John Beagle

People, Places and Things

Rentacomputer.com Celebrates 20 Years in the Computer Rental Business

Cincinnati, Oh -This year, Rentacomputer.com Celebrates 20 Years in the Computer Rental Business

From 1987 to 2007, Rent-A-Computer, renamed Rentacomputer.com, is a computer rental company that has evolved with the personal computer industry.

“In 1987, the first computer we rented was the IBM XT, a 8088 processor with 20mB Hard Drive. We upgraded it with a graphics card and green screen monitor. We also rented the IBM AT with a 80286 processor. Our first Apple product was a Mac Plus. And our first laser printer rental was the HP LJ Series II.” said Rose Morgan, co-founder with John Beagle.

In 1997, Rentacomputer.com was one of the first rental companies on the internet. Rent-A-Computer created its first website, Rentacomputer.com more than 10 years ago. In 1998, Rentacomputer.com helped co-found a computer rental industry trade association which became the National Computer Rental Association (NCRA). “Three years ago, the NCRA changed its name to the IT-RA, the International Technology Rental Association to better reflect the international membership of the organization as well as the focus toward technology rentals in general rather than computer rentals specifically.

It was the internet that fueled our growth. The internet provided a conduit which allowed us find local computer service talent in over 1000 cities worldwide. Everyday, Tech Travel Agents from Rentacomputer.com work with the best ‘local’ computer service and av equipment installers in the business.

Rentacomputer.com’s experience in the computer rental business combined with a vast global network of high quality technology installers ensures high quality installations every time, everywhere.

Tech Travel Agents have more options that other ‘national’ rental companies can provide. For example, in all major cities we have multiple technology installer solutions. That means we always can get the technology you need installed for your corporate event on time, when you need it, at a price no one can match. All from one vendor! One Tech Travel Agent is the only contact you need for your technology rentals in 2007.

Featured products include 42” Plasma Rentals for Tradeshows, Conferences and Corporate events. Also wireless devices including wi-fi laptops and complete internet connected 802.11 wireless networks, projectors, and av multimedia equipment. New technologies available include the new dual core computer rentals in both desktop and laptop computer forms as well as the latest Apple Dual Core products too!

Rentacomputer.com has always been on the cutting edge with products for the best image projection at any corporate event. “You need to look as professional as the next guy. Better yet, you want to look better. That’s why we choose Rentacomputer.com for all our Projector and Plasma rentals,” Mark S. from a nationwide wireless company. (Name withheld for confidentiality)

“We are currently looking at adding the 103″ Plasma rental display to our inventory, just to stay one step ahead of the competition.” said Bill Schiering, VP Marketing, Rentacomputer.com.

In addition to plasma displays, Rentacomputer.com rents LCD 2000-6000 Lumen Projectors, complete sound systems and internet cafes for conventions, conferences and trade shows.

Today, Rentacomputer.com assists all sized companies, governments and educational facilities in the United States, Canada and the United Kingdom with state-of-the-art computer and audio visual (AV) technology rentals.

Major manufactures represented in the rental product line include: Dell, IBM, Apple, HP, Hewlett Packard, Gateway, Sony, NEC, Toshiba, PDP, Samsung, Panasonic, Philips, GDV, Tatung, BenQ, Lavalier, LG Electronics, Hitachi, ViewSonic, Sharp, Lightware, Sony, Sampo, Proxima, and InFocus.Fast response to inquires from phone, fax or web requests and same day service is the key to the success of the computer rental firm. Quantities supported are from 1 to 500 computers, projectors, printers, network devices delivered as soon as today or tomorrow.

Rental periods are hourly, daily, weekly, monthly, quarterly and annually.

Contact a Tech Travel Agent at http://www.rentacomputer.com/ , email rentals@Rentacomputer.com or call toll free 800-736-8772. For more information on Tech Travel Agent Services visit http://www.techtravelagent.com/

List of Email Confidentiality Notices

Here is a list of email confidentiality notices I have used over the last 10 years.

The use of a confidentiality notice at the end of an e-mail is is a good idea. But only on emails that contain confidential or sensitive information. I have titled each of these disclaimers. Just cut and paste, to your signature tool, use title for easy reference. These are a bit redundant, but pick your favorite!

Title: Important Notice

IMPORTANT NOTICE: This email is confidential, may be legally privileged, and is for the intended recipient only. Access, disclosure, copying, distribution, or reliance on any of it by anyone else is prohibited and may be a criminal of offence. Please delete if obtained in error and email confirmation to the sender.

Title: Legal Disclaimer

DISCLAIMER: This e-mail contains proprietary information some of which may be legally privileged. It is for the intended recipient only. If an addressing or transmission error has misdirected this e-mail, please notify the author by replying to it. If you are not the intended recipient you may not use, disclose, distribute, copy, print or rely on this e-mail.

