Fitness Trackers… I win
The fitness tracker craze….
I win….
I tossed a “fitbit” tracker in to a paint mixer.
Now, I get health insurance for $1/decade, and I won the presedential fitness medal twice in one month!

The fitness tracker craze….
I win….
I tossed a “fitbit” tracker in to a paint mixer.
Now, I get health insurance for $1/decade, and I won the presedential fitness medal twice in one month!

Public Key Infrastructure (PKI) and Public Key encryption are essential components of Transport Layer Security (TLS) as well as digital signing. These technologies are also used for any application in which encryption and authenticity are key components, such as WS-Security, a standard for encrypting XML messages.
Continue Reading
At least twice a year, you should perform a “tech checkup” on your Windows computer, to make sure everything is running right.
Don’t bother calling the Nerd Squad….
This is something you can do, fairly easily, by yourself, for free.
Read on, to learn how
(Current as of Q2/2015)
I get asked all the time, “what laptop do you recommend?”
It’s a question with a complex answer, based on your budget, how you use it, and hardware features available on the market at any given time.
Because model numbers change so quickly, I wont cite specific models, so this article is more of a buying guide – how to figure out which features you need, and select a manufacturer. Once you know what you’re looking for, you can shop online or at your local big box retailer.
Click to advance to the next slide, or scroll down to view or download the printable PDF version.
I get asked all the time why I’m not on Facebook, nor on Twitter.
When an employee or contractor leaves the company, it’s best practice to immediately disable their access to company resources.
In the digital and online world, it’s easy to miss some forms of access, and remember off-hand every single system where the employee’s access should be revoked.
The level of risk increases when the employee separation occurs involuntarily, which might create a situation where the former employee is disgruntled, and increases exponentially if the employee has administrative privileges to sensitive systems.
In this article, I will attempt to outline best practices for a policies and processes around identity and access management, enumerate specific forms of access, many of which might be overlooked, and share some anecdotes resulting from the failure to properly revoke a terminated employee’s privileges.
Port of Ularn (“Ultra” Larn), a 1990’s version of Larn, an ASCII-based text game from the 1980’s.
Runs on Windows (Win32) including XP, Windows 7, Wiindows 8
Added color!
Science generally agrees that “mankind”, homo sapiens, is about 200,000 years old.
During that span of time, technology has advanced at an ever-increasing rate, but there have been only a small handful of innovations – fundamental changes – that altered mankind’s ability to express itself technologically.
ULarn (Ultra-Larn) for Win32, built on Cygwin but runs natively
Ularn that runs on Windows 7!