Categories
Technology

Can an Algorithm Predict the Next Bestselling Novel?

b2ap3_thumbnail_big_data_bestseller_400.jpg It’s not always easy to identify what will be hip and trendy years from now, but big data is attempting to bridge this gap. In general, due to the unpredictability of human behavior, it can be difficult to spot cultural anomalies before they happen. Despite these challenges, algorithms are being applied to various practices in both the business world and elsewhere. One innovative way in which it’s being used is by attempting to predict the next bestselling novel.

Jodie Archer, author of an upcoming book called The Bestseller Code: Anatomy of the Blockbuster Novel, claims to have found an interesting way to use algorithms and big data to discover what’s hot in the literature department. This particular algorithm, called the “bestseller-ometer”, looks at what particular qualities make for the most successful fiction. As reported by The Atlantic, the algorithm can identify a bestseller more than 80 percent of the time.

This success is attributed to the algorithm’s ability to identify bestselling fiction from the New York Times bestseller list. Basically, this is one of the many attempts that computing systems have made toward predicting the behavior of the human brain, and it could change the way that publishing companies accept and publish manuscripts. After all, if a book doesn’t sell, why publish it?

The biggest question that this algorithm attempts to answer is: “Why do we all read the same book?” It’s compelling, to say the least. Everyone has different tastes in literature. The academic who carries a pocket thesaurus around in his suitcase might find an escape in a good science-fiction short story or another piece of genre fiction. On the other hand, a book that’s destroyed by critics might be surprisingly successful. Thus, readers find different traits to be more valuable than others.

Aided by English professor Matthew L. Jockers, Archer built the algorithm to find out what makes a reader so interested in a certain piece of literature. The Bestseller Code looks at the various processes and strategies used by the algorithm to identify the context and other important parts of popular fiction. The list is quite long, but it includes a plethora of tropes that are generally found in literature, including:

  • Authoritative voice
  • Colloquial (everyday) language
  • Action-oriented characters
  • Cohesion
  • Human closeness

One other major idea that needs to be taken into account is that of the “zeitgeist,” or time-sensitive concepts. Basically, what’s contemporary is what sells. This adds an element of the unknown and makes it difficult to predict what will be popular in the near future. There’s also the interesting notion of the human element, which makes it difficult, if not impossible, to foresee how they will act in the future. In a way, it makes sense that a human should be picking the next bestseller, as the algorithm cannot empathize with characters or be moved by a good story. After all, a computer can analyze semantics as much as it wants, but it’s not the one reading the book. That’s the job of readers all over the globe.

While it’s possible that big data can make strides in the way we understand how humans think, it’s important to understand that humans are unpredictable by nature. Any attempts to predict the future based on statistics or metrics, while seemingly helpful, could mean nothing, as people often behave irrationally or beyond reason. While technology is a great way to bridge this gap, it’s still important to remember that people are people, not machines.

What are your thoughts on using big data to find new audiences and better understand your own market? Let us know in the comments.

Categories
Security

How Downloading Free Adware Can Lead to Malicious Crapware

b2ap3_thumbnail_downloading_unwanted_software_400.jpg One benefit of the Internet is that, if you search hard enough, you’ll likely find a free tool or app for virtually any common computing task. While certainly advantageous, freeware often comes with a hidden price, like having to also download additional, unwanted software, aka, “crapware.” If this freeware isn’t properly managed, it can wreak havoc on your system.

In most cases, the addition of crapware on a PC is obvious, like a browser toolbar suddenly appearing (that’s difficult to remove), or the addition of new antivirus software. Although, in cases where freeware is bundled with malicious crapware or adware, the unwanted applications are designed to be difficult to locate and remove.

How Does this Happen?
In most cases, the addition of crapware on a PC comes from the user being in such a rush to download the freeware that they don’t uncheck the option to also download the adware or crapware that’s bundled with the desired software. Essentially, it boils down to skipping over the fine print. To make matters more annoying, this practice is perfectly legal. After all, by leaving the box checked, the user agrees to the terms and services of downloading the software, which includes the installation of additional software.

In instances such as this, avoiding the spread of crapware can be as simple as making sure that every user on your network knows to uncheck this box when downloading freeware. Or better yet, banning altogether the practice of downloading freeware and unapproved software will almost guarantee that your network won’t become cluttered with unneeded and potentially malicious programs.

