Installing a sprinkler system at my home

I have been researching requirements for installing a home irrigation(sprinkler) system and have not found any single location where I can get all the city and state requirements for a homeowner installing their own sprinkler system.

RULE §344.30

A property owner is not required to be licensed in accordance with Texas Occupations Code, Title 12, §1903.002(c)(1) if he or she is performing irrigation work in a building or on a premises owned or occupied by the person as the person’s home. A home or property owner who installs an irrigation system must meet the standards contained in §344.62(b) Spacing, §344.62(c) Water pressure, §344.62(g) related to spraying water over impervious materials, §344.62(j) Rain or moisture shut-off devices or other technology, and §344.62(k) Isolation valve. Municipalities or water districts may adopt more stringent requirements for a home or property owner who installs an irrigation system.

All other research has provided no additional requirements that I need to follow.  Time to get started designing my system.  🙂

Quicken 2015 Premier – ERROR CC-501

I was trying to setup “Express Web Connect” for an account that I have had in Quicken for some time now.  I received “Error CC-501 is typically caused by a problem on the Quicken server. Please do not contact your financial institution for assistance.  They cannot resolve this issue. ” after entering my username and password.

Being an enterprise technical support engineer I began researching this error via  I found a few links, all of which indicated that as long as I am at the latest release version, I needed to contact Quicken technical support.  Which I did.

Links in order of access link 1, link 2, link 3.

Other than being somewhat hesitant talking with me, the frontline support person was helpful.  We collected CustomerCentralError.txt, OFX.log and CONNLOG.txt.  After a minute or two support came back on the phone and let me know they had advanced the case to [tier 2] support and I should receive an email in 24 to 48 hours.

Being a fan of Pink Floyd….

I was reading about the history of the Billboard 200 record chart ranking publication on WikipediA.  When I ran across this truly amazing statistic.

As of 2008, Pink Floyd‘s The Dark Side of the Moon has been on the charts for over 1,630 weeks, or approximately 31 years. Consecutively, the album spent a record 773 weeks on the Billboard 200. The other weeks were spent on the Top Pop Catalog Albums chart.

I have owned a copy of this album(vinyl) for most of the 31 years it was on the charts.  I still own a turntable and a vinyl copy of Dark Side of the Moon.  I think I will take a musical lunch break this afternoon and escape from reality for about an hour.

Pirelli World Challenge – GTS Round 2 @COTA


1. GTS, Brett Sandberg, Allendale NJ, 2:17.500
2. GTS, Lawson Aschenbach, Palm Beach Gardens Fl, 2:17.622
3. GTS, Scott Dollahite, Austin TX / Austin TX, 2:17.606
4. GTS, Nate Stacy, Owasso OK, 2:17.875
5. GTS, Parker Chase, New Braunsfels TX, 2:18.499
6. GTS, Max Riddle, Vancouver Canada, 2:19.108
7. GTS, Kevin Marshall, Incline Village NV, 2:19.491
8. GTS, Mark Klenin, Lone Tree CO, 2:19.683
9. GTS, Tony Gaples, Libertyville IL, 2:20.146
10. GTS, Jeff Courtney, Milwaukee WI, 2:20.292
11. GTS, Nick Esayian, San Diego CA, 2:20.831
12. GTS, Jason Alexandridis, Ashland OR/Novato CA, 2:20.971
13. GTS, Ron Ballard, Phoenix AZ, 2:22.571
14. GTS, Dore Jr., Miami FL, 2:18.615
15. GTS, Jack Jr, Livonia MI, 2:18.715
16. GTS, Martin Barkey, Huntsville Canada,
17. GTS, Patrick Byrne, Spokane WA,
18. GTS, Bob Michaelian, Seal Beach CA/San Antonio TX,

The Bill of Rights

If anyone hasn’t read these in a while, it might be good idea to do so, before you started popping off about any of the first ten Amendments to the United States Constitution. Better know as the Bill of Rights


First Amendment:

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

Second Amendment:

A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.

Third Amendment:

No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time of war, but in a manner to be prescribed by law.

Fourth Amendment:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Fifth Amendment:

No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.

Sixth Amendment:

In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed, which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the Assistance of Counsel for his defence.

