Author/Consultant Jeremiah L. Byerley
Jeremiah Byerley is a technical consultant & author who helps individuals and businesses develop the confidence and habits they need to be competitive in the information age. Jeremiah has unique insight in California’s South Coast working for companies such as Santa Barbara’s Higher Octave Music and Ojai’s Lynda.com with a wealth of international experience consulting for EMI, Activision, IDIMedia (Blaylock & Company), Anysoft and a contributor for online syndication company, Storyful. The news & tutorials on this site feature articles written by Mr. Byerley and curated selections from other authors to keep you on the edge of technology and security. For consultations requests, please contact Jeremiah.

How to Sync Google Calendar With iPhone Calendar

By Heinz Tschabitscher Early in the history of the iPhone, syncing Google Calendar with the iPhone Calendar app was an involved process, but current versions of iOS support Google accounts without any extra fiddling. Adding your Google Calendar events to the iOS Calendar app requires just a handful of taps. Apple’s iOS operating system supports […]

Meet the xenobot: world’s first living, self-healing robots created from frog stem cells

See the world’s first living, self-healing robots01:25 By Jessie Yeung, CNN Scientists have created the world’s first living, self-healing robots using stem cells from frogs. Named xenobots after the African clawed frog (Xenopus laevis) from which they take their stem cells, the machines are less than a millimeter (0.04 inches) wide — small enough to travel […]

No ‘Silver Bullet’ Fix for Alexa, Google Smart Speaker Hacks

Karsten Nohl, who was behind this week’s research that outlined new eavesdropping hacks for Alexa and Google Home, says that privacy for smart home assistants still has a ways to go. Researchers this week disclosed new ways that attackers can exploit Alexa and Google Home smart speakers to spy on users. The hacks, which rely on […]

OpenVPN vs IPSec, WireGuard, L2TP, & IKEv2 (VPN Protocols 2020)

What are VPN protocols and why do you need to understand the different options? With most VPN providers offering a variety of VPN protocols to choose from, it is good to know the pros and cons of these different options so you can select the best fit for your unique needs. In this guide we […]

China Poses an ‘Existential Threat’ to International Human Rights, Says Rights Group After Director Barred From Hong Kong

  Protesters attend a rally in Hong Kong to show support for the Uighur minority in China on Dec. 22, 2019. Dale de la Rey—AFP/Getty Images By Suyin Haynes and Sanya Mansoor January 14, 2020 China poses an “existential threat” to the international human rights system, according to a new report released today by Human […]

Apple Removes 17 Malicious iOS Apps From App Store

Researchers have uncovered malware in 17 iOS apps that were removed from Apple’s official App Store. Researchers have uncovered 17 apps on Apple’s official App Store infected with malware. Apple has since removed the apps from the App Store – but a “significant” number of iOS users could have installed them, researchers said. Once downloaded, […]

iMessage For Android: How to Get It And Use It

How To › Android iMessage For Android: How to Get It And Use It Share Pin Email Print   Android Tips & Tricks Basics Guides & Tutorials Installing & Upgrading Key Concepts Samsung Quick Tips By Sam Costello Writer Sam Costello has been writing about tech since 2000. His writing has appeared in publications such […]

Turn off, disable, or uninstall OneDrive

If you don’t want to use OneDrive, the easiest solution is to unlink it. If you want to stop syncing for a while, you can temporarily pause OneDrive and then resume syncing later. Learn how to pause and resume sync in OneDrive. Notes: You won’t lose files or data by disabling or uninstalling OneDrive on your […]

ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit Ones

Consumers don’t vet apps well enough to mitigate mobile threat risk, according to the latest mobile-threat report from RiskIQ Malicious mobile apps that try to dupe consumers by mimicking reputable apps is a persistent problem that’s on the rise, making an app store’s commitment to security a key factor to consider for mobile users who […]

No ‘Silver Bullet’ Fix for Alexa, Google Smart Speaker Hacks

Karsten Nohl, who was behind this week’s research that outlined new eavesdropping hacks for Alexa and Google Home, says that privacy for smart home assistants still has a ways to go. Researchers this week disclosed new ways that attackers can exploit Alexa and Google Home smart speakers to spy on users. The hacks, which rely on […]