Why Does this Happen?
By now, every Internet user should understand that nothing online is truly free–take for example the plethora the free apps that make money by collecting your data and selling it to marketers. Similarly, many of the developers of freeware make money if they can “trick” a user into downloading the bundled adware or crapware. In some cases, developers have been known to make as much as $150 per install.

How Bad is It?
In a recent report by ZDNet, it was revealed that Google issues over 60 million warnings each week to users about the dangers of downloading potentially dangerous software. In fact, Google claims to issue more warnings for unwanted software than they do for malicious threats–three times more to be exact!

To better understand the nature of these software bundles, ZDNet cited a study where it was found “that 59 percent of bundles are flagged by at least one antivirus engine as potentially unwanted, and that some packages are built not to install when the presence of antivirus has been detected.”

You may have encountered a malicious app that originated from a freeware download if you’ve ever encountered a fake “system alert” when using your web browser. With this all-too-common scam, you’re presented with a fake security breach “requiring immediate action.” Often times, the recommended course of action involves the user unnecessarily transferring funds or control of their PC to the scammer.

How Can You Protect Your Business?
In addition to the aforementioned employee training, business owners will want to employ a network security solution that detects and blocks threats associated with downloading malicious software. With a content filter, spam blocker, firewall, and antivirus solution, a Unified Threat Management solution from COMPANYNAME is up for the task of keeping your business safe. Make sure that your company is protected from the worst of the web by giving us a call today at PHONENUMBER.

Categories
How To

Tip of the Week: What to Do When Your Device Won’t Connect to Wi-Fi

b2ap3_thumbnail_check_your_wifi_strength_400.jpg Wi-Fi deadspots are very real, and tend to be annoying, fickle things. Despite maybe a wireless signal being strong enough for everyone else in a room to receive it, something may be interfering with the device. As a result, the Wi-Fi simply isn’t sufficiently strong enough to connect the device to the Internet. Fortunately, there are a few troubleshooting steps that may be taken to resolve the connection’s cutback.

Step One: Check Your Positioning
The first step to any Wi-Fi troubleshooting is to make sure that the router is located far enough away from any other electronic devices, as these devices can negatively influence the strength of the signal. This is especially true when these devices are positioned between the router and the workstation it is connecting to. Walls and floors can also affect the signal–the thicker the obstruction, the weaker the signal.

A relatively simple fix, especially when the router needs to be shared by multiple floors, is to elevate its position on the lower level. This reduces the amount of space the signal will have to cover before passing through the ceiling/floor (ideally without issue), as well as the amount of obstacles it has to contend with to reach the users on the level it is on.

Step Two: Antenna Adjustments
If a router (or PC) has an external antenna, it may be beneficial to adjust the antenna’s position until the signal’s sweet spot is found. Opinions of optimal antenna orientation vary, so it’s likely that the user will need to find the ideal alignment through some good, old-fashioned trial and error.

If that still isn’t effective enough to resolve the deadspot issue, there’s always the option of replacing the antenna itself. By simply unscrewing the included antenna and replacing it with a stronger model (or if absolutely necessary, a stand-alone antenna and extension cord combo), you can hopefully extend your reception out of your poorly-placed dead zone. After these adjustments are implemented, a device can pick up a signal that–under normal circumstances–would be out of reach.

If the equipment in question doesn’t have an adjustable antenna, there are USB adapters available to plug into a device that can work similarly to how the standalone and extension cord setup can, thanks to their longer USB connection cords.

If these adjustments still don’t deliver satisfactory results, it may be worth it to consider investing in a Wi-Fi extender. Rather than trying to maneuver a router and receiver to make a better connection, using a Wi-Fi extender means there only has to be a clear signal to each device from the extender’s position. This is a very effective solution if an immovable obstacle (say, for example, a wall) is blocking the signal, as the extender can create a detour around the obstacle, preserving the signal quality.

Step Three: Upgrades and Updates
Finally, check the router and adapters themselves. While age shouldn’t have too much effect on their performance, it could eventually develop into a problem if left unaddressed. Therefore, like all other office solutions, the costs associated with regularly upgrading equipment will likely be well worth the investment. However, if the equipment in question is too new to warrant a complete replacement, or hasn’t had its firmware upgraded in a while, it’s worth checking with the manufacturer or online for any updates that have been made to the device’s firmware or drivers.

