I am going to resist writing an article on the iPad - there is plenty of material available on that already. Instead, let's talk about the much heavier subject of cyberwarfare. Ever since August 2008, when a cyberattack on Georgia's government,...
Read More 

Personally Identifiable Information,

By now even the general public has become or is becoming aware of the term Personally Identifiable Information (PII). It refers to information that could identify sensitive information about individual people and has been entering the public...
Read More 

Virtualized Cloud,

I have written before about cloud computing and separately about Virtual Machines (VMs) but I would like to go over some old ground with new information and bring the two together. To summarize, cloud computing is simply using hosting, network, and...
Read More