Blog



Understanding the Meltdown Attack

Posted on January 5

Image

This month, security researchers released a whitepaper describing the Meltdown attack, which allows anyone to read the full physical memory of a system by exploiting a vulnerability in Intel processors. If that sounds bad, that’s because it is. It means that if you’re running workloads on a public cloud provider, and you don’t have a […]


3 Ways to Increase Your IT Earnings in 2018

Posted on December 31

Image

As 2018 draws near, companies go into hiring mode, and people come and go, which often leaves a lot of open positions. If you qualify to fill one of the more in-demand positions, you can often negotiate a higher salary. My biggest salary jumps have always come in the first quarter of the year. To […]


4 Inconvenient but Effective Security Measures

Posted on October 4

Image

Security usually requires sacrificing convenience (or money). So naturally, we tend to get away with as little security as possible. But if you’re a glutton for punishment, here are 4 very inconvenient but highly effective measures you can take right now to protect yourself from theĀ  evils lurking on the interwebs. Disable JavaScript Yeah, I […]


Blockchain is a Passing Fad

Posted on October 4

Image

Whenever a tech fad comes to an end, it becomes so obvious why it failed. Yet during the hype, it’s easy to miss the problems lurking just below the surface. I want to explore some of the problems I see with public blockchain and why I think it’s not going to live up to the […]


Yes, You Need IT Certifications

Posted on September 30

Image

Certifications are often lambasted as “worthless pieces of paper” and “experience is more important.” But for some people, certifications are more important than experience. A substitute for experience Newcomers to the IT world face the classic problem: how do you get experience without a job? Sure, you can tinker around on your own time, but […]