Seventh Amendment:

In suits at common law, where the value in controversy shall exceed twenty dollars, the right of trial by jury shall be preserved, and no fact tried by a jury, shall be otherwise re-examined in any court of the United States, than according to the rules of the common law.

Eighth Amendment:

Excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted.

Ninth Amendment:

The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.

Tenth Amendment:

The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.

vagrant: Cleaning up global-status using –prune

I have been wondering on to remove invalid entries from Vagrant’s cache related to Vagrant’s global-status report. Here is what I had before running global-status with –prune.

$ vagrant global-status
id       name            provider           state      
79df4b2  dc1             vmware_workstation not running
c4e872e  default         vmware_workstation not running
e297c2e  default         vmware_workstation not running
189bdaf  CL2             vmware_workstation not running
e198c39  CL1             vmware_workstation not running
6bcfef3  KAOS_web_dev    vmware_workstation not running
444920b  semsuv2         vmware_workstation not running
c017de8  kk_web_dev      virtualbox         poweroff
4f8e633  KAOS_Dev_Server virtualbox         poweroff
3409463  default         virtualbox         poweroff
96b522e  default         virtualbox         poweroff
5cb58ad  ctxphc          virtualbox         poweroff
9471f24  default         virtualbox         poweroff
04e9f07  default         virtualbox         poweroff
d4630d1  default         virtualbox         poweroff
1be1d04  default         virtualbox         poweroff
79736d8  default         virtualbox         poweroff
46e441f  default         virtualbox         poweroff
c8ea61e  default         virtualbox         poweroff
e4ac638  master          virtualbox         poweroff

Running global-status with the –prune option gives me the following output.

$ vagrant global-status --prune
G:/Vagrant/boxes/vivid-x64-kaos/0/virtualbox/include/_Vagrantfile:5: warning: already initialized constant VAGRANTFILE_API_VERSION

f:/Phpstorm/Servers/CTXPHC Precise amd64/Vagrantfile:5: warning: previous definition of VAGRANTFILE_API_VERSION was here

e:/Servers/Salt-Stack/Vagrantfile:5: warning: already initialized constant VAGRANTFILE_API_VERSION

G:/Vagrant/boxes/vivid-x64-kaos/0/virtualbox/include/_Vagrantfile:5: warning: previous definition of VAGRANTFILE_API_VERSION was here

e:/Servers/Salt-Stack/Vagrantfile:5: warning: already initialized constant VAGRANTFILE_API_VERSION

e:/Servers/Salt-Stack/Vagrantfile:5: warning: previous definition of VAGRANTFILE_API_VERSION was here

Now when I run vagrant global-status I get an accurate listing of Vagrant machines I have created.

$ vagrant global-status
id       name    provider   state   
96b522e  default virtualbox poweroff
5cb58ad  ctxphc  virtualbox poweroff
9471f24  default virtualbox poweroff
04e9f07  default virtualbox poweroff
d4630d1  default virtualbox poweroff
1be1d04  default virtualbox poweroff
79736d8  default virtualbox poweroff
46e441f  default virtualbox poweroff
e4ac638  master  virtualbox poweroff

NOTE: I have removed the Directory portion of the output for a cleaner look.

I have to thank Stakeoverflow for always having the best answers and explanations!

Lone Star Le Mans is BACK!

Lone Star Le Mans is BACK!

Hey Y’all! 

I hope you are as excited as I am about Le Mans coming back to COTA Thursday September 17th – Saturday September 19th. Last year was long hours, rain and boxed dinners but watching the rooster tail on the LEDs during that night racing….what a thrill! Having the track all to yourself during qualifying….epic!

This year will be more of the same! You can choose half shifts or full shifts. Tentative schedule is:

AM shift –  5:30 am – 12:30 pm 

PM shift – 11:00 am – 9:30 pm 


AM shift – 5:30 am – 12:30 pm 

PM shift –  11:00 am – 7:45 pm 


AM shift – 6:30 am – 2:15 pm 

PM shift – 1:30 pm – 11:00 pm 

This year we’ll provide all meals on track, primitive camping, a free guest pass and more great COTA swag than you can shake a stick at.

