The professionals at Geeks to the Rescue recommend thoroughly reading any legal document you approve. However, we also know the likelihood of people doing such is low, so here are a few of our recommended sections to keep an eye out for if you are to skim the document.
Nestled in the introduction is much more valuable information than one may realize. The introduction often lists the key players of the organization — many may not be who you expected. The introduction will also provide information about their policies concerning collecting information from minors.
What Information is Collected
How Information is Collected
Knowing how the information is collected can be as eye-opening as what information is being collected. Some of this information collection is manual, but some may be automated by some other means.
How Information is Stored
How and where your information is being stored may be of a special significance. If your data is being stored in a database in a foreign country, this may limit your ability to access it or request that it be deleted following a compromising event. This would also mean that the retrieval or deletion of your data may not fall under United States jurisdiction.
Who to Contact
Don’t Let Just Anyone Fix It
If your computer is running slow, badly, or not at all, let the Tulsa-based computer repair specialists from Geeks to the Rescue bring it back to life.
You may be familiar with the idea that lithium-ion batteries (the rechargeable batteries found in most modern laptop computers, tablets, and mobile devices) need to be completely drained and then recharged again to keep their “lifespan memory” as high as possible. Well, we’re here to say…both yes and no.
Nickle-based batteries of yesteryear did suffer from this dreadful “lifespan memory” problem. While modern lithium-ion batteries do as well, they aren’t nearly as prone to such issues as their predecessors. With that being said, to make your lithium-ion batteries last as long as possible, there are a handful of maintenance actions we’d recommend you take.
Moderate Draining, Not Complete Drainings
Unlike nickel-based batteries, lithium-ion batteries do best with slight discharges and recharge — even more so than with complete drainings. A full 0%-100% recharge of a lithium-ion battery doesn’t have the same impact that it did on nickel-based cells. With this being said, a complete draining once a month is a helpful way to recalibrate your battery’s charge gauge.
Keep Your Batteries Cool
Like your computer’s processor, your computer’s battery is also sensitive to extreme temperatures. Make sure that your laptop is properly ventilated and not kept in overly hot or cold places. The use of laptop stands is always recommended. Even makeshift stands, such as cardboard egg crates, can significantly extend the life and capacity of your battery.
Don’t Leave Batteries at 100%
Leaving lithium-ion batteries perpetually plugged can lead to undue strain. If you’re used to working from a laptop that is plugged in most of the time, do your battery a favor and work unplugged for a while. Letting it drain to about the 40% level is good for overall battery health. Aside from giving your battery’s charging function a rest, enjoy a change of scenery as well.
If you’re reading this, you probably have a 2011 Macbook Pro that you fear may have gone to a better place. You were probably looking at something with graphics (video or otherwise), and it just flickered, sputtered, and then collapsed. Part of you is likely thinking, “Well, it had a good run. I guess it’s time to move on to greener pastures.” The other part of you is going, “Why the heck did it just die?” Well, being that this article is being written on a 2011 MacBook Pro that recently had this happen, let us be the first to tell you that hope is not lost.
After this happened, you probably did what is always recommended during most computer issues — a restart. Upon rebooting your Macbook Pro by holding down the power button and then tapping it again, the Mac start-up sound probably chimed and it seemed to boot as normal…until it stopped. It didn’t totally load up but left you out to dry in some limbo. Ugh, so frustrating.
Shortly the 2011 MacBook Pros were released, Apple announced that there might be a handful with faulty GPUs. They advised anyone experiencing glitchy graphic display to take their computer to an Apple store for complimentary repair. That offer ended in 2016 once Apple claimed no more responsibility for this faulty GPU.
While there are rumored to be a number of temporary patch fixes that require you to download software from unauthorized sources (which we don’t recommend), you likely need a new logic board. While this used to be a considerable cost, prices for these have dropped in the past few years as the computers have been on the market longer.
How to Get it Fixed
If you’re in the Tulsa area, your friendly neighborhood computer repair professionals from Geeks to the Rescue would be happy to help. Bring your laptop into our Eton Square location at 8221 E 61st Street in Tulsa, OK and explain the issues you have — which may be this or anything else. A Geeks to the Rescue computer repair expert can get you back up and running in no time.
