pacc talk - association of personal computer user groupspacc.apcug.org/pacctalk/pt03-15.pdf · ·...
TRANSCRIPT
1
MEETING SCHEDULE Sunday, March 15, 2015
Official Newsletter of the Pittsburgh Area Computer Club
PACC TALK March 15, 2015
What is inside....
FreeFileSync,
MediaPortal, PeaZip
PAGE # 1
PAGE # 2
Strolling Down Memory (Core) Lane
Museums and online resources help preserve compu-
ting history …….. by Gabe Goldberg
PAGE # 3
My Office for iPad
Author: Paul McFedries … Review by Mary Ruth
PAGE # 4
Computer Problems Plague Everyone, Even Me
……. by Sandy Berger
PAGE # 5
“Free Speech” on the Internet, and More
…… by Diane Fahlbusch
PAGE # 6
Safe Travels. A proof-of-concept project lets you
boldly go where you’ve never been before.
….... by Gabe Goldberg
PAGE # 7
Easy Basic Backups ….……. by Jim Cerny PAGE # 8
Book Review: Galaxy S4 - The Missing Manual
…. by Steve Costello
PAGE # 9
edX Linux Course …… by Cal Esneault PAGE # 10
From the President’s ..and …... Editors Desk PAGE # 10
11:00 -11:25 am
ROOM # 311
Sign In, Pay Dues, Greet visitors, Purchase 50/50
tickets (Optional), Setup Computers,
Connect to Internet , Prep for Meetings
11:00 - 11:25 pm
ROOM # 301
PACC BOD Meeting
11:35 - 12:00 pm Windows New Users
12:00 - 12:30 pm
ROOM # 301
General Meeting, Raffle.
12:35 - 2:30pm
ROOM # 301 FreeFieSync (pg. 1)
MediPortal, PeaZip (pg. 2)
2:35 - 3:30 pm
ROOM # 301
More programs and utilities …...
2:05 - 3:30 pm
ROOM # 311
Hardware SIG
Users Helping Users - guests included
1:00 - 3:30 pm
ROOM # 311
Linux SIG, Members Helping Members,
Computer troubleshooting, Info Exchange
3:30 - 4:00 pm Pack Up Equipment, Doors Close
The bestselling book on Windows,
now updated for the
new 8.1 features Microsoft has fine-tuned Windows 8 with
some important new features, and veteran
author Andy Rathbone explains every one in
this all-new edAAition of a long-time bestsell-
er. Whether you're using Windows for the first
time, upgrading from an older version, or just moving from Windows 8 to 8.1, here's what
you need to know. Learn about the dual inter-
faces, the new Start button, how to customize the interface and boot operations, and more…!
WINDOWS SIG FreeFileSync
“FreeFileSync is a free Open Source software that helps you synchro-
nize files and synchronize folders for Windows, Linux and Mac OS X.
It is designed to save your time setting up and running backup jobs
while having nice visual feedback along the way. “
“Detect moved and renamed files and folders
Copy locked files (Volume Shadow Copy Service)
Detect conflicts and propagate deletions
Binary file comparison
Configure handling of Symbolic Links
Automate sync as a batch job
Process multiple folder pairs
Comprehensive and detailed error reporting
Copy NTFS security permissions
Copy NTFS extended attributes (compressed, encrypted, sparse)
Copy HFS+ extended attributes and ACLs
Support long file paths with more than 260 characters
(Continued on page 2)
2
Fail-safe file copy
Cross-platform: Windows, Linux, Mac OS X
Expand environment variables like %UserProfile%
Access variable drive letters by volume name (USB sticks)
Native 64-bit support
Keep versions of deleted/updated files
Prevent disc space bottlenecks via optimal sync sequence
Full Unicode support
Highly optimized runtime performance
Include/exclude files via filter
FreeFileSync portable and local installation available
Handle daylight saving time changes on FAT/FAT32
Use macros %time%, %date%, et al. for recurring backups
Case-sensitive synchronization
Built-in locking: serialize multiple jobs running against the same net-
work share”
Download from the file from: http://www.freefilesync.org/index.php
File size only 12,357 KB. It is sweet!
MediaPortal - from the web site:
“MediaPortal turns your PC into a very advanced MediaCenter / HTPC.
It allows you to listen to your favorite music & radio, watch and store
your videos and DVDs, view, schedule and record live TV as a digital
video recorder and much much more“.
File size: 98,5 MB
Download it from here:
http://www.team-mediaportal.com/mediaportal-download
“MediaPortal transforms your PC in to a complete media solution where
you can:
Watch, schedule and record live TV - like a TiVo, but better. Play vide-
os, movies, DVDs and Blu-ray discs. Listen to music and radio. Enjoy
pictures, home videos or create a slideshow. Stream media, radio and
TV to any HTPC / PC connected to your network. Use a remote to
control your HTPC from your couch. Access MediaPortal from the
web or mobile device. Check the weather, news, RSS feeds, and more.
All in the comfort of your living room, on your big screen LCD or Plas-
ma TV or projector. And that's only the basics. MediaPortal runs on
very simple hardware, connects directly to your TV and displays your
TV Series, Movies and Music in a much more dynamic way...
Want to record the entire series of your favourite soap? No problem!
Want to know which other movies that lovely young actor is in?
You bet! Want to listen to every track by your favourite artist in your
collection regardless of the album?
Easy! Like to show your friends your latest pictures, via a snazzy
slideshow? Simple!”
(Continued from page 1) PeaZip - good stuff!
Download it from here: http://peazip.sourceforge.net/ (6,087KB)
From the PeaZip Web site:
“PeaZip is a free archiver utility, based on solid and proven Open
Source technology of 7-Zip and other great Open Source tools (like
FreeARC, PAQ, UPX...) for supporting additional file formats and fea-
tures, in order to provide an all purpose zip utility featuring a powerful
unified GUI that, unlike most of other classic file archivers like i.e. Win-
Zip and WinRar, is natively portable and cross-platform, being available
for 32 and 64 bit Windows (9x, NT/2K/XP, Vista/7/8, ReactOS, Wine),
and Linux and BSD x86 and x86-64 (desktop neutral application, sup-
ports Gnome, KDE and other desktop environments).