Registration will be handled by MotorsportReg! Click here to sign up:

Top Four Cyber Security Myths: Debunked!

Feb. 10th was  Safer Internet Day, an international education and awareness-raising effort for organizations, families and individuals spanning more than 100 countries around the globe. In the spirit of sharing information and best practices on Safer Internet Day, the Symantec Norton team has compiled — and debunked — the top four cybersecurity myths along with quick tips to protect yourself online.

Share these with your friends, family and professional network.

1. I don’t need mobile security because traditional threats don’t target mobile devices.
While small and compact, smart phones and tablets are as sophisticated as most computers these days. This makes our mobile devices a high-value target for cybercriminals. Eight Android malware families were discovered in November 2014 alone, and of the mobile malware discovered in the last 12 months, 26 percent were comprised of threat techniques such as downloaders and Trojans. It is important to recognize that your mobile device is a sophisticated computer that can contain as much (if not more) unique personal content than your other devices. Keep your mobile devices safe from Internet threats by following these tips:

  • Always download your apps from an official app store.
  • Never click suspicious links in emails, SMS links or web pages — even on your phone.
  • Employ a password on your phone, and use software that can help you remotely wipe your data as well as find your phone should it be lost or stolen.

2. I can’t get viruses on social networks.
As you spend more time on social networks and your circles grow to include a larger group of acquaintances and friends of friends, you become an attractive target for cybercriminals who are looking to “go where the action is.” While you can often spot threats directly targeted at you, it can be difficult to spot a problem when a less savvy friend recommends a link or a post. On social media, cybercriminals are known to invest time crafting highly enticing fake offers that are intended to capture personal and financial information — and spread the scam through sharing. Stay safe from scammers by following these tips:

  • If an offer appears on your social network that appears to be “too good to be true,” don’t click on the link. Instead, do some research on the offer or company using your Internet browser. Oftentimes, someone else has fallen for the same scam and will report it online.
  • Use your social network’s blocking features to filter out suspicious followers, spam and other unwanted content.

3. Macs can’t get viruses, only PCs do.
Cybercriminals always focus their efforts where they see the most “bang for their buck.” Traditionally, Windows systems have offered the greatest return on investment. However, as the Mac has gained in popularity, and criminals have moved to tools that can target users regardless of their operating system, the volume of malware targeted at Macs has grown. Follow these tips to protect your Mac:

  • Don’t ignore those automatic updates — keeping your Mac operating system up-to-date will help protect from threats.
  • Always ensure that your Mac’s included security features (firewall, FileVault encryption) are turned on when possible.
  • Always try to download files from trusted sources.
  • Beware of phishing sites that may trick you into submitting your personal information. Such sites normally work on all browsers on all platforms, including Mac OS X.

4. My wearable is untouchable.
Wearable devices have quickly become the new trend in tech because they can help quantify and continuously improve a variety of aspects of your life. While this technology is very exciting, the biggest concern with wearable devices is that they are data collectors — holding key personal information such as your name, age, health and location. These devices often have the capability to transmit information wirelessly and can leave your information vulnerable to being leaked. Protect your personal data with these tips:

  • Be cognizant of the personal data that is collected and ask yourself, “How important this data is to you?”
  • Understand the privacy policies of the companies collecting your data to make sure you understand how it is being stored and used.
  • Use caution when using social sharing with these apps, and make sure you’re not sharing more than you intended.

What cybersecurity myths have you seen and heard? Talk about them in the comments section.

For more information about Symantec’s commitment to safeguard employee and customer data, visit the Your Information section of the Corporate Responsibility website.

Pro Sound News and Pro Audio Review: Take advantage of this free offer!



I’d like to take a moment to thank you for reading Pro Sound News and invite you to share the love!

Simply forward this email (or link below) to your colleagues who can also benefit from staying on top of everything that is happening in the industry. Pro Sound News covers the market like no other publication.

As a bonus, both you and your colleagues also receive FREE access to issues of Pro Sound News on the iPad/iPhone!  Download the app in the iTunes store.

Thanks again for reading Pro Sound News.


Michele Fonville
Audience Development

P.S. Pro Sound News now includes bi-monthly issues of Pro Audio Review!