• Main Menu
  • Blog

    • IT Certifications vs. College Degrees

      IT Certifications vs. College Degrees

      Which is more valuable, an IT certification or a college degree?  While the answer to that question depends upon many factors, we can learn a great deal by examining the specifics. Obviously, not all IT certifications are the same and not all college degrees are the same. The most common IT certificate is the MCSE

    • Space Colonization and Free Market Essential to Sustainable Growth

      Space Colonization and Free Market Essential to Sustainable Growth

      Here’s a yet another seemingly far fetched piece by yours truly, talking about such things as choosing between the potential destruction of all humanity and evolving endlessly into a god like race. Intrigued? I’m obviously not the only one to think in such dramatic and marginal terms. In addition to the hordes of nerds entertaining

    • 10 Coolest Gadgets Your Cat Will Love

      10 Coolest Gadgets Your Cat Will Love

      These gadgets aren’t for you human, they’re for your cat. Of course, since your cat can’t read you’re gonna have to do this. If you make your cat happy you’re likely gonna be happier too, so better pay attention now! We’ve picked out 10 cool gadgets we think your cat will love. 1. Pet Feeder

    • Technologies That Can Help Protect Your Privacy

      Technologies That Can Help Protect Your Privacy

      In a previous article on privacy we’ve established what it is, how does digitally networking our world affect it, and in a nutshell, why should we care. We established that the best way to ensure your privacy is through technological means, and in this article I offer an overview of what such technologies are. What

    • 10 Ways Facebook Subtly Changes Your Behavior

      10 Ways Facebook Subtly Changes Your Behavior

      Facebook continues to be the most popular social network, and has basically become as ubiquitous as telephones and televisions once were, almost as if a basic utility. Some actually find it strange when they find someone who isn’t on Facebook. But all that’s pretty obvious. What might not be as immediately obvious is just how

    • Imagine a world without language

      Imagine a world without language

      Language is something we take for granted, but when I start thinking about it it's a challenge just getting to define it, not to mention the very definition of language depends on language and the intricate relationship it has with our thinking and perception of reality. Language is actually a very dangerous tool. It is

    • 5 Reasons Why Tesla Motors Will Conquer The World with Electric Cars

      5 Reasons Why Tesla Motors Will Conquer The World with Electric Cars

      Tesla Motors is relentlessly working to make electric vehicles the absolute future of personal transportation. They’ve made them cool. They’ve made them viable, and they’re conquering the world. This is why they will succeed. 1. Elon Musk: Not Your Run of The Mill Entrepreneur To understand the success and drive of Tesla Motors we’ve got

    • In Defense of Technology Lock-In

      In Defense of Technology Lock-In

      I’m going to do the unthinkable. I am going to actually defend the practice that many consider “anti-competitive”, the practice of so called “vendor lock-in” often employed by technology companies such as Apple and Microsoft. In a nutshell the practice of lock-in involves building pieces of technology that work only in certain predefined circumstances and

    • How to Compare Online Schools

      How to Compare Online Schools

      Most institutions of higher learning only seriously compete with one or two other schools. Students often wish to attend a school near home, so the decision is often based on geography instead of educational quality. In addition, many public schools charge much higher rates of tuition to students from other states than they do to

    • Why Everyone Should Use a VPN

      Why Everyone Should Use a VPN

      VPN, or a Virtual Private Network, connects computers and other devices using an encrypted connection. This means that all data travelling through such a network is unreadable to anyone who might intercept the data stream, making it as private as it would be if all of the connected devices resided within the walls of a

    127 queries in 0.484 seconds.