Monday, 13 August 2018 / Published in News
Google Facial Recognition

Google Facial recognition

Google, once again, is excited about social media. But not in the ways you might think; this isn’t about another in a failed string of chat apps, or the knockout success that never was in Google Plus. Instead, it’s an entirely new way of recognizing human faces, and one made possible by — you guessed it — creeping on your social media profiles.

In a recently approved patent, Google detailed a system of “Facial Recognition with Social Network Aiding.” It’s exactly what it sounds like, an attempt to parse social connections as a way to better identify your mug.

We don’t shill.

Reverse Image Search works by attempting to match visual cues in photos with other, similar photos. It works mostly as intended, with some results being dead-on, and others complete misses. But as long as the photo is well-lit, and is of a high enough resolution, Google usually nails it.

Nailed it

Its a system that works, but could use improvement. Sometimes the results are only semi-relevant, and for those who don’t have as much data to pull from, it often overlooks matches entirely. Grab your friend Katie from middle school’s Facebook photo, for example. Chances are it only returns the Facebook account using the photo.

But the new system envisions a world where artificial intelligence would identify faces using not only visual cues, but various forms of data from personal communications, social networks, collaborative apps, and even your calendar.

It’s like this

Users enter a “visual query” in the form of a photo, screenshot or scanned image. The system would then analyze the image and look — using advanced image recognition — for others that are both visually similar, and a potential match using the data sources mentioned above.

Rather than just matching based on visual cues — Google‘s current system — the software would take additional steps to build further confidence in the person’s identity. Pulling from a number of data sources, including your hometown, age, occupation, and various others, Google would strive to be absolutely sure it returns images relevant to your query, based partially on the data it pulled from your social accounts and other collaborative apps.

Let’s attempt to wrap our head around this with a real example. Inputting an image of Amanda, from accounting, for example, should lead to relevant results with the new software due to a number of connections between you, the searcher, and her, the subject of your search. You’re connected by your employer, you’re friends on Facebook, and she routinely retweets you on Twitter. To Google, these all build confidence that Amanda’s image is indeed the one you’re looking for.

Or maybe you’d search for a childhood friend, Jeff. The same reasoning follows: you’re connected by your hometown, your high school, and an approximate age range.

Where the patent falls short is in detailing exactly how Google would use the technology. We can be fairly sure that Reverse Image Search and Google Photos would benefit. The latter, due to some wording that describes automatically sharing a group photo and tagging everyone in it.

But it’s other, less obvious use cases that could be worrisome. If Google were to bring back Glass, for example. Or if it were to reverse course and continue to provide artificial intelligence to the military. If you’re looking for a tinfoil hat example, that exists too; Google could begin feeding this data to law enforcement, like Amazon.

Rekognition, Amazon‘s feature-rich AI, provides real-time facial recognition to a handful of police departments in Orlando, Florida, and Washington County, Oregon. It’s not difficult to envision a competing product from Google.

The patent does note that in certain scenarios — scenarios Google fails to define — a person would have to opt-in to have their identify appear in these results. For now, it appears that we’re in the clear. But since this is only a patent, and not working software — to the best of our knowledge — things could change quickly.

It’s something to keep an eye on, but we certainly wouldn’t lose any sleep over it. At least not yet.

Monday, 06 August 2018 / Published in News
What is caching?

What is caching?

There are a few common problems in the IT world that you just see over-and-over again to the point that many users are quite familiar with them. Some of them are intuitive like a password lock out or a bad update where you experience a problem, your IT guys tells you what it was, and it pretty much makes sense. And then there are caching errors…

What is a Cache and Why Does My Computer Use Them?

A cache is a small section of memory or disk space reserved to in some way allow a program to run faster. If you think of your filing cabinet as your computer, it’s full of all sorts of documents that you may almost never look at, and then there are those documents like birth certificates and social security cards that you need much more often; so, you put them in a special folder at the front so you can find it quickly every time. If you do this, then you’ve created a kind of cache.

Another way caches work is to store data that’s already been processed so that you don’t have to reprocess it every time you need it. This is like keeping a copy of your completed taxes. If you have all your w2s, receipts, etc. you COULD redo your taxes from the original data if you ever had to provide a copy of them for any reason, but it is far more convenient to just hang onto that finished document. This is another kind of cache.

