photo RSMAtnWebAdRed13.jpg
Category archives for: Computer Corner

The Computer Corner

REG COMPUTERS

Web Browsers Around the World Exist Thanks to Google’s Chromium By Charles Miller Last week in this column, I praised Alphabet Inc., Google’s parent company, for deciding to share its Chromium web browser program for the benefit of Internet users worldwide. This week, let’s take a look at some of the web browsers around the [...]

The Computer Corner

REG COMPUTERS

Chromium: Google’s Programming Code That Launched a Thousand Browsers By Charles Miller Google’s Chrome browser is now the most used web browser software in the world. Last week, I had some extremely critical things to say about the dishonest and deceitful marketing tactics Google employed to obtain that number one status. I want to balance [...]

Google’s Road to Internet Dominance Utilized Questionable Tactics

google

By Charles Miller No fewer than five Atención readers sent me a reference to the same Washington Post article by Geoffrey A. Fowler entitled “Goodbye, Chrome: Google’s Web Browser Has Become Spy Software.” With a healthy dose of sarcasm I answered back, “What? You mean the biggest advertising company on the planet put malware into [...]

The Computer Corner

COMPUTERS

By Charles Miller Mexican Phone Dialing Procedures Soon to Be Simplified Mark this date on your calendar: Saturday, August 3, 2019. That is the day on which the procedure for dialing telephone numbers in México is set to change again. Again, you ask? That is something I will explain below. Dialing Mexican phone numbers can [...]

The Computer Corner

COMPUTERS

By Charles Miller New EU Copyright Directive Can Affect US Users Earlier this month, lawmakers for the European Union issued the Directive on Copyright in the Digital Single Market, a directive that essentially is a list of guidelines for each of the 28 EU member nations to use in enacting new laws to protect fledgling [...]

Is Your Email Address Compromised?

CPOMPUTERS

By Charles Miller A few weeks ago I wrote about the experience of a client o f mine whose email address was “pwned.” In writing that column, I made up what I mistakenly assumed was a fictitious name to protect my client’s privacy. I wrote that when I checked the haveibeenpwned.com website, I found the [...]

Brick-and-Mortar Retailers Are Newest Customers Buying Your Personal Data

Geolocalización-y-geotargeting

By Charles Miller It seems as if every time you read the news, some new story reveals more about our dystopian surveillance state. Cameras record us every time we go out in public, advertising giants Google and Yahoo read all our emails, Apple analyzes all of our photos, cell phone providers sell GPS data from [...]

The Computer Corner

COMPUTERS

By Charles Miller Email Providers Often the Biggest Culprit in Return-Receipt Message Failures One of my clients who uses a locally installed email client asked me about what he thought was a malfunction in the program. Just in case you do not recognize the term, an email client is software installed on the local computer [...]

The Computer Corner

spam-email

By Charles Miller   Why Aren’t Your E-mails Getting to Their Recipients? Your Address Might Have Been Hacked   The fallout continues from the article that appeared here a few weeks ago. This time the story is not about someone who read the earlier column, but someone who might have benefited by saving a lot [...]

The Computer Corner

COMPUTERS

By Charles Miller   A Guide to Understanding the Multitude of Networks Around Us   When it comes to trying to understand computer networks, it is easy to be confused by the alphabet soup of acronyms. WAN, LAN, WLAN, WWAN, PAN, CAN, MAN, CDN, VPN, and others all end with “N” and all are networks. [...]

 photo RSMAtnWebAdRed13.jpg
 photo RSMAtnWebAdRed13.jpg

Photo Gallery

 photo RSMAtnWebAdRed13.jpg
Log in | Designed by Gabfire themes All original content on these pages is fingerprinted and certified by Digiprove