Tracing The Path Podcast: Hidden Connections In The 20th Century One of many reasons why people are fascinated by history is the connections that events from different geographic locations, ancient …
VTS Engineering recently ran into a situation where two of our virtual private cloud (VPC) networks had overlapping CIDR blocks, and we needed a way to establish connectivity between both. In our…
I wrote this chapter of Designing a Safer Digital World to explain how generative AI has transformed identity fraud from a manual, creative activity into a scalable, automated system. This shift affects every institution that relies on digital identity.
ANOTHER Bad Windows 11 Update is Breaking Things Is Microsoft even trying at this point? On April 14th, Microsoft released the April 2026 updates for Windows. In years past, I would have been curious …
Speech is a gift that brings our thoughts to life, connecting, defining, and shaping us. More than just communication, it’s one of life’s greatest, most underrated pleasures. Let’s appreciate the…
Healing Food Dreams - Desert Health®
Who SHOULDN’T Buy The MacBook Neo — And Who Should?
ManyStories and the Future of the Open Internet
Confessions of a Recovering Cybersecurity Creature
Are Your Dreams Horsing Around? - Desert Health®
What Linux Gets Right And Windows Completely Ruins
Introducing Gomen Games
Rheumatoid Arthritis, Surviving & AI
Dumping Linux — 3 Reasons People Return to Windows After Switching
SanDisk Stock: How AI Turned Storage Into a 13X Trade
AI, Time, And The Endless Ceaselessness Of It All
This US Federal Bill is Digital Tyranny Waiting to Happen
How 1 Line of JavaScript Took Down Half the Internet
Be featured on our homepage daily.
Placeholder description lin 1
Placeholder description line 2
Placeholder description line 3
The top writers this week. View all