Day 20,324…aargh!

If you are:  an introvert, extremely busy or not a fan of yammering on the phone, then you have probably been down this familiar road:

  1. You visit a web site that offers a service you are interested in but the web site has very little information regarding the service posted on the web site.
  2. You visit the “contact us” section of the web site and see a phone number or feedback form listed.  Instead of calling the company you fill out the feedback form (you provide your email address as well as several other bits of “required” data) to request more information.
  3. Starting the next day, you ignore two phone calls per day from this company for the rest of your life.

I find a few things strange about this outcome:

  1. The company is aware of how the visitor reached out to them (by feedback form instead of phone call).  The company seems to ignore this critical piece of information.  Instead of emailing the requested information to the visitor, they choose to contact the visitor repeatedly through other methods.
  2. The company is aware that the visitor has not answered the first 9,000 call attempts they have made.  The company seems to ignore this critical piece of information.  Instead of halting the calls and pursuing another method of communication (like email), the company chooses to call the visitor’s number for a long period of time.  When I say long, I mean well after the visitor has died and his or her phone number has been transferred to other humans.  These poor humans of the future find themselves in a constant state of confusion over the daily calls they are receiving from a company they have never heard of .

Is the human voice so miraculous that its sound must be present in order to unlock the wisdom of this company?

Is this company so fearful that their information will fall into the hands of robots that its employees feel they must verify the “humanness” of each inquiry by scrutinizing voices over the phone?

Is a mischievous person intercepting all incoming communication between visitors and the company and then robocalling all visitors in a crude attempt at being a nuisance with the intent of inflicting financial loss for the company and mental anguish for the visitor?

These questions are too complex for my little mind to answer.  I can only hope for a phone-free afterlife.

Color-coding the internets – say what?!

I have been a web developer and computer programmer for a long time, so I know how frustrating and complex computers and mobile devices can be.  It is because of this experience that my number one rule is to never poke fun at users when they ask questions that make no sense regarding computing.  I myself asked all of those same crazy questions when I was learning, and I still ask many today.  The world is always kind enough to help me without fanfare, so I always do the same – no matter what.  Unfortunately, as hard as I tried, this rule went out the window recently when the effects of Hurricane Florence arrived in Raleigh, North Carolina.

Huddled safe and sound in my mother’s home, with wind howling and trees swaying, we watched a funny show on TV and snacked on Cheez-It crackers (the white cheddar ones, oh yeah).  My mind was far from thoughts on technology.  My brain was a vortex of worry.  Are cows going to fly by the windows?  Are we going to run out of TP? Can I swim across torrential rivers while holding onto my mom, my rabbit, my cat and my hamster?

And then it happened.

My mom looked at me from across the room, sitting in her fancy recliner, and said something my brain could not compute.  “So what’s this thing called the Black Internet and how do I get on it?”

Initially I did not know how to respond.  I remained quiet for a short time as I search every square inch of my brain for some crumb of meaning and I came up empty.  I had never heard anyone refer to the internet using color codes before.  Finally, I had no choice but to resort to a very sophisticated techy reply of:  “Huh?”

“You know, the internet that steals your identity.”

And it finally hit me.  “Do you mean the Dark Web?”

“Yes! That’s it! The Dark Web!”

At this point uncontrollable bouts of wild laughter rolled out of me.  I tried to contain myself, I really did.  Luckily ma took it in stride and rolled her eyes until my fit was over and then we chatted about the Dark Web.

I cannot even type this blog post without laughing.  It is just too much.  I am sorry, I really am.  I guess I am not the IT professional I thought I was😊  I will try harder.  I promise.

Caution: the kind voice on the line could be up to no good

We received another suspect call, as do so many every day.  His voice was kind and patient.  His goal? To remote into our computer.  This is not good.  Listening to him was disturbing.  Not because I saw him as a threat but because I know he would have been able to manipulate many others out there who may not be tech savvy or who may have cognitive impairments or who may just be so inexperienced with deceivers that they may not realize what is happening and comply with his requests.

Use the following example of what happened to us as a reminder to keep your guard up at all times when communicating with strangers who are trying to reach you in this digital age.

