Thursday, February 5, 2026

Free Seamless Mult-Computer Control with Deskflow

 

Free Seamless Mult-Computer Control

I tried Deskflow, the open-source keyboard and mouse sharing solution that lets you control multiple computers as one. Whether you’re working across Windows, macOS, Linux, or BSD machines, Deskflow turns your primary computer’s keyboard, mouse, and clipboard into a command center for all nearby systems — all without extra hardware or video switching. It’s like having a software KVM that actually simplified my setup, and love that its open source under the GPL-2.0 license.  

Deskflow isn’t just about sharing input — it’s about creating a fluid work experience across diverse environments. Imagine dragging your mouse off the edge of one screen and instantly typing on another, copying text on one machine and pasting it on another, or coordinating tasks across devices with no friction — all over a secure TCP connection with TLS encryption enabled by default. With active support for modern systems and Wayland on Linux, Deskflow embraces today’s desktops while empowering developers and power users alike to build or customize their ideal multi-machine workflow.  I've been using it for about 3 months and have noticed that it can get laggy on wifi , but works rock solid when my computers are using a wired connection.

click here or the image at the top for the software


https://blogs.cisco.com/security/three-benefits-segmentation?utm_medium=referral&utm_source=content&utm_campaign=thetechfirm



Wednesday, February 4, 2026

Reserving an IP on a Cudy Router Without Losing Your Mind

If you’ve ever gone hunting for a simple “DHCP Reservation” option on a Cudy router, you’ve probably discovered that Cudy likes to play a little game of hide-and-seek with its terminology. The feature is there, it works well, but it’s not always called what you expect. That’s why reserving an IP on a Cudy router is one of those tasks that feels harder than it should—until you know where to look. Once you crack the language barrier, though, the process is straightforward and incredibly useful.

The big benefit of reserving an IP address is consistency. Devices like printers, servers, or cameras really don’t appreciate surprises, and neither do the apps or computers that talk to them. By reserving an IP, you’re telling your router, “Hey, this device gets this address every time—no exceptions.” In my case, I used an HP DeskJet 2600 as the example in the video, because printers are famous for breaking the moment their IP address changes. One reservation later, and those “printer not found” errors magically disappear.

On a Cudy router, the trick is understanding that IP reservations are often tucked under something like Static Lease, Address Reservation, or a similar-sounding menu instead of the classic DHCP wording. You’ll usually need the device’s MAC address, then pair it with the IP you want it to keep. It’s not obvious at first glance, but once you’ve done it once, the mystery is gone—and suddenly Cudy’s interface makes a lot more sense.

The payoff is well worth the couple of extra clicks. Reserved IPs make troubleshooting easier, keep port forwarding rules stable, and generally reduce the number of “why did this stop working?” moments in your network. Whether it’s an HP DeskJet 2600 or any other always-on device, taking the time to lock in an IP on your Cudy router is one of those small networking wins that saves you headaches later.

Click here, or the image  to check out the Cudy AX3000  



For those of you who want to see a short video demonstrating how to do this, here you go


Enjoy



Opinion: Impact of AI on Networking Engineers



Tuesday, February 3, 2026

Free Stanford AI course - LLM Evaluation & Scaling

 

Free Stanford AI course - LLM Evaluation & Scaling

If you’re looking to elevate your understanding of deep learning and neural networks, this YouTube playlist is an invaluable resource you won’t want to miss. Carefully curated to take you from core fundamentals to advanced techniques, this collection of expert-led videos breaks down complex topics into lessons that are easy to follow and rich in insight. Whether you’re a beginner just stepping into the world of AI or a seasoned coder aiming to sharpen your skills, this playlist has something to offer at every level. 

What makes this playlist truly stand out is its focus on clarity and depth. Each video takes the time to explain not just how algorithms work, but why they work — giving you a deeper intuition that goes beyond memorization. From learning the mathematical foundations of machine learning to exploring hands-on coding examples and real-world applications, the playlist builds your confidence step by step. The result is a learning journey that feels structured, supportive, and highly informative.

One of the biggest advantages of this YouTube playlist is its flexibility. You can watch at your own pace, revisit tough concepts as many times as needed, and integrate learning seamlessly into your schedule — no deadlines, no tuition, and no classroom required. Whether you’re balancing work, school, or personal projects, this on-demand format makes mastering deep learning both accessible and sustainable.

