Articles by Jonathan Keane
Ransomware can cripple a business, but what can you do about it? Security experts weigh in on options
Bitcoin has certainly had its ups and downs in recent years, but what will 2015 hold for the
Data breaches can happen to any business, not just the huge nationwide chains you hear about on the news. Small- to medium-sized businesses...
There are many types of virtualization available today. Here we examine the various types and how they are used
Data centers can use enormous amounts of energy, but thanks to recent legislation, more of that energy will be coming from renewable...
The security of businesses and their customers is under scrutiny, meaning a greater need for security professionals. That starts with a...
Bring-your-own-device policies are becoming more common in businesses today. But before implementing them at your company, here are some...
Due to its anonymous nature, bitcoin has become associated with cybercrime - with its users becoming both the perpetrators and victims of...
Most people associate cryptocurrency with bitcoin, but there are numerous others out there too. From national currencies and cause-based...
The cryptocurrency bitcoin is slowly gaining popularity, especially with small businesses. Detailed here are some of the steps, advantages...
Join thousands of others with our weekly newsletter
The 4th Era of IT Infrastructure: Superconverged Systems:
Approaches and Benefits of Network Virtualization:
Free E-Book: Public Cloud Guide:
Free Tool: Virtual Health Monitor:
Free 30 Day Trial – Turbonomic:
- Apr25 The Data-Native Analytics Architecture: Seeing Is Believing
- May10 Better to Ask Permission? Best Practices for Privacy and Security
E-mail is not a threat. (Postal mail) is universal. The Internet is not.- USPS spokesperson Susan Brennan, in a 2001 Wired article.