Blogs

Click on links below to jump to respective Blog summary:

President's Blog

Internet Services Directions Blog

Ramblings Blog

APCUG Blog

 

 

Assn. of PC User Groups Blog

  • Tablet PC vs. Traditional PC - Which one to buy?

    This is a really great question or contest. So, first let’s define the two contenders. We’ll consider a notebook, or laptop, as the traditional PC. (The contest between laptop and...

  • “Oh, no,” you say. Not another new version of MS Office, just when you were getting used to the or versions. Calm down. This version is both very much the same and very different from previous versions. If you’re comfortable with the...

  • If you have just upgraded your computer to Windows 8 and are disappointed at the performance, don’t blame Microsoft. The problem may be with your computer manufacturer and/or with your upgrade preparation. Here are a few tips to get you on the...

  • For two decades, Microsoft’s Windows operating system has dominated the personal computing landscape. Microsoft’s success comes from making computers easier to use, without being tied to one particular computer hardware manufacturer. But, what...

  • ...

  • Did you ever try to open a file and the computer wouldn’t let you?  Did you ever wonder what those three or four letters mean after the dot (i.e. period) in a file name?  Well, it all has to do with “file types” also known as file “formats”.  And...

  • I know, exactly, that feeling of excitement when you first turn on your new computer.  I have done it many times since my first PC back in 1982. You push the “on” button and wait for the initial screen to show up to give you that wonderful...

  • In the past, finding free Wi-Fi away from home was difficult, if not impossible. However, most of the fast food restaurants and many other locations now make Wi-Fi available. If that is true, and it is, that should be the end of my article.

    ...

  • If you are traveling this year, there is a new hacking scheme that you should be aware of. The Federal Bureau of Investigation is warning travelers to watch out for malware that comes through hotel Internet connections.

    Here’s how it works...

  • Hardly a week goes by that I do not get a call from a friend or co-worker asking for help with a computer that had been hijacked by one of the thousands of variants of a type of malware generically known...

Pages