Mathews IT Services received accreditation from the Better Business Bureau (BBB) on the 3rd day of March 2018. We are committed to providing excellent service to our customers and joining the BBB gives our clients peace of mind that we are held accountable for our services. The BBB requires that accredited business adheres to its policies and procedures to ensure that they remain compliant.
According to The Better Business Bureau standards for trust are eight principles that summarize important elements of creating and maintaining trust in business.
1840: Samuel F.B. Morse receives a U.S. patent for his dot-dash telegraphy signals, known to the world as Morse code.
The code Morse devised with Alfred Vail uses a system of dots and dashes to represent letters and numbers. It went into practical use in 1844, after producing a working electromagnetic telegraph transmitter. The original code was a little different than the one in use today. What we recognize as Morse code is actually an international variation of the original, or “American,” code. The American code contained not only dots and dashes but also spaces in five letters: C, O, R, Y and Z. (C, for example, was rendered like this: • • •) The numerals 0 through 9 were also different.
The international version, known as Modern International Morse Code, was introduced at a conference in Berlin in 1851. The American code remained in widespread use until the 1920s, when everyone finally lined up behind the international version.
When he finally received a patent for the telegraph itself, it came first from the Ottoman Sultan Abdulmecid in Constantinople (now Istanbul), who personally tested it and gave it his blessing. Others, notably Englishmen Charles Wheatstone and William Cooke, had patents on similar but Morse eventually triumphed in the legal battle. His adept promotion, one-wire transmission system, and simple software – the Morse code – won the day.
History has never seen ransomware bring more than half the world’s computers to a standstill. On Friday, May 12, 2017, computers around the world were disabled by the biggest ransomware attack known as “WannaCry” that targeted Microsoft’s Windows Operating Systems. The malware attack has now infected over 2,00,000 Windows based devices in 150 countries. The attack spreads by multiple methods, including phishing emails and on unpatched systems as a computer worm.
For those unaware, WannaCry is a fast-spreading ransomware that leverages a Windows exploit to target a computer running on unpatched or unsupported versions of Windows and servers and then spread itself like a worm to infect other vulnerable systems in the internal network. The attack spreads by multiple methods, including phishing emails and on unpatched systems as a computer worm.
Soon, after the initial release of the ransomware on May 12, 2017, a U.K.-based researcher going by the name of MalwareTech accidentally discovered a “kill switch” in the malware. The researcher then registered a domain which the malware seems to ping before infection. The registration of the domain name stopped the attack spreading and acted like a kill switch, making it inactive. The creators behind “WannaCry” quickly evolved around the domain-based kill switch and altered the code to remove the kill-switch and restart their campaign. Security researchers have discovered variants of the Windows malware that either doesn’t have a kill switch, or which ping to a different domain than the one discovered by the researcher.
Microsoft has released a software patch (MS17-010) for the security holes on March 14, 2017. Microsoft has now not only encouraged users to download the security patches released for the vulnerability back in March but also created security patches for several now-unsupported versions of Windows, including Windows XP, Windows 8 and Windows Server 2003.
Client: “Enterprise-Grade WiFi at Home? Really?”
Chris M.: “Absolutely – much cheaper than you would think too!” “Would you like to know more?”
As technology advances over the years, we find that it also becomes more accessible. To put this into perspective, Steve Jobs first introduced the iPhone to the general public. That’s you and me! The powers that be at Apple headquarters knew what they had in their hands and grew into a major competitor in the tech world. The ever growing demand for cellular and mobile devices to have a constant connection to the internet paved the way for today’s cellular and wireless networks.
We depend on our mobile service providers to supply us with a connection to the internet superhighway, however, when we are at home we depend on our WiFi router to take over. This is a service typically provided by out internet service providers or ISP, however, the equipment that they use is not only leased to you at a monthly fee but it is also used equipment at that. If you have the benefit of having your wireless router in the living room or office area, then you will more than likely have a great signal. On the other hand, if you move too far away from the wireless router or it is install in your closet (like so many these days), then your signal may not be sufficient to cover your entire home. To address the lack of coverage some suggest WiFi extenders that use the electrical lines in your home to distribute the connection throughout your home. Not only is this inefficient but it also introduces a lot of electrical noise into a sensitive single.
Network administrators have known this for years and I would like to share it with you now. Enterprise-grade wireless equipment talks to each other passing clients from one device (access point or AP) to another. This allows for WiFi users to roam around the office, hospital, warehouses, and your home for example without dropping their connection to the network or internet. These devices can broadcast multiple service set identifiers (SSID. This is the WiFi name that you would connect to) which can separate guest traffic from internal traffic. Imagine if you could wake around your house without disrupting your streaming media. I know that I enjoy streaming Amazon Music and when I am walking around I do not know what my music to skip a beat. Wouldn’t you like to be able to experience uninterrupted streams of your favorite media?
If you would like to know more about the services we offer, including in-home enterprise-grade wireless networks – contact us today! 713-575-9514
Electronic mail, or email, is a method of exchanging digital messages between people using digital devices such as computers, tablets, and mobile phones. Email first entered substantial use in the 1960s and by the mid-1970s had taken the form now recognized as email. Learning more about electronic mail and how it all began! 1968 Ray Tomlinson
Mathews IT Services is making the move to Connectwise Automate formally known as Labtech Software for our remote monitoring and management platform. This process will take place over the next few weeks to ensure an easy and seamless transition from one platform to the another. LabTech is more than just software, it is a valuable tool that allows us (Mathews IT Services) to better assist our clients. Our very own Chris Mathews is a Certified Labtech Professional and is looking forward to getting his hands on the newest version of Connectwise Automate (aka: Labtech).
On this day, December 7 in 1941 at 7:55am Hawaii time the United States was attacked by the Japanse dive bombers bearing the Rising Sun of Japan on their wings. The surprise attack on US Naval forces struck a crucial blow to the U.S. Pacific Naval Fleet. The home base being Pearl Harbor and with most of the fleet at the dock, the loss of American lives was quite severe.
The day after Pearl Harbor was attacked, President Roosevelt appears before congress and declared a state of war between the United States of America and Japan. The US contribution to the successful Allied war span for four long years and cost half a million American lives in the process.
Much of the Pacific fleet was rendered useless: Five of eight battleships, three destroyers, and seven other ships were sunk or severely damaged, and more than 200 aircraft were destroyed. A total of 2,400 Americans were killed and 1,200 were wounded, many while valiantly attempting to repulse the attack. Japan’s losses were some 30 planes, five midget submarines, and fewer than 100 men.
-Retrieved from http://www.history.com/this-day-in-history/pearl-harbor-bombed
LabTech is the industry-leading IT automation software designed to allow your IT company to automate any IT task you or your company may require. While the program is wonderful and robust as can possibly be (Labtech can do anything you can do and more), however, it does require constant administration. That is where we step in. Mathews IT Services is well trained in Labtech and we are willing to share our knowledge with you. We offer managed LabTech services that allow you to support your client’s needs, while we take care of the daunting task of babysitting your LabTech server. As LabTech Software continues to develop the RMM tool, we develop with it. Constantly keeping up with the ever-changing times from versions 10, 10.5, and now moving into 11.
Cypress Heart and Vascular Center has begun to use Oculus Virtual Reality to help patients by reducing stress and anxiety. Doctor Fadi Alameddine, MD, F.A.C.C., F.S.C.A.I. and his staff located at 21212 Northwest Freeway, POB 2, Suite 325, Cypress, Texas 77429 have begun to use technology like no other doctors office. Cypress Heart and Vascular Center wants to ease your stress and anxiety levels during in-office procedures.