This blog post is in response to a comment made on Facebook. I certainly see where you are coming from. However in no way can these two things be properly… »
Why? The other day I bought a smartwatch. In 2017. You may ask why. It is a fair question considering 50% of Americans consider the smartwatch a passing fad… »
I discussed the benefits of building static websites in my last post. In this post, I want to expand on that discussion and explain how I built this amazing… »
My friend Erik asked me how much it would cost to 3D print a piece of paper. So how much would it cost you if you run out of paper but need to write down some… »
This entire post is from an email I received a while ago. It is an amazing example of model building, which is used extensively in some films. Two German… »
In part three I detailed how to create a secure environment and then how to create a master GPG key and then create signing, encrypting, and authentication… »
Keybase Set Up - Option 2 In the second post of my encryption series, I introduced you to Keybase. It is encryption for the masses. With a little bit of extra… »
In my last article, I touched on why encryption is important and offered some common sense first steps for your security. Let's expand that discussion by… »
Encryption To some, encryption sounds nefarious. Recent ransomware attacks may have given the word a bad rap. Encryption is the process of converting… »
So I built a server... Its name is Titan. My storage situation was becoming unwieldy. It consisted of seven bare drives and a hot swap bay. Backups were… »
It's 4:30 PM on a Friday and you get a call that a server you administer is down. The users are going to be working through the weekend on a project which is… »