Charles does an amazing job with our minutes; full of detail, linked references and plenty of follow-up research on all the topics and questions discussed at our meetings. We have created a new page for members to download these documents in PDF format. You can also use this website to search for the main topics in the minutes. Use the search box located on our Home Page.

Hope you find this useful.

Cheers

Peter (Pres.)

 

 

Posted
AuthorPeter Ward

eMug is the Euroa Macintosh Users’ Group, with enthusiastic members from many places including Avenel, Benalla, Euroa, Gooram, Kialla, Longwood, Merton, Shepparton, Tatura and Violet Town.

One of the great features of the Apple range of computing devices is that they work together.  At eMug we find out how to use each device, and we also explore the nice ways in which the devices communicate with each other.  For example, your list of names and addresses (Contacts) on your Mac will be automatically copied onto your iPad and iPhone so you do not have to type them again.

Being a member of eMug is also a great way to meet other like-minded people.  eMug cares for the needs of the raw beginner as well as experienced and advanced computer users.

Topics that eMug has presented over its 7 years of operation include apps, backup, charging your computing devices, Contacts, data storage, electronic newspapers, email, fine art and crafts, greeting cards, history, internet, library access, making movies, mapping, music, new products, newsletters, photography, presentations, security, sending large files, software tutorials, spreadsheets, video conferencing, word processing, and YouTube, to name a few.

We are kicking off this year with a special meeting on Privacy and Security of your iPhone and iPad (iOS devices). This will be a timely and helpful meeting as many users of these devices struggle to understand what information they are sharing daily with the authorities and IT companies. It can be a bit scary to know exactly what is going on and we will try to inform our members to help them make decisions for themselves about what information they want to share and how they can prevent cyber crime.

Posted
AuthorPeter Ward