How to Use Your HP Thin Client as a Music Jukebox.
So, you want a jukebox for your home or business. You have, or are thinking about getting, a HP Thin Client. Perfect! In this article, I will give you …
Continue ReadingSo, you want a jukebox for your home or business. You have, or are thinking about getting, a HP Thin Client. Perfect! In this article, I will give you …
Continue ReadingApple are rolling out iCloud for their Macs and iOS devices, but what if you have an iPhone and a Linux computer? iCloud isn’t available to …
Continue ReadingThere are plenty of Twitter clients for Windows, but the ones that truly shine offer plenty of customizable options and a simple, uncluttered user …
Continue ReadingUsing VBA in your Access databases can greatly increase the number of ways to control and present your data. In this article, we’ll take a look …
Continue ReadingWorried that your kids or employees might kill your system by accidentally downloading harmful software? Maybe you’d just rather see them …
Continue ReadingThere are a lot of calendar apps out there for the iPhone, iPad, and iPod touch, but one thing not all of them have is the ability to write using …
Continue ReadingWith the initial release of iOS for the iPhone back in 2007, Apple omitted support for Java virtual machine, a system for hosting platform-independent …
Continue ReadingHave you got a number of computers that you need similarly configured? Are you operating on a timeline and don’t have the time to install …
Continue ReadingLong popular on the Mac, Scrivener is now being released on the PC. Find out whether this unique writing software is right for you.
Continue ReadingRather than lugging around cases and folders full of sheet music you can view them as PDFs with a music viewing app. Some of these are now available …
Continue ReadingGoogle has its share of bad privacy headlines. Concerns about Google Street View, Gmail, Buzz and Plus are a few reasons some users don’t trust …
Continue ReadingGilisoft Privacy Protector is a useful app that helps the user to protect and hide data on their computer and also offers secure deletion tools. Here …
Continue Reading