Stories by David Strom

  • In Pictures: How to protect virtual machines (VMs)

    By David Strom | 11 March, 2014 08:27

    These four products represent different approaches to VM security

  • Remembering Quark and AppleTalk, Netware and Gopher

    By David Strom | 21 January, 2014 13:11

    The Apple Mac has played an important part of my professional journalism career for at least 20 of the years that I have been a writer. One Mac or another has been my main writing machine since 1990, and has been in daily use, traveling around the world several times and my more-or-less constant work companion. It is a tool not a religion, yet I have been quite fond of the various machines that I have used.

  • In Pictures: Best tools for protecting passwords

    By David Strom | 09 September, 2013 08:16

    Passwords are a security weak link, but these products help shield passwords from attackers

  • Best tools for protecting passwords

    By David Strom | 03 September, 2013 10:23

    For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login.

  • What to look for when evaluating password manager software

    By David Strom | 03 September, 2013 06:04

    Here are the significant issues that can distinguish one password manager product from another. You'll probably make a similar list of requirements as you do your own research for password managers.

  • In Pictures: Threat management tools for small businesses

    By David Strom | 25 July, 2013 08:31

    Check Point wins test of eight unified threat management (UTM) devices for small business.

  • Smartphones take center stage in two-factor authentication schemes

    By David Strom | 20 May, 2013 14:30

    We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install.

  • In Pictures: Best tools for social media analytics

    By David Strom | 26 March, 2013 08:41

    How to tell if your Facebook, Twitter and LinkedIn efforts are paying off

  • How to tell if your Twitter, Facebook and LinkedIn efforts are paying off

    By David Strom | 25 March, 2013 13:51

    As businesses make more use of social networks, the number of engagement, analysis and monitoring tools has exploded. Enterprises are trying to understand their return on social media investments, to find out if their Twitter and Facebook marketing campaigns are actually delivering customers. They want to track social mentions across multiple networks and be responsive to both kudos and complaints.

  • Single sign-on moves to the cloud

    By David Strom | 17 December, 2012 15:23

    We are awash in passwords, and as the number of Web services increases, things are only going to get worse. Trying to manage all these individual passwords is a major problem for enterprise security. Many end users cope by re-using their passwords, which exposes all sorts of security holes.

  • Web-based conferencing comes of age

    By David Strom | 22 October, 2012 13:41

    As more people telecommute, having a reliable way to connect via desktop video conferencing takes on greater importance. And for employees working in the office, Web-based meetings are a cheaper and less time consuming alternative to business travel.

  • How we tested Web-based conferencing services

    By David Strom | 22 October, 2012 04:48

    We set up a variety of meetings on each of the services and then connected via different desktops, browsers, and mobile clients to see how each displayed the meeting content and handled the audio connection.

  • Six annoying router problems - and solutions

    By David Strom | 18 June, 2010 05:23

    These days, having access to wireless broadband is an absolute necessity for home offices and small businesses.

  • 10 top iPhone apps for IT pros

    By David Strom | 13 January, 2010 11:00

    While the frivolous iPhone apps usually get most of the media attention (yes, there really are over 175 apps that can produce rude bodily noises), there are quite a few apps that can help you do your job as an IT worker. While less notorious, they are worth your time to download and check out.

  • 10 top iPhone apps for IT pros

    By David Strom | 12 December, 2009 05:59

    While the frivolous iPhone apps usually get most of the media attention (yes, there really are over 175 apps that can produce rude bodily noises), there are quite a few apps that can help you do your job as an IT worker. While less notorious, they are worth your time to download and check out.

Get exclusive access to ARN's news, research and invitation only events.
ARN Distributor Directory
ARN Vendor Directory
Microsites

iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

 

Latest News

02:01PM
Aldi to sell Medion Android tab for sub-$200
04:32PM
Pacnet collaborates with China Telecom
04:21PM
4K brings flexibility to digital photography: Panasonic
03:22PM
MAXON partners with Side Effects Software
More News
24 Apr
The China Healthcare ICT Conference 2014
05 May
CeBIT Australia 2014
06 May
Oracle Day 2014 - Across 2 Cities
06 May
Oracle Day 2014 - Across 2 Cities
View all events