Dymin Blog

Matt Helland

Bench Supervisor

Recent Posts

Spilled Liquid on Your Computer? There’s Still Hope!

Posted by Matt Helland on Apr 25, 2017 11:50:00 AM


We’ve all been there. You’re working on that project that needs to be done by morning.  Four cups of coffee deep, trying to stay awake, and then it happens: the coffee cup falls over and its contents run all over your computer.  What do you do?

Well, that is exactly what we will be addressing today. Taking immediate, appropriate steps can help protect your data and possibly allow you to save your machine. 
Read More

Topics: computer repair, data backup

3 Devices Commonly Misused to Backup Computer Files

Posted by Matt Helland on Jan 10, 2017 10:21:00 AM


One of the most common issues we see in the world of computer repair is failing hard drives. Unfortunately, this is an issue that is unavoidable. However, you can minimize the damage and preserve your business continuity by using a proper backup solution.

Backing up your computer means that you have a duplicate copy of all your business or personal files in a secondary location. Unfortunately, there are a lot of misconceptions on what actually constitutes a “backup device” and how to truly backup your files. This blog post will discuss three common devices that are used to back up data—specifically, why they are not as reliable as one would assume and shouldn’t be used as data backup devices.

Read More

Topics: data backup

How Do I Fix the Default Privacy Settings in Windows 10?

Posted by Matt Helland on Jun 30, 2016 2:27:10 PM


One of the most common complaints about Windows 10 is its intrusive privacy settings. With the release of the new operating system, this has become a stronger concern for a lot of home users. Windows 10 comes with several settings in place that mine a user's internet and computer usage to find personal information in order to “create a more customized computer experience.” This means a user's data is being mined to create ads directed specifically to the things he or she researches, buys, or uses on a daily basis online.

Read More

Topics: computer security