If you’re in the mobile device repair industry, you’ve probably noticed how many devices come in with damaged screens and deformed edges from being dropped on their corners or facedown. If you need to replace the screen, you’ll find it nearly impossible to get a good fit if the edges …
As Techs, sometimes we lose focus on the customers and clients and focus on the systems we work on, and our social skills can suffer as a result. Perhaps we never had much social skill to begin with, and we were never a social individual to start with. Why do …
Guest Contribution by Ken Dwight – The Virus Doctor: In October of last year I wrote about what was then the newest and most widespread malware infecting computers worldwide, known as CryptoLocker. At the time I referred to it as “Game-Changing Malware.” You may read that blog post here: http://www.thevirusdoc.com/blog/cryptolocker-game-changing-malware. …
In the past few weeks on Technibble, I have shown you how you can fill and sign the Computer Business Kit forms on a tablet, as well as how much money you can save on computer technician products. Well today I am extremely happy to officially announce the release of …
Sometimes when you run your own business, a personal emergency develops that you need to take care of. Your clients need you as well. Fail to respond to their needs and your business will suffer. Coming up with a detailed business continuity plan helps you manage both your personal and …
Earlier this week many computer technicians attended the industry event “CompTIA Channelcon” in Phoenix, Arizona. My friends Carey Holzman and Mike Smith from the Tech-Vets podcast hosted a live show on-location, talking about the computer repair business and I think this show is well worth a listen. Lisa Hendrickson from …
When it’s time to grow your business beyond just yourself, one of the biggest concerns computer repair business owners tell me is, “I’m afraid if I bring someone on board, they’ll steal clients and steal business.” I’ve learned some key ways to protect your business and your client base. Hire …
When I created the new Computer Business Kit version 3, my goal was to deliver so much value that it simply pays for itself over and over. You have already seen a glimpse of the computer business forms and their PDF versions in my last post. The Business Kit has …
It happens often. Many customers don’t view their machines with the view that at any time, their data storage hardware could fail. They don’t schedule a backup, and when their hard drive does fail or has issues, you’re called up to recover the data. There are many good tools for …
I would like to to show you something we have been working on for quite some time. We will soon be releasing version 3 of our popular Computer Business Kit and one of the new features is the ability to fill and sign the forms on tablets. In this short …
Attackers have rigged the website of an industrial software firm with a sophisticated reconnaissance tool, possibly in preparation for attacks against companies from several industries.
The incident was detected last week by researchers from security firm AlienVault who found rogue code injected into the website of a big industrial company that wasnt named. The website is related to software used for simulation and system engineering in a wide range of industries, including automotive, aerospace, and manufacturing, said Jaime Blasco, director of the AlienVault Labs in a blog post.
Europol launched a cybercrime task force Monday to fight online crime in the EU and other countries.
The Joint Cybercrime Action Taskforce (J-CAT) will be piloted for six months and hosted at Europols European CyberCrime Center (EC3), the organization said in a news release.
The J-CAT will coordinate international investigations to take action against key online threats and top targets, such as underground forums and malware, including banking Trojans, Botnets and online fraud, Europol said.
EC3, the EU Cybercrime Taskforce, the FBI and the U.K. National Crime Agency (NCA) are part of the initiative. Andy Archibald, deputy director of the National Cyber Crime Unit from the NCA will lead the task force.
The built-in touchpad in Raji Yusuff Oluwagbenga's laptop no longer works, making Windows nearly impossible to use. Here's how to (hopefully) fix the problem.
Have you ever tried to use a Windows PC without a mouse, touchpad, or other pointing device? It's all but impossible. So when your laptop's touchpad stops responding to your fingers, you've got a problem.
If the problem just started, reboot your computer and see if that fixes it. (Yes, I know that's painfully obvious, but we all sometimes overlook the obvious.) If that doesn't work, try these solutions.
[Have a tech question? Ask PCWorld Contributing Editor Lincoln Spector. Send your query to email@example.com.]
Smartwatches will be in the spotlight at the IFA trade show in Berlin, with LG, Motorola, Samsung and Sony all keen to demonstrate their new products are what consumers want.
Samsung Electronics and LG Electronics announced their upcoming smartwatches, the Gear S and G Watch R, last week in advance of the show.
Samsungs Gear S is a 3G smartwatch that doesnt need a smartphone to function. Its powered by an unspecified dual-core 1GHz processor and has a curved 2-inch Super AMOLED screen with a 480 by 360 pixel resolution.
After using Android Wear on the Gear Live, Samsung is back to using the Tizen operating system on its latest model. Getting developers to customize apps for smartwatches will be a challenge for any company, particularly Samsung since Tizen doesnt have the fan base that Android and iOS have.
Chinese authorities have issued a 20-day deadline for Microsoft to explain compatibility problems with its Windows and Office software, after previously warning the company not to obstruct an anti-monopoly investigation.
Chinas State Administration for Industry and Commerce (SAIC) posted an online notice Monday demanding that Microsoft offer a written explanation within the allotted time. The antitrust regulator has been investigating the company on industry complaints that Microsoft software has not been fully open, resulting in compatibility and bundling issues with the products.
Europes 700MHz band should be freed for mobile broadband by 2020, a report to the European Commission recommends.
The extra spectrum is needed to meet increasing demand for video on tablets, smartphones and other mobile devices.
The 700MHz Ultra High Frequency (UHF) spectrum is currently used for terrestrial broadcasting networks and wireless microphones, but it should be dedicated to wireless broadband across Europe around 2020, proposed a report prepared by former Commissioner Pascal Lamy.
While there is no immediate need for wireless use of that spectrum band in Europe, the report set a deadline for the assignment to mobile around 2020 with a margin of two years before or after. This leaves time for a proper transition period, likely to bring down costs for both consumers and broadcasters, the Commission said.
A thing I think happened: One day the People In Charge Of Ideas were sitting around at Volition racking their brains trying to come up with a new Saints Row game. "What can we possibly do to top the last game?" said one developer. "We literally gave players superpowers last time and put them in an entirely virtual world! There was a dubstep gun. It's impossible!"
Then a letter showed up at Volition HQ. "Dear Volition, Your games are obscene and you're all going to hell."
"Eureka!" shouted a developer who was, for some reason, dressed like a California prospector. And thus was Saints Row: Gat Out of Hell birthed from the depths of Satan's womb.
Youve probably read the rumors by now: Facebooks Messenger app records your movements! Spies on your conversations! Kills baby unicorns! Facebook wants you to know that its doing nothing of the sort.
In a statement fromPeter Martinazzi, a member of the Facebook Messenger development team, the social media company explains that Messenger doesnt actively listen in or watch you through your phones on-board camera and microphone. Instead, it asks to use your camera and microphone so you can make audio chats, or send photos and videos to your friends.
From the statement:
Like most other apps, we request permission to run certain features, such as making calls and sending photos, videos or voice messages. If you want to send a selfie to a friend, the app needs permission to turn on your phones camera and capture that photo. We dont turn on your camera or microphone when you arent using the app.
When not busy helping to find new treatments for cancer, IBM Watson is helping to cook up a few new dishes as well.
To show off Watsons powers, IBM is training its cognitive computing system to suggest new combinations of ingredients that could help cooks to create new, and sometimes quite delicious, recipes. It does so by analyzing the chemical compounds in each ingredient.
IBM joined Bon Apptit magazine to create a Web application called Chef Watson, now in beta, that offers lists of ingredients that can be used to create recipes. Bon Apptit is also working up a cookbook of the best Watson-based creations submitted by users.
Facebook is testing a way to let users of its mobile app search for posts shared with them in the past.
The tool is designed to let people find posts that otherwise might get lost in the mix. With the update, users can search for posts theyve previously seen on Facebook from friends and the Pages to which theyre connected.
People who have access to the update can search for, say, kayak trip John Smith, and a previous post that the user saw in his or her feed about the trip might pop up.
Were testing an improvement to search on mobile, a Facebook spokeswoman said. In this test you can use keywords to search for posts youre in the audience for on Facebook.
Apple had been looking for $2 billion in damages, so the award was far smaller than it had hoped, but it also asked the court to prevent Samsung from selling the infringing products, including its Galaxy S III smartphone, in the U.S.
"You can either kill him or mind-control him," says the handler watching over my shoulder as I play Lord of the Rings: Shadow of Mordor. I'm staring down at Kaka the Legend, an orc war chief, as he begs for his life.
This is the same Kaka the Legend who murdered fifteen of my best men. It's the same Kaka the Legend who taunted me on the battlefield, and then killed me with a blow from behind. It's the same Kaka the Legend who ran away from our next encounter like a coward.
I chased him, I knocked him down, and here we areme, a man of the resplendent White City of Gondor, towering over this bleeding uruk leader, his fellow orcs scattered about at odd angles where they fell to my sword.
Oracle has failed to persuade a federal appeals court to restore US$1.3 billion judgment in its copyright-infringement lawsuit against SAP, but will have the options of taking a lesser amount of money or pursuing a new trial.
The jury initially awarded the $1.3 billion to Oracle in 2010, but the judgment was subsequently vacated by U.S. District Court Judge Phyllis Hamilton, who had overseen the case. Hamilton found the jury overreached and said Oracle could accept a lower award of $272 million or seek a new trial.
Oracle at first opted for a new trial, but then reached a settlement wherein SAP would pay out $306 million, with Oracle reserving the right to appeal Hamiltons ruling overturning the $1.3 billion judgment.
I'd bet that if you polled 10 PC users on the best way to use the desktop on Windows you'd get 11 different answers. How to use the desktop is one of the most personal choices each PC user makes. We've already covered ways desktop hoarders can better manage filesthat cover up their wallpaper, for example.
Today, we're going to look at a method to keep your desktop as spartan as possible so that all you see when you boot up your PC is a pristine background image.
Here's how to do it in Windows 8.1.
Dump the files and shortcuts
The first thing you're going to want to do is get rid of any files sitting on your desktop. Sometimes this is harder said than done, because there are files that defy any logical categorization.