Here's how to extend the life of Windows XP indefinitely2x Software offers up a solution to your XP woes. Worry no more. The 2xLifeCyclePlus replacement shell for XP is available now and ready to serve.May 2, 2014 by Ken Hess in Windows
Marvel's latest tech marvel: Amazing Spider-Man 2It's a rare treat to see a new blockbuster movie like Amazing Spider-Man 2 before anyone else does, but it's an even rarer treat to get to talk to the people who made it and to see how they made it.May 1, 2014 by Ken Hess in Enterprise Software
Linux is about to take over the desktop but not like you think it willYou'd better get ready for the personal computing, BYOD, and corporate computing revolution. Linux is coming to a desktop near you. But not like you think or had hoped. It's coming in the form of the Chrome OS on Chromebooks.April 15, 2014 by Ken Hess in Google
Five security considerations for IoT implementationsIf you're considering implementing an IoT strategy for your business, you need a serious security plan. Here's your checklist of five security weak points and what to look for when you attempt to fix them.April 14, 2014 by Ken Hess in Security
Judge enhances FTC's power to sue over security breachesThe broadening of the FTC's powers to include cybersecurity and lawsuits over security breaches extends the government's ability to destroy businesses.April 11, 2014 by Ken Hess in Security
Is IoT the new Y2K?Every big trend that hits IT brings with it a hoard of shlock products, fly-by-night companies, and 'experts' from under every rock. Get ready for the wave of the new Y2K: The Internet of Things.April 7, 2014 by Ken Hess in Security
Get ready for Windows Server 2012 and Powershell 4.0Have you made any advancements toward moving to Windows Server 2012 and Powershell 4.0? If not, I have a shortcut for you: CBT Nuggets classes taught by Don Jones.March 27, 2014 by Ken Hess in Enterprise Software
Learn the art of podcasting from Keith and The GirlComedy podcast show stars and professional podcasters, Keith and The Girl (Chemda) discuss their book, The Ultimate Podcasting Guide. The book contains all the information you need to start and succeed in podcasting.March 19, 2014 by Ken Hess in Apple
Your next corporate computer might be a ChromebookIf you're a System Administrator, an IT decision maker, or a C-level executive, you need to give the humble Chromebook some real consideration as the new corporate workstation standard.March 18, 2014 by Ken Hess in Mobility
Chromebooks and education: A perfect matchChromebooks are perfect for students of all ages. They're lightweight, sturdy, inexpensive, secure, and fun. What's not to love?March 13, 2014 by Ken Hess in Dell
My month with the Acer C710 ChromebookA whole month with nothing but a Chromebook to use for writing, browsing, image editing, emailing, and communicating. It wasn't easy, but it was easier than I imagined.March 7, 2014 by Ken Hess in Google
Bitcoin lovers lament transaction malleability: Got goxxed?The end of MtGox. The wildly fluctuating prices. The major losses and hacks. The utter nonsense of it all. It hurts, doesn't it? But you know what? I told you so.February 26, 2014 by Ken Hess in E-Commerce
Chromebook Spectacular: The Practical Chrome PodcastTonight at 10PM EST, I join John Oliphant, James Welbes, and Craig Tumblison for their Practical Chrome Podcast show. In this live 13th episode, "Tell Me What You Really Think", I discuss my ongoing 30 day adventure with my Acer Chromebook.February 25, 2014 by Ken Hess in Hardware
Fixing the PC market in the Post-PC Era: Build better PCsIf you build it, they will come. No truer words were ever spoken. Building a better PC isn't difficult; it's just not something that anyone thinks about while lamenting the dramatic drop in PC sales. Build a better PC and we'll buy it.February 25, 2014 by Ken Hess in Hardware
Revisiting recent hacks with Kevin Jones of Thycotic Software (podcast)Kickstarter, Snapchat, Target, Neiman-Marcus, and other high profile companies have fallen victim to malicious hacks. Kevin Jones of Thycotic Software and I discuss the implications and solutions.February 24, 2014 by Ken Hess in Security