With these practices at your disposal, your Wi-Fi isn’t likely to cause many problems in your office again. If you still can’t get your Wi-Fi to work as intended, COMPANYNAME would be happy to help. To learn more, reach out to us at PHONENUMBER.

Categories
Cloud

Educate Yourself About the Cloud Before Choosing a Cloud Provider

b2ap3_thumbnail_the_cloud_rundown_400.jpg As a business owner, you’ve probably heard plenty about how the cloud can improve operations and make your life easier. While it’s certainly capable of doing both, it’s important to understand what, exactly, the cloud is. How do you select the proper solution for your organization’s specific needs?

What is the Cloud?
The cloud is a way of computing that allows your business to store and access data in an online environment. To put it simply, you’re using someone else’s computer for the purposes of storing data. This computer or server is managed and secured, either by your business’s IT department or by security professionals within public cloud providers. As long as you have an Internet connection, you can access your data from anywhere at any time, and scale resources to match your particular needs at any given moment. This flexibility is the greatest benefit that the cloud offers businesses.

By using a cloud solution, you can cut your costs and increase mobile productivity substantially. The cloud can also improve internal collaboration across departments through shared storage space. In general, cloud computing is such a solid investment that you’d be hard-pressed to find a business that doesn’t utilize the cloud in some way, shape, or form.

We’ll discuss the three types of cloud solutions in detail so you can make an educated decision regarding your business’s cloud investment.

Public Cloud
The public cloud is a place where the general public can store data within a cloud environment. It’s set up in a way which allows users to access only their own part of the cloud. Of course, this also depends on the provider, but it can be either a free or paid service for however many resources you use. For a good example of how the public cloud works, look at G-Suite (Google’s cloud services), Microsoft Office 365, and Dropbox.

Granted, the public cloud still has its downsides. If you lose your Internet connection or you’re traveling without access to the Internet, you’ll have problems accessing your data. Plus, some providers are known to change the locations of stored data without informing you of the change, which could become problematic. Another major concern is that you won’t have complete and total control over your security standards.

While the services work for their price and are good for consumers, the public cloud might fall short of business expectations. A more customized solution can be found in the private or hybrid cloud.

Private Cloud
When we talk about the private cloud, we usually refer to one of two setups. Sometimes a company has the resources to host their own cloud solution, but in other cases, providers might offer an isolated section of their infrastructure for exclusive use by your organization. The provided solution is based on resource usage, while the private cloud that’s hosted on-site tends to be a bit more costly due to hiring IT staff to maintain it. Either way, the private cloud offers substantial improvements in terms of security, while requiring a bit more loving maintenance.

Hybrid Cloud
The hybrid cloud is a solution designed to utilize qualities of both the public and private cloud to achieve a similar level of service to both. By reaching through an infrastructure’s firewall to access resources, it effectively allows for a similar level of service as a public cloud with exceptionally more powerful security solutions. The hybrid cloud is ideally for use by organizations that need the customization it offers.

Which type of cloud are you interested in? To learn more about your options, give us a call at PHONENUMBER.

Categories
Security

Test Your Knowledge of These 3 Common Security Threats

b2ap3_thumbnail_prevent_security_issues_400.jpg Security is a critical part of running your business, especially in a world where organizations require technology for most any task. In fact, some of the most dangerous threats are known to hide within a company’s network, waiting for any opportunity to strike. With the right preventative measures, you can keep your network safe from catching threats before they hit your network in the first place.

Defining Malware
Malware is short for “malicious software,” which is an overarching phrase referring to malicious code designed to cause problems. Malware often injects code into applications to execute viruses or trojans. One of the most common types of malware is a variant called ransomware, which you’ve probably heard of thanks to a number of high-profile infections. When a machine is infected with ransomware, it encrypts the files on the device until the ransom is paid to the hacker. Aside from this rather dangerous strain, other types of malware can have far-reaching and varied effects.

Defining Rootkits
Like malware, a rootkit is at home on a system. Unlike some types of malware, however, a rootkit is designed to allow a hacker to gain control of a system while remaining undetected for extended periods of time. Rootkits are dangerous thanks to their ability to avoid detection by software that’s supposed to find them, like firewalls and antivirus solutions.

