Following up on Predictions for 2018 in Tech

On New Years Eve, 2017, we wrote an article with predictions for the 2018 year in tech.  Now that the Halloween has passed and we are in the midst of the end of the year Holiday season, now's a good time as any to reflect on those predictions, and see what we got right, and … Continue reading Following up on Predictions for 2018 in Tech

The First Recorded Cyberattack

Twins Francois & Joseph Blanc were men ahead of their time. They are quite possible the first people to hack technology in order to commit insider trading, and they got away with it! We’re talking about two guys who hacked the top-of-the-line highest tech communication networks in the world at the time they hacked it: Napolean’s … Continue reading The First Recorded Cyberattack

Travel Destinations for Escaping Technology and Recharging Your Inner Batteries

I know this is a tech blog, and I’m a computer nerd who spends most of my waking hours behind a screen, but every once in a while, it’s healthy to give your eyes and brain a rest and breath some fresh air. One of my passions is traveling, and I’ve been fortunate enough to … Continue reading Travel Destinations for Escaping Technology and Recharging Your Inner Batteries

Chatrooms and Politics

No matter where political philosophies reside on the left-right spectrum, we can all agree that we live in energetically charged political times. The rise of right wing reactionary political factions in Europe and America, reenergized and emergent left-wing factions in Latin America, Canada and Europe, growing desperate Islamic dissatisfaction in the Middle East and Africa as … Continue reading Chatrooms and Politics

Protecting Your Systems Against Social Engineering

No matter how technically secure we set our devices, systems and accounts to be, there is always a human component to any cyber security protocol. Hackers and bad actors recognize this, and often times resort to manipulating users who have access to these systems to provide the information necessary to enter through the front door. … Continue reading Protecting Your Systems Against Social Engineering

Benefits of Two-Factor Authentication

It's becoming more common place to see suggestions or requirements for two-factor authentication from various pieces of technology, apps and sites. Often displayed with the shorthand 2FA, Two-Factor Authentication is an increasingly popular security method that requires two points of authentication from the user in order to grant them access. There is an obvious explanation … Continue reading Benefits of Two-Factor Authentication

How to deal with Internet Trolls

The internet is a strange and fascinating place. It's full of interesting works of art, entertainment sites, political action groups, cat videos and plenty of pornography, amongst many other things. It's a virtual space where people congregate and share ideas. However, it's also a largely anonymous place. This anonymity has encouraged the rise of the … Continue reading How to deal with Internet Trolls

State of the Union, Satirical Edition

Every year, except for the first year of a new president's term, the President of the United States makes an address to a joint session of congress reporting on the status of America's economy and detailing his or her's administrations policy goals for the upcoming year. This address is called the State of the Union. … Continue reading State of the Union, Satirical Edition

The Gap Between Technology and the Law

It is illegal for a potential employer to ask you about your religion, race, ethnicity or national origin while conducting a job interview. Discriminating against your application based on the results of those queries would be an absolute violation of your rights. However, there is nothing stopping a potential employer from looking you up on … Continue reading The Gap Between Technology and the Law

Tech Tip: Securing Your Systems and Information From Hackers

In the modern era, services involving sensitive information, such as shopping and banking, are commonly conducted over the internet. However, many of us are not careful enough with accessing our banking accounts or inputting credit card and social security information while utilizing these services. Here's a couple of steps you can take to ensure that … Continue reading Tech Tip: Securing Your Systems and Information From Hackers