Happy Saturday, everyone! Here on Global Nerdy, Saturday means that it’s time for another “picdump” — the weekly assortment of amusing or interesting pictures, comics, and memes I found over the past week. Share and enjoy!







































































Here’s what’s happening in the thriving tech scene in Tampa Bay and surrounding areas for the week of Monday, May 4 through Sunday, May 10!
This list includes both in-person and online events. Note that each item in the list includes:
✅ When the event will take place
✅ What the event is
✅ Where the event will take place
✅ Who is holding the event

Tuesday at 9:00 a.m. at Entrepreneur Collaborative Center (Tampa): Entrepreneurs Learning and Growth Hub presents Preparing Your Business for AI Automation.
Many businesses attempt to automate too early and struggle with broken processes, unreliable results, and increased complexity. This session focuses on how entrepreneurs can properly prepare their business for AI automation by building the right foundations first.
In this session, you’ll explore what needs to be in place before introducing AI so automation supports growth instead of creating operational risk.
Find out more and register here.
Tuesday at 10:00 a.m. online: Computer Coach / Tech Success Network presents LinkedIn Master Class: Being Found In The Crowd.
Standing out on LinkedIn takes more than just having a profile. It takes intention, clarity, and the right approach. This live webinar is designed to help professionals cut through the noise and get noticed by recruiters, hiring managers, and industry peers. Led by the Computer Coach Career Services team, this session breaks down how LinkedIn actually works and how to use it as a tool for visibility, connection, and career growth.
Find out more and register here.
Tuesday at 5:30 p.m. at Entrepreneur Collaborative Center (Tampa): Tampa Bay Biotech presents Building Agentic AI Assistants: A Tutorial for Everyone.
Join Tampa Bay Biotech for a practical and engaging introduction to Agentic AI — the new generation of AI assistants that can reason, plan, use tools, and complete multi-step tasks. This session will explain how agent-based AI differs from traditional AI and standard prompt-response systems, then walk through the core architecture behind intelligent assistants, including LLMs, memory, tools, planning, execution, and orchestration.
Find out more and register here.
Wednesday at 5:30 p.m. @ spARK Labs (St. Pete): The St. Pete / Tampa AI Salon is back with Chad Mairn, Professor and Founder of the Innovation Lab at St. Petersburg College. It’ll feature the this format: keynote → startup pitches → open mic → networking.
Find out more and register here.
Wednesday at 6:00 p.m. at Vaco (Tampa): Tampa Bay Product Group presents Product Builders & Bingo: Casual Networking Social Hour.
Get ready for a networking experience that trades awkward silence for a little friendly competition. We’re turning the standard “so, what do you do?” small talk into a low-stakes scavenger hunt with our interactive Networking Bingo. Each attendee will receive a custom bingo card packed with a mix of product-focused prompts and lighthearted personal fun facts. Your mission is simple: strike up a conversation, find someone who matches a square, and have them sign your card. It’s the ultimate icebreaker designed to help you connect with as many local product peers as possible in a relaxed, pressure-free environment.
While you hunt for those winning rows, we’ll keep the energy high with plenty of fuel for your conversations. Food along with both alcoholic and non-alcoholic beverage options will be provided to keep things casual. Beyond the networking, we’ll also have exciting giveaways throughout the night for those who participate in the quest. Whether you’re a seasoned product leader or new to the field, come for the community, stay for the prizes, and leave with a whole new set of local connections.
Find out more and register here.
Thursday at 6:00 p.m. at TEKsystems (Tampa):
Ready to level up your network? Connect with industry-leading recruiters and fellow tech professionals at TEKsystems, one of the world’s premier IT staffing firms. Whether you’re looking for your next role in Web development, Cloud, Data Science, or Cybersecurity—or just want to be proactive in today’s shifting economy—this is the place to be.
Find out more and register here.
Thursday at 7:00 p.m. at The Neon Temple (Tampa): The Neon Temple presents Ouroboros of TPRM, is your TPRM actually working anymore?
Come join The Neon temple as D4B05H drops some knowledge-bombs about TPRM (Third-Party Risk Management). Understanding how the landscape has changed, and with the rise of AI, how effective actually is your current TPRM program? Some lessons learned from building an effective vendor TPRM program and how you can learn from their struggles.
Find out more and register here.
Friday at 6:00 p.m. at The Orlo (Tampa):
Organized by Disrupt the Bay, this is a Roaring ’20s-themed charity event in Tampa, FL, dedicated to raising funds for pediatric cancer research, particularly targeting ATRT. There’ll be a premium cocktail hour, live entertainment, curated dining, silent and live auctions, and powerful stories showcasing the real impact their support makes for children and families. It’s not just a gala—it’s an experience where purpose meets style, and generosity fuels life-saving breakthroughs led by Save The Kids Foundation.
And hey, you’ll get to hang out with this guy:
Find out more and register here.
| Event name and location | Group | Time |
|---|---|---|
| Sunday Chess at Wholefoods in Midtown, Tampa Whole Foods Market |
Chess Republic | 2:00 PM to 5:00 PM EDT |
| D&D Adventurers League Critical Hit Games |
Critical Hit Games | 2:00 PM to 7:30 PM EDT |
| IMPROV Drop-In Class! (FUN! No experience required) [$20] Spitfire Theater |
Tampa 20’s and 30’s Social Crew | 2:00 PM to 4:00 PM EDT |
| Sunday Pokemon League Sunshine Games | Magic the Gathering, Pokémon, Yu-Gi-Oh! |
Sunshine Games | 4:00 PM to 8:00 PM EDT |
| Tampa AI Builders Meetup – Casual Meet & Greet |
AI Wealth Builders of Tampa | 7:00 PM to 9:00 PM EDT |
| A Duck Presents NB Movie Night Discord.io/Nerdbrew |
Nerd Night Out | 7:00 PM to 11:30 PM EDT |
| Return to the top of the list | ||

