As stated above, the “dominance” this study claims for women may not be taking into account the number of women who use those sites mostly for business.  If we could subtract that number from the total, the user ratio might well be much closer to equal.  Of course we’re also going to have to subtract the men who use the social networking sites primarily as business tools, but if Ms. Machlis is correct, the ratio is still going to even up considerably.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


121-130 of 1857
© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending