You probably already know that your computer can talk to you. Text to speech is fairly commonplace for listening to texts while keeping your hands on the wheel while driving. Many business computer services use text to speech in many applications for small business IT support. It helps when you need both hands free but need to keep on computing. But did you know that you can also talk back to your computer and have it listen? Computer users have had this capability for a while. The name of this powerful tool is Windows Speech Recognition...
Category Archives: software
Most computer users understand consequential damage to computer hardware. Now, we can dive into the exponentially deeper realm of consequential damage in regards to software. This area is so much deeper simply because hardware troubleshooting is limited to the finite number of hardware components installed in a system. Software troubleshooting, by contrast, can take on an almost infinite level of variables. In Los Angeles computer repairs can be performed by experts who can address such software problems...
Software TroubleshootingThese variables depend on the software that is currently installed on the computer, software... --
Creating and providing antivirus software is a big industry in today’s business world. Any L.A. computer repair expert can tell you that just as the criminal syndicates that create these viruses continue to grow and expand, antivirus software developers and researchers must adapt and evolve. This industry sector is big money, because any large or small business that is concerned with their computer and IT security (and EVERY one should be) must purchase and continue using yearly licenses to keep their antivirus solution up and running...
Know the Antivirus Software AvailableBecause of the cost involved, and the risks one takes when deciding upon which software to choose, it is important... --
My favorite new app these days is called IFTTT, and one of the best things about it is… it’s free. The acronym title stands for ‘If This, Then That’ and it’s virtually a customizable commands program. The company currently has a network of 72 channels - programs, apps, websites and more - to choose from in creating a ‘recipe.’ Each recipe consists of the following ingredients: the trigger (if this) and the corresponding action (then that). Throughout Los Angeles computer repair experts can help you select what works best for you...
Popular ChannelsAmong the more popular of channels are Instagram, Evernote, LinkedIn, Google Calendar, Twitter... --
Skinput is a system from Carnegie Mellon's Chris Harrison that monitors acoustic signals on your arm to translate gestures and taps into input commands. Just by touching different points on your arm, hand, or fingers you can tell your portable device to change volume, answer a call, or turn itself off. Even better, Harrison can couple Skinput with a pico projector so that you can see a graphic interface on your arm and use the acoustic signals to control it. Courtesy of slashdot.com... --..
The Texas Department of State Health Services routinely collected blood samples from newborns to screen for a variety of health conditions, before throwing the samples out. But beginning in 2002, the DSHS contracted Texas A&M University to store blood samples for potential use in medical research. These accumulated at rate of 800,000 per year. The DSHS did not obtain permission from parents, who sued the DSHS, which settled in November 2009. Now the Tribune reveals that wasn't the end of the matter. As it turns out, between 2003 and 2007, the DSHS also gave 800 anonymized blood samples to the Armed Forces DNA Identification Laboratory to help create a national mitochondrial DNA database.... --..
A federal judge on Monday ordered the Pennsylvania school district accused of spying on its students to stop activating the cameras in school-issued MacBook laptops. According to the original complaint, Blake Robbins was accused by a Harriton High School assistant principal of 'improper behavior in his home' and shown a photograph taken by his laptop as evidence. In an appearance on network television last Saturday, Robbins said he was accused by the assistant principal of selling drugs and taking pills — but he claimed the pictures taken by his computer's camera showed him eating candy. Also on Monday, the company selling the software used by the school district to... --..
[caption id="attachment_2073" align="alignnone" width="640"] The United States Capitol Building[/caption] The House passed a new cybersecurity bill with an overwhelming majority vote. The Cybersecurity Enhancement Act, H.R. 4061 has a number of interesting provisions. Representative Michael Arcuri, a Democrat of New York who sponsored the bill called cybersecurity the 'Manhattan Project of our generation' and estimated the US needs 500 to 1,000 more 'cyber warriors' every year in order to keep up with potential enemies. The new bill 'authorizes one single entity, the director of the National Institute of Standards and Technology, to represent the government in negotiations over international standards and orders the White House office of technology to convene a cybersecurity university-industry... --..
Are you a thrifty shopper who loves finding online coupons for the best deals on the items you need? If so, you might get frustrated surfing various sites and sifting through search engine results trying to find the right coupons for your upcoming purchases. The Daily Reflector in Greenville, SC reports that a solution might be near as online shopping site MoneyMailer.com has launched a new search engine designed to simplify the process of finding online coupons. New search engine enhancements such as portals that group similar coupons together make it easier for consumers to find deals in their area. [caption id="attachment_2326" align="aligncenter" width="640"] Old fashioned coupons[/caption] "Everyone wants to save,"... --..
In retaliation against Microsoft's Computer Online Forensic Evidence Extractor (COFEE), which frequently helps law enforcement officials extract data from password-protected or encrypted sources, two talented developers have created what they call "Detect and Eliminate Computer Assisted Forensics" (DECAF), to be used as a counter intelligence tool. It was specifically designed to thwart the Microsoft forensic toolkit. DECAF works by monitoring the computer it's been installed on for any indications that COFEE may be operating on the machine and does everything in its power- which is quite a bit- to stop COFEE from getting through. More specifically, the program goes about deleteing COFEE's temporary files, killing its processes, erasing all COFEE logs, disabling USB drives, and even contaminating or spoofing a variety of MAC addresses in order to muddy its own forensic tracks. DECAF can be directed... --..