Author Archives: Tim Erlach
A friend passed along a recent experience in recovering his lost iPhone Camera Roll. I thought I would share it with you. If you think you may have lost all your pictures, this may give you some hope. Following is his email describing the situation:
“In my case, I was able to retrieve my Camera Roll, which was crucial, as I had video from my baby’s birth.
Also, every single contact came back, as well as all of my apps. I did have to “Update All Apps”, as it restored the app, but the apps were all out of date for some reason.
I’m passing alond an email that was forwarded to me. I don’t claim to have written it. Research shows that it, or similar emails, have been going around since 2006; however, it is good common sense on simple steps to protect your technology from allowing someone to exploit you. (On a side note, I really appreciate that it was well written with nice format and grammar. Seems a lost art in forwarded emails.)
Begin Forworded Text:
Not all thieves are stupid.
This gives us something to think about with all our new electronic technology.
Erlach Computer Consulting Commits Two Year Contract in Pro Bono Services to Big Brothers Big Sisters of Northern Nevada
Reno, Nev. — May 7, 2012 — Erlach Computer Consulting has committed to provide a two year contract to Big Brothers Big Sisters – Northern Nevada for computer management and services pro bono. Erlach Computer Consulting (ECC) is investing the work and staff talent to the local non-profit to support the organization’s service to the community.
Following an initial project to overhaul Big Brothers Big Sisters’ IT infrastructure, ECC will provide ongoing support; equipping the organization with the latest IT management resources, optimizing performance and security, and providing unlimited support, troubleshooting and professional CIO guidance.
The cloud has been around for a while and is really starting to take off! Here are some thoughts on security that may be useful and help you get your head around your security exposure.
Originally presented to the Washoe County Bar Association April 12, 2012.
End User Devices
This is where most data security issues originate. Individuals do not have the resources, patience, time and focus to assess and counter all the vectors for loss. This area is the greatest threat. At the same time it is the area you have the greatest control over. Review the following recommendations and see if they apply to you:
At the recent PhotoPlus Expo in New York City, held between October27-29th, hundreds of exhibitors came together to show off their latest and greatest accomplishments in technology. From new developments in cameras, lenses, printers, clothing, gear, gizmos and gadgets, the Expo had it all. But if you consider yourself more of a enthusiast or weekend “photog,” you may have felt a little out of place. The expo is mostly geared toward the professional shutterbug. Many of the newest innovations, however, were perfect for both the pro and novice alike, although not necessarily that affordable. Here are just 3 of the awesome innovations found at the PhotoPlus Expo. For a deeper detailing, Popsci.com provides a more thorough look.