Defining Trojans
Trojans are malicious entities that allow hackers to access a system by misleading the user. Trojans are backdoors that can allow hackers access to a system at a later date, and they are often installed alongside other malware to distract the user from taking preventive action. The trojan can be used for a number of purposes, from data destruction to surveillance or espionage.

The Solution: Preventative Security Measures
Since so many threats are blocked by preventative security measures, it would be foolish not to implement them. There are several ways you can keep threats out of your system, including:

  • Firewall: Firewalls act as a bouncer for your network, keeping threats from entering or leaving your infrastructure. They work best when combined with other preventative measures, like antivirus, content filters, and spam blockers.
  • Antivirus: Antivirus solutions detect and eliminate threats that have made it past your firewall solution. Antivirus offers prompt threat detection, which is important since malware that’s left unchecked could cause untold troubles.
  • Spam blocker: Threats often arrive in your email inbox as spam, and the unknowing employee could accidentally click a malicious link or reveal important credentials. A spam blocker eliminates the vast majority of spam from even hitting your inbox.
  • Content filter: A content filter is helpful for keeping your employees from accessing sites known to host malware, as well as inappropriate or time-wasting sites, like social media.

A Unified Threat Management (UTM) solution is a great way to take advantage of all of the above solutions. It’s widely considered to be the most comprehensive and useful preventative measure available to SMBs. If you want to learn more about UTMs, be sure to give COMPANYNAME a call at PHONENUMBER.

Categories
Best Practices

Tip of the Week: How to Clean Your PC Like an IT Pro

b2ap3_thumbnail_cleaning_your_computer_400.jpg Just as anything else will, a computing device will need some TLC to keep it physically clean and in tip-top shape. In order to clean your system safely, you will need proper tools, and the know how to properly clean your PC.

For a basic cleaning, a can or two of compressed air, and lint-free wipes should suffice. For jobs that will require a little more elbow grease, you will need to add a few more items to this list–a small screwdriver, cotton swabs, and isopropyl alcohol (make sure it’s isopropyl, and not ethyl-based).

Cleaning Out the Desktop
Before you get started, keep in mind that you’ll be dealing with some pretty sensitive hardware. We highly recommend having an experienced technician handle this for you.

First and foremost, you’ll want to completely power-down your system. This includes not only powering down the machine but also killing power to the surge protector it is plugged into and removing the power supply cord from your system. Wipe down the case exterior using a static-free dust cloth and get rid of dust that has been caught in the external vents, preferably by using your compressed air once the case has been opened. For dust bunnies of above-average size and other assorted crumbs, carefully go through and wipe them away with cotton swabs before using the compressed air to rid the system of the remaining dust.

As you use the compressed air, be sure not to sustain the stream for too long, as it could damage some of the more sensitive components of your system. You should also be very careful of what you touch in the system and avoid any bare or soldered wire to avoid serious electric shock. As you will almost certainly be generating static, make sure that you touch the metal and plastic frameworks frequently enough to keep you fairly equalized.

Once you’ve finished with that, close the case back up and go over it again with your dust cloth.

While it may be tempting to just take a vacuum to the buildup of dust in your system, don’t. The bristles on the vacuum are notorious for generating static, which can easily damage the delicate internal parts that your system relies on to function.

Making Your Screen Spic and Span
There is little more annoying than fingerprints and smudges streaking up your screen, especially when you are trying to focus on your work. Fortunately, cleaning the screen of your display is fairly similar to cleaning a window, with a few special considerations.

If you utilize an LCD display, applying a half and half mixture of distilled water and white vinegar to a microfiber cloth and gently wiping the screen works wonders to rid it of debris. If you still operate a CRT monitor, an ammonia-free glass cleaner will do just fine while preserving the screen’s coating. Make sure that you don’t spray the device with whatever liquid you use in either case. Instead, apply the cleanser directly to the cloth and wipe down the screen that way.

Keeping the Keyboard and Mouse Clean
Of all of your computer’s components, the keyboard and mouse will be the ones that are exposed to the most debris and bacteria as they are handled almost constantly during computer use. To do a basic cleaning, unplug your keyboard from the rest of the system and turn it upside-down, gently shaking it to dislodge any crumbs and other particles that are trapped between the keys. Another option is to use a can of compressed air, spraying between the keys at a 45-degree angle. Once you’re confident that most of the accumulated mess is cleared away, gently flip it over and shake it out again before carefully wiping it with an antibacterial wipe and drying it with a microfiber cloth.

