advertise on blackrefer.com

BlackRefer.com - tons of info about black/african american computing

HOME
blacks and computers

Websites most recently added to this page.

Custom Search

To advertise on this site, click here

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

(Computer directory below)

blackrefer.com video section
divider-line
divider-line
HP computers are racist
divider-line
African Americans and the
Digital Divide , NPerry and DCollier2
divider-line
African American in Science
and Technology, Dr. SHargrove3
divider-line
divider-line








Lenovo’s Yoga Tablet  


Lenovo’s Yoga Tablet


Posted today on Lenovo’s YouTube page, Kutcher is shown leading a focus group of elders that begin to express their common problems of product durability, sound quality, convenience and other difficulties that their generation tends to often face with new technology products.

You can view the latest video here:
http://www.youtube.com/watch?v=yskjLk7CqAI

In case you missed last week’s video, you can view here:
http://www.youtube.com/watch?v=6-KICdJD1PM


ooOoo


The articles on this website are provided for information purposes only. BlackRefer.com does not accept any responsibility or liability for the use or misuse of the article content on this site or reliance by any person on the site's contents. Use at your own risk.

No Implied Endorsement:
BlackRefer.com does not endorse or recommend any article on this site or any product, service or information found within said articles. The views and opinions of the authors who have submitted articles to BlackRefer.com belong to them alone and do not necessarily reflect the views of BlackRefer.com.



Infographic: PC Shipments Flatten Out After Two Years of Decline | Statista
You will find more statistics at Statista

ooOoo


The articles on this website are provided for information purposes only. BlackRefer.com does not accept any responsibility or liability for the use or misuse of the article content on this site or reliance by any person on the site's contents. Use at your own risk.

No Implied Endorsement:
BlackRefer.com does not endorse or recommend any article on this site or any product, service or information found within said articles. The views and opinions of the authors who have submitted articles to BlackRefer.com belong to them alone and do not necessarily reflect the views of BlackRefer.com.



    Theft Through Thin Air…How Secure Is Your Wireless Internet Connection?   by Jay Wilson


    Ever gone to one of the many establishments; connected your laptop, phone, or any other device to their wireless internet connection (network)? You probably thought to yourself, “how nice of them to provide this valuable service…?” However, and in nearly all cases; before you were able to actually access the internet, you had to click on (or acknowledge) their usage agreement. Again, and in most cases, no one actually reads what the agreement is saying (too wordy, right?).

    In a nutshell, the establishment is simply warning you that theft, or some other kind of mischief could occur while you’re connected to their wireless network (or Wi-Fi device); and that they WILL NOT be held liable should you elect to continue, and connect your device to the internet using their resources.

    While most households (and some businesses) do not employ usage agreements, the same possible security lapses hold true for millions using wireless internet.

    Here are some facts:

    * The most common level of wireless security, Wired Equivalent Privacy (or WEP), even when configured correctly, is easily hacked. DO NOT USE WEP SECURITY!!!

    * There are numerous cases of innocent / eventually exonerated people, having been falsely accused of performing illegal acts via the internet (i.e. downloading or accessing illegal software, child pornography, etc.), that were later attributed to weak security on their wireless access device – and the device having been accessed by unsuspected criminals.

    * Thieves can use freely available products to capture your wireless passwords, enact identity theft, and possibly retrieve other valuable information from your computer, laptop, etc.

    While there’s no such thing as 100% guaranteed security on a wireless network, there are some simple steps you can take to greatly reduce your chances of becoming victimized via your wireless device. The first step, is to ensure that you’re not using one of the older, limited in security features, wireless-802.11a, or 11b routers (upgrade to at least a wireless-802.11g device; with the ideal devices being either a wireless-802.11n, or the newer – supposedly faster/further range, 802.11ac device). In either case, don’t get too confused about the particulars (i.e. name brand, etc.), as the 802.11 standard will be clearly marked on both the physical device, as well as the outer packaging. Secondly, and once you have the appropriate device, ensure your encryption (or security level) is set at WPA2 (or Wireless Protected Access/Pre-Shared Key 2). Currently, this is the highest level of wireless protection for home devices, and nearly all devices made after 2003 “should” have this capability already added. I used the word, “should”, because as someone who’s certified in this arena, and when visiting homes and businesses to correct a wireless, or internet issue; it turns out that nearly 70% of them have the incorrect wireless security settings, and have not enabled the WPA2 security feature. FYI: You should always insist that anyone who’s installing your wireless internet connection; set the security settings at WPA2. Finally, never use dictionary-based, or a combination of words to establish your wireless password, and always ensure your wireless network name (also called an SSID, or Service Set Identifier) reflects something other than the standard, out-of-the-box, name. For example, if your wireless is broadcasting 2WIREXXX, NETGEAR, CISCO, etc.; it should be changed, so as not to tell outsiders the actual type of equipment you’re using (note: potential thieves can easily and freely get default passwords for the devices). An ideal, and secure wireless network may look something like this (SEE DIAGRAM 1):