Title: Confidential Responsibility

The contents of this e-mail are confidential to the addressee and are intended solely for the recipients use. If you are not the addressee, you have received this e-mail in error. Any disclosure, copying, distribution or action taken in reliance on it is prohibited and may be unlawful. Please note that any opinions expressed in this e-mail are those of the author personally and not your business name who do not accept responsibility for the contents of the message.

Title: Confidential and Privileged

The information transmitted is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited. If you receive this in error, please contact the sender and delete the material from any computer.

Title: Private and Confidential

This e-mail and any files transmitted with it are private and confidential and are solely for the use of the addressee. It may contain material which is legally privileged. If you are not the addressee or the person responsible for delivering to the addressee, be advised that you have received this e-mail in error and that any use of it is strictly prohibited.

Title: Strictly Confidential

This electronic transmission is strictly confidential and intended solely for the addressee. If you are not the intended addressee, you must not disclose, copy or take any action in reliance of this transmission. If you have received this transmission in error it would be helpful if you could notify Your company name as soon as possible.

Title: Disclaimer

DISCLAIMER: This e-mail contains proprietary information some of which may be legally privileged. It is for the intended recipient only. If an addressing or transmission error has misdirected this e-mail, please notify the author by replying to it. If you are not the intended recipient you may not use, disclose, distribute, copy, print or rely on this e-mail.

Title: Message not Secure

Internet communications are not secure and therefore the sender does not accept legal responsibility for the contents of this message. The information transmitted is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited.

Title: Important and Confidential

IMPORTANT – this e-mail and the information that it contains may be confidential, legally privileged and protected by law. Access by the intended recipient only is authorized. Any liability (in negligence or otherwise) arising from any third party acting, or refraining from acting, on any information contained in this e-mail is hereby excluded. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Copyright in this e-mail and attachments created by us belongs to Your company name: the author also asserts the right to be identified as such and object to any misuse.

Title: Transmission Confidential

This e-mail and any files transmitted with it are private and confidential and are solely for the use of the addressee. It may contain material which is legally privileged. If you are not the addressee or the person responsible for delivering to the addressee, be advised that you have received this e-mail in error and that any use of it is strictly prohibited.

Title: Electronic Transmission

This electronic transmission is strictly confidential and intended solely for the addressee. If you are not the intended addressee, you must not disclose, copy or take any action in reliance of this transmission. If you have received this transmission in error it would be helpful if you could notify Your company name and contact as soon as possible.

Failed DOS Attack on Icann and US Defense Servers

Last night a Denial of Service or DOS attack considered the most significant attack since 2002 on the computers that direct traffic on the internet, failed to result in any significant loss of service to internet users.

DOS attacks attempt to overwhelm internet root servers with requests and information, which can slow down the network response. The attacks began last night and lasted approximately 12 hours.

The attack was believed to be from Asia. Thirteen internet ‘root’ servers that serve as the internet’s central address books were only slightly affected.

“It was a significant and concerted attack, but the average internet user would have barely noticed,” said Paul Levins, Icann Corporation VP of Corporate Affairs. Icann is the internet company that assigns IP names and numbers. “Ironically, the system gets stronger and better because of the attacks as we’re constantly upgrading the
technology,” Mr. Levins said.

The two servers targeted are operated by the US Defense Department and by Icann. The US homeland security department confirmed it was monitoring unusual volumes of internet traffic.

“There is no credible intelligence to suggest an imminent threat to the homeland or our computing systems at this time,” said an unnamed US defense department spokesperson said in a statement.

“… there was very little impact on the general public, the servers were able to hold up against the attacks. The internet in general was designed to even withstand a nuclear attack,” Zully Ramzan, a researcher at Symantec, told CNET News.com.

Sources: Paul Levins, Iccan; Mark Tran, Guardian Unlimited; Zully Ramzan, Symantec; Unnamed source at US Defense Department, CNET News

Gates to Jobs: I’m a PC and you’re an Idiot!

Bill Gates doesn’t see any humor in Apple’s “Mac vs. PC” ads. Gates came up short calling Jobs an idiot directly, but in a recent interview he expressed his opinions on the subject.

5 Points Expressed about the lunacy of Apple advertising strategy (from a recent Newsweek Interview):

Point 1″.. over 90 percent of the (population) use Windows PCs..”
Point 2: “.. [Windows Users don’t] think of themselves as dullards…”
Point 3 : “[Windows users] are not the kind of klutzes that somebody [Jobs] is trying to say they are”
Point 4: Gates also took shot at the Vista upgrade ad featuring PC getting major surgery. “Well, certainly we’ve done a better job letting you upgrade on the hardware than our competitors [read: Mac OS, Linux] have done. You can choose to buy a new machine, or you can choose to do an upgrade.”
Point 5: Vista has better security than the Mac Os. “Nowadays, security guys break the Mac every single day. Every single day, they come out with a total exploit, your Apple Mac machine can be taken over totally.”

Perhaps Window and Macs should play nice and advertise like Coke and Pepsi.