Hire this?

If you wish to hire me for a future project (check out approximate pricing for writing/editing) or wish to suggest a discussion topic for a future post, go ahead. I will respond promptly.

Unfortunately, all cold callers offering products and services will go unanswered. In addition, I am not seeking guest posts or prepared to act as a submission partner or editorial contact for other sites.

As Seen On:


For my part, I will not seek your contact information for future mailing lists, beg for shares on social media or introduce annoying popups selling courses and other items designed to extract money from fellow writers. I have another site to handle business activities. All I’m seeking is work with ethical rates (yes, I said it), intelligent discussion and readers.

You are of course welcome to support my writing if you enjoy it. Future revisions of posts on the site will include a signature with multiple options to buy me a coffee, subscribe or donate. My family and I thank you in advance.

My Portfolio

A sample of my credited portfolio is shown below. You can search by keyword or topic if necessary, given that there are more than 200 entries. Note that some older entries are unavailable as companies change or archive their sites. If you find one that’s no longer active, let me know and I’ll send you a screen capture from my internally managed portfolio.

263 items   1 followers   0 votes   1.59k views

My Portfolio

A selection of stories published to date.

Nov 22, 2019 - blog.ipswitch.com - 1

Mark Zuckerberg is still pushing for the creation of Libra, but it's obviously futile for him at this point. He knows we don't trust Facebook.

Nov 18, 2019 - blog.purestorage.com - 0
Mission-Critical Applications: Reducing the Cost of Downtime | Pure Storage Blog

In the span of just one minute, the downtime costs from the interruption of mission-critical applications can rise to $10,000. Think then about what an

Nov 18, 2019 - blog.purestorage.com - 0
Storage Considerations for Moving Legacy Applications to the Cloud

Moving legacy applications to the cloud can increase performance and enhance daily operations, but what do you need to know about the transition?

Nov 06, 2019 - smseagle.eu - 0

But, where do you start? How do you identify potential security threats?

Nov 06, 2019 - blog.ipswitch.com - 0

How much customers care about data breaches is often dependent on the type of customer data obtained by attackers.

Nov 06, 2019 - blog.ipswitch.com - 0

I’d like to believe that all readers will use this post to prepare for a ‘what if’ scenario but the sad truth is that some of you are reacting to a data breach and lack an incident response plan.

Nov 06, 2019 - smseagle.eu - 0

What are the risks of Shadow IT? How can they be reduced?

Nov 06, 2019 - blog.ipswitch.com - 0

Secure Socket Layer (SSL) or Transport Layer Security (TLS) refer to security technologies that encrypt data sent between a web server and web browser.

Nov 06, 2019 - blog.ipswitch.com - 0

As IT pros, we’ve been aware for quite some time that some users are a threat to security.

Nov 06, 2019 - blog.ipswitch.com - 0

If you are a small or medium business, you may have left your data backups in the hands of outside help or, even worse, to chance.

Nov 06, 2019 - blog.ipswitch.com - 0

Two years plus and counting and companies are still being impacted by WannaCry. Here are the four main reasons why an old exploit and ransomware is still an issue.

Nov 06, 2019 - blog.ipswitch.com - 0

Why is the GNFA relevant? What are the benefits to companies and to certified GNFA professionals?

Nov 06, 2019 - whatsupgold.com - 0

Given the number of possible ports, how can network administrators handle a monitoring process or even detect an intrusion?

Aug 14, 2019 - whatsupgold.com - 0
The Real Reason We Need Multiple Data Backups - WhatsUp Gold

In many jurisdictions, there is a legislative or accounting requirement to store data for a minimum of five years. Easier said than done. That's why multiple data backups are necessary.

Aug 14, 2019 - smseagle.eu - 0

How can companies ensure adequate protection of physical and digital files? What are the common attack vectors involved? Does your security policy consider remote and onsite attacks?

Aug 07, 2019 - blog.ipswitch.com - 0

Facebook is determined to launch their own digital currency called Libra, but why would anyone trust them at this point?

Jul 31, 2019 - whatsupgold.com - 0

Azure App Insights will handle public, private and hybrid clouds only. WhatsUp Gold offers an alternative that allows monitoring of the Azure environment and the entire local area network.

Jul 31, 2019 - blog.ipswitch.com - 0

It’s fair to observe that Bluetooth has its issues and security vulnerabilities are now being exploited by hackers seeking access to data.

Jul 31, 2019 - whatsupgold.com - 0
Why Azure is Better Than AWS - WhatsUp Gold

Both Azure and AWS offer a variety of cloud offerings. But why is Azure gaining momentum over AWS?

Jul 31, 2019 - smseagle.eu - 0

What is the ideal way to ensure reliable yet prompt update installation? In a traditional office environment, is it practical to supervise individual installs? Can we rely on all updates or will they cause additional problems?

Jul 31, 2019 - blog.ipswitch.com - 0

Since encryption is used to secure data, it would seem only natural that encrypting something twice would increase security. That isn't always the case.

Jul 31, 2019 - blog.ipswitch.com - 0

Should businesses be worried about Huawei or is this really just hysteria and a political agenda that is sending shockwaves around the world?

Jul 31, 2019 - blog.ipswitch.com - 0

Over the past few years, Slack has risen to be the largest collaboration tool to help teams stay on track. In this article, I will discuss how it works.

Jun 11, 2019 - blog.ipswitch.com - 0
Is Big Data Losing its Appeal in the Face of Data Privacy Concerns?

The use of big data by enterprises is almost commonplace at this point, with advocates claiming it aids decision-making, increases revenue and productivity and decreases operational costs. But it comes at a cost to data privacy.

Jun 10, 2019 - smseagle.eu - 0
Password Management —Secure Passwords Essential for User and Business Protection

For years, security pros have emphasised the need for different passwords, as identical passwords make it way too easy for hackers.

Permanent link to this article: https://www.youronlinecontent.com/hire-me/