    black/african american computer users


    SSID: UM_SECURED_WLAN (Could be using AT&T, CISCO, NETGEAR, etc., equipment. We simply don’t know; and that’s good!) Encryption: WPA2 (The best wireless security level!) Password: *J01011901w! (think of something you won’t forget, i.e. a birthday/anniversary, and offset it with special characters such as an “*” or “!”, and perhaps a few lower and capital letters).

    In the above diagram description, note that a password is usually not displayed via wireless devices. We are simply giving a blueprint for creating stronger passwords. Of course there may be times in which you have an immediate need to connect to a less than WPA2 configured, and/or unsecure wireless network (i.e. perhaps for a brief session); the bottom line is that your home wireless network should never be configured as “open” or unsecure. Diagram 2 shows images of unsecured networks. Note that unsecure networks are usually identified by having an exclamation (!) mark, and/or the words: unsecured network near their name.

    black/african american computer users


    A word of caution when it comes to wireless security…It’s like taking the extra second, and remembering to lock the door before you leave your home…IT’S YOUR RESPONSIBILITY!

    About Author: Jay Wilson has over 30 years’ experience in the Information Technology (IT) arena. He holds degrees in both business and computer science, and has several industry-standard technology certifications. He owns Jay Tex Systems, a Texas-based computer , network, and repair facility. email: info@jaytexsystems.com

    Julius A. "Jay" Wilson
    Owner/Proprietor, Jay Tex Systems
    E-mail inquiries: info@jaytexsystems.com
    Phone: (210) 451-0756 / (830) 386-4370
    Toll free 1-888-JTEXSYS (583-9797)

    ooOoo


    The articles on this website are provided for information purposes only. BlackRefer.com does not accept any responsibility or liability for the use or misuse of the article content on this site or reliance by any person on the site's contents. Use at your own risk.

    No Implied Endorsement:
    BlackRefer.com does not endorse or recommend any article on this site or any product, service or information found within said articles. The views and opinions of the authors who have submitted articles to BlackRefer.com belong to them alone and do not necessarily reflect the views of BlackRefer.com.



    Buying The Right Computer for Your Student   by Jay Wilson


    I am thoroughly convinced that buying a computer is similar to buying a vehicle…BUYER BEWARE!!! As we think about the upcoming school year, and in many cases, are preparing to send our loved ones off to college; the goal of this article is to help you purchase, or perhaps upgrade the right computer for their needs. Truth be told, you can buy an absolutely new computer, and that same computer have hidden defects unbeknownst to both the buyer and possibly even the seller. Likewise, I’ve seen people waste their hard earned cash on a used computer, only to have a reputable repair shop inform them that the computer’s Operating System (the semi-heart of the computer), is not valid; and cannot be repaired for less than $200 or more. This is known as getting a non-genuine/non-validated Operating System (i.e. kind of like buying a car with the mileage having been turned back from 240,000 to 2,400 miles).

    When buying a computer, whether new or used; the first thing you should do (if possible), is go with someone who has a working knowledge of computers, or pay (no more than $40.00) a reputable business that specializes in inspecting a computer. In both instances, the individuals may even get the asking price lowered in your favor. Yet, and if that option is unavailable, take this article with you, and you’ll save yourself both money and future headaches. For starters, I am very confident in saying that for those on a budget, a good used computer (or maybe the computer you currently have), can give you the same, and in many cases better performance than a new one. A very first observation when buying, or upgrading a computer should be if everything is working properly.

    While many people don’t know it, a Microsoft-based computer can actually “tell” you if there’s a present or imminent problem. The easiest way to do this is by (once the computer is running) clicking on the Start button, right clicking on COMPUTER (or MY COMPUTER), click on Properties, and then Device Manager. This will give you a visual look at all of the main parts of the computer. If you see a red X, this indicates a failed/non-working item. A yellow exclamation mark indicates an item that may be working, but with faults (i.e. it will/possibly fail soon). In any case, have these fixed by the seller, and before purchasing. Secondly, and if there’s an Internet connection available, validate the software on the machine. You can do this by going to the following link: http://www.microsoft.com/genuine/default.aspx?displaylang=en A machine that does not have valid software, will not be able to receive critical updates, and may eventually cease to operate. Repairs for this could well exceed $200 dollars.