  • The call came in from this phone number:  282-648-2794 and the caller id was a long series of numbers instead of an actual business name.  Phone numbers are easy to mask so this could or could not be the callers actual phone number.
  • The caller was a very sincere and patient young man with a thick accent, it sounded like an Indian accent.
  • He began the conversation with something creepy.  He made a comment that we had been on our computer yesterday.  This is something he would have no way of knowing.  But we replied yes.  This was his way of determining if we did or did not have a computer in our possession.
  • He then asked if we were the only ones that used the computer, this is his subtle way of determining if the computer is being used for business or personal use.
  • He then asks us to visit a web site and download software.  What he wanted us to download is software from alpemix.com in order to gain remote control access to our computer.  If you do an internet search of alpemix you will see that this is remote control software and it has been used in phone scams for many years.  I do not know the history of alpemix so I cannot say at this time if it is a software of good intent that is just unfortunately the software of choice of scammers or not.  Either way, the scam goes like this:  you download the alpemix software, the caller remotes into your machine and releases malware or viruses, your computer then shows you have malware or viruses, the caller then says that for a fee he will repair your computer.
  • We kept this caller on the phone so long pretending to be inept computer users who could not reach the alpemix.com site, that the caller finally gave up, said something so disgusting that it cannot be repeated and hung up on us.

If you think you have people in your home who would believe a caller like this, sit down and go through this scenario with them.  Encourage them to immediately disconnect the call.  Not engaging with the caller is the most successful strategy and then use features on your phone to block the call so hopefully you will not receive another call from the same people (many phones have call blocking features now and this is a perfect opportunity to take advantage of them).

Avoid engaging or arguing with the caller.   This will in no way change the trajectory of their behavior.  Make no mistake, you are dealing with a criminal over the phone.  We can only hope that they will suddenly take up a sweet hobby like knitting or cliff diving and be so preoccupied by it that they forget to show up for work at their job which is obviously a company called something like “Phone Scam Surplus Manufacturers of the Free World Organization”.  Just hang up the phone and go on your merry way:)

Google Ads = a really intuitive interface, thank you!

I tried Google Ads this year because they sent me an offer to try out the service again.  I am so glad I did.  The experience was very different from what I had experienced in 2018.  The interface is now much easier for me to navigate and my biggest issue in the past was not being able to figure out why ads were being rejected by the system.  Problems with ads are very easy to understand now.  The interface clearly identified where problems were before I submitted the ad so I was able to create the ad, submit the ad and the ad was approved with no delays due to ad rejections.

A big thanks to Google Ads for the ease of use, I appreciate it and it worked well for me.

I only ran into one problem this time and it had nothing to do with Google Ads, it had to do with the product I am selling.  Plenty of visitors clicked on my ad but no one purchased my product.  How could someone not want to buy this? Everyone needs to know how to raise a bunny rabbit inside the home.  I am so shameless, I am plugging the book inside this Google Ad article;)

 

Dealing with the IPERCTV disorder during the holidays – remote control mayhem

The holidays are going to be here before you know it and that means many of you are going to have a house full of relatives.  This quick post will help you prepare for the impending onslaught of freakish family behavior regarding electronics.

Most of my relatives are afflicted with a very strange disorder.  The “I must point every remote control at the TV and see what happens” disorder (also known as IPERCTV).  The scene usually unfolds at dawn.  One early riser must immediately know the weather conditions of all cities in the world via the gorgeous people on The Weather Channel.  Since no one else is up, and since the guest is incapable of complex thought at such an early hour, he or she proceeds to pick up all 37 remote controls lying around the house to try them out.  The behavior with each remote control is the same:  point the remote control at the TV, press every button on the remote control, move on to the next remote control and repeat.

It does not matter that the remote control says “General Motors” on it, clearly indicating that it is in fact a key fob for the car in the driveway, the guest is going to point it at the TV and click every button on it anyway.  One of these button presses inevitably sets off the car alarm of the car in the driveway and wakes up everyone in the house.  The rest of the family comes downstairs to investigate the alarm.  It is at this point that the guest quickly demands someone turn on the TV for the latest weather report.

For the next two hours the host attempts to sync back up the 985 audio and visual systems to the one remote control that they all used to successfully communicate with.  During the first hour and a half of troubleshooting, there is a tremendous amount of cussing.  The final thirty minutes is dedicated to testing, lecturing guests on remembering to use only one remote control and drinking beer for breakfast to deal with the stress.

To save your sanity, lock your extraneous remote controls away NOW.  Do not wait until your guests are in your living room.  To make for an even smoother visit, put a piece of paper next to the TV remote control that shows guests what buttons to push.

Good luck.

I love foreign magazines and now I have easy access to them!

Prior to the eBook explosion on our planet, I gave little attention to foreign magazines because they were often extremely expensive due to shipping costs and delivery time was delayed as well.

I am very happy to see so many magazines from faraway lands are now available to me electronically! Do not think you have to have a special device (other than a regular computer or a regular smart phone or tablet) to read these magazines.  If you have a computer, smart phone, or tablet, then you can download Kindle software directly to your device so you may begin reading these magazines immediately!

This is the location to download the necessary Kindle software:    https://www.amazon.com/kindle-dbs/fd/kcp

Once you have the software downloaded then go on a fantastic shopping adventure on amazon.com for all the fabulous magazines you never had easy and timely access to before!  Here are just a few to get started (you would use the “Deliver to Kindle” during checkout – it is the option over on the right):

NOTE:  If you find a magazine that does not have the “Deliver to Kindle” option listed on the right, then the magazine is not yet available electronically.

