Midsize Insider

All

Alex Keane

Alex Keane

Writer
Connect with AlexKeane on Twitter Connect with AlexKeane on LinkedOn Connect with AlexKeane on Facebook AlexKeane's website
Born in 1971 in London, United Kingdom, Alex Keane is a pen name used by Michael O’Dwyer (his real name is common to several other individuals in creative fields,) who lives in Kowloon, Hong Kong. He is married to a Chinese citizen, has two children, and thoroughly enjoys life in his adopted country.

With over 15 years professional experience in the electronics volume manufacturing arena, his specialties include project management, information technology, quality and process management as well as product and supplier sourcing in the Greater China region.

Articles by Alex Keane

Microsoft's Windows 8 Deployed in American Schools: Companies to Follow?

Educational institutions in ten K-12 school districts have decided to deploy Windows 8 solutions as a means of encouraging literacy and providing students with advanced digital learning tools. In addition, Windows 8 provides a convenient way of accessing proprietary educational ...

Windows 8 Benefits from Tablet Adoption Since OS Release in October 2012

Microsoft released its Windows 8 operating system in October of last year, and since then, multiple manufacturers have released a number of tablets and hybrid tablet/PCs. Since the latest version of Windows is designed for maximum efficiency on a tablet, ...

iPad Recycling Recommended for Executives

With the holiday season fast approaching, many shoppers are seeking to purchase an iPad either for themselves or for loved ones. Depending on the specifications selected, the cost could exceed $500. However, there are other options and iPad recycling programs ...

Network Security Addressed by New Risk Assessment Document for Payment Data

Adhering to standards as defined by the PCI Security Standards Council is a prerequisite for any organization that retains, processes, or transmits cardholder information. Many companies process credit/debit card payments, but few know how to assess the risk involved in ...

Cloud Computing Needs More SOA Services

The original aim of service-oriented architecture (SOA) was to prevent vendor monopoly, whether in software or underlying hardware, allowing greater user freedom when choosing applications for various business or personal applications. However, many vendors try to tie users to their ...

iPhone 5S--Rumors Begin in Advance of 2013 Release

Apple customers are well-known for their loyalty and for being quick adopters of the latest Apple releases. This tendency to upgrade as soon as a new product is available is rivaled only by their enthusiasm for information on future products. ...

Windows Phone 8 on Rumored Microsoft-Brand Smartphone

Microsoft has not officially indicated an intention to enter the smartphone manufacturing arena. Recent rumors, however, mentioned on readwrite, that the company has plans to do so, could well prove true. Were it to develop its own smartphone, Microsoft would ...

Business Intelligence Solutions Becoming More Popular

Business intelligence is a relatively recent term coined to refer to the processing of raw data into a usable format for immediate use in marketing and many other disciplines, including finance, as demonstrated in a recent article in CIO. Earlier ...

Cloud Computing Adoption Blocked by Company Executives

There is no denying that benefits exist for small and midsize companies that are prepared to invest in cloud-based solutions, as there are obvious cost advantages in out-sourcing certain processes, reducing hardware spend, and allowing flexible scaling as the need ...

IT Security: Employees are a Primary Threat?

A bold statement, perhaps, and certainly one that does not make pleasant reading for midsize company owners or IT security professionals. However, as threats go, a company's own employees can allow threats to take place, unwittingly or not. As indicated ...

BYOD Security Advice Issued in Australia

The DSD (Defence Signals Directorate) in Australia provides a valuable resource to native companies and advises them on security issues that are common in an online environment. A recent document release was discussed on ZDNet, relating to BYOD security and ...

What Is the CRM Industry's Solution for Future Mobile Devices?

The use of Internet services on the move, despite the ready availability of laptops, netbooks, and other devices, was previously determined exclusively by the speed of access, and slow speeds eliminated the use of applications with advanced features due to ...

SaaS: Connectivity Takes Precedence Over App Selection

Software as a service (SaaS) is a rapidly growing market, and some estimate that by 2020, annual global earnings will exceed $125 billion, a six-fold increase over current earnings. In a recent article on Gigaom, Russ Mason, founder of Mulesoft, ...

Windows XP Still Outranks Windows 8 in Surveys

Despite being released over a decade ago, Windows XP remains the most popular operating system for business users, and it seems companies have little interest in Windows 8, despite that fact XP will no longer be supported starting April 8, ...

Internet Security Knowledge Crucial for Senior Executives

CEOs and other senior management positions often fail to consider IT issues when outlining future company objectives. For example, a sweeping decision to initiate a cloud-based CRM solution for customer support made by the CEO or midsize company owner often ...

Data Encryption Policy Instigated by NASA after Laptop Theft

In a recent written communication sent to all employees, NASA has indicated that, in the future, all laptops will include data encryption software that secures entire hard drives rather than relying on password protection alone. This communication is in response ...

Data Security: Privacy Shortcomings Highlighted by New Study

The methods used to protect customer information vary widely from company to company and often are linked to the industry area involved. For example, financial institutions will record data in a different way from those primarily involved in online activities. ...

ERP Project Management a Problem for U.S. Air Force

The recent announcement by the U.S. Air Force of their decision to scrap the billion-dollar ERP program ECSS (Expeditionary Combat Support System) was not a popular one with U.S. taxpayers and is one of several government-funded IT projects that have ...

Cloud Computing Tax Under Discussion in Vermont

Lawmakers at the Vermont statehouse will discuss the viability of implementing a cloud computing tax for the state on November 19, 2012, according to a recent article on Boston.com. This will have far reaching implications for all providers of cloud ...

IT Security and Psychology--a Surprising Combination

Psychology is defined as the science of studying the mind and related behavior. At first glance, it would seem to be far removed from technical areas involving IT security. However, as recently illustrated on ZDNet, it seems that psychology professionals ...

« Previous12Next »