In today’s tech landscape, understanding deep learning isn’t just a bonus — it’s a superpower. From powering recommendation systems to enabling image recognition and natural language processing, deep learning shapes the future of technology across industries. This playlist gives you the tools and insight to stay ahead of the curve and apply these transformative skills in your own projects and career. Dive in today and take a significant step toward mastering the world of intelligent systems. 

Watch here:
👉 https://youtube.com/playlist?list=PLoROMvodv4rObv1FMizXqumgVVdzX4_05 


Free Stanford AI course - LLM Evaluation & Scaling


Monday, February 2, 2026

From the web: Microsoft Confirms It Can Share Windows 11 BitLocker Keys With Law Enforcement

from the web: Microsoft Confirms It Can Share Windows 11 BitLocker Keys With Law Enforcement

Microsoft has basically confirmed that it can hand over BitLocker recovery keys to law enforcement if there’s a valid legal request.

BitLocker is the built-in disk encryption used on lots of Windows 11 machines, and many people don’t realize that the recovery keys get saved to Microsoft’s cloud by default — which means if the FBI or another agency gets a warrant, Microsoft can hand those keys over to help crack open a locked device. This hasn’t been widely known until recently, but reports say at least one case in Guam involving fraud investigations saw the FBI get the keys from Microsoft and use them to unlock encrypted laptops.


It’s stirred up a bunch of privacy debates because the whole point of encryption is to keep prying eyes out, and folks are pointing out that other tech companies design their systems so the provider can’t hand over keys even with a warrant. While Microsoft says key recovery is meant to be a convenience for users, security experts worry storing these keys in the cloud makes them a potential weak spot — not just for law enforcement access but also if hackers ever breach those cloud systems.

https://www.ghacks.net/2026/01/24/microsoft-confirms-it-can-share-windows-11-bitlocker-keys-with-law-enforcement/


Why fiber rollout alone isn’t the answer
https://www.datacenterdynamics.com/en/opinions/connecting-the-usa-why-fiber-rollout-alone-isnt-the-answer/


Thursday, January 29, 2026

The Case for the Post-Install Check-In


The Case for the Post-Install Check-In

Installing new network gear can feel like crossing the finish line of a marathon. The link comes up, the lights blink happily, and there’s a strong urge to declare victory and never look back. But that’s exactly why post-install check-ins matter. An install isn’t really done when the hardware is mounted and powered on — it’s done when you know it’s behaving itself in the real world, not just during that first five-minute victory lap.

In this case, I followed up on a Ubiquiti Wave Pro link after the install, fully expecting to see a calm, stable connection living its best life. Instead, I found the link hopping frequencies like it had too much caffeine. On paper, everything looked “up,” but under the hood the radio was changing channels far more often than it should. If I hadn’t checked back in, this would have quietly turned into intermittent performance issues and finger-pointing later on.

The Case for the Post-Install Check-In
That’s the sneaky danger of skipping follow-ups. Many problems don’t show up immediately — they creep in once the link starts dealing with real interference, weather changes, or other radios in the area. A post-install review lets you catch these early warning signs while they’re still small and fixable, instead of waiting for a user to report that “the network feels weird sometimes,” which is never a fun troubleshooting starting point.

Following up also gives you a chance to validate your original assumptions. Maybe the spectrum looked clean during the install, but reality had other plans. Maybe auto-settings are being a little too enthusiastic. Checking back confirms whether the configuration you chose is actually the right one, or if it needs tuning. It’s like going back to tighten the bolts after a test drive — boring, but extremely effective.

In the end, checking on equipment after an install isn’t about mistrusting your work — it’s about respecting physics, RF chaos, and the fact that networks love to misbehave when you’re not looking. That quick follow-up on the Wave Pro link turned a potential future outage into a simple adjustment. And honestly, that’s way better than getting a call later that starts with, “So… this has been happening for weeks.”



Introduction: Moving Beyond Basic Benchmarking
For network engineers, relying solely on basic single-stream iPerf or simple ping output often fails to capture the true performance characteristics of a network path, especially under load. This is where FLENT (The FLExible Network Tester) comes in.

click on the image to read the article 


Popular post