Full support: 7z, FreeArc's arc/wrc, sfx (7z and arc), bz2, gz, paq/lpaq/
zpaq, pea, quad/balz, split, tar, upx, zip
Read (browse, extract, test): 7z, apk, bz, bz2, bzip2, tbz2, tbz, gz, gzip,
tgz, tpz, tar, zip, zipx, z01, smzip, arj, cab, chm, chi, chq, chw, hxs, hxi,
hxr, hxq, hxw, lit, cpio, deb, lzh, lha, rar, r01, 00, rpm, z, taz, tz, iso, jar,
ear, war, lha, pet, pup, pak, pk3, pk4, slp, [Content], xpi, wim, u3p,
lzma86, lzma, udf, xar, dmg, hfs, part1, split, swm, tpz, kmz, xz, txz,
vhd, mslz, apm, mbr, fat, ntfs, exe, dll, sys, msi, msp, ods, ots, odm, oth,
oxt, odb, odf, odg, otg, odp, otp, odt, ott, gnm, doc, dot, xls, xlt, ppt, pps,
pot, docx, dotx, xlsx, xltx, swf, flv, quad, balz, zpaq, paq8f, paq8jd,
paq8l, paq8o, lpaq1, lpaq5, lpaq8, ace, arc, wrc, 001, pea, cbz, cbr, cba,
cb7, cbt (and more...)
Repair: FreeArc's arc/wrc
Encrypt:
7Z: 7-Zip AES256 encryption
ZIP: WinZip AES256 AE encryption, and ZipCrypto for legacy compat-
ibility; can decrypt PKZip's AES encryption
ARC: FreeARC AES256, Blowfish, Twofish256 and Serpent256
PEA: AES256 EAX authenticated encryption
PeaZip is localized in 29 languages and is capable of handling all most
popular archive formats (150+ file types), supporting a wide array of
advanced file and archive management features (search, bookmarks,
thumbnail viewer, hashing, find duplicate files, convert archives...),
especially focused on security (strong encryption, two factor authentica-
tion, encrypted password manager, secure deletion...).
The distinctive trait of PeaZip is the innovative and easy to use compres-
sion/extraction interface, more similar to CD burners interfaces rather
than to a classic file compressor. This design makes extremely simple to
check (and update) items set for compression and extraction, integrating
a full featured file manager component.
Also, tasks created in the GUI can be easily saved as batch scripts, in
order to automate backup operations, or for fine tuning, or for learning
purpose, bridging the gap between the ease of use of GUI applications
and power and flexibility of console.”
the end of the story
the end of the story the end of the story
3
the end of the story
Strolling Down Memory (Core) Lane Museums and online resources help preserve computing history
By Gabe Goldberg, APCUG Advisor, Region 2 /
Gabriel Goldberg Computers and Publishing, Inc.
LinkedIn: http://www.linkedin.com/in/gabegold
Twitter: GabeG0
Gabe (at) gabegold.com
I had very mixed feelings the first time I saw computer technology I'd
used in my career exhibited as museum artifacts. And I had a similar
reaction to seeing mainframe genealogy ("System/360 begat ...") in
computer history books. While the good news is that today’s main-
frames are close relatives of that first generation on which many of us
grew up, it's easy to forget how much things have changed, and how
far we've come. (Remember 25MB 2314 disk packs, giant 100MB
3330s and timesharing mainframes with half-megabyte memory?) At
the same time, newcomers often lack the perspective to understand
how things originated and why the computing world looks the way it
does.
So it’s interesting and instructive touring real-world and virtual com-
puting museums, lovingly created and maintained by generations of
professionals—many of whom designed, built and used the equipment
written about and shown.
But where to start? Searching yields about 407,000 website hits.
https://www.google.com/search?q=%22computer+museum%22 Of course, adding keywords such as "mainframe" and "IBM" winnows
results to only 127,000 and 66,000, respectively.
Unsurprisingly, the first general search result is the Computer History
Museum. http://www.computerhistory.org/
Organized in the 1960s to exhibit Gordon and Gwen Bell's personal
technology collection in Digital Equipment Corp.'s Boston lobby, it’s
now housed in a multi-million dollar showplace in Mountain View,
Calif. Its website offers a wealth of overview and in-depth reading
material. Exhibits include technology "prehistory;” modern computer
origins, development and history; game playing; system restoration;
and seminal industry contributors recognized as Museum Fellows,
including Konrad Zuse and IBMers Fran Allen, Erich Bloch, Gene
Amdahl and Bob Evans.
A major new exhibit, "Revolution: The First 2,000 Years of Compu-
ting," includes a mainframe gallery, based around an IBM System/360
Model 30 CPU and showing three 2411 magnetic tape drives and a
1311 disk drive. In short, it's a typical smallish System/360 installa-
tion. A small display also describes System/360 solid logic technology
(SLT)—halfway between integrated circuits and transistors, chosen
when integrated circuits weren’t quite mature enough to use on a large
scale and transistors were already "old tech." Searching the online
Revolution exhibit for mainframes http://www.computerhistory.org/
revolution/search?q=mainframe yields more than 60 hits. The
main System/360 story is here.
http://www.computerhistory.org/revolution/mainframe-
computers/7
Further north along the West Coast, another museum has a different
orientation: presenting major historic computing technologies in ac-
tion, showing how people used them. Founded by Microsoft's Paul
Allen, The Living Computer Museum in Seattle includes such blinky-
light wonders as Princeton University's huge System/360 Model 91
console panel. Real old-timers can try their hands and test their memo-
ries working on an IBM sorter and keypunch, and try to convince
relatives that these were once mainstream computing technology. Non
-IBM computers include DEC’s PDP-7/8/10KI/11, Sigma 9 and
Unisys V380. http://www.livingcomputermuseum.org/
Many museums cover the whole computing spectrum, exhibiting dif-
ferent amounts of mainframe history and technology. A bit off the
beaten path is the American Computer and Robotics Museum in Bo-
zeman, Mont., describing itself as "The world's oldest continually
operating museum of its kind" and "Inch for inch, the best museum in
the world." http://www.compustory.com/
In Washington, D.C., the Smithsonian Institution—nicknamed "The
Nation's Attic”—of course has computing resources. An online
COBOL exhibition lets you "learn about COBOL, or Common Busi-
ness Oriented Language, one of the first computer-programming lan-
guages to run successfully on different brands of computers.” The
Computer History Collection includes artifacts related to producing,
collecting, modifying, manipulating and using information in modern
American society, with two dozen mainframe computers or compo-
nents. There's plenty more to be nostalgic about, including 100 periph-
erals, 1,000 electronic components and 450 electronic calculators. Plus
150 cubic feet of documentation—which sounds like less than what I
had to move whenever I changed programming jobs!
http://americanhistory.si.edu/cobol/introduction /
http://americanhistory.si.edu/comphist/
Overseas are several museums in Germany, where many computers
and related technologies originated, and where IBM has for decades
had major development and manufacturing facilities. Stuttgart has
Computermuseum der Fakultat Informatik, which includes a 4331
Model 2 complete with at least a few of its manuals.