How do Caching Errors Happen?

So far, caching sound like some organizational no-brainer, and mostly it is, but why do they cause problems? That boils down to things changing how you don’t expect them to. If you think about the first scenario, imagine that you started taking lots of documents from everywhere else and putting them in your cache. This would eventually make your cache take just as long to look through as if everything was normally sorted; so, the thing designed to speed you up may actually slow you down. Like this, sometimes a program may start to consume large sums of memory and greatly slow down after prolonged usage because it just keeps hanging on to more and more.

The second case where you are holding processed data is especially great for speeding things up, but what happens when the information you derived your cache from changes? Maybe you filed your taxes, then realized you have an extra tax form you forgot to include. Now all those processed tax forms are no longer relevant and your taxes must be reprocessed. When this kind of caching error happens, you need to “clear your cache” which is like telling the computer to go double check the original documents and reprocess everything.

Monday, 23 July 2018 / Published in News
CSV- Computer Vision Syndrome

CSV- Computer Vision SyndromeWith the average American spending 10+ hours a day plugged in, eye health is becoming an increasing concern in our nation. Recent studies show that between 50% and 90% of people who work at a computer screen exhibit at least some negative symptoms as a result.

TVs, Computers, Cell Phones, Tablets, and other screened devices have all become such integral parts of our professional and personal daily lives that many of us would not even consider living without them at this point… but the negative impact they can have on one’s well-being should not be ignored.

Understanding CSV – Computer Vision Syndrome

Computer Vision Syndrome isn’t one specific problem. Instead, it includes a whole range of eye problems including eye soreness, headaches, blurred vision, dry eyes, and neck and shoulder pain. Likewise, there is no one cause for these symptoms.  While many people assume the issue is just THAT they are using their devices too much, experts have determined that many of these symptoms can be negated through better habits and understanding of where these issues are coming from.  If you suffer from from the above issues, try following these helpful steps:

  1. Adjust your lighting:  The high contrast between a bright screen and a darker room can create extra strain on your eyes.  A well lit room allows your pupils to dilate to the appropriate level for your monitor’s light output, or if your device offers the option, make sure to enable low-light mode and/or blue light filtering whenever you are in a more poorly lite enviornment.  This can save your battery life and your eyes.
  2. The 20-20-20 rule:  When you are working (or playing) in front of a screen for extended periods of time, take regular breaks for your eyes. It’s not hard once you get into the habit.  Every 20 minutes you spend looking at a screen, stop to look at something else that’s at least 20 feet away for at least 20 seconds. On a related note, this is not a bad time to get up and walk around, and just let all your other muscles limber up a bit as well.
  3. Purchase computer glasses They are like reading glasses specifically for computer screens.
  4. Reposition your monitor:  Monitors should be positioned 20″-30″ away whereas TVs should typically be 8-12 feet away depending on the size of your screen.  Also make sure that your eyes are on level with your screen.  The neck strain and headaches associated with CSV often comes from poor posture resulting in prolonged periods of looking either up or down with your whole head.
  5. Break up and reduce your total screen time: If your job requires you to look at a computer for eight hours a day, don’t start playing computer games the minute you get home. Spend more time outdoors, and focus on more distant, real-world subjects.

Addressing the eye health and ergonomic needs of your employees is important to the productivity of your workforce. Let one of our consultants evaluate your work-space, and help your employees develop a healthy relationship with their technological needs.

Tuesday, 10 July 2018 / Published in News

Cyber Security

Many people think of cyber security as a specialized skill set handled by that one smart guy you hire to handle it, but as the world progresses, we find that you can’t just rely on someone else to be your sole gatekeeper for your entire computer system.  As cyber-security experts have gotten better and better at making secure systems, criminals have gotten equally better at targeting the weakest link in these systems.  And in today’s world, that link is typically the end-user.

The Risk of Not Knowing Cybersecurity Best Practices

When you check your email, it is up to you to decide if and email is fraudulent before clicking on any links. When you are on the web, and you are asked to enter a credit card or other personal information, it is up to you to know if the website you are connected to is both secure and legitimate. When you download an app, you have to decide if the permissions that app is requesting are actually things the app needs or if there is an underlying trojan trying to get the privileges it needs to bypass the security features built into your device. When you get a phone call warning you of a problem, you need to decide if the person you are talking to is actually your service provider, or someone trying to get you to divulge sensitive user account info.