To find more foreign magazines on amazon.com, here is one way to find them quickly:

There are several methods of reading eBooks besides using Kindle software, I outline more here:

https://jennymummey.wordpress.com/2016/09/20/it-doesnt-matter-what-electronic-devices-you-have-you-can-read-e-books-well-i-guess-maybe-a-fancy-toaster-wouldnt-work/

Best Tech Dream Ever

Holy schnikes! I had the best tech dream ever last night:)

The horror of forgetting every single password for every single web site, mobile app, desktop app, database, server, work door code, house door code, safe, car door code finally came to fruition in a stress filled dream of too much work and too little time.

When I realize my brain no longer contained all password data for all of my things in my life requiring passwords, I was so stressed about it that I was truly unable to react in any way and then suddenly this lovely wave of calm came over me and I accepted the moment.  I decided I would not pursue recovery in any way, I would just walk away from all that was password protected and start anew.

I woke up pretty happy at the tranquility of it all but also at the sheer absurdity of me in any dimension accepting loss of data – never!

Gadget mania:)

With the number of electronic devices in the hands of our clients now it is truly a miracle they have not rioted against all of IT.  I have a sincere respect for them just based on the massive amount of patience they have for learning, caring for and using the large number of crazy devices we support for them.

If you have a full arsenal of gadgets for work and home and feel as if you are reaching your breaking point, then take a deep breath and keep the following tips noted below in mind for a happy life.

  • If you are unable to turn off all devices for quality time with other humans or for strolls in nature for a set amount of time each day, then you are probably going to self-destruct in some weird and ugly way in front of witnesses in a public place.  No one wants that.  Just turn the gadgets off and do your thing.
  • Understand how to update the gadget to keep it running well.  Check for updates weekly.
  • Understand how to turn off, turn on and hard reboot the gadget.  Avoid leaving computer-like gadgets in an on state for weeks at a time, rebooting is very important as is normally shutting down every few days to avoid all sorts of performance issues.
  • Understand how to backup data from the gadget to another gadget (like to an external hard drive) that you then store in a separate place (any detached structure from your home or office that is secure).  Backup your data on a regular schedule and never deviate from this schedule.
  • Know that if you enjoy a huge bowl of Captain Crunch while reaching over your gadget to snag a book that is sliding off of a shelf, then the Captain Crunch is going to spill all over the gadget rendering it completely unusable…probably forever.

Noting the creepy factor when implementing video conferencing or video chatting tools (i.e. Skype, Zoom, Teams) in the workplace

Video conferencing and video chat are seriously valuable tools for businesses and families alike. This article focuses on the use of these tools in a business setting and how to identify and deal with misuse.

Two types of employees make the use of these tools a problem in the workplace: the gossiper and the pervert. These types of employees already make normal employees uncomfortable in everyday office situations. When employers add in forced face-to-face video communication where normal employees are on display (with zoom capability) with undesirables, the meetings become unsettling.

The gossiper is very easy to identify. He or she, after the meeting, quickly relays to anyone who will listen inappropriate information regarding meeting attendees.

Though easy to identify, the gossiper may be hard to silence. Over time the gossiper may also create a truly toxic environment and even jeopardize the welfare of the company or safety of other employees if they spill company secrets or safety protocols to other people. If you have trouble with gossipers in the workplace now, incorporating video communication may intensify the toxicity. Proceed with caution.

Perverts can be extremely difficult to identify because they often make inappropriate comments or gestures towards others in one-on-one encounters. This behavior is difficult to identify in a group setting. Employees may also misidentify someone as being a pervert and immediately shut down all communication with them. This strategy of course will never solve the problem if there in fact is a problem.

If you are running video meetings or managing people that are participating in them, carefully examine how people are interacting during the meetings. If something seems off, like communication is not natural, there is too much silence, or a normal employee is suddenly agitated then there could be a problem.

Here are a few suggestions that may make meetings like this bearable if you notice issues in current video-enabled meetings:

  • Make it part of the meeting policy to include meeting rules (rules are short and easy to understand) inside the meeting invitation (at the very top) of every video-enabled meeting invitation sent out so all participants understand how to behave during and after all video-enabled meetings. In the rules, be sure to clearly identify the types of inappropriate employees that make meetings difficult in the workplace.
  • Recommend that employees sit several feet away from the camera and behind a desk, so they are viewed as they are in normal in-person meetings where personal space is acknowledged (no one is looking up anyone else’s nose).
  • Give employees the option to turn the video portion off so participants cannot see them.

Good luck:)

Create a free website or blog at WordPress.com.

Up ↑