Here’s part 2 of “Sh*t Customers Say”
Continue reading this entry »
Because I work with many end users who don’t know what they’re doing, I have decided to create a compilation of the stupid things customers ask us and things they say to us. This is part one of what I hope to be many more as the IQ of customers goes down while technology gets simpler.
Photography is my #1 favorite thing to do when I’m not working or learning new things. The past few years have been full of random expeditions, adventures, and exploring the world around me. Since getting my first DSLR camera in 2007, I have made many observations. The observation I feel that is most notable is many photographers carry either too much or too little gear with them for whatever occasion. I think I have gotten what I need when I’m out down to the right amount of gear without giving me too much or too little when I’m away from home base.
Needing to upgrade software is an inconvenience as it is when it needs to be done, even more so when you need to restart your computer after installing the update. I always run into this same issue with iTunes and updating my iPhone. iTunes always wants the latest version, and I don’t want to wait for it to download, install, then save all my work, restart, reopen everything, and continue working.
In a previous blog I taught you how to install TrueCrypt on your computer and use it to encrypt your hard drive. In this blog I will teach you how to now hide the fact that you have TrueCrypt installed and take your computer’s security to the next level.
When it comes to your power bill, less power used by computers and equipment means more saving on the power bill every month. I’ll explain in this post how I built a couple personal servers that not only take much less power, but are 100% silent as a bonus feature — WITHOUT sacrificing performance.
Years ago in college I learned a very simple way to calculate subnets. I had since forgotten this method, but have recently been re-acquainted with it. This method uses the binary representation of the subnet mask to determine the number of hosts per subnet, in turn giving you the number of possible networks and host ranges.