• Main Menu
  • Blog

    • An Introductory Guide to Bitcoin

      An Introductory Guide to Bitcoin

      Bitcoin enthusiasts believe it could change the way we think of money, and severely disrupt the existing financial infrastructure centered around banks and government issued fiat currencies. We will talk more about the potential and impact of Bitcoin in another article, but in this one the idea is to explain, in a nutshell, what Bitcoin

    • How to Remove Information from Background Check Websites

      How to Remove Information from Background Check Websites

      It seems as though the more daily life becomes inter-connected with the Internet, the more that our personal information is available to just about anyone who wants it. Forget about National Security Agency conspiracy theories, the real danger to keeping our private lives to ourselves are the various commercial data collection warehouses that exist throughout

    • 15 Tools That Make Encryption Easy to Use

      15 Tools That Make Encryption Easy to Use

      In addition to simply exercising common sense when posting things about yourself online encryption is the most powerful tool we have for protecting our privacy and security. It doesn’t rely on rules and regulations to protect your privacy, or any other form of trust in third parties to take up the cause for you. Instead

    • Dell’s Precision T3500 Tower Workstation

      Dell’s Precision T3500 Tower Workstation

      Dell offers four tower workstations in it’s Precision line of products: T1600, T3500, T5500, and T7500. The T3500 is the most affordable of the Tx500 line, but still provides plenty of power and options for professional use. Dell’s Precision T3500 provides a good selection of options and performance at entry-level prices. It is an excellent

    • 6 Cheaper Superphones You Probably Didn’t Know About

      6 Cheaper Superphones You Probably Didn’t Know About

      If you want a powerful high end smartphone you probably think you’ll have to shell out well over $500 dollars or get yourself locked into a hefty two year contract. Understandable considering that phones that get the most attention by tech media, and get most advertised by their respective companies, at least in the west,

    • In Defense of Technology Lock-In

      In Defense of Technology Lock-In

      I’m going to do the unthinkable. I am going to actually defend the practice that many consider “anti-competitive”, the practice of so called “vendor lock-in” often employed by technology companies such as Apple and Microsoft. In a nutshell the practice of lock-in involves building pieces of technology that work only in certain predefined circumstances and

    • How to Prepare for an IT Certification Exam

      How to Prepare for an IT Certification Exam

      As a preface to this article, I should admit that I am a certification junkie. I hold CCNP and CCDP certifications from Cisco, the MCSE certification from Microsoft, the CISSP from ISC2, and additional certifications from HP, Oracle (Sun), Checkpoint, TripWire, the ICSA, and several other IT organizations and vendors. These certifications have been very

    • Why Stagnation of CPU Performance is Not a Big Deal

      Why Stagnation of CPU Performance is Not a Big Deal

      There are various reports talking about the difficulties of scaling current CPU technologies upwards to meet the expected major improvements in speed. In a nutshell, the ongoing trends of adding more cores, and integrating various non-CPU system functions with the CPU are only going to get us so far, but they will fairly soon reach

    • 8 Star Trek Technologies We Actually Use

      8 Star Trek Technologies We Actually Use

      In the half-century since Star Trek first fired up the popular imagination, a number of the technologies depicted in the franchises tales have since become commonplace. Let’s take a look at 8 Star Trek technologies that we can actually use today.

    blog
    309 queries in 0.346 seconds.