How do I put this list together?
It’s largely automated. I have a collection of Python scripts in a Jupyter Notebook that scrapes Meetup and Eventbrite for events in categories that I consider to be “tech,” “entrepreneur,” and “nerd.” The result is a checklist that I review. I make judgment calls and uncheck any items that I don’t think fit on this list.
In addition to events that my scripts find, I also manually add events when their organizers contact me with their details.
What goes into this list?
I prefer to cast a wide net, so the list includes events that would be of interest to techies, nerds, and entrepreneurs. It includes (but isn’t limited to) events that fall under any of these categories:
On Saturday, April 18th, Anitra and I attended Tech in Full Effect, a gathering of Tampa people in Tampa’s tech scene who also enjoy ’90s hip-hop and R&B, and we had a grand time!
Organized by Jordyn Short and Tiffiny B., it took place at Gaspar’s Luxury Estate in South Tampa, a large house and property that can serve as a vacation place for a large group, or in the case of Tech in Full Effect, a lovely party venue.
They had DJ Will spinning ’90s classics…
…’90s hip-hop/R&B-themed drinks…
…and opportunities aplenty to catch up with old friends and make new ones:
While many of the guests were local, a number came from way, way out of town, including from Jacksonville, Miami, Atlanta, and even San Francisco.
I had lots of conversations, and some of the topics were…
(I try to bring both Steve Urkel and Stefan Urquelle energy.)
All in all, it was a great event with great people, great conversations, and great food and drink in an unusual setting for a Tampa Bay tech event. My thanks to Tiffiny and Jordyn for putting it on — and please let us know when and where you’re holding the next one!

