blog

Piracy: Don’t Do It

Piracy is a crime. Don’t pirate things. They’re serious about it. I’m not just being [...]

Are Newsletter Signups Dangerous to Journalism?

Hear me out here. (I don’t have stats, so this is purely an opinion piece [...]

ARGs: What Are They?

ARG stands for Alternate Reality Game. It is what it sounds like: the game’s creator [...]

Codebreaking – AI vs. The Zodiac Killer

The Zodiac Killer’s cipher spent years unbroken. Misspellings and mistakes within his own system made [...]

The Saga of System 32

  System 32 is essentially the heart of the computer’s software. Task manager, the boot-up [...]

Apple Wheels – It’s Wheely About Advertising

Ah, Complaining.   Apple Wheels   The Apple Mac Pro cost several thousand dollars, and [...]

Memes in Marketing: Apex Motion

  Apex Motion is a machinery company specializing in bakery automation. They make machines that [...]

Internet Of Things: Network Vulnerability

  Internet of Things items are convenient, otherwise they wouldn’t be selling. At least not [...]

Blizzard Entertainment’s 2012 Hack: An Example of How to Do It Right

In 2012, game developers were beginning to experiment with a principle known as “always on”. [...]

Optical Storage

  Optical storage is defined by IBM as any storage medium that uses a laser [...]