What is a cookie?
You’ve probably already gathered that the cookies we’re talking about aren’t the kind your grandmother used to bake for you as a child. “Cookies” are another word for very simple text files that give the webmaster particular site information about your activities on their site. Some of this information can include your geographic region, the amount of time you spent on their site, which links you clicked on, and the like. These cookies can also allow a site to “remember” you in the case that you return. All of this information lets webmasters know more about how you’re using their site and how to reach out to you in the future.
What can cookies cause to happen off a user’s website?
Let’s say that you were in the market for some new running shoes. You logged onto a number of educational websites to find out what material is best for your foot and running style. Oddly enough, when you navigated to other websites, especially social media, you notice ads for those kinds of shoes in your social media timeline. What gives? Well, in this instance, you were more than likely served these ads because of a cookie that was dropped in your browser. The cookie dropped in your browser alerted the social media site to serve you advertisements based on your previous website activity. You can remove these cookies by deleting these cookies in your website settings.
Deleting Cookies in Chrome
With your Chrome browser, click “Chrome” next to the “File” option
Click “Clear Browsing Data”
From this page, you can choose how much of your cookies or browsing data to delete
Deleting Cookies in Internet Explorer
With the Internet Explorer browser open, click “Tools” at the top.
Select “Internet Options”
From this page, you can choose how much of your browsing data or cookies to delete.
Deleting Cookies in Safari
With the Safari browser open, select “System Preferences.” You can also hold down the Command key along with the comma (“,”) key.
Navigate to and click the “Privacy” tab.
Click on the “Remove All Website Data” button to select what browsing data or cookies to remove
Deleting Cookies on Firefox
With the Firefox browser open, select the three horizontal line icon in the upper right corner.
Click on “You may what to clear your recent history…” link.
From that screen, you can choose how much of your browsing data and cookies that you’d like to delete.
If your computer or other computing device is in need of repair or enhancement, the friendly computer repair professionals from Geeks to the Rescue in Tulsa can help.
Though a desktop computer is great for use in an office or at home, the “growing” portability of laptop computers has made them quite popular in the last decade. In this piece, we’re going to look at what to consider when shopping for a new (or new-to-you) laptop computer.
Ask yourself, “What am I going to use this laptop for?”
Picking out the right laptop for you can be daunting. There are a wide variety of options, bells, and whistles now available for most price ranges. A quick way to cut to the chase is to write down everything you plan on using a laptop for. Will this be a true workhorse? Will it just be for answering emails in your breakfast nook? Jot down what kind of use your laptop will receive. This will help you narrow your options.
PC or Mac?
Though you may already have a preference towards Mac or PC computers, purchasing a new laptop may give you an opportunity to reconsider your options. Those who enjoy engaging in creative endeavors such as photography, videography, music production and design tend to prefer Macs. Those who are looking for a robust, customizable experience tend to like the functionality of PCs. If Macs and PCs were the two sides of the brain, a Mac is more right-brained (creative, fluid, design-oriented) while a PC is more left-brained (logical, pragmatic, orderly). Still, it pays to research them both to see which is the best fit for you.
Hard Drive Capacity
Are you a digital minimalist or a borderline digital hoarder? We don’t judge either way, but this will impact how much storage you should look for in a laptop hard drive. A larger hard drive will allow you to store all of your images, audio, video, and document files with ease. A smaller hard drive will cost considerably less. You should still keep in mind, however, that cloud-backup or backing up crucial data to external hard drives is strongly encouraged should something happen to your laptop.
Are you someone who tends to be centrally focused on the task at hand? Do you, instead, end up with multiple programs running simultaneously? If you’d like to maximize the number of programs you can run at the same time without the computer slowing down or heating up, you will want ample memory. Your memory is measured by the amount of RAM (Random Access Memory) your laptop contains. One gigabyte of RAM is typically the lowest amount of RAM you can get away with. Four gigabytes is becoming much more standard. If you plan on engaging in more “labor” intensive activities such as gaming or video production, increased RAM should be a higher priority. Even if you can’t afford your preferred amount of RAM, make sure that the laptop you’re looking to buy can be later upgraded to your RAM specifications at a later date.
