Home > Blogs

Blog Posts

RSS Feed Subscribe  RSS details

Brad Yale

How the Internet Works: Platform As A Service

By Brad YaleYesterday

In an ongoing effort to shed light on basic concepts within the Internet, this article is going to touch on a underlying principle of cloud based solutions, PaaS. This article will aim to answer the following questions:


  1. What is PaaS?
  2. How does PaaS Work?
  3. How is PaaS Different than Traditional App Development?
  4. What are the Major Benefits of PaaS?
  5. Who Should Utilize PaaS?

  6. If you need a refresher on how the cloud works, check out "How the Internet Works: The Layers of the Cloud"

John  Traenkenschuh

Thank You, SANS.org!

By John TraenkenschuhFeb 12, 2015

No matter what the need, few security organizations are as dedicated to helping us InfoSec Pros as SANS.

John  Traenkenschuh

The Enemy Within

By John TraenkenschuhFeb 8, 2015

Long ago, Traenk read about new attacks, attacks modeled after biological attacks.  Those were viruses; what new comes?

Brad Yale

Windows 7: How To Delete Item Not Found Using CMD

By Brad YaleJan 22, 2015

Every operating system contains errors. One of the more common errors found within Windows OS's is the "item not found" or the "file not found" error. The error typically shows itself when a user tries to delete a file only to find it cannot be deleted when prompted with the following error message: "Could Not Find This Item: This Is No Longer Location in {insert_directory_here}. Verify the item's location and try again."

Well, for those of you who want to delete the file without verifying the item location, below is a quick video tutorial showing you how to delete the item in question. 

Brad Yale

How to Browse the Web Privately Using a Secure SSH SOCKS Tunnel

By Brad YaleJan 16, 2015

There are times when you want to browse the web but you want to do it privately, without being traced. Sure, you could go ahead and utilize the incognito feature built into most major web browsers however to truly browse in anonymity, there is nothing better than utilizing a secure SSH SOCKS Tunnel. In this quick "how-to", we are going to show you how to set up a secure SSH Socks Tunnel enabling you to route all your web traffic through your host.  

Brad Yale

The Rise of Communication through Haptic Feedback

By Brad YaleJan 14, 2015

For most of us, haptic feedback takes two forms - a vibrating phone in your pocket alerting you to an incoming message and key stroke vibrations when typing a text message/playing a game on your smart device. This though, is a shame because as Apple and Google engineers know, haptic feedback could be and should be used for so much more.

Brad Yale

The Uncoupling of American Content Society

By Brad YaleJan 12, 2015

If 2014 and CES 2015 has taught us anything, it is this: for the first time in American television consumer history, the consumer is gaining the upper hand in how, when and why they watch content. With announcements of single streaming services made by HBO, CBS and a variety of other cable stations in 2014 matched with Netflix, Amazon, Chromecast and the announcement of Sling TV at CES, 2015 might finally be the year when consumers ditch cable for selected streaming content.

In this spirit, here are four reasons why 2015 might be your year to leave your cable provider for streaming content services.

Brad Yale

Mobile Security: Physical Location Tracking

By Brad YaleDec 5, 2014

On the level of global commerce, we are addicted to devices. By the start of 2015, it is estimated there will be 3 billion Android devices in circulation around the world. Of those, there are roughly 19,000 distinct devices in operation. On the same accord, there are roughly 550 million active iOS devices globally with another few hundred million being phased out. As a global culture we love our mobile devices. Yet here is the thing, by all measures, our devices aren't all that secure. In both data and physicality, our devices have an operational tendency to betray us. 

This said, a question: what is more worrisome, mobile data security risks or mobile device physical security risks? 


Brad Yale

SEO 101: How to Search More Effectively

By Brad YaleDec 1, 2014

Google drives online life. There are roughly 40,000 global search queries every second. 40,000 search queries every second equates to roughly 3.5 billion global search queries per day. 3.5 billion search queries per day translates to roughly 1.2 trillion global search queries per year. As of the writing of this article 3:38 EST on 11/25/14, there have been 2.618 billion searches today. 

Search is critical to online life. Like blood flowing in your veins, search is the life force of the Internet. And yet, no one ever tells you how to search. There are tips and tricks you can use to make your search queries more effective, more targeted. Below are some of those search tips. 

John  Traenkenschuh

Well Played, Microsoft, Well Played

By John TraenkenschuhNov 23, 2014

Microsoft has always found support for its platforms by providing an excellent development IDE.  Now, that IDE is free, in most circumstances.

John  Traenkenschuh

Free Visual Studio?

By John TraenkenschuhNov 20, 2014

Just got notice that Microsoft is making a full-featured version of Visual Studio available--for free.  Traenk is happy.

Brad Yale

15 Critical SEO Terms

By Brad YaleNov 10, 2014

When you are new to any field, part of playing catch-up is learning the lexicon. Like any other field, SEO -Search Engine Optimization - is full of terminology which might seem like another language yet will prove critical to your ability to carry out everyday tasks of the professional SEO. 

With this said, here is a list of 15 Critical SEO Terms which you need to know. 

Page 1 2 3 4 5 Next >