Software Updates & Reviews
Cybersecurity
Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs.
...
Hardware Releases
Podcast #847 – Micron Kills Off Crucial, AM5 Budget Build Sadness, Ryzen 9850X3D Leak, Plex, Shady Panda and MORE
Yes, we talked about DDR5 pricing a lot, again. But we also talked about a very special Intel...
Software Updates & Reviews
Fix “This video format is not supported” on YouTube TV
Setting up a new computer is bliss -- no old, unused apps and the machine performs much better...
Tech Trends & Innovations
Skeet Ulrich Reveals the ‘Scream’ Reboots’ Original Endgame
The Scream franchise came...
A Complete Guide to Building Modern Solutions
The year 2024 is going past us. With many transformations taking place on the...
Linux Foundation forms new initiative to support development of Chromium-based projects
The Linux Foundation has launched the...
Low-Maintenance Backend Architectures for Scalable Apps
After years of working in the intricate world of software engineering, I learned that the most beautiful solutions are often those unseen: backends that...
User Research is Storytelling
Ever since I was a boy, I’ve been fascinated with movies. I loved the characters and the excitement—but most of all the stories. I...
How to Download a YouTube Video or Channel
The ability to download media on the internet almost feels like a lost art. When I was in my teens, piracy of mp3s,...