One of the advantages of laptops is your ability to use a computer on the go. One of the downsides can be viewing larger documents or video files on a small screen. If you have trouble reading smaller text sizes or you need to edit visually-rich items on the go, look for a laptop with a screen size that will be comfortable for you. Keep in mind that most text documents can be expanded to allow for easier reading. Still, editing videos, photos, or graphics may be uncomfortable with a smaller screen. If you won’t be using a laptop for these visually-demanding activities, a smaller screen means greater portability.
Keyboard Arrangement & Illumination
Your keyboard is one of your greatest points of interaction with your laptop. For this reason, it is essential to find a laptop that is comfortable and functional. If number-input is a large part of your work, consider a laptop keyboard with a 10-key number entry pad. Also, if you may end up working in darker environments, a back-lit keyboard can be helpful in being able to see the keys.
Most laptops these days come equipped with web-cameras built into the top of the screen. If you will be using your laptops for web conferencing or recording any kind of video, you’ll want to consider the quality of the camera on the laptop. If you rarely ever have a need to use Skype or any other web conferencing program, a higher quality webcam may not be necessary.
New, Refurbished, Downright Used
Let’s face it, laptops are expensive. You can pay anywhere from a couple of hundred bucks to several thousand dollars for a laptop. Because of this steep price, it’s worth considering whether having a brand new laptop is a priority. If it isn’t, you can save yourself hundreds of dollars on a quality refurbished or simply used laptop. If you’re considering a used laptop, make sure that the model is one that is upgradable to your liking. Some older laptops are only upgradable to a certain degree. Some Macs, for example, can only run up to a certain version of Mac OS. Newer used Macs may be fully capable of running the latest versions of your favorite programs.
When purchasing a used laptop, it pays to have computer repair professional look it over for any lingering software issues, malware, and to upgrade the operating system to its latest version. The computer repair experts at Geeks To The Rescue are happy to get your new-to-you laptop running at its best and handle any issues into the foreseeable future. If you have any questions, feel free to reach out to them today.
I don’t know about you, but two of my ongoing issues with computers are storage and access. Either I run out of storage on my mobile device, tablet, and laptop, or I don’t have access to the files I want when I need them. In this piece, we’re going to look at three online software products from Google that alleviate these two problems. Even better, all of these products are completely free.
If you’re still keeping events on a physical calendar attached to your fridge, you’re probably running into some serious limitations. Even daily planners have their weaknesses. Here are a few reasons to fall in love with Google Calendar.
It’s always with you. Whether you’re sitting at your computer or you’re out and about with your smartphone, your calendar is never far away.
Move events around with ease. I tend to like to schedule out most waking moments of my day on my calendar (easy with Google Calendar’s “repeating events” feature). Still, what’s the old expression, “We make plans and God laughs”? With Google Calendar, you can easily move events to any time period with a drag-and-drop feature, or with their “Find a Time” feature.
Share your calendar with others. Whether you need to coordinate with a spouse when to pick up your child from baseball practice or share your daily work schedule with your boss, you can easily do so. Shared parties can see updates in real-time. Don’t want to share everything? You can also set up different color-coded calendars for certain styles of activities and sharing permissions. Personally, I have two different work calendars — one for tasks that are less time-sensitive and others for “rocks” — or items that cannot be moved. I have other calendars for my morning routine, evening routine, and appointments.
Be reminded of things you need to do before you need to do them. Want to make sure to pick up your son from cub scouts or to take your elderly mother to the doctor? You can set a reminder for any event any amount of time before the event to keep you on schedule.
I recently purchased a new laptop. Unfortunately, the model I wanted only had 128gig hard drive. This is pretty tiny in comparison to many with a standard a terabyte hard drive — nearly 100 times as big. Still, how do I justify this? Because I don’t keep much of anything on the physical hard drive of my computer thanks to Google Drive.
