I recently made a series of purchases on eBay and the contents of each box is known only to me. See if you can guess what I will eventually end up with and why.
Are hackers watching you as you sleep? I think it’s a crazy world of hype and here’s why.
If you offer file downloads from your site or if you have various features that users can interact with, it might be helpful to capture usage data.
Fun project today, I had to substitute each & with its HTML equivalent (&) but not any ampersands where the substitution had already taken place.
Anyone can follow a list of procedures, when do I get to make a difference? Can’t I just spend my time automating this?
In 2011, as a grad student, I forensically examined a TrueCrypt container to see if I could tell if it contained anything useful for an investigation. In doing so I learned a lot about implementing strong encryption.
What happens when computer scammers call me? I give them “on the phone training in patience.”
Designers and developers don’t have to be on the cutting edge, but they have to at least acknowledge their job is to serve those they are developing for. And I’m sorry, but mobile phones and social media are no longer cutting edge. They are just a given. My biggest pet peeve when dealing with tech […]