Steven J. Vaughan-Nichols

Steven J. Vaughan-Nichols has been writing about technology and the business of technology since CP/M-80 was the cutting-edge PC operating system, 300bps was a fast Internet connection, WordStar was the state-of-the-art word processor, and we liked it!

How Microsoft went from

Five ways to keep working from home safe for your employees and your company

Five ways to keep working from home safe for your employees and your company

For many of us, we're not going back to working from the office anytime soon, so it's time to give serious thought about securing our home offices.

You're going to be using confidential computing sooner rather than later

You're going to be using confidential computing sooner rather than later

These days it's not enough to secure your data when it's on your disk or moving across your network, you need to lock it down in memory as well.

Four operating systems: One device. How the Chromebook will become the universal laptop.

Four operating systems: One device. How the Chromebook will become the universal laptop.

Soon, you'll be able to run not just Chrome OS, Android, and Linux on your Chromebook but Windows applications as well. Here's how and what that will mean for your company's PCs and laptops.

Desktop-as-a-Service: Will you soon be running your

Desktop-as-a-Service: Will you soon be running your "desktop" from the cloud?

Both Google and Microsoft want your desktop running on the cloud and, thanks to the Coronavirus pandemic, they may just be successful sooner than you might think.

The five best Kubernetes security practices

The five best Kubernetes security practices

Everyone is moving to containers for their programs, and to manage them, almost everyone is using Kubernetes. That leads to one big problem: How do you secure Kubernetes itself?

5 ways to avoid cloud waste

5 ways to avoid cloud waste

A big reason why we all use clouds these days is to save money from running our own server rooms and data centers. But, if you don't use clouds correctly, you can still lose money. Here's how to avoid those costly mistakes.

Bridging the broadband gap: Connecting the truly last internet mile

Bridging the broadband gap: Connecting the truly last internet mile

Thanks to the coronavirus, we reply on the internet more than ever. By and large, it's held up well, but some underserved areas are suffering more than ever. What is and can be done for internet access beyond the cities?

The new edge in edge computing

The new edge in edge computing

The Linux Foundation says networking, edge computing will overtake cloud computing by 2025. Why? And, exactly what will this new edge-based computing world look like?

Zero Trust: Protecting your company inside and out

Zero Trust: Protecting your company inside and out

The traditional castle-and-moat security model where users, once inside the firewall, were automatically trusted has long been outdated. What if you can't trust anyone in or outside your network?

Technologies that have been jump-started by COVID-19

Technologies that have been jump-started by COVID-19

The economy is suffering, but some technology businesses, such as telemedicine, contactless payment, 3D printing and e-paper document management have taken off. While others, which were already big, like ecommerce and...

Rowhammer memory attacks close in on the real world

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

Load More