Using the Safety Apps on Your Mobile Phone

This post is for your information and safety. You may be surprised by how easy it is to set-up your “In Case of Emergency” – ICE contacts on your mobile phones. This critical information could possibly save your life or get you expedited help on your way to the hospital. For example, in the free apps on your mobile phone, you can provide your blood type. In addition, it helps emergency personnel know whom to contact on your behalf in the event of an emergency.

When you have a moment, listen to my podcast on why you may want to consider using these free apps, which are available on your mobile phone. Then use the support links below to read and use the guidelines setting up your emergency contact information.

This podcast is available on Apple podcast, Google podcast, and other platforms of your choice. 
Just click this link to select:

https://anchor.fm/judith-guerra7.

Find detailed information and resources about emergency cell phone apps at the Medical Alert Advice website by clicking the 911 icon.

Android users can find assistance with filling out the Medical ID information using the links below.

 android-app—medical-id-instructions.pdf (jointcommission.org)

https://medicalid.app/

Apple has various ways to use emergency features on the iPhone. Click the link below to learn more and to setup your medical ID on the Apple phone using the Health App.
https://support.apple.com/en-us/HT207021

Sources:
https://www.pcmag.com/how-to/how-to-add-emergency-info-to-your-phones-lock-screen
https://freeappsforme.com/medical-id-apps/
bSafe – Never Walk Alone on the App Store (apple.com)

Smartphone Security Apps

mobile securityMore and more these days smartphones have become our way to conduct personal business. Passwords are keyed into these devices to purchase items, conduct bank business, and order lunch.  Credit card information is stored. It’s a convenient way to get things done not just quickly, but also expeditiously.

We also rely on these devices to be a safe way for conducting all manner of other business.  So, the question is what have you done lately to make sure that your mobile device is protected from hackers? Continue reading

Job APPS Savvy

mobile productivityThere is no longer any doubt that in today’s world often we use technology to help us with our lives. As a matter of fact, JOB HUNTING is no longer done in the old-fashioned way, and I don’t mean newspapers. I’m sure most of you are familiar with the on-line application process.  Making your way through the many application requirements, and then hoping that you will be among the very lucky prospective candidates to get a response can be frustrating, to say the least. Continue reading

Brrrr It’s Cold…Protect Your Cell Phone !

 

 

Photo  Jarobin Guerra Gilbert

Photo
Jarobin Guerra Gilbert

Prevent phone freeze

 To keep phones from getting too chilly, don’t leave them alone in the elements, like in a parked car. Stashing your phone inside pockets closest to your person, where they can absorb some of your body heat, is best.  If you do need to leave it behind, turn the phone off instead of just putting it to sleep. Continue reading

Privacy On-line.. Should We Surrender?

surrender privacyHow many of you are wondering if your attempts to control your privacy on-line is probably going to be one of the most challenging tasks before you?

In recent weeks there have been so many news articles headlining breaches in security safety for people as well as for government information!  Just when we think we have it under control they pull us right back in with stories that suggest there is no sure-fire way to secure our information.  How can we not feel vulnerable?

So are you planning to surrender?

eyespy

For those of you who believe you want to continue the challenge of protecting your digital identity, below are some guidelines that have been suggested from various professionals.  As always, click the link provided at the end of the summary for a more detailed description.

