Recent Articles By Dave Hamilton [RSS]

Test Your Router’s Ability to Handle Full Speeds and Avoid Buffer Bloat

11:30 AM, Apr. 14th, 2016 · Dave Hamilton · TMO Quick Tip

Recently on Mac Geek Gab we were discussing your router's Quality of Service (QoS) settings and avoiding a scenario where everything else on your network slows down when one device is using up all of your bandwidth, a condition known as Buffer Bloat. One way to test that is to do a speed test while simultaneously watching a series of pings from the Terminal. Another is to simply use DSLReports' speed test which does all of this for you! Check it out.

Use the π Symbol on Your iPhone on Pi Day

11:06 AM, Mar. 14th, 2016 · Dave Hamilton · TMO Quick Tip

Today is Pi Day. While some people might say that Tau is more relevant than Pi, it's still Pi Day. With that in mind, you may want to wish your friends a happy Pi Day. And while that's cool, it's even cooler to wish them a Happy π Day (OK, well, it may or may not be cooler to do this, but it's definitely geekier!). We'll show you how to get the π symbol by adding a Greek keyboard to your iPhone.

Sponsor: AirWatch, Simplify Enterprise Mobility

9:00 AM, Mar. 9th, 2016 · Dave Hamilton · Weekly Sponsorship

This week, The Mac Observer is sponsored by VMware AirWatch. AirWatch is a platform that makes it easy for you to access all your work apps and information from your personal mobile device (yes, folks, that means your iPhone, too!). Visit today to learn how easy it will be for your business to get started with a 30-day free trial and then let AirWatch take care of the rest!

Guide to Who Holds The Decryption Keys for 16 Cloud and Backup Services

11:35 AM, Mar. 4th, 2016 · Dave Hamilton · Dave Hamilton's Blog


As many people are now learning, simply knowing that something is encrypted is not enough. Encryption, like security, exists on a continuum that runs between safety and convenience, and it's important to know where on that continuum your data – and cloud providers – lie. The largest factor in determining the relative security of your encrypted data is knowing who has access to the decryption keys (i.e. who is able to decrypt it... and when?). We made a list to help you out.