http://computermuseum.informatik.uni-stuttgart.de/index.en.html
http://computermuseum.informatik.uni-stuttgart.de/dev_en/
ibm4331/ibm4331.html
http://computermuseum.informatik.uni-stuttgart.de/
cm003_en.html
Not far from Stuttgart, there's indeed history galore was exhibited at
the IBM museum in Sindelfingen. Unfortunately, it’s moved to IBM’s
Boeblingen Lab where they’re building a new exhibit, but focus has
changed and the primary audience is IBM customers. So it’s not open
to the public.
http://www.theage.com.au/news/Perspectives/History-galore-at-
IBM-museum/2005/01/31/1107020294580.html
http://www-03.ibm.com/ibm/history/documents/pdf/
HistoryofIBMDataProcessing.pdf
The Heinz Nixdorf Museums Forum in Paderborn, Germany, is billed
as the world's largest computer museum. In more than 6,000 square
meters of floor space, it depicts the 5,000-year history, present and
future of information technology, from origins of numbers and charac-
ters in 3000 B.C. to the 21st century computer age. The museum's
depth is shown by having separate curators for areas such as "punched
card technology, PCs and media history" and "typing machines, office
technique, German computers and Nixdorf.” While it surprisingly has
no IBM mainframes, it features original ENIAC components, two
Zuse devices (Z11 and Z23) and a Cray 2.
http://www.hnf.de/en/ueber-uns.html /
http://www-03.ibm.com/ibm/history/documents/pdf/
HistoryofIBMDataProcessing.pdf
(Continued on page 4)
4
rooms and hallways. They made me feel nostalgic, since I'd used and
worked on many of them. My wife was less impressed, calling the
house a computer mausoleum, proving that one person's interesting
museum is another's ... well, let's not call it that. So check out the
worldwide assortment of tributes to computing technologies we've all
used which shaped today's world. And explore the computing world's
diversity; browse a bit beyond System/360 and its descendants to see
how others have computed.
This article first appeared on http//www.destinationz.org and is used
with the author's permission. Gabe Goldberg has developed, worked
with and written about technology for decades. He can be contacted at
My Office for iPad Author: Paul McFedries
Review by Mary Ruth Butler, Member,
Let’s Compute, CA
Publisher: Que Publishing
Rating: Excellent Level of information: Intermediate
Introduction: This review covers “My Office for iPad” from an inter-
mediate user’s viewpoint.
I have used books written by Paul McFedries before; I found this book
to be up to the standards I have come to expect from McFedries.
The book is well organized and the instructions are easy to follow. I
especially liked the color coding used for the illustrations.
The book follows a very logical pattern in discussing the various apps
and includes an excellent discussion of Office 365. One criticism I
have, which is a minor one, is that I think the author should have in-
cluded more discussion on use of the apps for viewing only.
That point notwithstanding, I think the book offers the reader a thor-
ough discussion on the use of the various apps so that the reader can
take maximum advantage of Office 365 on the iPad. The explanations
cover virtually all of the tasks that the reader would likely want to
accomplish on the iPad.
The individual sections on each of the apps are in enough detail to
permit the reader to achieve excellent command of each one. The “It’s
Not All Good“ notes are very helpful in pointing out some of the limi-
tations of Office 365.
I was pleased that McFedries included a section on the use of
OneDrive. This application is an excellent tool for both PC and Mac
users. I especially liked the information on sharing OneDrive docu-
ments including the capability to use an extra level of security by re-
quiring the recipient to log in with using a Microsoft account.
Perhaps the most surprising feature of the book is the Excel Work-
sheet Function Reference section. Although I am a confirmed Excel
user, the Excel reference section offers a very easy way to expand the
use of Excel. This section will be helpful in using Excel in the full
Office Suite on my PC as well as on the iPad.
The completeness of the book’s index is worth noting. I found it to be
easy to use and very complete.
I would definitely recommend that anyone who is interested in using
Office 365 on an iPad buy the book.
IBM itself has a few historic information resources, found by search-
ing IBM.com.
http://www.ibm.com/Search/?q=%22ibm+museum%22
Endicott, N.Y.—where IBM and many technologies/products originat-
ed—is represented by its Visitors Center. While not tech-centric, it
includes the Thomas J. Watson-IBM room which examines his profes-
sional career and development of IBM.
http://www.endicottny.com/VCmuseum.html
The Rhode Island Computer Museum has a diverse collection (from
Apollo Jabba to Wang Peripherals) but not many mainframe or IBM
items.
http://www.ricomputermuseum.org/
Some museums specialize, such as the Computer Graphics Museum in
Salt Lake City, though, i’s presence is still largely online. I'd love to
see an IBM 2250 Graphics Display Unit, something I battled with
supporting under VM/CMS.
http://computergraphicsmuseum.org/
A group called Mid-Atlantic Retro Computing Hobbyists runs a muse-
um in Wall Township, N.J., with five exhibits: mainframes, minicom-
puters, homebrew-era computers, business microcomputers and con-
sumer microcomputers.
http://www.midatlanticretro.org/
For more online resources, there’s a list of physical and virtual com-
puter museums.
http://ed-thelen.org/comp-hist/merged.html#PhysicalCompMus
http://ed-thelen.org/comp-hist/merged.html#OtherCompVMus
Yahoo's directory lists about a dozen computer exhibits.
http://dir.yahoo.com/computers_and_internet/history/museums/
Wikipedia describes and lists various museum categories: online,
North American, European, Latin American, Middle East and Ocean-
ia, along with further reading.
http://en.wikipedia.org/wiki/Computer_museum
Many online communities exist for reminiscing and chatting about
bygone systems; two such lists are here.
http://www.classiccmp.org/lists.html
Researching this article tempted me to join multiple museums, but I'll
content myself with mapping their locations and attempting to connect
the dots by visiting as many of them as possible. Perhaps I'll log
equipment and systems found on which I worked.
Much has been written on computing's origins and evolution. Two
books essential for mainframers are “IBM's Early Computers” and
especially “IBM's 360 and Early 370 Systems.”
http://www.amazon.com/IBMs-Early-Computers-History-
Computing/dp/0262022257/ref=sr_1_1?
s=books&ie=UTF8&qid=1377020591&sr=1-1&keywords=ibm%
27s+early+computers
http://www.amazon.com/IBMs-Early-Systems-History-
Computing/dp/0262161230/ref=sr_1_2?
s=books&ie=UTF8&qid=1377020724&sr=1-2&keywords=ibm%
27s+early+computers
Sometimes museums are found in surprising places. I describe a
friend's home as being decorated in "early mainframe,” since he's
tastefully placed various mainframe components—large I/O devices
and controllers and such, not mere circuit boards or control panels—in
(Continued from page 3)
the end of the story
the end of the story
5
Computer Problems Plague Everyone, Even Me Sandy Berger, CompuKISS
Sandy (at) compukiss.com
www.compukiss.com
Why do things change on your computer? One day everything comes
up just as it normally does. The next day, you can't get on the
Internet, the icons are in a different place, and/or your program is
working differently. Well I am here to tell you that everyone has
problems like this -- even me! Here's the whole story!