15 gigs per Google Account. If you have a Google account, you have automatically have 15 gigs of online storage in Google Drive for free. This may fill up quickly if you have larger files, but if you’re mostly storaging images and word documents, that may last you quite a while.
Saved as you go. Let me know if this sounds familiar: you’re writing a word document or building a spreadsheet and due to your laptop battery draining or a power surge, you lose everything. What a pain! With Google Docs and Google Sheets, near every single letter, every action is saved to Google Drive in real-time.
Access all of your files from anywhere. Whether you use several different computers or you just want to be able to see your files from anywhere, all of your files are available anywhere you can have access to your Google account. Start writing a word document at work and finish it at home on a separate computer — no need to email any documents to yourself.
It sure can be nice to have a notepad with you to jot items down. Whether ideas, shopping lists, or contact details, a good pad and pen can come in handy. What if you could have access to every note you’ve ever jotted down in an instance — even being able to search through them? Well, with Google Keep, that’s a reality.
Simple, but robust. Google Keep is a very simple application, but bells-and-whistles are probably not what you’re looking for in a note-taking program. Think of it like a giant wall of sticky notes you can access anytime.
Ok, so it has some bells. Some of the features are tick-boxes (great for shopping lists), note sharing, image uploads, a drawing feature, reminders, and the ability to back up any note to Google Drive. There is also a Chrome browser extension that allows you to save any website to your Google Keep account for later viewing — a kind of universal bookmarking.
Never let an idea slip through your fingers. The biggest appeal of Google Keep is that you can jot down an idea, message, contact information, or other note at a moment’s notice. Once jotted down, you can then access notes from any device that has access to your Google account.
If you’ve ever watched the British comedy program “The IT Crowd”, or really just called certain IT departments, you may have heard the following response. “Hello. IT. Have you tried turning it off an on again?” It can’t be that easy to fix a computer or mobile device, can it? In this piece, we’re going to look at why restarting a device may actually be all that is required to remedy many processing issues.
The Psychology of the Restart
If you’ve ever been told, “Well, have you turned it off and on again?”, you may feel like the technician is questioning your intelligence.
“You think I wouldn’t have just tried that before I called?”
Still, in many instances, we actually haven’t tried that. Sometimes, we assume that problems are much more severe than they actually are. Part of the reasoning for this is because we don’t want to admit our own ability to be derailed by such seemingly insignificant issues. We feel that if there is an issue that we haven’t been able to resolve, it must be major. In addition to restarting being fairly effective, having the mindset to perceive the minor issues before we make mountains out of molehills can help us take a few steps back, look past our pride, and fix easy problems.
The Technical Reason Why Restarting Is So Effective
In order to simply survive, our brain is making sure our lungs are breathing, that our blood is becoming oxygenated and that our heart is pumping this blood throughout our body. While this is happening, it’s also making sure our digestive system is processing food properly, that our liver and kidneys are cleaning out our systems, and interpreting signals from thousands upon thousands of nerves. In addition to simply keeping you alive, it’s also helping you concentrate well enough to drive a car, balance your checkbook, and remember to pick up the kids from soccer practice. However, without getting a good night’s sleep, things start to go haywire. You forgot to pick up your son from cub scouts. You sit at a green light and cars behind you begin to honk. You find yourself having to re-read the same sentence in an email just to make sense of it. The more sleep you miss out on, the more energy your brain allocates to simply keeping your vital bodily functions operating, leaving less power to allow you to process details.
Computer systems are very similar to our own brains. In addition to maintaining a connection with the internet or an intranet and a variety of wirelessly connected accessories, they’re simultaneously processing a myriad of commands. Your internet browser alone is typically juggling multiple tabs that are all processing informing from various websites. As your system is pulled in many different directions, it can only handle so much. Certain loads begin to lag, some freeze, others crash. It’s much like a young child becoming frustrated when they are tired. Their brains are over-taxed and in need of a break.