    Next, listen carefully that the machine does not make loud fan, or other noises. This would indicate an excess of dirt build-up, possible mechanical failure of the fans, loose wires, and eventual overheating. Normally, these problems can be corrected through the machine having undergone a good tune-up/cleaning (which should be done at least annually; average cost $60 - $80). For laptop purchases, insist that the machine be displayed, and using both the charger/adapter, as well as disconnecting it, and allowing it to run for at least 15 minutes on battery power (note: a laptop charger can give a lighted indication that it’s working, and yet not produce enough current to actually charge the laptop properly). If a laptop battery is older than 2 years, it’s a good idea to replace the battery. Connecting to the Internet is another priority. Nowadays, there are many locations offering free wireless Internet service, and nearly all college campuses have it. Therefore when purchasing a laptop, insist that it has a built-in wireless card, or has a slot capable of having the wireless card installed. Your student will definitely need this capability for connecting to the Internet, and without the restriction of wires.

    Two other key components to pay attention to, are hard drive size and memory. The hard drive will determine the amount of storage available, and memory has an effect on how fast our machine will operate. Always insist on a machine with at least a 40GB hard drive size (if used), 120GB+ (if new). Your memory requirements should be at least 512MB (used), 2GB (new). Always try to get machines that have at least a CD ROM on them, as your student will need it to load programs/read lessons. In many cases and while not an essential, bargain that the computer have the combination CD-DVD drive; which allows for DVD viewing and recording onto DVD media. On another personal note, I do not advocate purchasing the smaller, “netbooks” for students. these may look like laptops, but fall far short of providing what will be needed to get our student through the rigors of school.

    Now that we have a solid computer, we need to make sure our student has the right software. Undoubtedly, they’ll need to have tools which allow them to produce documents, presentations, and calculations. Microsoft’s “Office” package which usually retails for about $120 to over $700 dollars, is still the most popular, and widely used program on the planet. It contains all of the essentials needed to get the student through school, and well beyond. However, and for those on a budget, there’s an alternative package. It’s called “Open Office”. While it’s not Microsoft, it does offer tools that do somewhat similar things, and can easily open all Microsoft Office products. It can be downloaded at http://www.openoffice.org.

    To protect against viruses, make sure you invest in a good protection package. Two of my recommended favorites, are Symantec’s Norton products, and McAfee’s Antivirus. While both of these can be a bit pricey, I’ve also independently tested many of the free products, and have a concluded favorite: Microsoft’s Security Essentials. While some places charge in excess of $80.00 (labor) to load the software, you can get it free at: http://www.microsoft.com/security_essentials/default.aspx

    Finally, the question still arises (Mac versus PC)? Surely, you’ve seen the commercials (and I even have my own, 15+ year comical, but serious dialogue with colleagues on this subject). In short, and in my independent opinion, Macs are generally more reliable and more expensive (in purchase and repair) than PC. Still, buyers of Macs need to understand that their usage commands about 20% of the market (but growing), and that programs which are designed for PC, generally will not work on a Mac. NOTE: Both Microsoft and Open Office have software packages for the Macs.

    With this information in hand, you are now hopefully ready to get the best for your hard earned dollar – and hopefully our lucky student will make a huge return on the investment!

    About Author: Jay Wilson has over 30 years’ experience in the Information Technology (IT) arena. He holds degrees in both business and computer science, and has several industry-standard technology certifications. He owns Jay Tex Systems, a Texas-based computer , network, and repair facility. email: info@jaytexsystems.com

    Julius A. "Jay" Wilson
    Owner/Proprietor, Jay Tex Systems
    E-mail inquiries: info@jaytexsystems.com
    Phone: (210) 451-0756 / (830) 386-4370
    Toll free 1-888-JTEXSYS (583-9797)

    ooOoo


    The articles on this website are provided for information purposes only. BlackRefer.com does not accept any responsibility or liability for the use or misuse of the article content on this site or reliance by any person on the site's contents. Use at your own risk.

    No Implied Endorsement:
    BlackRefer.com does not endorse or recommend any article on this site or any product, service or information found within said articles. The views and opinions of the authors who have submitted articles to BlackRefer.com belong to them alone and do not necessarily reflect the views of BlackRefer.com.



    Thieves Operating Via Telephone Scam by Jay Wilson


    Recently, I received a call from an individual, alarmingly thinking that her computer had contracted some sort of virus, Spyware, or malware. Did a warning display across the computer screen? ABSOLUTELY NOT!

