Tom Henderson

Tom Henderson is dojo of ExtremeLabs, researcher at Network World, world traveler, and friend to many.

Review: VMware vSphere gets much-needed facelift
Clear Choice Tests

Review: VMware vSphere gets much-needed facelift

vSphere 6.5 is easy to install, sports a new VM management console and takes a stab at Docker integration.

Pwn2Own 2017: Your stuff as mincemeat

Pwn2Own 2017: Your stuff as mincemeat

Security teams gathered at Pwn2Own 2017 to hack your favorite software and found plenty of bugs, proving nothing is foolproof.

After the WikiLeaks dump: Do nothing

After the WikiLeaks dump: Do nothing

Don’t panic about WikiLeaks. If someone wants to hack your system, they will find a way. Your best option: Continue your security best practices.

Checklist for choosing a small cloud host or ISP

Checklist for choosing a small cloud host or ISP

Use this checklist to select a cloud host or ISP—and prevent future problems.

Mobile World Congress 2017: Mobility monsters

Mobile World Congress 2017: Mobility monsters

GSMA has brought everything mobile to Mobile World Congress 2017 in Barcelona, painting a picture of mobile world domination.

REVIEW: Deep dive into Windows Server 2016
Clear Choice Tests

REVIEW: Deep dive into Windows Server 2016

In this review, we will go through the various new and improved features of Windows Server 2016. We found that many of them worked as advertised, while others weren’t totally baked yet.

The $475 S key

The $475 S key

Without Apple Care, a broken S key on a MacBook Air turns into an outrageous $475 repair.

Harbinger of The Great Internet Wall arrives

Harbinger of The Great Internet Wall arrives

President Trump’s executive order on immigration puts non-U.S. citizens’ data in jeopardy.

The latest database attacks: Tips of the icebergs

The latest database attacks: Tips of the icebergs

MongoDB, ElasticSearch and Hadoop have been hit by ransomware. This is just the beginning of such attacks.

Windows 10 peeping: Microsoft fails to understand the uproar

Windows 10 peeping: Microsoft fails to understand the uproar

With each new Windows update malady, Microsoft loses the confidence of users who might otherwise find value in the product.

Rated insecurity: Faux Cat 6 cable sold on Amazon

Rated insecurity: Faux Cat 6 cable sold on Amazon

Some Amazon sellers offer Cat 5 and Cat 6 Ethernet cable for cheap, but it is insecure—isn’t UL- or TIA-approved and is at risk for starting a fire.

On being a 24/7 organization and the 2016 leap second

On being a 24/7 organization and the 2016 leap second

Providing 24/7 support 365 days a year isn’t a requirement, causing headaches when you need help most. On top of that, the 2016 leap second could complicate things.

Zen and the art of security

Zen and the art of security

Achieving security Zen is a long discipline of unlearning what you’ve learned and accepting countless paradoxes.

IBM MaaS360 delivers powerful, easy-to-use mobility management
Clear Choice Tests

IBM MaaS360 delivers powerful, easy-to-use mobility management

Fiberlink MaaS360 won our Clear Choice test of mobile device management tools in 2011. IBM bought Fiberlink in 2013, so we wanted to see how the product has evolved over the years.

Looking to 2017: It’s not just enterprise security

Looking to 2017: It’s not just enterprise security

Things are bad for the security of everything and data privacy, and 2017 will be equally bad if not worse.

2016: A systems security disaster

2016: A systems security disaster

With more than 900 security breaches recorded so far, 2016 certainly looks like a disaster. And the future doesn’t look good either.

10 reasons to divorce the cloud

10 reasons to divorce the cloud

For some companies, using cloud services isn’t what they hoped or expected it to be. Reason’s like these might be enough to make them leave.

Your security mirages

Your security mirages

Some of the things you use to keep your systems and data safe aren’t as secure as you think.

When DR fails

When DR fails

Tom Henderson learned a few valuable lessons after his server was hacked and his disaster recovery failed.

Review: Four ways to manage Macs in a Microsoft world
Clear Choice Tests

Review: Four ways to manage Macs in a Microsoft world

In our labs we found that Parallels, Centrify and Thursby go beyond what’s offered by Microsoft/Apple.

Load More