One of the downsides to technology is the hold it has on us at times. You see people walking down the street checking their phones oblivious to the world around them. Or how about those people sitting across from each other at a restaurant on their … [Continue reading]
Welcome to my horribly neglected Blog
As I was updating my bio to be um... a bit more up to date and current, I noticed that the last new post was from October 2015. It's official, I have horribly neglected this blog. The good news is, I have more ideas and content ideas now than I have … [Continue reading]
It’s Time for Email 2.0
Email has not evolved nearly as much as it could over the years. There is an opportunity for some major improvements by extending the capabilities available to users and administrators alike. Microsoft and Google have built very stable and robust … [Continue reading]
The Value of Testing Things to the Breaking Point
Last Friday night I sat down anxiously to read more of "The Organized Mind". Fortunately I had a couple of hours before my usual bed time to gather more valuable lessons. This book is already shaping the way I organize my tasks and more importantly … [Continue reading]
Tools for Personal Information Security
This is part 4 of 4 of the Personal Information Security Redux. As you might imagine there is so much to the topic of personal information security. This series of articles has merely scratched the surface. Hopefully it will help you become less … [Continue reading]
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 80
- Next Page »