Annoying Tech Arrogance

Well hello and welcome back to this edition of The Weekly Geek. It’s great to see you again!

Earlier this month I was touring the desert of SlowServia searching out the ancient city of Mydatastewslow. While digging at the temple of Bloatedfiles I found that a tomb raider had already been there.  While sifting through the sand, the ancient one showed up full of arrogance, praising himself to the local tribe. That was until the ancient one realized he was looking at Adonis himself. As a hush fell across the desert valley, the ancient one looked down at the sand in humble submission and quickly scurried away to perform some menial task at hand. Continue reading

Shared Calendar Programs

Howdy and welcome back to another fun and exciting adventure with The Weekly Geek!

Well, you would think I was back in college with all of the research I have been doing lately. In this weeks fun and exciting column I want to talk about the latest project I have finished, calendar sharing programs. Since a lot of my work is for businesses, many of my customers want and need a program to track each others schedules.

Over the last few months I have grabbed several programs and add-ons from the internet and run them through their paces.

My fist requirement was no spyware and this immediately eliminated over half of the contestants. My next requirement was ease of use, in which most all of the remaining programs passed. The final two requirements were system stability and use ability. If it crashed my test PC’s AND the response from the program developer took more than two business day’s, off the list they went. The usability was from a standpoint, if I downloaded a copy of your program I do accept “this feature is available only in our full version, please enter your credit card number…” WRONG, off the list with you.

Now let’s skip the other gory details and get down to the final three.
Continue reading

Antivirus use and renewals

Welcome back to another fun and exciting adventure with The Weekly Geek.

Deep in the jungles of your computer case resides the ancient temple of “hard drive” where the sacred and rarely backup treasure of “all my personal data” resides. While the special guards of the “lazy boy recliner” snooze at their post, the sneaky Professor Rattan and his sneaky virus crew are digging a tunnel (opening a port / backdoor), copying the ancient manuscripts (installing a key logger), looting the gold (using a dialer to run up your phone bill) and putting fake manuscripts (using you as a SPAM relay) in your temple. Continue reading