What is the answer for both systems? A rest and restart. Restarting your device can be akin to getting a rest following a busy day. A restart allows your device to stop processing unnecessary actions and to prioritize what to process. An even greater restart may be unplugging all power supplies to your system and letting it sit for 10-20 seconds. The reason for this may be that some components will continue to process information after the main system is turned off.
So, no, we’re not questioning your intelligence when we ask “have you tried turning it off and then turning it back on again?” We’re simply attempting to help you find the easiest solution to your problem. Like people, for a wide variety of processing issues, sometimes the only thing a computer needs is a nap.
Even if it has been a long while since you’ve purchased your new computer, there’s a good chance that your old computer is still hanging around. Filling up closets or just sitting on a shelf in the garage, old computers are some of the most notorious squatters in your home. Still, there’s a certain complexity comes with getting rid of the darn things. Not only are they loaded with hazardous or valuable materials, they may also contain sensitive information. In this piece, we’re going to look at how to responsibly say goodbye to your old computers and mobile devices.
Back Up Your Data
If your computer still boots up, hop on and take a look around for sensitive contents. If the computer connects to the internet, you will probably be able to back up your files to an offline service such as Dropbox, Google Drive, or Microsoft OneDrive. If the computer is not able to connect to the internet, you may need to use a physical external hard drive to remove important documents. Some higher capacity flash drives may actually be able to help if you don’t have much to offload. Price out the options. Sidenote: Backing up your data on a regular basis is a good idea regardless of whether or not you plan to dispose of a computer or other device.
How To Get Rid of Sensitive Information
One of the scary aspects of selling, giving away, or even trashing an old computer is someone accessing personal information you thought you got rid of. Let’s walk through how to make sure your documents are safe.
Sign Off & Deauthorize Everything
Just like you’d close the windows before you move out of a house, make sure that nothing else can access your data by signing out/off and deauthorizing any installed products. Make certain that you’re signed out of every program and that the device is deauthorized for any software product or service. Completely delete your browser history and downloaded files. Leaving even one application connected to an outside service on your computer can expose other sensitive data to whomever else comes across your computer after it’s out of your hands.
Do a “Wipe” of Your Hard Drive
You may think you’re in the clear by simply deleting sensitive files after they have been exported. Sadly, the contents of those files may still be hiding in your hard drive. In order to truly wipe your hard drive, you will more than likely need to use an external wiping program to make sure that your digital files are “shredded.” If you plan on disposing of your computer and want to make absolutely sure that no one will be able to access any sensitive data, some have recommended physically destroying the hard drive. This can be done by removing it and either smashing the plates inside the hard drive with a hammer or drilling a hole through the plates. Because of safety concerns, we don’t recommend physically destroying your hard drive.
Never Throw a Computer In the Trash
Even though the title of the article contains the word “dispose”, this does not mean you’re throwing anything in the trash. Computers, mobile devices, and most other electronics should never just be thrown out with household trash. The first reason is due to the environment. Some of these devices contain materials that may be hazardous to the environment such as lead or mercury. The second reason is because of how recyclable these devices are. Almost every ounce of these devices can be recycled. Many of these computers and devices even contain gold.
Ask About Trade-Ins or Recycle
Wherever you’re purchasing your new computer, ask them if they take older computers in on trade. You may find that your old computer may actually even shave off some of the cost off of your new computer. Even if they won’t take the computer in on trade, many computer sales companies or other electronics stores will accept computers for recycling.
Still Not Sure? Bring Your Computer To Geek Rescue
If you don’t feel comfortable about disposing of your computer properly, whether you don’t think you could adequately wipe the hard drive or properly recycle it, bring it to the computer specialists at Geek Rescue. At Geek Rescue, we can lay your computer rest in the safest way possible. If you’re not sure whether or not to get rid of your computer, we can see if there’s anything that can be done to save it.
If you’ve ever been tasked with finding a specific file from a long time ago, you know how much of a needle in a haystack the entire process can be. In order to make the process a walk in the park, we’re going to take a look at some file naming protocols you’ll want to adapt.
