Following up on Predictions for 2018 in Tech

On New Years Eve, 2017, we wrote an article with predictions for the 2018 year in tech.  Now that the Halloween has passed and we are in the midst of the end of the year Holiday season, now's a good time as any to reflect on those predictions, and see what we got right, and … Continue reading Following up on Predictions for 2018 in Tech

The First Recorded Cyberattack

Twins Francois & Joseph Blanc were men ahead of their time. They are quite possible the first people to hack technology in order to commit insider trading, and they got away with it! We’re talking about two guys who hacked the top-of-the-line highest tech communication networks in the world at the time they hacked it: Napolean’s … Continue reading The First Recorded Cyberattack

Wearables and Smart Watches: a Follow Up

  A few months ago, this blogger here at burgerfried wrote a post about wearable technology. Apparently, the fine folks at Reviews.com saw our post and contacted me about plugging an article of theirs reviewing smart watches, which for a nascent tech blogger like myself, should be considered an excellent opportunity to expand. However, if you … Continue reading Wearables and Smart Watches: a Follow Up

Utilizing NEAT While At Your Computer

Those closest to me know that one of my primary focuses this year is to break many bad dietary and physical habits in order to gain control of my health and lose 8 year’s worth of excess weight. As a web developer and systems administrator, this can be a difficult task given that I normally … Continue reading Utilizing NEAT While At Your Computer

Travel Destinations for Escaping Technology and Recharging Your Inner Batteries

I know this is a tech blog, and I’m a computer nerd who spends most of my waking hours behind a screen, but every once in a while, it’s healthy to give your eyes and brain a rest and breath some fresh air. One of my passions is traveling, and I’ve been fortunate enough to … Continue reading Travel Destinations for Escaping Technology and Recharging Your Inner Batteries

Best Language Learning Apps

Technology has had a global effect on humanity, bringing peoples and communities who are geographically distant closer together. Through instant communication and easing the diffusion of ideas, tech has helped give rise to Walt Disney’s ideal of a small world after all. However, even when we can instantly communicate with the far corners of the … Continue reading Best Language Learning Apps

Chatrooms and Politics

No matter where political philosophies reside on the left-right spectrum, we can all agree that we live in energetically charged political times. The rise of right wing reactionary political factions in Europe and America, reenergized and emergent left-wing factions in Latin America, Canada and Europe, growing desperate Islamic dissatisfaction in the Middle East and Africa as … Continue reading Chatrooms and Politics

Best Apps for Weight Loss and Fitness

There's an old adage that says "Summer Beach Bodies start in February". Since it's the beginning of March, what better time to go start trimming the fat then now? I've started a strict diet and exercise regemin, and being the techie that I am, I've done some research recently on apps that would assist me … Continue reading Best Apps for Weight Loss and Fitness

Tech Tip: How to Create a Restore Point in Windows

Using backups to create restore points are a great method to unwind damage caused by a virus or hack. They also help restore accidentally deleted information. Here's how to create a backup restore point on your device: Creating a backup: 1.) Go to Control Panel > System and Maintenance > Backup and Restore 2.) Select Setup … Continue reading Tech Tip: How to Create a Restore Point in Windows

Protecting Your Systems Against Social Engineering

No matter how technically secure we set our devices, systems and accounts to be, there is always a human component to any cyber security protocol. Hackers and bad actors recognize this, and often times resort to manipulating users who have access to these systems to provide the information necessary to enter through the front door. … Continue reading Protecting Your Systems Against Social Engineering