    In fact, she actually received a phone call, and from someone that seemingly knew her by first and last name; as well as even knowing her address. Although this false technical representative (absolute stranger) spoke English, they also spoke with a very heavy accent, and began trying to direct the lady to do some very basic “checks” of the computer…At this point, and remembering some of the information I had previously written concerning electronic theft; the alert lady then hung up the phone, and immediately called me.

    Thank goodness some of the information we post in your SA Crime Coalition’s newsletter stays in the mind of the reader…

    If the lady had continued as directed, there’s absolutely no doubt that several bad scenarios would have occurred to include, but not limited to: 1) emptying of bank account funds/credit card fraud; 2) viruses/spy-malware being placed on the computer; and 3) computer being made non-accessible, and remotely held for ransom (unless monies paid to the unscrupulous caller). As a general rule of thumb, no one should ever call you (on behalf of a company) to, “report” your computer as having a virus. In fact, and if you receive a call such as the one being described in this article; IMMEDIATELY HANG UP! DO NOT STAY ON THE LINE, AS THESE CRIMINALS ARE USUALLY SAVVY ENOUGH TO GET THEIR VICTIMS TO FALL FOR THEIR SCHEME!

    How did the caller obtain this lady’s information? It’s very simple. Little known to most consumers, is that whenever you register products, buy things online, etc.; you are providing enough information to help build what is called a mailing list, or customer contact list. These lists are often sold, and to a number of third party, and private individuals (many of whom have not been screened, and have criminal intent for using the list). To help mitigate your information being sold, NEVER (if possible), list a contact number when registering a product; likewise, always ask vendors if they participate in programs of selling their contact list, and if they do IMMEDIATELY OPT OUT! While this actual scam has been around since about 2008; it is rapidly on the rise, and has claimed a high amount of victims. Click on the provided link to learn more about this type of theft:

    http://greekgeek.hubpages.com/hub/telephone-scam-computer-virus.

    About Author: Jay Wilson has over 30 years’ experience in the Information Technology (IT) arena. He holds degrees in both business and computer science, and has several industry-standard technology certifications. He owns Jay Tex Systems, a Texas-based computer , network, and repair facility. email: info@jaytexsystems.com

    Julius A. "Jay" Wilson
    Owner/Proprietor, Jay Tex Systems
    E-mail inquiries: info@jaytexsystems.com
    Phone: (210) 451-0756 / (830) 386-4370
    Toll free 1-888-JTEXSYS (583-9797)

    ooOoo


    The articles on this website are provided for information purposes only. BlackRefer.com does not accept any responsibility or liability for the use or misuse of the article content on this site or reliance by any person on the site's contents. Use at your own risk.

    No Implied Endorsement:
    BlackRefer.com does not endorse or recommend any article on this site or any product, service or information found within said articles. The views and opinions of the authors who have submitted articles to BlackRefer.com belong to them alone and do not necessarily reflect the views of BlackRefer.com.



    Don’t hate the computer…Hate the “Digital Divide” (game)!


    On a personal note, whenever I think about technology and computers, my mind is always on the people aspect of what’s to be offered. Admittedly, my thoughts also turn to a state of bewilderment. While I’m rarely confused about the Xs and 0s, I’m very puzzled as to why we still have this dilemma known as the, “Digital Divide”. In short, the digital divide is the difference between those that have readily available access to technology/computers; versus those who don’t.

    black computer users
    While the first programmable computer is said to have surfaced in 1936 (Germany); The first affordable “personal” computer as we know it and use today, was first introduced in 1981, and called the "IBM PC". Twenty-nine years and counting, leads to one BIG question: Why does this divide still exist, and how do we close the gap? First, we have to get past fear-of-the-unknowns. Don’t be afraid of technology (there are many free avenues within the local and online communities, designed to help you become proficient). Secondly, we have to acknowledge that whether we like it or not; this is a technology-driven society.

    We’ve made it a perpetual habit of “selectively affording” cell phones, and other devices, but the truth is our sons, daughters, friends, and neighbors who are without “essential technology”; will lose out on some of the opportunities afforded by owning a computer. Sure you may be able to surf the Internet from your cell phone, but it’s not the ideal tool for doing school research papers, presentations, and completing online job applications. Having readily available access to a computer does this and more.

    Concerned about affordability? No need to be. Prices for computers are far below than what they used to be. In fact, a used (but in good shape) Internet-ready computer can be purchased for under $150.00. Still, and if this will be your first computer, it’s advisable to have someone with you who knows about computers. In fact, they may be able to bargain the price down, saving you further dollars and frustration.

