sysadmin

Tips for Maintaining a Growth Mindset

+

One of the key ingredients to success in both life and your career is a growth mindset. This post outlines what a growth mindset is and provides some tips that will help you adopt one.

Essential keyboard shortcuts (Windows/macOS/Linux/UNIX)

+

Regardless of which desktop operating system you use, there are many keyboard shortcuts that can save you time and boost productivity. In this blog post, I'll summarize some key ones (pun intended).

How to Leverage Music for Maximum Tech Productivity

+

Listening to music while working at your computer is one of the most effective productivity hacks for tech professionals. In this post, I'll outline how to create a music strategy for maximum effectiveness.

macOS for Linux admins (2022 refresh)

+

If you already know the ins and outs of the Linux operating system, this is everything you need to know about macOS.

An overview of cloud buzz words

+

Cloud buzz words are everywhere. In this post, I'll pick them apart and explain what they represent.

UNIX/Linux is now a core skill for anyone working in tech

+

UNIX and Linux have come a long way since the 1990s. Today, they rule the cloud....and the rest of the world too.

Cybersecurity in a Nutshell

+

Cybersecurity plays a massive role within organizations and existing IT job roles today. If you want to know more about the different facets of cybersecurity, then this blog post is for you!

Seldom discussed tips for working in the tech industry

+

There are plenty of great tech industry tips online. In this post, I'll discuss some that you probably haven't seen before.

5 Z shell features that will encourage you to switch from Bash

+

macOS and some Linux distributions now use the Z shell as the default login shell instead of Bash. This post outlines five awesome Z shell features that may encourage you to switch from Bash.

Cybersecurity in the early 1990's

+

Cybersecurity is critical in today's digital age of ultra-connected software and hardware. But what did computer security look like 30 years ago? And did it bear any resemblance to cybersecurity today?