This may not sound like a techy subject, but without computers and other technology, this would not have been possible. The FDA has approved the use of a “fish skin” to facilitate healing of chronic wounds. Chronic wounds are different from “regular” wounds in the way they heal, and chronic wounds are often the direct result of diabetes or other […]
New Wound Care Technology? Sounds Fishy to Me
How to Get Your System Information–and Why You Might Want To
There is a lot of stuff under the hood of your computer. Today I’m going to show you how you can find out exactly what is under the hood. Why, you ask? Well, first of all, it can come in handy when you’re talking with a tech support person over the phone. Another thing is that sometimes you may want […]
When Does One Use a Hashtag? Twitter for Beginners
If you are a Twitter user, you may not find as much value in this post as someone who is not a Twitter user. But if you’re just getting started with it, read on, you might see something useful. Twitter has been described as microblogging. I guess that’s accurate. What you’re reading here is a blog, so the 140 character […]
Can You Create a Secure Password?
Recently I told you several things that you need to know about passwords. Today I’ll give you step by step instructions on how to make a strong, secure password that will meet requirements and that you will eventually remember. Trust me, you CAN remember them. The sentence method: Open up a program on your computer that you can free-flow type […]
Microsoft is Not Calling You!
Truth: Microsoft Technicians are NOT going to call you and offer to help fix your computer. That means that anyone who calls you claiming to be a Microsoft Technician is NOT telling you the truth. There is no division within Microsoft tasked with calling users to help them fix their computers. Furthermore, there is no process within your operating system […]
How Safe is Your Password?
A reporter from Wired magazine recently got schooled in password security, which generated a lot of conversation in the tech space on keeping yourself safe in cyberspace. There is one simple thing to do to stay safe in cyberspace: stay out of it. Yeah right. That’s what I thought. So here’s the rundown: Strong passwords, different passwords, different cards, non-obvious […]
Spammers Know There’s One Born Every Minute
I remember the early days of spam emails, before there was a way to block them. There weren’t nearly as many as there are today, but we still spent a lot of time keeping our mailboxes clean. It was pretty easy to spot one, too. They were always selling something, and it was always obvious that they were selling something, […]
How I Use Evernote to Keep Track of Stuff
It has become an increasingly busy world, hasn’t it? Seems like there’s never enough time to get to everything I want to do, and remembering everything I want to remember is nearly impossible. Technology has helped, and although I still love the feel of a pencil and paper for certain things, it’s just not feasible to pull off the […]
A Post about POST
A lot happens after you push a power button, even before you see the “splash screen.” Electronic devices—computers, tablets, phones, PDA’s (remember them?), even appliances, go through a Power On Self Test, or POST. In basic terms, it is exactly what it sounds like. As the current is applied to the system board, the most basic components on the board […]
Why Does Microsoft Keep Changing Stuff?
If you know me—at all—you know that I use a lot of different forms of technology, from different providers. This gives me the foundation to be able to tell you authoritatively that it is not just Microsoft that keeps changing stuff. Let’s start by saying that, although a horse and buggy is an adequate way to get around and […]