1. No More “Final Version” Names On Files
Everyone knows that when you put “final version” in the title of a file, you’re just asking for requested revisions. Not only is Murphy’s Law one reason to get out of the habit of doing this, but identifying the actual final copy of a file will be nearly impossible. In order to make life easier for you and everyone who may want to find this file in the future, consider a four-digit numbering system for numbering file versions. An example of this is to start with “0000”, “0001”, “0002”. These versions should give you enough room to add plenty of revisions (up to 9,999 to be exact) before you’ll have to worry about how to add a new digit to your file naming protocol. If you think you’ll have over 9,999 versions of one file, add another “0” in the beginning…and we’ll be praying for you.
2. Lose The Special Characters
We’ve all seen some file names that have more special characters than a Wes Anderson movie. The issue with using special characters is that they don’t always play nicely with all systems. Another issue can be confusion over what symbol you’re actually looking for when it comes to searching for a specific file. Keep it simple when needing to divide information by using camel case (ItLooksLikeThis), underscores (_) or dashes (-). Because you probably don’t need a “~” anyway.
3. Claim Your Files
When sharing a file for use on a certain project, it can be handy include who created the file or who last altered it in the file name. You can do this by including the person’s full name (not as widely recommended) or by including their initials. This handy for questions about how a specific file was written or built and can be a great way to figure out who broke it so you can fix it again. C’mon, be honest — it was you, wasn’t it?
4. Simplify The Dating Process…For Your Files, That Is
Nobody said that dating was easy. You have to make things look nice, tidy, and be upfront with all of your information. Oh, wait, we’re talking about dating files? Well, the same rules apply. In order to list the important information right off the bat, adding the date to your file names is a great habit to adopt. However, without using special characters that some programs may not like, how does one do this? Using a simple year-month-day format in the form of YYYYMMDD, it couldn’t be easier. If you’re still confused, the date of the writing of this article is February 4th, 2019. If I wanted to add the date to this Word document, it would be 20190204. Easy peasy, lemon squeezy.
Has your hard drive fizzled out? Are you having trouble finding important files on your PC? Don’t worry — your friends at Geeks To The Rescue are here to help. Find out how we can help today.
These days, it feels like anyone can start a small business. While is tremendously exciting, it’s important to remember that every business handles sensitive information that should be protected. In this piece, we’re going to look at a handful of techniques that can help increase the cybersecurity of any small business.
Create a Culture of Security
We live in a fast-paced world and some concepts can slip our minds. It’s for this reason that cybersecurity should be emphasized from the top of the company on down. Before sensitive information is shared among staff members and clients, encourage staff to ask them the following questions:
Is this data being shared responsibly?
Who else could possibly access this data?
What can I do to ensure that this data doesn’t fall into the wrong hands?
Make Sure All Hardware and Software Is Secure
This digital age has made work flexible with team members able to work from practically anywhere on any device. In order to keep your organization’s data secure, it is important to make sure that all of your team members’ devices and software systems are secure with the latest software updates. Most reputable software providers are as diligent about cybersecurity as your business as you are — making many advanced security features built into their systems. While this is the case, it is still important to double-check what security is built into any company operating systems.
Set Organization-Wide Cybersecurity Standards
Just like a chain is only as strong as its weakest link, cybersecurity measures should be stressed at every level of an organization. Because mobile devices and laptops run the risk of being stolen more than systems back at the office, it is important to have cybersecurity standards in place to guard devices that can access sensitive information. Even desktop computers, if left with weak password protection, can prove to be vulnerable to attack by the wrong people in the office. Organization-wide security protocols go a long way to risk information falling into the wrong hands.
Have a Secure Data Backup System In Place
As many small businesses specialize in data by means of creating digital products or by manipulating digital information, an organization with no security data backup system can take a huge hit if data is lost. Whether the business technology is damaged, lost, stolen, or mishandled, a big enough loss of data can mean a huge loss of revenue — a loss from which many small businesses may not be able to recover. Having an automated system that makes a secure backup of company data ensures that sensitive or costly data can be recovered in the event of a data loss.
For help making your small business’ data more secure, consult your friends at Geek Rescue for assistance.