Not knowing how to make these choices can be disastrous.  One bad click, is all it takes to get your entire network encrypted by ransomware or install spyware that steals all your passwords.

Making IT Services and Personal Responsibility Work Together

This where your IT consulting firm comes in.  If you have not received a Cybersecurity Policy from them request one.  For most organizations, this should include:

  • Criteria for evaluating if an email, website, link, or application should be trusted.
  • Restrictions on what websites and services you may access from your work machine.
  • Restrictions on what information can be saved and transmitted under various circumstances.
  • Protocols for defining what information is confidential, and how to handle its storage and transmission.
  • Instructions for identifying security redflags
  • A policy for ensuring that employees are regularly trained on emerging security threats.

Don’t have a Cybersecurity Policy yet? Don’t settle for a one size fits all solution.  ComSolutions’s expert security analysts can review your business model and help you determine the best approach for your business and regulatory compliance.

Tuesday, 17 October 2017 / Published in News

October 16th 2017, US-CERT publicly disclosed a vulnerability at the core of the WPA-2 encryption protocol.  This vulnerability affects nearly every modern encryption configuration used for transmitting information across the internet, especially Linux and Android devices. The KRACK exploit was discovered by security researcher Mathy Vanhoef before it could be implemented for widespread misuse; however, now that this issue is public knowledge, it is extremely important for businesses to update their systems to protect against it.

How Serious is this Vulnerability?

In terms of how harmful this exploit can be, it is extremely serious:

  • It can be used to steal any encrypted information that is transmitted from or received by your computer or mobile devices.
  • It can be used to inject various forms of malware into local networks and website.
  • It affects all kinds of internet enabled devices; however, the most serious threats of injection are specific to Linux and Android.

The good news here is that a hacker needs to be within range of someone’s wifi network to implement it; so, the likelyhood of it being used against your home computer is fairly low.  The most likely candidates for this attack are big businesses and smaller businesses that handle secure information.

Due to the potential damage that this exploit could cause, we strongly urge our clients to review their local networks to ensure that all of their connected devices are properly patched.

Friday, 08 September 2017 / Published in News

Equifax revealed on Sept 7th, 2017 a data breach that compromised the personal information of 143 million users.  This breach is reported to have exposed a number of sensitive pieces of personal information including Social Security numbers, birthdays, driver’s licenses, credit card numbers, and credit dispute documents.

To find out if your information has been compromised, visit:

What to do if you’ve been compromised?

  1. Check your bank and credit card statements for suspicious charges.
    • You should make a habit of this. Many hackers wait months or even years to use your stolen information.
  2. Take an inventory of your online services that may be linked to your bank account or credit card.
    • Make sure each account is using a different password to isolate breaches if they occur.
    • Make sure you know what services you do and do not actually have so that you can better recognize fraudulent charges.
  3. Check your credit report for unexpected activity. Equifax is offering one free year of premium tracking to help users stay vigilant of issues that arise from this breach.
Thursday, 07 September 2017 / Published in News
Hurricane Evacuation for your business

Hurricane Evacuation checklist for your business

Evacuation Preparation

In light of the storms heading toward the Gulf of Mexico, ComSolutions wanted to share a few reminders to help make things a little easier when an emergency arises.

  • Please note the following.  If you are bringing your server or computer equipment with you or just want to leave it in place,  please be sure to follow proper shutdown procedures. Remember that it is never safe to power a server off without following a specific protocol. To prevent damage, there is a specific order in which your equipment should be shutdown. If you’re unaware of how to shutdown your server or equipment orderly,  CSI would be happy to assist. Please call our office at 504-224-9475 Ext 2 or email to schedule a call or an on-site appointment.
  • If you plan to work while out of town, here is a basic kit that can make working on the road easier:
    • Plastic storage bin to carry the following
    • Extension cord / surge protector
    • Network switch and RJ45 patch cables
    • Wireless router or WiFi HotSpot
    • External drive(s) or NAS unit that we have identified.
    • A list of all of your vendors, customers, and primary points of contact
    • A copy of your insurance policies, agents phone number, and your business checkbook in the event of relocation.
    • Setup an employee social media page for emergency communications
    • Call ComSolutions at 504-224-9475 Ext 2. with any questions
  • If you already have a cloud disaster-recovery plan with CSI, please call us so we can schedule a phone interview or appointment to review this. Remember to stay safe, keep us informed of your plans, and keep our contact info handy should you need any assistance.
Wednesday, 29 March 2017 / Published in News

