- Web, Big Data, Social Media, TV Production, Wordsmithing

Campaigns and savvy companies use us to produce:

  • Internet infrastructure, email, domains, security
  • Brilliant web sites
  • Worker and activist management infrastructure (secure online back-office)
  • Big Data/voter data/activist data
  • TV production & distribution
  • Social media engagement
  • Engaging wordsmithing resulting in action
  • Mass email for action and engagement
  • Streaming media TV
  • Online security planning



 rsbn.jpg  newt.jpguniv.jpg  cain.pngwedbush.jpg


  • Latest from the blog

    GOP Tech Week Blog

    Three Non-Tech Tips To Save Work and Worry!

    Number Two Will Make Your HEAD EXPLODE! 

    Don't use all the social media tricks you've seen elsewhere to try to make your network soar.  Most don't work.  Be selective in your appeals and keep your messages in mass email short.  Put your appeals for social media action where they are most likely to be acted upon.

    All the following tips were developed from years of repeated A/B tests and will reliably and effectively help you build your audience.

    Read more

    Warning: PGP Fail in Major Email Readers

    PGPJust yesterday I released a video discussing the merits of using mainly because your system will not become littered with PGP/GPG keys and keyring files that would result in much deeper forensic scrutiny and/or cipher compromise if an adversary ever comes into possession or remote control of your phone/notebook/computer.


    Read more

    Security/Privacy Tip #4 of 4: Real Encryption -

    There were a lot of headlines at the front of this week's GOP Tech Week.

    • Whatsapp's last guardian of privacy/security against owner Facebook, CEO Jan Koum, departs Facebook exec team and board.
    • Facebook is launching a blockchain division to promote sleight-of-hand dedication to privacy
    • Signal repairs MAC OS notification bug

    Today we examine real encryption usng a strong tool that does not require public/private keys - just one key.  See the video for how to accomplish a good key exchange.

    Read more