Sometimes the sheer pain of dealing with Windows' quirks, 'features', and various anomalies is just about more than any sane person can bear. The fact that everything goes to the C drive drives me crazy and after 20+ years with Windows, that drive is pretty short.
There are no sacred cows to someone who believes that consumer devices and self-service IT are the keystones of the new business model. IT Apologist Ken Hess takes on Consumerization and bring your own device.
Kenneth 'Ken' Hess is a full-time Windows and Linux system administrator with 20 years of experience with Mac, Linux, UNIX, and Windows systems in large multi-data center environments.
You probably are more than a little paranoid about giving out your social security number but that risk is just the tip of the iceberg. Data breaches over the past eight-and-a-half years put millions of people at risk.
It's frustrating to deal with the constant threat of browser-based malware, pop-ups, and extensions gone wild. I wonder where all the good browsers have gone? It would be nice to have one that works.
The iPhone 5 has some great features but there's one that it doesn't and it makes me want my iPhone 4 back. Apple's connector blunder makes me want to toss my iPhone 5 out the window or possibly through one.
A little cross country travel makes one realize that connectivity is essential. A lot of cross country travel makes one realize that connectivity is sparse at best. A connected nation is a safer nation.
It's beyond comprehension that people still text while driving but it's even more shocking to know that people can't refrain from using their phones during normally intimate times. It defines a whole new meaning for 'bring your own device.'
It's obvious to all observers that Microsoft is in a state of transition and transformation. Ballmer has declared that now that there is 'One Microsoft.' E Pluribus Unum, dude. What's the next move?
When you install Java, you see a graphic that informs you of Java's popularity. But the question is, do we as users, have a choice? The answer is, "Yes, but."
You can encrypt, use multi-factor authentication, connect via VPN, have anti-malware software and still give away your identity by making a fundamental mistake when using your mobile phone: Talking too loud.
Mobile phones started out as brick-heavy, full-sized behemoths. Then they were tiny candy-bar sized toys. Now we're on the grow again. How big is too big for mobile devices? And how small is too small?