<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Alex Jablokow
Alex Jablokow is a freelance writer who specializes in technical and healthcare business. He blogs about the Internet of Things, software, inertial guidance systems, and other topics for business clients. Sturdy Words, his freelance content business, is at www.sturdywords.com.
Find me on:

Recent Posts

Posted on 10.19.18 by Alex Jablokow

Balancing Security and Ease of Use with Two-Factor Authentication

Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...

Posted on 09.11.18 by Alex Jablokow

An Introduction to FIPS-140-2 Requirements

FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.

Posted on 06.19.18 by Alex Jablokow

What is Virtual Infrastructure Management?

Virtualization creates virtual resources that can be used the same way as any physical resource or application. Disk drive partitioning is a familiar form of virtualization. Servers, networks, desktops, applications, and storage can all be virtual.

Posted on 06.04.18 by Alex Jablokow

What is Network Discovery Software?

Modern corporate networks have become much more dynamic than they used to be. This makes it harder for sysadmins and network admins to know what's connected to the network.

Posted on 05.21.18 by Alex Jablokow

Guide to Web Browser Automation

Automation replaces human work in repetitive, tedious tasks, and minimizes the number of errors.  With the right automation tools it is possible to automate browser tasks, web testing, and online data extraction, to fill forms, scrape data, transfer data between...

Posted on 05.11.18 by Alex Jablokow

WUG's Free Visual Traceroute Tool

WhatsUp Gold’s free Visual Traceroute tool gives you a rapid and intuitive knowledge of your network status. 

Posted on 04.11.18 by Alex Jablokow

Should You Hire A Cloud Storage Security Vendor?

The decision to use a third-party vendor or not depends on several factors. Regardless, cloud data security is a crucial part of business planning.

Posted on 03.19.18 by Alex Jablokow

Edge Computing Vs Fog Computing

The cloud liberated computing power, applications, and data storage from reliance on specific hardware managed in a specific location. But the Cloud does typically exist in a specific location: a facility somewhere with racks of servers.

Posted on 02.27.18 by Alex Jablokow

We Need to Increase Focus on Endpoint Security

Increasingly, corporate work is being carried out on mobile laptops, tablets, and smartphones, and corporate data is being held outside of the company’s own systems. 

Posted on 01.11.18 by Alex Jablokow

Cybersecurity Cost: How Should It Fit Into Your Budget?

Cyber risk leads to financial risk, but cybersecurity is still often thought of as a technical rather than a business problem.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.