When weird things happen on the computer, most people
immediately blame themselves saying, "I must have done something
to make this happen." The truth, however, is that in the computer
world changes can happen without your having done a thing to cause
them. This was really brought home to me this week when I had
several "problems" with my own computer
When I sat down to work on the computer last Monday, the icons for
my password manager and several other shortcuts that I use regularly
were no longer on my browser toolbar at the top of the screen. On
Tuesday, when I opened my Quicken program, the numbers and text
was twice as large as normal. On Thursday I tried to play some
music and found that iTunes was no longer working. On Friday I
found that my CD drive, which I hadn't used for months, was no
longer working.
Now, it is unusual for all of these things to happen in one week, but
it is not unusual for them to happen. I did not do anything to cause
any of these changes. So what happened? Well the simple
explanation is that the computer is run by millions of lines of code.
As you work on the computer, add files, and download programs,
things change. Even installing updates from the manufacturer causes
changes. Sometimes these changes, even if they are aimed at making
a certain part of the computer better or more secure, can adversely
affect other programs and other computer operations.
Although these types of changes can produce huge frustrations for
the end user, the first thing to learn is that you probably didn't cause
the different behavior and that, if you remain cool and calm, you can
often correct the changes. Here's how I got through my aggravating
week.
To find the missing icons, I had to look carefully at the screen where
they normally appear. I found two arrows next to where the icons
normally appeared. Low and behold, when I pressed the arrows, the
missing icons cascaded down. To actually solve the problem, I
simply put my cursor on the area next to the arrows until it turned
into a double-ended arrow. Then I dragged that to the left and my
icons appeared and remained on the screen.
Quicken was another disconcerting item. For several days, the text
and numbers appeared larger one time and smaller the next. To be
honest, I never found the cause, but luckily it all went back to normal
and has stayed that way.
Why in the world would iTunes stop working? I had no explanation,
but I did have an easy solution. I simply reinstalled the iTunes
program. It was aggravating and a bit time-consuming to have to do
so, but after I did, everything went back to normal.
The most vexing problem was my CD drive. Last time I used it, it
worked fine. Now wasn't working. It did not appear in My Computer
at all. A trip over to the Device Manager showed the CD drive with a
yellow exclamation meaning that it was not working properly, which I
already knew. I tried a few things like uninstalling the CD driver and
rebooting, but had no success. I knew that this could be a hardware
problem. Perhaps the drive itself had stopped working. I also knew,
that it could be a software problem. Since the driver and filters from
the operating system are used to run the CD drive and other
peripherals, I decided to check that out first. I headed over to the
Microsoft website where I found a Microsoft tool called "Fix It." I
used it to troubleshoot and correct the problem. There are multiple Fix
It tools, and the proper one can be a bit hard to find, but Fix It checked
out the software, found the problem, and helped me quickly solve the
problem at no cost. That sure beat having to purchase and install a new
CD drive.
Well, now everything on my computer is back to normal. At least for
the moment. The moral of the story is that, unfortunately, we have to
expect glitches when working with computers. The best thing that you
can do is to keep your eyes open for possible solutions, learn as much
as you can about how your computer works and be bold enough to
troubleshoot small problems. I keep my Sherlock Holmes hat ready for
use at any time. You may want to do the same.
My eBay for Seniors By Michael Miller, Que Publishing
Review by Melvin Weekley, Editor,
Seniors Computer Group, CA
Mlweekle (at) cox.net www.SCGsd.org
Rating: 5 Stars
Excellent resource for the beginner and the experienced user
This is an excellent book, the best I have seen on the subject of using
eBay.
What I like the most is the organization of the subject matter and the
indexes. The table of contacts has an excellent list of the topics that
will interest most readers and you can read about a topic that is of
particular interest or just read through the book.
The index is quite thorough and is easy to find the particular topic you
wish to read about.
The content of the book is very thorough and written in a style to ap-
peal to all level of readers. A person just starting to use eBay will find
it extremely helpful in guiding them through the process of learning
and using eBay. The experienced reader can jump quickly to the par-
ticular topic they wish to learn more about and get the details they
need.
The book also has excellent charts of the
various items included in each area and
makes it simple and quick to find what you
need.
I would recommend this book to anyone from
the one considering trying out eBay to the
experienced user just wanting a quick refer-
ence to details of using eBay.
the end of the story
the end of the story
6
never look at what they’re doing?!” Additionally, there is a marked
increase in pedophile crimes due to internet communications.
Some recent evidence of statements being curtailed involves Twitter
and Facebook postings. Some are blatant stupidity, as in the March
29th Facebook posting by Colleen Chudney that she did drink but did
not get caught by the breathalyzer test by her parole officer. The 22
year old was on probation for a 2012 drunk driving offense, and part
of her parole was that she refrained from consuming any alcohol.
Her parole officer saw the posting and called her. She hung up on
him, which is another parole violation. He insisted on a urine test to
check for drinking within the previous 80 hours. She was granted
another 93 days in jail instead of her parole ending just a few weeks
later.
A recent case involved a man who posted a public message about his
estranged wife on Facebook. On November 23, 2011 Mark Byron
posted the hate filled rant. It sparked great debate on the online
circles while the case was pending. Of course most of the
commentators ignored the fact that a court order of protection had
already been issued to his wife and son after he was convicted of
civil domestic violence against her last year. On February 23, 2012,
a judge ruled that he had to post a lengthy apology and corrections to
his previous inaccuracies on his Facebook page for 30 days or face
60 days in prison and $500 fine.
Musician Courtney Love’s 2010 public Twitter posting to reporter
Alan Cross about an unnamed attorney who was “bought off” is
another recent example. The attorney, Rhonda Holmes, brought a
defamation case against Love. Surprisingly, the case was decided in
Love’s favor on January 25, 2014, since the attorney was not named,
the posting was quickly removed once Love realized she had marked
it “public” instead of “private,” and, although the statement was false
and injurious to Holmes’s reputation, the case itself restored that
reputation. (Each state’s laws have nuances to them.)
However, Love had to pay $430,000 in damages when she was sued
in 2011 over statements posted on Twitter and Myspace regarding
fashion designer Dawn Simorangkir. There is currently another case
still pending, brought by Simorangkir against Love, based on
accusations of theft on the Howard Stern's radio show and “taunting”
on the social media site Pinterest.
