On-Site Computer Repair, Service, Networking and IT Support to Homes and Small Businesses Throughout Milwaukee, Waukesha, Ozaukee, Racine, Kenosha, Washington and Walworth Counties. 

Facebook Twitter E-mail RSS

Friendly, Professional Service Since 2003

On-Site Service At Your Home Or Office - No Additional Trip Charges

Call Me At:
262.327.0858
414.375.0858
800.993.8327

Request a service call online

A convenient way to begin the process of resolving your computer issues and needs.
Just fill out a brief form and I will get in contact with you as soon as I can.

formats

Goldman Sachs | Podcast: Artificial Intelligence – The Next Wave of Disruption

image_printPrint

Goldman-Sachs

George Lee, chief information officer for the Investment Banking Division at Goldman Sachs discusses  in a podcast recorded on March 4, 2015 the ever increasing role of artificial intelligence in our everyday lives. Lee defines artificial intelligence as, “An attempt to simulate human level cognition, recognition, and even reasoning at some level in computing and with algorithms.”

Whether its intelligent online search prediction and marketing, machine automation such as self driving cars, or process optimization going on across every industry, artificial intelligence is aiding us to gain a better understanding about complex systems and to make better decisions.

Artificial intelligence is now being integrated with very large data sets known today as ‘big data’ to expand into new frontiers of knowledge and technological possibilities.

To Podcast:  Goldman Sachs | Podcast: ‘Exchanges at Goldman Sachs’ – Episode 7: Artificial Intelligence – The Next Wave of Disruption

~Ted Eiler

 
 Share on Facebook Share on Twitter Share on Reddit Share on LinkedIn
formats

The Importance of Keeping Flash and Java Updated

image_printPrint

Adobe-Flash

The Adobe Flash Player and Java Runtime Environment commonly running on many computers today are notorious targets for hackers looking for an entryway into your system.  These are two third-party programs that are used heavily on the web and run on multiple operating systems, and as such exploits discovered in them can be leveraged on many computers across different platforms.

Flash and Java is frequently updated to patch newly discovered security holes and vulnerabilities, so it is important to keep them up to date to improve your security while online. Read more…

 
 Share on Facebook Share on Twitter Share on Reddit Share on LinkedIn
formats

Google Draws the Line With Ad Serving Chrome Browser Extensions

image_printPrint

Google_Chrome_icon_(2011)

Google has been recently removing Chrome extensions published on the Chrome Web Store that inject advertisements into the browser without previously informing the user.  All extensions published on the Chrome Web Store must adhere to the Developer Program Policies, requiring that extensions may show advertisements only if:

  • This behavior is clearly disclosed to the user.
  • There is clear attribution of the ads’ source wherever those ads appear.
  • The ads do not interfere with any native ads or functionality of the website.
  • The ads do not mimic or impersonate the native ads or content on the third-party website, and the ads adhere to the content policy on impersonation and deceptive behavior
    (Chrome Developer Program Policies)

Read more…

 
 Share on Facebook Share on Twitter Share on Reddit Share on LinkedIn
formats

A Tip to Help Keep Your Credit Card Safe Online

image_printPrint

Secure credit card

As news reports of online security breaches occur with increasing frequency, people are becoming more concerned about the safety of conducting financial transactions over the internet.

While there are security risks to using a credit card online that are beyond our control, one practical step you can take to avoid having your credit card compromised is by using a virtual credit card.

A virtual credit card is a unique temporary credit card number that is generated and linked to your real credit card.  The temporary credit card is only available for a single transaction, after which it becomes unusable.

If your credit card number happens to get stolen somehow in a security breach, you are safe because the stolen card is no longer usable, and the thief does not have your actual real card number.  You can also place a dollar limit on the card, which prevents an online vendor from placing a greater charge than you expect.

Virtual card numbers are becoming a very common feature offered by credit card companies to reduce the risk of unauthorized transactions.  The service is usually accessed by the user on the credit card issuer’s account management website.  If you are unsure whether or not your credit card issuer offers this beneficial service or how to access it, please contact their customer service department directly for more information.

~Ted Eiler

 
 Share on Facebook Share on Twitter Share on Reddit Share on LinkedIn
formats

Microsoft Announces Forthcoming Windows 10

image_printPrint

Windows 10

Microsoft held an event in San Francisco on September 30, highlighting “what’s next for Windows” with the upcoming release of Windows 10 operating system.

Interestingly, they decided to skip past version number 9 for an unexplained reason, perhaps to distance itself from the stigmatized Windows 8, or to make the number on par with Apple’s OS X.  No official release date was announced, rumor has it is coming out sometime later in 2015.

Due to the bad press and poor reception Microsoft received with Windows 8, they are hoping to make a big comeback with this next release.  The big problem with Windows 8 is that Microsoft attempted to make an operating system that was tailored to touchscreen and tablet devices, however in doing so they crippled the functionality of the classic Windows desktop environment people have been familiar with now for decades (ie. the removal of the classic start button with start menu, replaced by the touch friendly modern start screen). Read more…

 
 Share on Facebook Share on Twitter Share on Reddit Share on LinkedIn