In the past week, several clients have had their email accounts hacked and the overwhelming feeling is one of shock. Questions emerge, how did this happen? Why did it happen to me? I hope to answer some of those questions, as well as describe just one incidence with the hope that you’ll begin to recognize patterns and be able to prevent this from happening to you. First I want to credit a CNN story that ran a few days ago that describes a real situation where a friend’s email was hacked and the culprit sent out a very real sounding request for help. Fortunately, the author noted some issues that just didn’t feel right and because he listened to his gut, was able to avoid making a bad situation worse. Read more
Archive for News
Throughout my business, clients have always asked me about how to get a great website. The simple answer is that with the advent of iWeb and WordPress, anyone can have a great website with very little cost. If you have the time to invest in learning the tools, you can create a simple website in very little time. But what happens when you don’t have the time but your business demands a serious web presence? Start with the end in mind. Keep your vision on the final result you are looking for. Read more
- By Scott Aronowitz
Dayton Heights Elementary School in Los Angeles has made substantial improvements to its education technology offerings, courtesy of technology marketing firm Everything Channel and local volunteer action center L.A. Works. The “makeover” impacts the school’s computer lab, library and teacher workroom.
Everything Channel sponsors Channel@Work, a volunteer program to give back to the community. A component of the program, the Technology Makeover School Edition, is behind the improvements at Dayton Heights. They include six new computers and a printer for the school library and OS and keyboard upgrades for 34 Apple workstations in the school computer lab, as well as a new computer for teacher use. Read more
WITI Los Angeles Regional Network
Spring Mixer with Girls in Tech!
(Sponsored by ÜberGeekGirl®)
Make new contacts, re-connect with former colleagues, invite clients (and make new ones!). You’ll have rare access to a highly diverse group of professionals committed to your success!
Recently one morning I was driving around Santa Monica, feeling grateful for all the wonderful things that have happened to me since relocating from the Midwest. I felt a strong urge to find a way to give back to the community in some way. I thought there might be an organization that I could do a project for and wondered how I might find the right opportunity. Little did I know that the opportunity would find me via Twitter. Read more
Hard drives are the basis of your computer. The use of computers comes down to manipulating data, and the hard drive is where you store all of your data; photos, music, work documents, email, the list goes on.
Most of the components in your computer are electronic devices. They don’t fail with time like a mechanical device such as a car. But your hard drive is one of the few mechanical devices used in modern computing, and as such, it’s destined to die eventually. A typical lifespan is 3 years on average.
It’s important to learn to recognize the warning signs of an imminent hard drive failure so you can rescue all that data before it’s lost—sometimes forever, not retrievable at any cost.
This post comes from a talented colleague of mine, Jennelle Crothers. She does Systems Administration work in San Francisco. This information is so timely, I asked her if she’d mind if I shared it with my readers. Her blog can be found at techbunny.com
It happens at every workplace. Employees leave layoffs, retiring, or just moving on to new things. As a systems administrator, I wish that managers understood how deeply integrated a staff-person is with the computer systems they work on daily. It’s not always a simple process to undo someone’s existence. In fact, for every new hire you make in 2010, make a point to document all the access that is granted so that when they leave, we can follow it and remove the access. Read more