Last week was my first week at NetFoundry, where I’m the Senior Developer Advocate. It was fun, and it was also like drinking from a high-tech, encrypted firehose!
To mark the occasion, I sat down with NetFoundry’s Head of Developer Experience (and also developer; he does a lot!) Clint Dovholuk for my first episode on Ziti TV. We spent an hour diving into the “meat” of Zero Trust, networking architecture, and why your traditional VPN might be the “castle and moat” that finally (and unintentionally) lets the invaders in.
If you’re a developer who has always viewed networking infrastructure as someone else’s problem (and as a recovering mobile developer, I’m certainly guilty on that charge), here’s the deep-dive breakdown of what I learned in my first week on the job.
The term “Zero Trust” is everywhere. You can’t throw a rock on the tech internet without hitting a marketing department claiming they’ve “solved” it, and Clint and I joked about the “eye-roll” factor of the term.
Clint said that Zero Trust might be better understood if you called it Explicit Trust. In the old “Castle and Moat” model, if you’re in the castle, you’re trusted. In the OpenZiti model, we assume the network is already compromised. You have zero privileges until they are explicitly granted based on:
Authentication: “Who are you?”
Authorization: “What are you allowed to do?”
A lot of resources will authenticate and authorize you through some kind of sign-in process. Clint describes OpenZiti as moving the process out by one layer into the network so you can’t even connect to an OpenZiti-protected resource without being authenticated and authorized first.
Or, to quote Clint:
With OpenZiti and Zero Trust, if you have a service that’s protected by OpenZiti, you first need to authenticate to the OpenZiti overlay network, and then you need to have an authorization that permits the operation you’re trying to perform.
OpenZiti also uses a Zero Privilege approach. Once again, to quote Clint:
The whole idea is that you have no privileges until you are granted privileges, and only then are you able to take whatever operation you want.
Apparently we’re on different sides of this debate. Clint prefers referring to JWTs as “Jay double-U tees,” while I prefer to call them “Jawts.”
OpenZiti is the network overlay project, and NetFoundry is the company behind OpenZiti.
The “Open” in OpenZiti comes from the fact that it’s an open source project. This is in keeping with the philosophy that a cybersecurity product should be open source because making source code publicly visible enables a community of developers, analysts, and other experts to audit, test, and improve it.
If you have the time, tech skills, and inclination, you can use OpenZiti and run your own overlay network at zero cost — if you don’t count the cost of said time and tech skills. It’s all up for grabs here.
However, if you’d rather spend your time and technical expertise elsewhere, especially once your needs get up to scale, such as on your main line of business, NetFoundry is here to provide you with a managed OpenZiti platform.
It’s easy to run one controller and two routers on your laptop. But when you’re an enterprise managing a fleet of routers, handling upgrades, and monitoring metrics, you’re suddenly in the “overlay business” instead of your actual business. NetFoundry is the “Easy Button” that manages OpenZiti for you [19:10].
Clint then gave a quick demonstration of the OpenZiti quickstart, which creates a fully functional OpenZiti network overlay on your system in a couple of seconds. This overlay has both a router and a controller, and each has a specific job.
The OpenZiti controller [24:36] serves as the brain of the overlay network. It’s the authority responsible for managing the state of the environment and ensuring that all connections are secure and verified before traffic ever flows.
Its responsibilities can be broken down into several key functions:
The controller surfaces several critical APIs that different components of the network interact with. These include:
Edge Client API: Used by SDKs and tunnelers to authenticate and discover services.
Management API: The interface used by administrators (often via the Ziti CLI) to configure the network, such as creating new identities or defining service policies.
Fabric and OIDC APIs: Used for internal mesh communication and identity provider integration.
The controller is the primary decision-maker for the two pillars of Zero Trust security:
Authentication: It verifies the identity of any user, device, or “workload” attempting to connect (answering “Who are you?”).
Authorization: It checks configured policies to determine exactly what that identity is allowed to access (answering “What are you allowed to do?”).
Unlike a traditional network where a firewall might be open by default, the controller ensures the network is dark by default. No connection is permitted until the controller has explicitly authorized it.
The controller is the starting point for bringing new devices into the fold through a process called “Bootstrapping Trust”.
It issues One-Time Tokens (OTTs) (essentially signed JSON Web Tokens) that are delivered to users.
When a client initiates enrollment, the controller validates the token and facilitates a Certificate Signing Request (CSR) exchange.
The end result is a strong, cryptographically verifiable identity that the client uses for all future secure communications.
While the controller does not actually handle the data traffic (that is the job of the routers), it provides the “map.” It coordinates with the edge routers to broker data channels, ensuring that when a client “dials” a service, the routers know how to steer that traffic to the correct destination.
The OpenZiti router [26:09] is the workhorse of the network. While the controller acts as the brain and makes policy decisions, routers constitute the data plane: the actual infrastructure that moves bits from point A to point B.
According to Clint, the router’s job can be broken down into these core functions:
The routers are responsible for creating the “mesh overlay network”. Unlike a traditional hub-and-spoke networking model, these routers connect to one another to form an interconnected fabric. Even if you start with just one router, you can deploy many others to extend this mesh.
The primary job of a router is to broker data channels. When an application wants to send data, the router facilitates the creation of a secure path. It effectively “steers” the traffic through the mesh to ensure it reaches the intended destination router and, ultimately, the target service.
Everything in OpenZiti is technically an SDK client, whether it’s a standalone app or a “tunneler.” These clients connect directly to the routers to form the necessary channels for communication. The router acts as the listener that accepts these connections once the controller has given the “okay.”
The router is where the heavy lifting happens. It is the component that actually sends your data from one side to the other. While the controller handles the logic of authentication and authorization, it never touches the application data itself. That task is handled entirely by the routers.
By acting as the only point of entry into the mesh, routers help enforce the “dark by default” philosophy. Unless a client has been explicitly authorized by the controller, a router will not broker a channel for it, effectively keeping the protected services invisible to the public internet, and by extension, unauthorized and malicious parties.
The coolest part for a developer? You can spin this all up on your local machine in about seven seconds with a simple ziti edge quickstart [23:00].
One of my questions was the one every developer asks: “Why can’t I just use a VPN?”
Clint insists that an OpenZiti overlay actually is a VPN [34:05] in the broadest sense, in that it’s a virtual network that’s closed off to unauthorized parties. It just functions much differently than the “one big mush” of traditional VPNs, which are open by default, and once you’re in, you can see everything.
On the other hand, OpenZiti is dark by default [35:45]. If you have a server on the open internet, it usually has an open port (such as port 22 for SSH or 443 for HTTPS). With Ziti, you close those ports entirely. The service becomes “dark,” and the ports are invisible, and you can’t attack what you can’t even find.
I’ll admit, when I first tried to set up a client and server, I got a little lost in the “magic dance” of certificates. Clint called this process bootstrapping trust [38:47].
It starts with a One-Time Token (OTT), which is a signed JWT, and the process goes like this:
The admin creates an identity on the controller [41:09].
The client uses the token to find the Controller’s URL [43:11].
The handshake takes place, where the client verifies the controller’s certificate, and they exchange a CSR (Certificate Signing Request) [44:43].
Strong identity: The result is a JSON file containing a key that must be protected like a secret.
We also took a detour into Agentic AI. Clint has been using MCP (Model Context Protocol) Gateways to let Claude interact with the Ziti CLI.
The breakthrough here is efficiency and security. By using an MCP Gateway, you don’t have to give your raw credentials to the AI [57:02]. Plus, by using a targeted MCP server, you can strip a massive 100k data object down to a 10k summary, saving a fortune in tokens [59:12].
I asked Clint who is actually using this in the wild. The “Adopters” list is growing, including projects like Blue Bubbles (the tool that brings iMessage features to Android) [50:33].
But the stakes get higher. We discussed Zero Trust Drones and secure communications on the battlefield [52:12]. When you’re in a high-stakes environment like Ukraine, having secure, “dark” comms is a necessity, not a luxury.
This was the first of many Ziti TV livestreams featuring Clint and Yours Truly. The next one’s scheduled for Friday, April 30th at 11:00 a.m. U.S. Eastern / 8:00 a.m. U.S. Pacific / 1500 UTC, and you can view past livestreams in the Live section of the OpenZiti YouTube channel.
Watch the full replay here: Ziti TV: Explaining OpenZiti to the New Guy
Happy Saturday, everyone! Here on Global Nerdy, Saturday means that it’s time for another “picdump” — the weekly assortment of amusing or interesting pictures, comics, and memes I found over the past week. Share and enjoy!







































































































