Have You Ever Been So Tired That You Ate an Earplug in Your Sleep?

March 18th, 2018 | Essay, Parenting
Yes, I too, didn’t know that was something that could happen, until yesterday evening. As I may have mentioned, my wife and I have a sweet little infant at home, so I am deep into the sleep deprivation game. Since I want to be a good husband and partner, and help share some . . .

All Else Equal: I’d Rather Not Get Hit in the Face With a Tennis Ball

February 15th, 2017 | Essay, Philosophy
There are times when a lot of things can simultaneously go wrong, and a person can quickly find themselves in a veritable maelstrom of worry. There are also times when we can see certain problems approaching on the horizon, which appear blurry at first, but viciously clear . . .

The Top Three Ways to Improve Your Cybersecurity Hygiene

October 18th, 2016 | Cybersecurity, Technology
Yesterday I had the privilege of attending a Cybersecurity Town Hall with Congressman Mike Honda, as well as members of the FBI and U.S. Secret Service. The overarching theme of this event was how we, as citizens, can improve our personal cybersecurity hygiene. While this . . .

Popular Post Algorithms Are a Self-Fulfilling Prophecy

October 9th, 2016 | Behavioral Economics, Blogging
Let's say I wanted to create a module to display my blog's "popular posts." No harm in that, right? Wrong! The sheer act of creating a system to display popular posts creates a further gap between new content and content that was already deemed, popular. Sure, this many . . .

Creating Content for Mass Distribution Is an Energy Vampire

October 9th, 2016 | Blogging, Data Analysis
I have noticed a very interesting occurrence when it comes to the act of creation—regardless of if you're recording a podcast, creating a new vlog, or just writing a simple blog. There is an almost fractal like amount of time that is required by each creative work, and as . . .

Does Your Company Have Data Recovery Fire Drills?

October 8th, 2016 | Cybersecurity, Technology
In any company, a member of the leadership should be able to randomly ask a senior member of the tech staff to run a failure simulation. This simulation is a process whereby the tech team would then work to restore a system (in this case, a website) from their backups as . . .

Intro to the Immutable Log

October 6th, 2016 | Cybersecurity, Technology
The Immutable Log, which is a term I first came across while reading an article in Forbes many years ago, is such an amazing concept—yet virtually nobody (statistically speaking) knows about it! An Immutable Log is a complete record of each and every interaction with any . . .

An Easy Way to Set up Grav for Local Development

October 4th, 2016 | Blogging, Technology
You should almost never download individual files via FTP, edit them, and then upload them—overwriting the older copies on a server. This is a generally outdated practice and something I still see used frequently when people don't know of a better option, are too lazy to . . .

Stop Asking Me to Join Your Mailing List

October 3rd, 2016 | Behavioral Economics, Technology
I will preface this by saying—if you like to engage with the Internet via email only, signing up for every mailing list you come across might be a great way to bypass having to read news websites, or find things with search engines. Just kick back in a dark room with a nice . . .

Creating Half-Formed Content Is Superior to Creating Nothing at All

October 2nd, 2016 | Blogging, Philosophy
Evergreen content is a term I first heard while working at a newspaper. It means content that can (or will) evolve or change over time, making it continuously useful, as opposed to content about specific events or stories that once read, aren't typically worth revisiting—and . . .