If your keyboard is a membrane type keyboard, it is possible to remove the keys to get a good, comprehensive clean. Before you do so, be sure to create a record of the keyboard’s layout so your keys may be replaced properly.

To remove the keycaps, use the small screwdriver to gently pry them from their housing. However, because they can be difficult to put back on, leave larger keys (like the space bar, shift, and enter) on the keyboard as it is being cleaned. Use compressed air, cotton swabs, and isopropyl alcohol to clean out the grime that was hiding under the keys. Once you’re satisfied, snap the keycaps back in place and test thoroughly.

As far as the mouse goes, the overwhelmingly more common LED-sensor models will only need to be wiped down with a lint-free cloth and a few quick swabs of rubbing alcohol.

A Clean Workstation is a Happy Workstation
Keeping your computer clean can provide many benefits beyond just the aesthetic value. Equipment will likely run better, last longer, and be less apt to make you sick through exposure to simmering bacteria and germs. For more ways to optimize your technology experiences, make sure you keep checking back to our blog.

Categories
Security

Without Protection, Your USB Ports Could Become RIP Ports

b2ap3_thumbnail_usbad_idea_400.jpg It seems like everything available today can function with a USB connection, be it a thumb drive, device charger, or a desktop device–there are even USB-powered mini fridges meant for a single soda can. Unfortunately, “everything” includes malicious devices and malware.

If a USB drive is infected by malware, you can put your computer and data at risk by merely plugging it in, and there are some malicious USB devices out there that pose some pretty serious threats.

USB Kill 2.0 
Despite being powered by electricity, computers don’t mix well with too much charge, as USBKill.com has capitalized on. Creating a dongle that is capable of siphoning power off of the device it is plugged into, USBKill.com’s proprietary device then releases the energy back into the system as a power surge attack.

Intended for hardware developers to test their devices’ resistances against ‘juice jacking’ (a form of data theft that extracts data as a device is charging), the USB Kill 2.0 permanently damaged–if not destroyed–95% of all devices it was tested with without the company’s proprietary USB protection shield. This shield is what allows the USB Kill 2.0 to be safely used for its intended purpose–to test electrical attack resistance.

What’s more, in some cases when used without the shield, the USB Kill 2.0 wipes data from the device. While this is not what the USB Kill 2.0 is intended to do, this occurs simply because the charge is enough to damage the device’s drive controllers.

Needless to say, a business saboteur could find great use in the $56 USB Kill 2.0 as a method of attack, and there aren’t many effective protections a workplace can implement, besides educating employees to resist the temptation of plugging in any USB device they find.

USB-to-Ethernet Theft
Best practices for workstation security dictate that a system be locked whenever its user steps away, no matter how briefly. However, a security researcher recently discovered a method of extracting data from a locked computer using, you guessed it, a USB-connected device. By disguising itself in a particular way, the target computer adopts the device as the preferred network interface, allowing the hacker to extract data to a rogue computer attached to the cable’s other end in about 13 seconds. The best defense, according to the researcher who uncovered this flaw: don’t leave your workstation logged in and unattended, even with the screen locked.

What a Business Can Do to Protect Itself
Of course, not all USBs are evil carriers of the worst malwares and threats, but by no means should they be used after being found on the street willy-nilly, especially in a workplace setting. In order to protect business workstations and data from threats, simply enforce a requirement to have any USBs fully checked by your IT department before in-office use. Alternatively, consider utilizing a cloud solution as a much safer option to meet your mobile storage needs.

To protect your business from possible saboteurs introducing their USB-based malware, it is also wise to secure exposed ports with locking devices.

While USB devices seem to be the pinnacle of affordable convenience in data storage, they are far more trouble than they are worth, at least in terms of security. There are much safer solutions to implement that feature equal, if not greater mobility than even a flash drive. A cloud solution, for instance, can be accessed from anywhere there is an Internet connection, kept safe in a well-protected, offsite location. New and improved solutions like these make risk-laden devices, such as USB dongles, unnecessary.

For more IT tips, tricks, and solutions, subscribe to our blog.