With 20+ years of experience in IT, training, and technical trades, it is my desire to share what I've learned with anyone else willing to learn. I strive to do the best job possible in the best manner possible, and with a little humour. Keep in touch: Twitter - Facebook - Google+.
Feel free to contact at firstname.lastname@example.org
Guy's Latest Posts
Microsoft is still in the innovation business. If you don’t think so, you haven’t heard about Microsoft’s open source electronics prototyping platform called Gadgeteer. You read that right – Microsoft and Open Source in the same sentence. Wanted to build a little invention you had in mind? Maybe you’re already programming C# and would like to work with some different hardware. Are you a technology teacher looking for a platform with which to teach? From the student to the professional, Gadgeteer can help you make your ideas a reality.
Need. Want. One is a four letter word and the other is a necessity. Listen up and heed this old man’s words as I get you set to go back to school, do some real learning, and save thousands of dollars by not buying into this computer fad. Look at me! I got an iPhone! Look at me! I can film my lectures! Look at me! I made a spreadsheet that does my arithmetic for me!
Did you ever get an e-mail and really wondered where it came from? Who sent it? How could they have known who you are? Surprisingly a lot of that information can be from from the e-mail header, or by using info from the email header to do some detective work. Today, we’re just going to focus on how to unhide the header in Gmail, and then look at what we can glean from the header.
Did you read our article, At What Age Should Kids Be Exposed To Technology? You should. Dave Parrack did a great job of compiling the results. Here’s the thing – kids going to introduce themselves to technology, and chances are it’s going to be when you aren’t looking! If you’ve got kids, you know that […]
Total privacy! Or so we think, as our words and information went flying through the air. Not so: First it’s word of warrantless wiretapping, then it’s word of newspapers, lawyers, insurers and more hacking your communications, who’s next? How do we stop this? Unfortunately, laws are very after the fact, so you need to take some measures right now. This is where we look at how to secure your smartphone communications to make cherry-picking your information a lot harder.
The Pebble E-Paper Watch (which we’ve just reviewed and will be giving away) has a lot of interesting functions, is highly customizable, and raised over $1 million within 28 hours of being put on Kickstarter. Maybe the Pebble isn’t exactly what you want though. Maybe you’d like a different look or functionality. Money talks, and these other smartwatch innovators are ready to listen. Some of these are concepts and some are already on the market! Which one do you want? Maybe all of them?
Kids can be cruel. Almost as cruel as so-called grown-ups. That cruelty has found its way on to the web and into the lives of countless young people who thought they might be able to escape the harassment by enjoying their on-line pursuits. It is very likely this is the story of an untold number of girls and boys the world over.
Personal privacy is the hot topic these days, at least in the news. It should also be the hot topic in your computing life, as well! What you do online and on your computer says an awful lot about you and, in the hands of the wrong people, can prove disastrous. Oh, fine, at least we have a password on our computers. But let’s say we are doing something where privacy really does matter. Imagine we had a benevolent reason to cover our tracks. On to some tools that will help us do just that!
With the Prism-Verizon scandal, what allegedly has been happening is that the United States of America’s National Security Agency (NSA) has been data mining. That is, they have been going through the call records of Verizon’s approximately 99 million users looking for, well, anything! If the thought of the occasionally overzealous government official isn’t enough reason to encrypt your smartphone, then all the identity thieves and scammers out there ought to be. Today, I’m going to show you a few things you can do to make that information a bit more secure.
Last week it was officially announced that the United States National Security Agency (NSA) has been mining data from cellular service provider, Verizon. People were, and are, freaking out! How could the government do such a thing? What kind of totalitarian state are we really in?
Possibly the biggest boost to the male ego since chest hair, GPS Satnav units have saved us from having to “pull over and ask for directions!!!” Nuh-uh sweetie-pie, I got this with my GPS. Don’t give me directions, just give me an address and I’ll be there! Oh technology, we all love you, keeper of peace […]
Can you imagine how much quicker the Civil Rights Movement of the 1950’s and 60’s would have come to a head if they had the power that we hold in our pocket? Some would say that the Civil Rights Movement is still going on, and The Arab Spring shows us that it is. Here’s how you can document the challenge and make a difference with just a smartphone, some courage, and compassion.
Since the dawn of media, the weather has sustained publishers of almanacs, sold newspapers when nothing was happening, tuned listeners into the radio, and viewers into the television news. Today, we carry all of this media in the form of our smartphones, yet something as primal as our need to know the weather is still important. Today I want to share with you two ways to get the weather, the 3D Weather widget and the AccuWeather.com widget.
With the resurgence of the Graphics Interchange Format in its animated incarnation, the HOT debate about how to pronounce that gem of an acronym has also come to the front again. There are two fighters in the ring, here. One that is coached by the man most credited with bringing the GIF to the world, Steve Wilhite and his soft-G approach. The other fighter goes by the name of Vox Populi.
Fellow reader Dado asked us, “How can I run multiple operating systems from a single USB?” This becomes practical if the different operating systems are Live CDs, i.e. designed to access a PC from outside of the computer’s own operating system. This can be handy if the native operating system is corrupted through misuse, poor maintenance, or worse, malware. There are several tools that can help you create your multiboot USB stick. We tested three of them: XBoot, MultiBootUSB, and YUMI.