Category: Articles

  • 2-Port Thunderbolt 2 KVM Docking Station Review, A Road Warriors’ Dream

    When trying to squeeze the very most productivity out of a make-shift work station, one of the central components is a KVM switch and a docking station. These devices let you combine multiple displays, multiple computers, and multiple peripherals into a single, cohesive unit. One of these devices was sent for review, and we found…

  • Netgear Nighthawk X10 Review (R9000), Big Is Beautiful

    A Router By Any Other Name… Is Half As Fast (Nighthawk X10 Review) A little bit of background. The purpose of a router. The diagram shows this visually, but a router is the hub of your network. Imagine spokes of a wheel being the devices you use that connect with the internet, and your router…

  • [Opinion] The United States Government Is Limiting Consumer Choice, Fear-mongering

    So What’s The Problem? Technology is a global ecosystem. Advancements in the industry may happen in individual research centers, implementing them requires dozens more. Research that is funded in America is then designed in Germany and manufactured in Taiwan for instance. Though this isn’t an article on supply chains, it will help to highlight just…

  • Net Neutrality Repealed, What Happens Now?

    What Was Net Neutrality? “Net neutrality is the principle that Internet service providers must treat all data on the Internet the same, and not discriminate or charge differently by user, content, website, platform, application, type of attached equipment, or method of communication.[4] For instance, under these principles, internet service providers are unable to intentionally block, slow down or charge money for…

  • (Sponsored) Firewalls, Security, And FireDragonSecurity

    Firewalls are an essential part of your IT security infrastructure. In fact, in many cases, they are the foundation and rightfully so. It’s important to note, however, that the target has changed and so have the perpetrators. These days, the masterminds behind cyber-attacks are infinitely more sophisticated than they once were. Many will stop at…

  • (Sponsored) Why Time Til Live (TTL) is a Critical Factor in Your Cyber Security

    Cyber-crime has become much more sophisticated than ever before. No longer are the threats simply a kid playing in the basement. The cyber war has become a billion dollar industry, netting malware companies and hackers millions. As corporate IT departments attempt to keep these companies out, CEOs and presidents need to remember that they may…

  • Electronics Entertainment Expo E3 Day 2 Recap

    Normally Day 1 would be where the biggest day of the show. Then comes E3 Day 2. As it turns out, Sony is taking top honors and they debut’d with a bang. If you were going to head back to watch the event after, I would recommend the Sony Press Conference above all others. So,…

  • Electronics Entertainment Expo (E3) Day 1 Recap

    For those out of the loop, E3 has been a central hub of video game news for 22 years. The event has served as the largest convention of video game delevopers, console pushers, and related products in North America. While in the recent past, many companies have opted out for their own press event (notably…

  • The CIA, Your ISP, And You

    The CIA, Your ISP, And You

    With new details coming out on the regular thanks to Wikileaks and the bowels of internet, we are learning more and more that privacy doesn’t exist. At least, privacy should not be assumed. This is something individuals and organizations have to actively pursue. Be it from the prying eyes of random hackers (likely), your ISP…