Logitech S150 USB Speakers with Digital Sound SSK M.2 NVME SATA SSD Enclosure Adapter, USB 3.2 Gen 2 (10 Gbps) to NVME PCI-E SATA M-Key/(B+M) Key Solid State Drive External Enclosure Aluminum Support UASP Trim for SSDs 2242/2260/2280 Samsung Electronics 870 EVO 256GB – 4TB 2.5 Inch SATA III Internal SSD (MZ-77E2T0B/AM) StarTech.com SATA to… Read More
Crawford Computer Home Services
Give yourself the gift of security Call (520) 298-1953 http://www.crawfordcomputer.com A local Tucson business for 25 years Call for your initial $120 computer cleanup, over the Internet, at your convenience. Additional Standard Rates may apply in the event of a malicious virus, hardware-related problem, or on-site service is required. For a subscription of $150 per… Read More
Casas Adobes Church
Anne Bailey, Office Manager at Casas Adobes Church, called me one day back in 2009. They had an old out-of-warranty IBM server crashing. We got that straightened out, got her network straightened out, got her PCs and printers straightened out. Anne was happy. A few years later, we upgraded to a new Dell Windows 2008… Read More
Novak Environmental
Novak Environmental, Inc. is a full service landscape architecture and land planning firm. Karen Novak Cesare has run this firm, serving clients in Arizona since 1998. NE specializes in both public works and private development projects. Karen is a busy professional. When she and her team need something, they need it now. It’s my job to be available to take… Read More
Routine Maintenance on Windows Computers
I believe in running periodic preventive maintenance on them. Here is a basic check-list for the maintenance of these computers: Check OS Drive space. Check Network type (Private, Public, Domain) & sharing. Clean up temporary disk files by running cleanmgr.exe (remove System Files as well). Delete the temporary files in %SYSTEMROOT%\TEMP and %TEMP%. Check System Restore:… Read More
What To Do With Malware
What is Malware and where does it come from? Malware is any software you may end up with that disrupts your computer or gains access to private information. There are lots of technical classifications – virus, worm, trojan horse, ransomware, spyware, adware, scareware, etc. I see them as two main types: malicious – hidden and/or resistant to removal;… Read More
Baseball Scorecard
Introduction I originally developed this program as a simple way to count pitches, balls, strikes and outs, keeping score on the sidelines of Little League games. After awhile, even the “official” score keeper often turned to me for confirmation. I had fun doing it. So I am publishing this for others to try out. You… Read More
MatchControl Shooting Match Scoring Program
Introduction I originally developed this program as a way to score Scholastic Action Shooting Program (SASP) matches. After a while, I modified it to apply to any shooting match that employed the same format – squads of athletes shooting 5 strings at stages of steel targets. I had fun doing it. So I am publishing this… Read More