Midsize Insider

All

Vladislav Davidzon

Vladislav Davidzon

Freelance Writer
I've been starting and launching tech companies since I was fifteen years old, and for a decade owned and managed what became the first carbon-neutral web hosting company. I've also worked as an information technology manager for a medium sized government agency. My particular interests lie in the intersection of sustainability and technology, and I have a tremendous amount of background in environmental design.

Articles by Vladislav Davidzon

Passwords an Overlooked Security Strategy

Despite spending major amounts of money to secure data and applications, organizations that rely on electronic media are missing the boat when it comes to the most important aspect of network security. Poor use and choice of password is one ...

Access and Control of Cloud Files Could Be Compromised

Easy and continually available access to stored files and information is what makes cloud computing such a valuable tool for any organization. But when it comes to putting information into cloud storage, how much control do you keep? That control ...

Cloud Computing and Mobile Web: Everyone Is Gearing Up for a Complex New World

Chief Information Officers who are poised to build their next internal network have some serious decisions to make. With cloud computing and virtual machines changing the way we utilize networks and deploy solutions, the next generation of networks will be ...

Privacy Versus Convenience for Cloud and Social Network User Management

IT professionals increasingly find that when working with cloud based networks, they must find ways to verify authorized users and make sure that the correct user is getting access to the correct information. One method that identity firms have started ...

US State Department Switches to Google Chrome Browser

Google Chrome is now the browser of choice for the U.S. Department of State, but what does this imply for the average consumer? In an announcement made by the Secretary of State Hillary Clinton reported by Tech Republic, a possible ...

Smartphones Leaking Cryptographic Keys: The Danger of Encryption Key Recovery

Smartphones have long been popular for working on the go, but they may not be quite as safe for sensitive data as many think. There are methods that allow the cryptographic keys used to encode information to be recovered. In ...

Location-Based Services Increase Foot Traffic and Revenue, Says Report

Location-based cloud services are expected to grow into a $12.7 billion dollar industry by 2014 and it appears that IT managers at small and midsize busineses ought to start paying attention to the opportunities available within this sector, reports TechCrunch. ...

Study Shows that the Human Factor Plays Big Role in Data Breaches

In a society where knowledge is power, data breaches are an absolute disaster. But despite security programs, passwords, encryption, and urgings of secrecy from higher-ups, much of the data that companies harbor still manages to find itself into the wrong ...

The Scoop on the FTC's Investigation of Google and Apple

US Senator Charles Schumer has asked the Federal Trade Commission (FTC) to examine two of the world's largest companies, Apple and Google, over reports that programs operating on their mobile operating systems are violating rules and policies regarding user privacy, ...

Mobile User Privacy Rights Becoming Hot Button Issue

Mobile privacy has become a large topic of discussion, with new stories of user privacy violation popping up every few weeks. In February, developers of social media app Hipster were slapped with allegations of collecting contact lists without permission. With ...

The Google Apps and Microsoft Office Showdown

Google and Microsoft are battling once again, this time between their business productivity tools. The cloud-based Google Apps is striving to be the biggest competitor of Microsoft Office, with the productivity suite comprising Google Docs (document, spreadsheet, and presentation capabilities), ...

« Previous1Next »