Here’s what’s happening in the thriving tech scene in Tampa Bay and surrounding areas for the week of Monday, April 27 through Sunday, May 3!
This list includes both in-person and online events. Note that each item in the list includes:
✅ When the event will take place
✅ What the event is
✅ Where the event will take place
✅ Who is holding the event

Tuesday at 5:30 p.m. at the Rialto Theater (Tampa): Join TEKsystems and Gold’s Liquor for an evening of craft spirits, connection, and community impact as they raise funds for the March of Dimes organization!
This ticketed tasting event brings together members of the local business and professional community for a relaxed, social evening in support of the health of moms and babies.
All ticket purchase proceeds go towards their fundraiser for the March for Babies walk 2026.
Find out more and register here.
Tuesday at 5:30 p.m. at the Hidden Springs Ale Works (Tampa): Join Tampa’s tech pro on Tuesday, April 28th, for the monthly meetup event, TampaTech, Taps & Tacos!
No speakers, no presentations – just great conversations and a raffle (because that’s way more fun!)
Find out more and register here.
Tuesday at 6:00 p.m., online: The Mission: From “Hello” to “Welcome Back.” The biggest limitation of most AI apps is that they have “Goldfish Memory.” Every time you open the app, it’s like meeting a stranger.
At this meetup, this all changes. You’ll build an agent that uses Gemini 3’s 2-million-token context window and a new Memory Skill to create a truly personalized experience. Your app will remember that you hate cilantro, prefer 15-minute meals, and that you scanned an onion three days ago.
Find out more and register here.
Thursday at 2:00 p.m. at CoHatch West Tampa (Tampa): Join Tampa RHUG to explore cutting edge solutions for IT modernization.
They’ll dive into RHEL 10 Image Mode, a new deployment methodology that is a game changer for system security and administration. You’ll also see how Ansible Automation Platform simplifies VM lifecycle management and automates OpenShift Virtualization, a critical topic for those facing virtualization strategy changes.
Find out more and register here.
Thursday, starting at 4:00 p.m. at American Legion Post 138 (Tampa): You’re invited to participate in a MacDill and Tampa wide Orange Call!
Please feel free to spread the word to all communicators, guardians, and enablers past and present, as well as DoD Civilians. Their purpose is to gather and network amongst fellow communicators, guardians, and enablers of all ranks, titles, and experience levels, share resources, and seek professional development. They’ll conduct a round table meet & greet and discuss MacDill communicators and missions, including the increasing role of cyber and the importance of defending our nation’s networks.
Find out more and register here.

How do I put this list together?
It’s largely automated. I have a collection of Python scripts in a Jupyter Notebook that scrapes Meetup and Eventbrite for events in categories that I consider to be “tech,” “entrepreneur,” and “nerd.” The result is a checklist that I review. I make judgment calls and uncheck any items that I don’t think fit on this list.
In addition to events that my scripts find, I also manually add events when their organizers contact me with their details.
What goes into this list?
I prefer to cast a wide net, so the list includes events that would be of interest to techies, nerds, and entrepreneurs. It includes (but isn’t limited to) events that fall under any of these categories: