Ever wonder what happens when you agree to the end user licence agreements (or EULAs) that you must abide by to use modern technology? This past weekend, I watched a documentary that explores the chain of events you set in motion when you click things like the “Submit” button
Read more →This might be the most eye-catching blog post title I’ve ever come up with. It may also be the easiest. It’s certainly accurate. I know I’m reading at this speed because Spritz Reader tells me so.
Read more →Whenever I send people an email, chances are it either arrives in their inboxes or, in a small minority of cases, their spam filters reroute it to their spam boxes. One or the other. Emails just don’t get lost in transit. I’d expect the same thing to happen with
Read more →Even though I’ve had Apple iCloud Drive for about a year, I hadn’t bothered to use it until recently. It’s a great alternative to copying files from one device to another, which is a pain even when I can use USB memory sticks. That said, I already have a
Read more →All types of malware, from viruses to trojan horses to bots and so on, aren’t particularly mysterious. They’re merely pieces of software. They worry people since they do things to computers their owners don’t want done. Security-conscious computer users have already adopted good habits. They don’t click
Read more →Computer buyers are like drivers who need to put gas in the tank. Let me explain. There are a few “discount” gas stations near my place. They sell gas for about four cents per litre less than nearby stations. On a typical 30 litre fill-up, that works
Read more →Computer users who don’t back up their data tend to ignore this basic reality: there are only two types of hard disks. those that have failed those that will fail When they do fail, the computer’s owner experiences the frustration and anxiety that usually accompanies the loss
Read more →Do you regularly repeat certain lengthy processes in your business? For instance, do you take the same steps to deliver a certain service to a customer? If you do, you probably know what steps to take when. You might, however, forget a step or two when the process
Read more →Do you let other people use your computer? It’s a reasonable thing to do. Guests at your office might need directions to their next destination. House guests might want to check their email. That said, you might be letting them check your own email, or contact information, or calendars, or
Read more →Last week I went over my seven habits of recording interviews. Other journalists thanked me for this, and a few want to know what technology I use. I’m going to explain what I have used multiple times in a series of blog posts. Today, I’ll go over options that many journalists don’t even
Read more →