Animus BytesinAnimus BytesUnveiling the Technological Dystopia: Decoding David Foster Wallace’s Infinite JestStep into the mind-bending world of David Foster Wallace’s Infinite Jest, an enthralling novel that takes readers on a journey through a…Aug 2, 2023Aug 2, 2023
Animus BytesinAnimus BytesConfronting the Abyss: A Call to Shatter Fear and Unleash the SelfYou’re not dynamite but you’ll doJul 17, 2023Jul 17, 2023
Animus BytesinAnimus BytesThe Shadow: Part ThreeJungian Inner Work: An Approach to Self-HealingSep 29, 2022Sep 29, 2022
Animus BytesinAnimus BytesThe Shadow: Part TwoThe Importance of Owning Your Shadow: How to Embrace the Dark Side of Your PsycheSep 29, 2022Sep 29, 2022
Animus BytesinAnimus BytesThe Shadow: Part OneThe Shadow in Jungian Psychology: What is it and why does it matter?Sep 29, 2022Sep 29, 2022
Animus BytesinAnimus BytesTo Begin to Understand Russia, Start with the VarangiansThe existence and name of a pre-Kievan Rus’ Khaganate are inferred from a handful of early medieval Byzantine and Persian and Arabic…Sep 29, 2022Sep 29, 2022
Animus BytesinAnimus BytesThe Importance of Aleksandr Solzhenitsyn’s ‘The Gulag Archipelago’ in Our Modern RealityFrom the moment that Aleksandr Solzhenitsyn published The Gulag Archipelago in 1973, it has remained an important text for those wishing to…Sep 28, 2022Sep 28, 2022
Animus BytesinAnimus BytesBuilding Virtual Reality and Augmented Reality AppsTools to considerSep 28, 2022Sep 28, 2022
Animus BytesinAnimus BytesA supply-chain risk management approach that is practicalAnd How Arx Can HelpSep 27, 2022Sep 27, 2022
Animus BytesinAnimus BytesA Beginner’s Guide to ISO 27001: The Basics of Information Security ManagementInformation security management (ISMS) defines and manages controls that an organization needs to implement to ensure that it is sensibly…Sep 27, 2022Sep 27, 2022