Chad Kime

Chad Kime combines his Electrical Engineering and MBA degrees to translate between technical language and common English. After managing over 200 foreign language eDiscovery projects Chad values practicality over idealism. Chad has written on cybersecurity, risk, compliance, network security hardware, endpoint monitoring software, anime DVDs, industrial hard drive equipment, and legal forensic services.

VMware: Cross-Cloud Review

As enterprises embrace digital transformation, they must also consider the risk of local data regulations and over-dependence on a single cloud environment. Many seek to spread out the risk by adopting a...

Microsoft Intune Review

Moving to a mobile workspace creates many complications for companies. IT teams still need to manage the licenses and deployment of applications, but they often have no physical access to the mobile...

VMware Workspace ONE Review

Any company with remote workers needs to work harder to protect their assets and extend security to their remote workforce. Virtual desktop infrastructure (VDI) solutions continue to rise in popularity as cyberattacks...

Citrix Workspace Review

The pandemic’s seismic shift to remote work created a surge in demand for solutions to secure remote access for organizations of all sizes. As a result, virtual desktop infrastructure (VDI) rose dramatically...

AT&T: Enterprise 5G Review

Business always needs to go faster. Faster computers, faster processing, and faster connections. AT&T’s 5G enterprise solution promises to deliver broadband speeds over wireless and cellular networks to unlock new opportunities previously constrained...

Acunetix: Web Application Security Review

To launch a modern website requires a maze of proprietary programming, open-source libraries, and legacy features. Inspecting each component for vulnerabilities takes enormous time and labor resources unless the development or application...

Cisco: SecureX Product Review

Cybersecurity protection requires visibility throughout an organization to detect attacks in progress. Extended detection and response (XDR) solutions, such as Cisco’s SecureX, expand upon endpoint detection and response (EDR) solutions to include...

Invicti: Web Application Security Product Review

The number of websites and web applications grows every year but so does the number of attackers attempting to exploit them. to protect their web assets, companies turn to web application security...

VMware Carbon Black: Product Review

VMware Carbon Black helped pioneer the active endpoint detection and response (EDR) technology segment within the broader endpoint protection market.  Their EDR solution now includes cloud-based and in-house endpoint protection.   See below for...

The Data Deduplication Market

The data deduplication market addresses two primary needs — reducing storage space for data backups and cleaning up databases. Although radically different in execution and motivation, the goals for each need are...

Top Data Mining Certifications

Data is fueling business, and those who can use data mining to extract insights gain huge benefits. This need for insight drives demand for all levels of data scientists capable of effective...

How Data Mining is Used by Nasdaq, DHL, Cerner, PBS, and The Pegasus Group: Case Studies

Companies understand that data mining can provide insights to improve the organization. Yet, many struggle with the right types of data to collect, where to start, or what project may benefit from...

Latest Articles