  1. Use Adblock Plus:  Adblock Plus (ABP) is an open-source content-filtering and ad blocking extension for Mozilla Firefox (including Firefox for mobile, Google Chrome and Opera web browsers. In November 2012, Adblock Plus was also released as an app for Android devices. ABP, a forked version of Adblock, allows users to prevent page elements, such as advertisements, from being downloaded and displayed. via Adblock Plus – Wikipedia, the free encyclopedia.
  2. Adblock is free:  Click this link to learn more: Adblock Plus – Surf the web without annoying ads!.
  3. Use Ghost E-Mail: Create various e-mail addresses. Companies often share your email address. Using the same email address across various sites may allow companies to connect those address with your identity. When using sign-up forms it may be wise to withhold some of your personal information.
  4. Use a “dumb phone:  Low tech phones can only make calls and send text messages. Smartphones are designed to track everything you are doing on the Internet. You can use this link to check what services are available for this type of equipment. http://www.engadget.com/2013/04/12/verizon-new-prepaid-basic-plan/
  5. Use Multiple Browsers:  Google Chrome, Apple Safari, Mozilla Firefox. Use one browser for email, one for social networking, and another one for general browsing.
  6. Pay Cash.  All credit cards leave digital trails and are used for tracking purposes.  Pay cash for items you want to keep private (such as, health items).  Pay cash for alcohol, cigarettes and other personal items.   via Ways to Make Your Online Tracks Harder to Follow – NYTimes.com.

Twitter Privacy

twitter_mannersTwitter users will want to read this post about Online Privacy Settings, by Susan Wright-Boucher in Communications, Social Media .  Click the link for details.  3 Steps to Better Online Privacy on Twitter | Susan Wright-Boucher.

I hope this is helpful!  🙂

Keeping up with tech news…

iPhone/iPad

 ♦ Periodically tech4boomers highlights articles that have tips, tricks and useful information.  This week we want to call your attention to an article by Katherine Boehret, of the Wall Street Journal, which covers iPhone and iPad things you should get to know. Don’t forget to click the link provided for the details.  A sample of what she covers is: how to directly access apps, how to Tap to scroll up, keyboard shortcuts, how to take screenshots, how to swipe search.  In all she covers ten things you will want to know.  Click this link for the article: via Ten Tips and Tricks Every iPhone and iPad User Should Know – WSJ.com.

———————————

Choosing Computer Monitors

The next article we think you will want to read is by Kate Murphy at the New York Times, Personal Tech section.  This article covers what you should consider when buying a computer monitor.  Since we spend sooo much time these days looking at computer screens, it’s important to know why you choose one monitor versus another, and how important  the specs are. Ms. Murphy explains resolution, and how the picture elements (pixels) are supposed to give a sharper picture quality.  However, that may be true only up to a point.  Murphy checks with a retinal neuroscientist for his opinion.  In addition, contrast ratio is explained. But, after all of this discussion it turns out “Response time is the first thing to look at”. Ergonomics play an important role when choosing a monitor. How monitor ergonomics affects eye, back, and neck strain is also reviewed. All said, this is an important article.  Read more by clicking this link: via Things to Consider When Buying a Monitor – NYTimes.com.

I hope this is helpful 🙂

Find it …Keep it?

How many of us have experienced the loss of an unreturned phone?  Recently,  I was wondering what goes through any person’s mind who finds a phone belonging to someone else, and decides to keep it, or sell it.  What are their thoughts about keeping something that is clearly an important personal item of someone else?  Is it that they relate to the ancient Roman law, Finders, Keepers?

Finders, keepers is the adage with the premise that when something is unowned or abandoned, whoever finds it can claim it. This idiom relates to an ancient Roman law of similar meaning and has been expressed in various ways over the centuries..via Finders, keepers – Wikipedia, the free encyclopedia.

Have you ever had the opportunity to return something of value to someone else?  What makes a person do his/her best to return an item to the owner? Is it moral conviction/training value within a person?

Honesty refers to a facet of moral character and denotes positive, virtuous attributes such as integrity, truthfulness, and straightforwardness along with the absence of lying, cheating, or theft. “Honesty is the best policy.” — William Shakespeare, Mark Twain, Steve Landesberg and Tony Farrugia. all said this saying.via Honesty – Wikipedia, the free encyclopedia

The next time you find yourself in this situation, below are some guidelines and links to websites for details on what you can do if you believe that “honesty is the best policy”

If you find a locked iPhone

Since you can’t unlock the phone, you can’t poke around… But you do have options.

  • The first is to hold down the Home button for a few seconds, which may—depending on the owner’s phone settings—trigger either Siri or Voice Control. In either case, when prompted by the beep, say, “Call ICE.” If the phone’s owner has an ICE contact as described above, the phone will either start calling that person right away or ask you to clarify which number to call (as in, Home, Mobile, Work, etc). If you luck out and connect with the emergency contact, you can explain the situation to that person.via What to do if you find a lost iPhone | Macworld.

Call the police

  • You can also turn to your local police department. Manalapan, N.J., police officer Joe Felicia told Macworld that after you turn a found phone into the police, “if the owner responds to the police station and can identify the phone, the police department will return the phone to the owner. If not, the phone will go in a bin with hundreds of other phones.”

Felicia said that he sees “no problems” with trying to search the phone to locate the owner, if “it is being done in good faith.” The one catch: “If you are searching the phone and you stumble onto something that is obviously illegal… the phone would go directly to the police.”via What to do if you find a lost iPhone | Macworld.

Find the owner of a lost cell phone

  • Power the phone off. This can be done by holding down the power button on the phone. The power button is usually on the right side of the phone, toward the bottom. On some phones the power button is highlighted in red..
  • Turn the phone back on by pressing the power button again. You may need to hold the button for a second for it to power back on..
  • Watch the screen to discover the service provider. Once you know the service provider, contact the company’s customer support phone number. Many phone companies’ websites have “Contact Us” sections where you can find this number…
  • Answer questions from the representative the best you can. The agent may ask for the phone’s serial number and the type and style of the phone. If you are not sure of these answers, the support agent can help you locate information. The information you provide should be able to give the agent the information he needs to find the owner.
  • You may be asked to bring the phone to a local store or mail the phone back with a prepaid envelope the company sends you. via How to Locate Cell Phone Owners | eHow.com.

I hope this is helpful 🙂

Green Wi Fi in New York

Who doesn’t remember the mild-mannered avatar Clark Kent using the iconic telephone booths to change into Superman, and then flying off to ‘protect’ Metropolis !  Those were the good old days!

Well let’s Flash Forward to our Metropolis, New York City, where the telephone booth will now be used to enhance the lives of its citizens by providing Free Wi-Fi… Read on…

Let’s review what Wi-Fi is againWi-Fi internet is a way of accessing the internet using a wireless network through an wireless access point. This replaces the traditional use of using a networking cable to access the internet. Read More »via Ask.com – What’s Your Question?.

 New Yorkers and visitors are now able to connect free-of-charge using their smartphones, tablets, and other WiFi-enabled devices. Access is currently available at 10 locations, with additional hotspots to follow in the coming months.  via NYC Digital – News.

The wireless signal of the pay phone booths will span an 100 to 200 foot radius and the network will appear as “Free WiFi” or “NYC Free Public WiFi” on phones, laptops, tablets, and other WiFi devices.

 The network isn’t password protected, but when you launch your browser, you will be required to agree to terms and conditions before surfing the web. Read More via New York City Pay Phone Booths Now Free WiFi Hotspots – ABC News.

LOCATIONS:  Manhattan 402 West Broadway (at Spring Street); 458 Seventh Avenue (at 35th Street); 410 Madison Avenue (at 48th Street); 1609 Broadway (at 49th Street); 1790 Broadway (at 58th Street); 230 West 95th Street (at Broadway).Brooklyn 545 Albee Square; 2 Smith Street (both at the Fulton Street Mall).Queens 30-94 Steinway Street (at 31st Avenue). Read More via City Begins Wi-Fi Pilot Program in 10 Phone Booths – NYTimes.com.

Click for Maps:  via City of New York – NYC Public WiFi Hotspots – foursquare.

HOW TO USE PHONE BOOTH Wi-Fi

Look for a phone booth that says WiFi or Free WiFi labelled on it.

Stand within 200 feet of the WiFi-enabled phone booth.

On your phone or laptop, connect to either of the wireless networks, “Free WiFi” or “NYC Free Public WiFi.”

