Latest Posts

Episode 13: “Beer Brewing”

In this episode Adam and Peter discuss beer brewing.  Peter has engaged in the art and science of homebrewing and has a lot of questions.

HomeBrewing for Dummies is actually a very good book.

Beer Brewing Class in Nashville

Basic Brewing Class

August 13th, 10am-11am
Are you new to brewing beer?
Have you been thinking about learning how but don’t know where to start?
This class is for you! Learn the basics of brewing beer at home. We’ll walk you through the step by step process of making a batch of beer and explain the equipment, ingredients, and give helpful tips along the way.
Registration fee is only $15.
Space is limited.
Register here!
As always, we have all of your gardening and brewing supplies (in addition to wine making kits)!
Stop in to discover your next hobby!

All Seasons Gardening & Brewing Supply Co.

924 8th Ave. South

Nashville, TN 37203

PART OF THE SPRING NETWORK

Episode 12A – “Found a Laptop and a Pokemon”

In this episode Peter’s friends have found laptops and they are not sure what to do with them.  We go on to discuss the laptops and our own discovery of Pokemon Go.

Show Notes:

What is Pokemon?
https://en.wikipedia.org/wiki/Pok%C3%A9mon

The iPhone case that could make you a Pokémon master: ‘Target’ gadget aims to help struggling players catch ’em all.
http://www.dailymail.co.uk/sciencetech/article-3712966/The-iPhone-case-make-Pok-mon-master-Target-gadget-aims-help-struggling-players-catch-em-all.html

Pokemon Aimer
https://www.myminifactory.com/object/pokeball-aimer-pokemon-go-23009

Episode 12: “Prepare for the Worst”

In this episode Adam and Peter discuss the worst case scenario.  When it has hit the fan and all of the preventative measures have failed, it is time to mitigate the damage.

10 Critical Steps to Survive a Ransomware Attack, Step 10: Prepare for the Worst

Episode 11: “Whitelist”

In this episode Adam and Peter discuss using the “Whitelist”.  What does your computer and a nightclub have in common?  You can’t get in if you are not on this list.

10 Critical Steps to Survive a Ransomware Attack, Step 9: Allow Only Whitelisted Applications