The press has also become one of the greatest violators in the past
few decades. They do not always verify their facts before reporting a
story, and news stories are really editorials rather than reporting. The
(Continued on page 7)
“Free Speech” on the Internet, and More
By Diane Fahlbusch, President, ICON PC User Group
(ICONPCUG), Long Island, NY
June 2014 issue, The ICONPCUG Graphic
www.iconcpug.org
Editor (at) iconcpug.org
Social networking has allowed people to express themselves to either
select people or to the public. Unfortunately, many posters do not
exercise restraint, claiming it is their “right.” Freedom of Speech is a
highly treasured right granted to Americans. However, it is also the
most misunderstood and abused rights granted under the First
Amendment to the Constitution of the United States. To quote it
directly, “Congress shall make no law respecting an establishment of
religion, or prohibiting the free exercise thereof; or abridging the
freedom of speech, or of the press, or the right of the people
peaceably to assemble, and to petition the Government for a redress
of grievances. “
But does this give one the complete freedom to say whatever,
whenever and however one wants?
The original purpose of Freedom of Speech was to allow for
religious freedom and different political views to be expressed.
When the USSR started making some changes, it was jokingly
phrased that citizens still had the same long lines to wait in, but were
now allowed to complain about them. This is something Americans
take for granted. The Constitution also allowed the press to publish
verified facts and editorials without recrimination. (The key here is
VERIFIED facts. The Watergate scandal was actually exposed to by
two reporters, which then led to criminal investigations.) However,
that does not give one carte blanche to say whatever one wants. This
is evidenced by the existence of cease and desist orders, gag orders,
restraining orders, retractions and the like emanating from
defamation and harassment cases.
Defamation is defined as “the action of damaging the good
reputation of someone”, and encompasses both slander and libel.
Slander is SPOKEN defamation or false statements. Libel is
“WRITTEN, PRINTED or PICTORIAL representation which
unjustly damages an individual’s reputation, OR the act of
presenting such a statement to the public.” Harassment is
“disturbing or irritating persistently.” All of these actions may land
one in court.
The fastest growing concern in police departments is Cyber-bullying.
Perhaps part of the problem is that the parents are really not
supervising what their children are doing on. As one Suffolk County
Police officer stated, “Would you just drop your kid off at Times
Square at 10:00am and go back at 5:00pm to pick them up? Well,
what do you think you’re doing when you hand them an I-Pad and
7 the end of the story
Safe Travels A proof-of-concept project lets you boldly go
where you’ve never been before
By Gabe Goldberg, APCUG Advisor, Region 2 /
Gabriel Goldberg Computers and Publishing, Inc.
LinkedIn: http://www.linkedin.com/in/gabegold Twitter: GabeG0
http://destinationz.org/Mainframe-Solution/Application-
Development/Safe-Travels.aspx Gabe (at) gabegold.com
Proof-of-concept (POC) demonstration projects can blaze a trail,
doing something on a small scale, for the first time, but perhaps
changing basic assumptions and potentially influencing an industry
or the world. One recent example was the privately launched Dragon
supply capsule reaching the International Space Station; the early
mainframe Linux implementations represent another.
Closer to home, IT POC projects are sometimes called pilot studies
or prototypes. In the data center development/rollout scheme of
things, they come much earlier than efforts such as beta tests, the last
bit of fitness evaluation and tweaking before full release or
production. Of course, even though “proof” connotes assured
success, POCs occasionally fail—but that can be good news, because
a concept disproved at an early stage often prevents a large disaster.
Major mainframe changes often begin with POC projects.
Sometimes they’re even off-radar “skunkworks” efforts, hidden until
results are irrefutable and leading to game-changing successes.
Linux on System z is frequently introduced with this toe-in-the-water
approach, then scaled for huge server consolidation.
But in spite of being a simple concept, POCs require more than a
rote idea-try-results-success progression. Detailed planning and
careful implementation make projects much more likely to succeed.
Specifically, keep the following in mind:
Consider politics. Your bright idea might tread on someone’s toes;
don’t offer or threaten to make anyone’s favorite technology
obsolete. Emphasize collaboration and synergies. Don’t be overly
clandestine; managers might not appreciate being surprised, even by
a good-news project. Watch for C-level changes that influence
receptivity to your effort, because new players often bring different
assumptions and biases. In such cases, be prepared to justify/sell
your project again with compelling and objective information.
Be creative to solve real issues. Anticipate how unused resources
might be deployed to meet future demands or solve sudden
problems. For example, having Linux servers already running allows
quick response when new services are required or distributed servers
fail. Seize opportunities when new technologies or insights arrive.
Scratch an itch. Deal with a long-time technical frustration or
address a business problem not solved by “business as usual.”
Find a sponsor with an itch. Does an IT executive need a dashboard
showing operational status or a scorecard tracking active projects?
Are distributed servers growing out of control just because they
always have? Listen for “If only...” conversations and make them
real.
Set business-related goals. Build on—don’t repeat—what’s been
done. There’s no doubt that Linux runs on System z hardware, so
don’t set out to prove that. Rather, demonstrate how mainframe
Linux can improve your organization’s IT function, cost-
(Continued on page 8)
best example is the man accused of setting off a home-made pipe
bomb at the Atlanta Olympics in 1996. Almost everyone remembers
his name, Richard Jewell, because for 10 days the news stations kept
flashing his picture and name and basically stating that he did it.
Numerous newspapers also made the same claim. They could have
chosen to say that this man was a key to the investigation. They also
selectively exposed facts about his personal life to present an
unsavory character. And even when he was cleared by the police a
few weeks later, no one bothered to repeatedly show his picture and
state that he was actually a hero. (He was a temporarily employed
security guard making little more than minimum wage, yet he risked
his life to help others.) And of course, most people cannot name the
actual bomber. For the record, it was Eric Rudolf. He first became a
suspect in 1998 and pleaded guilty in 2005 after eluding arrest for
five years.
As an immediate aftermath of this “Freedom of Speech,” Richard
Jewell found that he was unemployable after all of the press
coverage. Not only would potential employers rip up his resume and/
or job application when they saw his name, but he was cursed at,
thrown out of potential employers’ offices and sometimes had things
thrown at him. Even strangers on the streets of Atlanta and other
towns bombarded him with verbal and physical abuse (spitting,
punching and kicking). He had no choice but to sue those who had
maligned him. The NY Post, NBC, and CNN just settled quickly,
although they maintained there was no wrongdoing. But Cox
network, owners of a string of news stations and publication, took
the case to court and dragged it through the appeals court. Sadly on
both accounts, the case was dismissed in August, 2007 after Richard
Jewell’s death because there was no plaintiff. However, law
enforcement agencies reevaluated how, when and what information
to release to the public to prevent what they now call “The Richard
Jewell Syndrome.”
Devices come with instruction manuals and warning labels.
Unfortunately speech does not come with this message: WARNING
- Engage brain before engaging mouth. People also seem to have
lost their common sense and consideration. Why would you discuss
your life publically on your social media page – or someone else’s?
That is part of the problem with social media – very few think before
they post. The other problem is that the postings can be marked
either “public” or “private”, but most people do not pay attention to
this. Furthermore, that private post you just sent can in turn be
resent and made public by your “friend.” Another interesting point is
that even emails that are sent across a public network (otherwise
known as the internet) are considered “public” messages, according
to copyright law.
So, no, one DOES NOT have the RIGHT to say whatever pops into
one’s head – especially on social media, or any other media. And
remember, the first four letters of Twitter spell “TWI.T. Act
responsibly and don’t be one!
(Continued from page 6)
th end of the story
8
the end of the story
Be business-oriented. You might be driven by technology but
financial issues will affect and perhaps dominate decision making. If
you have an IT chargeback system, use it for the POC. If you don’t,
provide management with cost/benefit information as compelling as
your concept’s validation.
Understand and address financial issues. Know what drives your
organization—opportunities, hot spots, sore spots—and match your
concept to them.
Remember that potentially vast scalability is among the mainframe’s
traditional strengths. A metaphor suggested is handling an open-pit
mine with a massive hauler, rather than a fleet of pickup trucks. Start
small and anticipate growth, perhaps avoiding or displacing a more
expensive server farm.
Ultimately, your POCs—Linux on System z, private/public cloud
computing, enterprise-wide encryption, streamlined business
processes, whatever—will succeed or fail based on quantifiable
organizational benefits, with perhaps a dose of politics. If you’ve
adequately planned and executed, and maintained stakeholder buy-
in, your reward may be scaling enterprise-wide.
This article first appeared on http//www.destinationz.org and is used
with the author's permission. Gabe Goldberg has developed, worked
with and written about technology for decades. He can be contacted
Easy Basic Backups By Jim Cerny, 2nd Vice President, Sarasota PCUG, FL
August 2014 issue, Sarasota Technology Monitor
www.spcug.org
jimcerny123 (at) gmail.com
Unfortunately it is not a perfect world and, as you know, any
mechanical device can fail. Because your computer and/or your hard
drive can fail, everyone (this means you) needs to take the extra step
on a regular basis to make sure that you have a good backup. I am
always surprised at the number of people who just don’t do backups
at all – they will have a real problem if something goes wrong. There
have been many “backup” articles written and I would encourage
you to read some of them. But the purpose of this article is just to
give you the basics first and then you can decide what further steps
you need to take and what more information you may need. Here is
the “basic backup” information:
1. Why do I need to do a backup? – In case your computer or hard
drive fails
2. What is a “backup” anyway? It is simply a copy on another
memory device.
3. What should I back up? This is good question. I do not backup
my entire “C” drive, I only backup those files that are important
to me – those files I NEED to keep. I do not backup my
software/programs. For example, I have many documents (files)
which I created using the Word program. Well, I can use
someone else’s Word program and their computer in an
emergency to open those files from my backup device. I can
also use “Open Office” to open those files. I just need my files
which I have backed up and a computer that has Word or is
connected to the internet. Get the picture? A backup is also
great when you get a new computer and need to put all your (Continued on page 9)
effectiveness, customer service, flexibility, reliability, etc.
Be reasonable. Don’t “boil the ocean”—or even, necessarily, the
swimming pool. Set achievable but meaningful goals. Perhaps boil
the bathtub by running a small-scale private cloud service in an
LPAR, or by introducing a new Web service with a dozen
lightweight Linux servers under z/VM. That is, start with small
applications/services rather than the most complex and resource-
intensive application, no matter how impressive the latter might be.
Perhaps use a personal System z development tool such as System z
Personal Development Tool (zPDT) or Rational Developer for
System z (RDz) as an entry point for a larger concept. Success will
come from scaling up results, and failure won’t consume much time
or money.
Be prepared. When your POC succeeds, it might enter production
without being re-implemented, let alone re-architected. That is,
choose meaningful naming conventions for servers, file directories,
users and such that can scale and be publicized, rather than being
restrictive and embarrassing (e.g., Star Trek character-named servers
or random data names). Follow industry standards and best practices,
along with (especially) current installation policies.
Establish evaluation criteria and stick to them. The concept you’re
proving should be measurable, e.g., function, performance, cost,
scalability. Focus on the initial goal and avoid mission creep,
analysis paralysis and perpetual testing. If it’s not in production by
the deadline, abandon it.
Compare alternatives fairly. Don’t burden mainframe cost with other
platform expenses or too much shared infrastructure and overhead
costs. Include and apportion precise costs for servers, associated
software and staffing. Beware of fudged numbers when requested for
head-to-head comparison.
Be flexible. Things change, requirements evolve. Don’t hang onto
cherished ideas whose time has passed, whether they’ve become
irrelevant or are now commodities not needing validation.
Be collaborative. Mainframe-only—even all-IBM—data centers are
rare. But the System z platform is still the central server workhorse.
So the more it connects to and supports other platforms and
networks, the more valuable it is and the more enthusiastic other
systems’ staffs will be supporting a POC and its full adoption. When
appropriate, blend disciplines. Successful Linux on System z
projects involve z/VM folks learning a little Linux, and the Linux
team understanding a bit about z/VM. That develops a common
language and framework. For each group, it’s like travel to a foreign
country, learning enough of the language, terminology, customs and
concepts to find the bathroom and order a beer. Heterogeneous
computing supplements mainframe strengths with other similarly fit-
for-purpose technologies.
Involve relevant vendors. If you’re porting cross-platform,
understand versions, support, licensing and contractual issues.
Because vendors often perform and participate in POC projects
themselves, you might receive quick buy-in and favorable terms by
suggesting and enabling new market areas for them. But you might
not want to nest POCs—that is, have yours rely on the success of a
vendor’s—so tread carefully here. Negotiate realistic prices for
ancillary tools such as server provisioning, backup, system
management and performance management.
Speak up. The best potential technology solution does no good if it’s
a secret.
(Continued from page 7)
the end of the story
9
liking, but by all means do your backups. One of the worst-case
scenarios is that your computer quits working, you decide to buy a
new computer, but you cannot move any of your files to the new
computer because you didn’t make any backups! Every once in a
while, ask yourself: “What would I do if my computer quits working?”
Book Review: Galaxy S4 - The Missing Manual The book that should have come with the site
By Steve Costello, President / Editor,
Boca Raton Computer Society, FL
May 2014 issue, Boca Bits
http://brcs.org/ editor (at) brcs.org
I have read several of the Missing Manual series of books and find
them very informative.
