I’ve heard it a hundred times: Should I store my files in my Dropbox account or in my Cloud account? Isn’t The Cloud better since it is more modern than Dropbox? I begin to tremble with fury …Read Article
This feature first appeared in the Summer 2014 issue of Certification Magazine.
Criminals lurk in many of the Internet’s dark corners, scouting out victims and eager to pounce whenever they identify a network vulnerability. Organizations that fail to apply basic security controls to their networks face a multitude of risks from anonymous attackers, including theft of …Read Article
Sometimes finding out about a cybersecurity vulnerability is like seeing a mouse in the kitchen. Before it happens, both businesses and home computer users tend to assume that their IT security is entirely shipshape. If you haven’t seen any problems, then why would you assume that problems exist, right? You only start asking questions after you …Read Article
In an article penned for Certification Magazine last month, I spent some time speculating about the next version of Microsoft Windows, the beta release of which was due out Sept. 30. In that article, I pieced together all of the rumors and speculation to try to form a coherent picture of what this …Read Article
The term Internet of Things, or IoT, was coined in 1999 by Kevin Ashton. Ashton, a British technologist who co-founded the RFID-pioneering (radio frequency identification) …Read Article
Windows 8 has been with us for a couple of years now and its reception in the marketplace has been tepid at best. A lot of users found the interface changes in Windows 8 to be unpalatable. In fact, many users elected to keep the familiar environment provided by Windows 7 on their desktops, and …Read Article