World Backup Day 2017

March 31st is World Backup Day, but it’s important to backup more than one day per year!  Here’s why.

Data can be lost in a number of ways including:

  • Operating systems crashes
  • Data corruption
  • Hardware failures
  • Lost or stolen devices
  • Natural catastrophes including fires, flooding, etc.
  • Viruses
  • Accidental file deletion
  • Failed or incompatible upgrades, patches, or other improvements to your system
  • Deliberate sabotage by a disgruntled employee
  • April Fools Day pranks gone too far… one more reason to do backups on March 31st

Remember don’t just back your data up, have a backup plan! This means having a comprehensive strategy for dealing with all of the above.  Your backup plan should include solutions to all of the following common problems:

  • If your entire workplace is destroyed by a catastrophe, do you have an off-site copy of your data to work from?
  • Do your backups go back far enough to insure that you will have a good copy of your data, even if a virus or corruption gets saved to your most recent backup?
  • Do your backups include all of the system settings required to restore your work to a new device without having to undergo lengthy reconfiguration issues?
  • Do you have a place to restore your data and software to?




Monday, 30 January 2017 / Published in News


E911 Legislation and Compliance

As of 2017, your company or institution can be legally liable for 911 calls that fail to provide the correct location of the caller.  As of December 31, 2016, if your system does not meet these standards, you have a legal obligation to change your phone system immediately in order to avoid stiff fines and penalties ranging from $500.00 to $5,000.00 per offense.

What does E911 compliance require?

  • Calling 911 cannot require an outside access key such as having to press * to dial out (common in hotels and offices).
  • A call to 911 must relay the detailed, physical location of the phone down to the room number, floor, or office number.  Police, fire fighters, and paramedics use this exact information so they are sent to the correct location, avoiding any delay reaching the emergency.
  • If disconnected, emergency dispatchers must be able to call the phone back directly without getting an auto-attendant, answering service, call center, or remote switchboard.
  • 911 calls connect to the agency within closest proximity to the caller — not the central phone system’s location (e.g., corporate headquarters).

These safeguards are already built into our VoIP phone systems, but if you are unsure if your phone system meets these specifications, give us a call and we’ll make sure that you are covered.

Friday, 23 September 2016 / Published in News

Yesterday, Yahoo confirmed claims that 500 million user accounts were stolen as of a 2014. The data that was compromised includes names, emails, passwords, telephone numbers, and the answers to account security questions. If your account is one Yahoo suspects was compromised, you’ll be prompted to enter a new password as soon as you log on. If you use the same password on other accounts, you should change those, too.

How to Minimize Risk

While there is nothing you can do to prevent these breaches, there are a number of best practices that you can use to prevent exposure from these kinds of attacks:

  1. Pick better passwords:  When information gets stolen, the time it takes the hacker to decipher your password is directly proportionate to how common and complex of a password you are using.  Avoid common passwords and patterns such as “12345”, “qwerty” or “password” and if you use any actual words in your password, pair them with a few random letters and numbers as well.
  2. Change Passwords Often: Often times these attacks don’t become clear until well after the data is stolen, but if you change your password often, the stolen information will likely be outdated by the time the hacker tries to exploit it.
  3. Never Reuse Passwords: Just like changing your password can prevent stolen info from being used against you, reusing old passwords can re-open you to risk from old breaches.
  4. Update Security Questions:  Just like passwords, these can be stolen and used against you as well.
  5. TWO-FACTOR AUTHENTICATION: Adding a second type of authentication, like a one-time code sent over text message, can greatly secure your online accounts making them hard to get into even if your information gets stolen.

Contact us today to find out more about how to secure your company’s online accounts.