Previous Missing Manual Reviews
January 2013 - Wordpress: The Missing Manual
http://ctublog.sefcug.com/wordpress-the-missing-manual-by-matthew-
macdonald/
April 2012 - Google+: The Missing Manual
http://sefccw.wordpress.com/2012/04/02/book-review-google-the-
missing-manual-by-kevin-purdy/
Disclosure
I received this through the O'Reilly User Group Program at no cost,
and decided to review it, as I have a Sprint Galaxy S4 and want to get
the most out of it.
Review
The book is divided into five parts:
Part I - The Basics
If you've had your S4 for a while, you should at least skim this part to
make sure you are aware of these basics.
Part II - The Built-In Features
This part deals with taking pictures/videos, music management, GPS,
the calendar, and more.
Part III - The Galaxy S4 Online
Learn about networks, hotspots, email, getting apps, etc. with you S4.
Part IV - Advanced Features
How to synch/transfer files, virtual private networking (VPN), voice
control, settings list, different connections/accounts, and more.
Part V - Appendixes
Setup and sign up, accessories, troubleshooting and maintenance.
NOTES
Note 1: "This book happens to be written based on the Samsung Gal-
axy S4 sold for T-Mobile phones, so it may slightly differ from what
you see on phones from other carriers." Quoted from the Frequently
Asked Question box on page 27.
Note 2: My S4 is for Sprint, but for the most part things are the same.
There are some different default apps of course.
Conclusion
Well worth the investment of time and money to get the most out of
your Samsung Galaxy S4.
Author: Preston Gralla
Publisher: O'Reilly Media
Released: August 2013
Price: Ebook $15.99, Print $19.99
http://shop.oreilly.com/product/0636920022824.do
files in it. I backup everything in the “My documents” and “My
pictures” folders – that is, I backup all the files I have in “My
documents” and all “My photos”. I do not backup “My music” or
“My videos” because I don’t have any of those that are important
to me. You do NOT have to backup your email or anything that
you have saved on the internet cloud (such as on Google Drive, or
Dropbox for example). Certainly you may choose to use the
internet cloud as your backup device. NOTE: Photos and videos
take up MUCH more space than other files –see below.
4. How often should I do a backup? As often as needed so that you
do not lose anything important. I do a backup every three or four
weeks.
5. How do you do a backup? I use either an external hard drive or a
thumb drive that plugs into a USB port on my computer. (I don’t
recommend using CD or DVD disks for doing backups as you will
probably run out of space on the disk and have to use too many of
them.) I just connect my drive, create a new folder on the drive
called “backup 7-31-2014” (the date). Then I just open the
Windows Explorer and drag the entire “My documents” folder to
that backup folder, and then do the same for “My pictures.” It
takes about 20 or 30 minutes, but you can do other things on your
computer in the meantime. While the files are being copied, you
will see a green bar lengthen from left to right until the copy is
complete. There is also a time estimate shown which is usually
inaccurate.
6. How much space do I need on the device? To find out how much
space you are using now on your “C” drive for any folder, open up
the “Windows Explorer” program and, on the list of folders in the
left column, find “My documents”. RIGHT-click the mouse on
that folder to get a pop-up menu, then left-click on “properties”.
You will see how much space that folder is taking up and that is
how much space you will need on your backup device to copy it.
It will also tell you how many files are in that folder. My “My
documents” takes up about 300 megabytes. My “My photos” takes
up well over 6 gigabytes. So I will count on needing about 7
gigabytes of memory for EACH backup. If you get an external
hard drive, pay the extra bucks and get a one-terabyte drive and
you will have lots of space. Or you can get a 32 or a 64 gigabyte
thumb drive which, for me, can easily hold my last two backups.
7. How many backups should you keep? I only keep the most recent
two backups. After I create a new backup, I delete the oldest from
the device to save space.
8. Anything special about photos? Yes, they take up much more
space. On my computer, my pictures take up almost twenty times
the space of my documents or other files. So, I handle my pictures
differently. I only keep the last two years of pictures on my
computer. Every year I copy the oldest photos (from three years
ago) to CDs and put them in my photo album. If you have really
special photos, you should back them up with your other files and
not put them on a CD. I have heard stories that CDs may not last
forever and can deteriorate.
Are there other choices or ways of doing backups? You bet. There are
programs that you can buy or download from the internet that can
automatically do the backups for you. Sometimes backup programs
come with the memory device you purchase. There is “the cloud”
option too, where you can put your files on the cloud and let that
company keep them for you (i.e. such as using Google Drive or
Dropbox). But their free space is limited and you may have to pay for
more space. Perhaps one of these other ways will be more to your
(Continued from page 8)
the end of the story
10
From the Presidents,
……. Editor’s desk
Required reading: Always good reading available here …….
Strolling Down Memory (Core) Lane
Museums and online resources help preserve
computing history …….. by Gabe Goldberg PAGE # 3
My Office for iPad Author: Paul McFedries
.… Review by Mary Ruth Butler PAGE # 4
Computer Problems Plague Everyone, Even Me
……. by Sandy Berger PAGE # 5
“Free Speech” on the Internet, and More
…… by Diane Fahlbusch PAGE # 6
Safe Travels. A proof-of-concept project lets you
boldly go where you’ve never been before.
….... by Gabe Goldberg PAGE # 7
Easy Basic Backups ….……. by Jim Cerny PAGE # 8
Book Review: Galaxy S4 - The Missing Manual
…. by Steve Costello PAGE # 9
edX Linux Course …… by Cal Esneault PAGE #10
IMPORTANT NOTICE: The PACC web site is working. You are again able to
get your copy of PACC TALK there. If you have a problem with viewing it with
Adobe Reader, use another PDF reader, such as Nitro. to view the PACC TALK.
PACC Web Site: http://pacc.apcug.org/
While I have used Linux systems for ten years, I have never had any
formal training. This was an opportunity to get a more detailed
understanding in a coordinated manner. While the approach and pace
were excellent, the amount of information covered was extensive. This
course is not recommended for the casual Linux user as it requires
about 60 hours to complete. Every time you log-in, the software takes
you back to the point in the course where you were when you last
logged-out. You can also go to any previous point in the course to
refresh your learning.
You can take the course at no cost if you register under the "audit"
category. If you need to document that you successfully completed the
final test, you can apply for a "Verified Certificate of Achievement"
for a fee. edX offers many other courses on a wide variety of subjects.
Examples include: Introduction to Game Design, Solar Energy,
Circuits and Electronics, and Mechanical Behavior of Materials.
