How many sites and services can you login to using your Facebook or Twitter account? What if, instead, we used a secure method of login? Would our identities be more secure? Yes, they would.
There are no sacred cows to someone who believes that consumer devices and self-service IT are the keystones of the new business model. IT Apologist Ken Hess takes on Consumerization and bring your own device.
Kenneth 'Ken' Hess is a full-time Windows and Linux system administrator with 20 years of experience with Mac, Linux, UNIX, and Windows systems in large multi-data center environments.
I'm thrilled with my new iPhone 5. Well, with a few exceptions, I'm thrilled.
A lot of people are so angry about the government's "spying" programs that they're not really seeing the bigger picture. The big picture is that government surveillance is good. Yes, good.
Microsoft understands, better than any other software company, that BYOD is actually a thing. It's a thing to be dealt with at the source, which is exactly what they're doing.
US workers are angry about the job loss to cheap labor locations. American companies are to blame but we can take action to stop it. Caution: Long post.
It's funny to look back on my personal history with Linux and remember how subversive and alternative it once was. These days, it's just another operating system. That original subversive spark is gone.
An examination of the true state of the IT job market and the need for certification reveals some interesting results.
Gleaning from Adobe's 2013 Digital Marketing Optimization Survey, I found that less than half of the respondents have a mobile-optimized site or a mobile app.
In this off-topic post, I explore (no pun intended) the five major browsers and why you should care about them.
PowerShell is one of the best Windows tools available, but it could be even better. Here are my five suggestions for a better PowerShell experience.