    Schools and other non-profit organizations should take advantage of the government’s donation of free computers. With San Antonio having a number of military sites, inquiries can be made as to becoming a recipient for their no longer needed computers, printers, and software (which are usually in great shape). You can start by calling the Defense Reutilization and Management Offices (DRMO) at the site. They will be able to get you in the right direction.

    Hopefully by now, you’re ready to start crossing that bridge. So let’s talk about some hidden freebies. Why pay for expensive Microsoft Office training, when Microsoft themselves offer free, self-paced online tutorials:

    http://office.microsoft.com/enus/training/default.aspx?ofcresset=1

    On the contrary, there’s a free alternative package that offers a suite of tools which lets you do presentations, documents, etc. You can download, and read about it at: (http://www.openoffice.org)

    The “bridge” of not knowing and ensuring our global competitiveness is real, and needs to be addressed. The real challenge is hating, but beating the game by putting that first foot forward, and eventually eliminating the divide!

    ooOoo


    The articles on this website are provided for information purposes only. BlackRefer.com does not accept any responsibility or liability for the use or misuse of the article content on this site or reliance by any person on the site's contents. Use at your own risk.

    No Implied Endorsement:
    BlackRefer.com does not endorse or recommend any article on this site or any product, service or information found within said articles. The views and opinions of the authors who have submitted articles to BlackRefer.com belong to them alone and do not necessarily reflect the views of BlackRefer.com.





COMPUTER - SOFTWARE
   

  1. African American Family Reunion Organizer ...
    African American family reunion organizer software.
    http://lhh.fimark.net/family-reunion-planner.html

  2. African-American Free Download ...
    African-American Free Download website.
    http://www.brothersoft.com/downloads/african_american.html

  3. African-American Information Technology ...
    African-American Information Technology is site that is both News content and a reference site in the realm of Information Technology with the focus group being African-Americans.
    http://www.africanamerican.com/

  4. African-American Research Tips ...
    African-American Research Tips software.
    http://genealogy-software-review.toptenreviews.com/african-american-research-tips.html

  5. A Nation Online ...
    How Americans are expanding their use of the Internet.
    http://www.ntia.doc.gov/ntiahome/dn/index.html

  6. AF America ...
    Provides affordable and effective Web Pages, Internet Services, Pentium black computers and Marketing services for businesses, organizations and individuals.
    http://www.afamerica.com

  7. Ashaware ...
    Black Board International's Ashawareline of Afrocentric Software includes educational programs for childrenand adults as well as a screen saver and clipart.
    http://www.ashaware.com/

  8. Black Facts ...
    Black Facts Online is the world's largest free online database of Black History information, use Black Facts Online for research, education and fun 24 hours a day, 365 days a year, Black Facts Online is a public service of Inner-City Software.
    http://www.blackfacts.com/

  9. Black Screen Saver Download Services ...
    African American and Black World computer free software downloads.
    http://www.spiritdatatree.com/downloads/index.html

  10. Black Software ...
    African American photo stock, screen savers, clip art, and software. Free Black software downloads.
    http://www.blacksoftware.com/

  11. Cush City ...
    World's largest African-American selections of books, videos, art prints, toys, software, calendars & more!
    http://www.cushcity.com/

  12. Douglas Consulting & Computer Services, Inc. ...
    DCCS is a MBE and MD based Information Technology company providing government and business industries with efficient, competitive and innovative I.T. solutions.
    http://www.douglasccs.com/

  13. Empower Encyclopedia ...
    Multimedia black software, black history research.
    http://www.empowerencyclopedia.com

  14. It's A Black Thang.com ...
    African American educational CD-ROMs that provide a reference for information about Black history and the many contibutions and accomplishments.
    http://www.itsablackthang.com/AfricanAmericanEducationalSoftware.htm

  15. Jay Tex Systems ...
    General Computer Repairs. Certified Computer Security & Virus Removal Technicians.
    http://www.jaytexsystems.com/

  16. Soft Blue Educational Software and Learning Systems ...
    Soft Blue's technological focus is intelligent "smart-logic" software a proprietary platform developed by soft blue, inc. to create individualized learning-pace based systems.
    http://www.softblue.com/

  17. Spiritdatatree.com ...
    African American image clip art images related to Hip Hop, black churches, black business enterprise with latino and fashion clip art.
    http://www.spiritdatatree.com/store/index.html










Get Your Degree!

Find schools and get information on the program that’s right for you.

Powered by Campus Explorer




divider of content








black city info


160x600 Skyscraper - More memory. Upgrade
 




Terms of Use    Privacy Policy