Home Backup Plan?
Go share your backup plans, experiences, and recommendations on the Friends in Tech blog.
Follow these topics: FriendsinTech, Tech
Go share your backup plans, experiences, and recommendations on the Friends in Tech blog.
Follow these topics: FriendsinTech, Tech
Yes, it’s true, work upgraded from my junky old T-mobile 7730, to a brand new Verizon 8830 -Curve. It’s going to take some getting used to, I’ve had it for 5 hours and am still reflexively reaching for the trackwheel when I pick it up instead of using the trackball at the center, and even…
The simple solution, of course, is to not click links. Type in the address of your bank or anywhere you plan to make a financial transaction. “We are all familiar with the Latin alphabet, and with the fact that some characters sometimes appear with various diacritical marks above them (e.g., á and ñ), especially in…
If the news today that you will no longer be able to post updates to LinkedIn automatically from twitter has you bummed out, take a look at If This Then That. Ifttt.com I know many of my readers have seen it before, but if you haven’t, seriously go sign up and “put the Internet to…
From time to time I find myself needing to use the Robocopy utility to copy data and retain all of the metadata from the files I’m copying. It’s actually quite a nice utility, not only does it maintain the metadata you tell it to, it also is a way more robust and speedy way to…
Ran across this idea from a local Blogger/Tweeter, @wyliemac, and I think it has some real intriguing possibility. I’ve often seen local events that I might want to help out, but because of other commitments I couldn’t volunteer, or attend, and even the lowest sponsorship levels are out of the question for an individual, so…
Sarah Anderson lays out one area where being a “know-it-all” is actually pretty dangerous. Unfortunately, many cybersecurity professionals either refuse or fail to accept the basic premise that he/she does not and cannot know everything. This failure or refusal is dangerous as cybersecurity requires a constant education and re-education from uncommon sources – news, Twitter,…
See a sample before subscribing here