Upon launching your browser, agree to the terms and conditions.

Go on the Internet, email, stream, or do anything else Internet-related.

For more details click link: via NYC phone booths will be free WiFi Hotspots – How to connect to NYC WiFi phone booth? — New York Computer Help Blog.

I hope this is helpful 🙂

Phone Security

Everywhere lately I am reading about how to protect one’s identity from phone loss or theft.  In recent weeks it is even more so.  This topic is without doubt something we all need to be aware of, and should do  something about.  Are you at risk of putting your identity in jeopardy because you have not taken the steps to add restrictions on your phone?

What are your risks today?  Have you ever lost your phone?  Do you think security on your device is important?  Don’t think so ? Below is a small part of an article that appeared in the New York Times recently.  I urge you to click on the link after the brief summary to get the full story.

Chuck Bokath would be terrifying if he were not such a nice guy. A jovial senior engineer at the Georgia Tech Research Institute in Atlanta, Mr. Bokath can hack into your cellphone just by dialing the number. He can remotely listen to your calls, read your text messages, snap pictures with your phone’s camera and track your movements around town — not to mention access the password to your online bank account. via Protecting a Cellphone Against Hackers – NYTimes.com.

Enough said?  Below are  recommendations  on how to begin protecting yourself from compromising the safety of your personal information.  In the New York Times article one of the smartphone security companies  mentioned is Lookout, Inc.  Check out the information below and get started with protecting your cyber identity.  🙂

Award-Winning Security That’s Easy to Use Your smartphone is vital to your work and everyday life. Lookout provides award-winning security to protect you from viruses, malware and spyware, the ability to backup and restore your data, and tools to help locate lost or stolen phones. Lookout’s unique cross-platform, cloud-connected applications are designed to be lightweight and efficient while delivering the best protection possible. via Smartphone Security | Mobile Device Security for Smartphones.

Apple iPhone and iPad users can checkout the 2 links below

Protecting and Recovering Your iPhone and iPad from Loss and Theft | Security Generation.

Frequently Asked Questions About Find My iPhone (and iPad) | Security Generation.

♦  Android phone users may want to check out how to protect their phones with Norton’s beta app

Norton Mobile Security Android security appSmartphones hold a lot of valuable data: Text messages, e-mail, and even credit card numbers can reside on the device, where they’re easily accessed. If you lose your phone, you run the risk of having your identity stolen. Sure, you can set up a lock pattern, but we have seen such measures circumvented in the past.

Symantec’s Norton Mobile Security (beta) allows you to remotely lock and wipe your phone by text message, so that whoever finds it can’t immediately go on a shopping spree in the Android Market with your money. You can even lock down the SIM card so that a thief can’t swap it out to another phone. Beyond that, Norton permits you to block calls and text messages, as well as to scan your phone for malware. Although the program is still in beta until the end of the year, Norton Mobile Security is a superb choice for anyone who wants complete cell phone protection. via Protect Your Android Phone With Security Apps | PCWorld.

I hope this is helpful 🙂


ACKNOWLEDGEMENT

I cannot write my post today before I acknowledge the recent reports about the manufacturing of Apple products in China.  Even more to the point,  I do not think that any one of the many Apple customers in the United States was not troubled by the report of how these products, we’ve come to love and use, are being made for our use and entertainment.

Human cost does matter.  In this country where we live to enjoy all sorts of labor laws to protect the human cost value from capitalism, we cannot close our minds and eyes to this recent, startling revelation.  We should further evaluate and listen, but we cannot ignore what is alleged.

In 1904 the National Child Labor Committee began its mission of advocating for child labor laws in the United States.  That was one hundred eight years ago. That’s only one issue.

Surely, as citizens, parents and ultimately as consumers of the products, which Apple and other companies either manufacture, or contract with others to manufacture, we will be vigilantly watching for what plans and solutions to this multi-headed hydra are proposed and implemented.  The news is disturbing; the answer is probably not simple.

There is clearly more to come on this subject.