This Linux course is an example of the modern trend using on-line
learning. Public library systems also have many similar programs for
their patrons. The key advantage of a "course" is organization of
information in logical order (versus the fragmented approach using
search engines). Do a little exploration to see if you can find a course
of interest.
the end of the story
the end of the story
edX Linux Course by Cal Esneault, Former President of CCCC;
leader of many Open Source Workshops & SIGs
September 2014 issue, CCCC Computer News
Newsletter (at) clickers.org www.clickers.org
edX hosts online university-level courses in a wide range of disciplines
to a worldwide audience at no charge. It was founded in 2012 by
Harvard and MIT and uses open- source software that it makes
available to other schools to develop similar courses. The Linux
Foundation is a nonprofit organization that promotes and protects
Linux and seeks to advance its use. It also sponsors Linus Torvalds.
I signed up for "LFS101x: Introduction to Linux", an
edX course co-sponsored by the Linux Foundation. The course was
divided into many small modules. Included were text explanations,
videos, "lab" work using browser sessions, and short quizzes at the end
of each topic. It was essential to have a working Linux system available
to test the concepts. The course gave specific instructions assuming you
used one of the following systems in a GNOME environment:
Debian Family Systems (such as Ubuntu) SUSE Family Systems (such
as openSUSE) Fedora Family Systems (such as CentOS)
Examples of screenshots from each of these types are shown below. I
followed along with a separate computer running Ubuntu 14.04 LTS.
Frequently within the text portion, there were - schematic diagrams to
show relationships between Linux components. For example, see
below the explanation for the different types of Linux systems: server,
desktop, and embedded.
the end of the story
11
If you would like to become PACC HELP LINE volunteer inform the editor by sending e-
mail to: [email protected]
NAME COMPUTER AREA PHONE TIME
Agrawala, Vishnu Hardware 724-553-8051 3 - 6:00 pm
Cutrara, Phil Geoworks 766-0274
Fisher, Bill Cobol, Word Perfect 367-8996 7 - 9:00 pm
Konecny, P. Windows, DOS 6.2x, MS IE,, Hardware 795-6075 8 - 9:00 pm
PACC HELP LINE Help is available to PACC members on various computer topics by contacting one of
those listed below. It is recommended that the initial contact with any of these experts
should be made via the PACC WEB SITE. In this way others can benefit from the
questions and responses. Be courteous and call only during the listed times.
FOR SALE ——————————
HD external USB 2.0, 400
GB Western Digital, $30
Contact Vishnu
724-553-8051
Classified ads. Buy, Sell, Trade. Members may place free ads (up to 5 lines).
For commercial ads send a inquiry to: [email protected]
Reprint Policy.
Permission to reprint articles from PACC
TALK is given to school, personal computer club, and nonprofit organization publications, provided
that: (a) PACC Inc. receives a copy of the
publication; (b) credit is given to PACC TALK as the source; (c) the original author is given full credit;
and (d) the article author has not expressly
copyrighted the article. Recognition is one means of compensating our valued contributors. Arrangements
can be made to receive copy on magnetic media; for
MEMBERSHIP APPLICATION FOR PACC: (Please print in CAPS)
NAME.................................................................DATE................................
ADDRESS....................................................COMPANY.............................
CITY...............................................STATE.............ZIP+4...........................
PHONE...................................E-MAIL........................................................
OCCUPATION.............................................................................................
INTERESTS.................................................................................................
RECOMMENDED BY PACC MEMBER......................................................
Dues: $25 per year.
Make your check out to: PACC and send it with your application to:
Treasurer, PACC, 216 Cashmere Court, Cranberry Twp. , PA, 16066
cut here.....................................................................................cut here
ATTENTION:
AS OF JANUARY 2012 THE DUES FOR PACC MEM-
BERSHIP ARE DUE AT THE SAME TIME FOR ALL
OF THE MEMBERS. THIS IS TO ELIMINATE ANY
CONFUSION ARISING FROM ELECTRONIC DE-
LIVERY OF PACC TALK. ANY OTHER TIME
PERIOD WILL BE PRORATED, IF ONE INSISTS.
12
PITTSBURGH AREA COMPUTER CLUB P. O. Box 557 PITTSBURGH PA 15146
E-mail: [email protected]
OF
FIC
IAL
NE
WS
LE
TT
ER
OF
TH
E P
ITT
SB
UR
GH
AR
EA
CO
MP
UT
ER
CL
UB
P.O
. BO
X 5
57
, PIT
TS
BU
RG
H P
A 1
5146
NO
T
RE
SP
ON
SIB
LE
FO
R T
YP
OG
RA
PH
ICA
L E
RR
OR
S O
R W
RIT
ER
S A
CC
UR
AC
Y
NE
XT
ME
ET
ING
: Ma
rch 1
5, 2
01
5
The P
ittsburgh Area C
omputer C
lub (PA
CC
) holds its meetings the THIRD S
unday of each m
onth. The next m
eeting will be in room
311 at Point Park University, Wood S
t. and Blvd.
of the Allies. T
he doors open at 11:00 am and close at 4:30 pm
. Bring your P
C!
FOR SOME YEARS THE PACC TALK WAS AVAILABLE IN DIGITAL FORMAT. T
here-fore, as of January 12, 2012, th
e mem
bership dues are payable in the first m
onth of the
calendar year. R
enew your M
emberships !!! S
end a check or money order for $25 m
ade out to ‘PA
CC
’ and addressed to T
reasurer, PA
CC
, 216 Cashm
ere Court, C
ranberry Tw
p. , PA
, 16066. Classified ads. B
uy, Sell, T
rade. Mem
bers may place free ads (up to 5 lines). A
rticles should be prepared in plain A
SC
II text. WIT
HO
UT
formatting. D
eadline for articles is the 25th of the m
onth. Send them
to P.J. K
onecny, P
.O. B
ox 557, Mon
roeville, PA
15146. PACC hom
epage can be found at: http
://pa
cc.a
pcu
g.o
rg
PA
CC
OF
FIC
ER
S A
ND
VIP
s
PA
CC
SIG
LE
AD
ER
S
Hardw
are-Vishnu A
grawala
724-553-8051
MS
Publisher - P
. J. Konecny
795-6075
Window
s - P. J. K
onecny 795-6075
Pres. – P
J. Konecny
795-6075 E
ditor - Pavel J. K
onecny 795-6075
Exec V
P – B
ill Fisher
367-8996
Treas. - V
ishnu Agraw
ala
724-553-8051 M
AL 1 - T
im P
repelk
a
VP
Prog. - R
ich Springer
655-2883 M
AL 2 - P
at Barron
VP
Edu. - H
omer Jam
es 341-0252
M
AL 3 - A
nil Rodrigues
521-4096
P A C C 1975 - 2015
IN ITS FORTY-FIRST YEAR
NEXT PACC MEETING
IS ON March 15, 2015