Jan Groover – The formalist who celebrates life

Jan Groover was born in Plainfield, New Jersey in 1943. Ms. Groover pursued an education in art, receiving her BFA in painting in 1965, from the Pratt Institute in New York, and later received her Master of Art Education from The Ohio State University in 1969. After teaching art in high school and then at the University of Hartford in […]

What are the worst used cars to buy?

It wasn’t that long ago that buying a used car meant taking a risk. People would be at risk of buying a car with faulty equipment such as a bad engine, alternator, and transmission. Fortunately, there are now many websites and consumer reports that tell people about the best and worst used cars to buy. To help avoid buying a […]

Back to School Time: Establishing Routines

Going back to school can be a busy and stressful time of year for you and your child. Establishing routines is an important step in maintaining discipline and order in your home. By the time school starts again in the fall, our children have fallen out of their usual routines. Parents need to remember that children need rules and guidance, […]

Possession of Drug Paraphernalia in Texas

The state of Texas still considers drug-related crimes to be quite serious, and these crimes carry severe penalties if convicted. Under Texas law, it is illegal to possess or have control of items that can be used for the consumption or manufacture of drugs. This means that the penalties even extend to those found only with paraphernalia and not the […]

5 Great Android Apps for Amazing Video Conferencing

Video conferences make our lives easier. Connecting with people from school and business has also been made possible through video conferencing. In line with this, Android also allows its devices to do just that. In no particular order, here are 5 great Android apps for awesome video conferencing: 1. Qik video connection Android Qik’s interface is different from its iOS […]

What Are the Types of Ethical Hackers?

The first step in the ethical hacking methodology is reconnaissance, also known as the information gathering phase. The aim of the reconnaissance phase is to collect as much information as possible about the target. For example, an attacker will likely collect passwords and essential details about employees. They can do this by using tools or search engines. Once they have […]