blog

Bad AIs Eat Their Own Data

Poorly optimized algorithmic content is frustrating for users, in more ways than one. Ads (For [...]

What is BlueTooth?

Specs Bluetooth behaves a lot like ordinary WiFi, but over much shorter distances. It’s wavelengths [...]

A Brief Overview OF LAN and WAN

LAN stands for Local Area Network. A LAN is just a network of devices connected [...]

Bluetooth: Dos and Don’ts

Don’t: Hook too many things up to the same device The maximum number of Bluetooth [...]

NeoPets NFTs

Firstly, if you’re looking for a basic overall explanation, we have an article on NFTs: [...]

Talking Angela: An Accidental Misinformation Campaign

Games The early 2010s was an era of mobile-gaming greats, with such classics as “Where’s [...]

The EA Pride and Accomplishment Incident

EA – You can’t just do that. I’ve talked about the incident before in my [...]

Folding Phones, and the Road to Get There

Brick Phones The first portable phones were barely portable at all. A suitcase with a [...]

The iPhone’s Hard Reset Bug

Apple Apple’s proprietary software is notoriously difficult to make malware for. It’s not that it’s [...]

The EA Hack

The EA hack isn’t a special case. Not anymore. Hack, after hack, after hack, data [...]