Ed Tittel

Ed Tittel is a 30-plus year IT veteran who's worked as a developer, networking consultant, technical trainer, writer and expert witness. Perhaps best known for creating the Exam Cram series, Ed has contributed to more than 100 books on many computing topics, including titles on cybersecurity, Windows OSes and HTML. Ed writes and blogs regularly for TechTarget, Win10 Guru, TomsITPro and GoCertify. As of January 1, 2018, Ed is also a Microsoft Windows Insider MVP.

6 Ways to Maximize Your IT Training Budget

6 Ways to Maximize Your IT Training Budget

Customized, in-house training often zeros in on topics relevant to your business. However, it comes with an equally high price tag. If your employees simply need to fill in knowledge gaps or get up to speed with a specific software...

The dangers of dark data and how to minimize your exposure

Untapped and neglected, dark data can pose security risks should it fall into the wrong hands, or range outside its owner's control.

The Dangers of Dark Data and How to Minimize Your Exposure

The Dangers of Dark Data and How to Minimize Your Exposure

Structured data, like content in a database, is relatively easy to manage. However, confidential or sensitive unstructured information -- log archives and other untagged, non-inventoried data -- presents a real challenge to CIOs....

How to choose the best vulnerability scanning tool for your business

Any shop with Internet access must scan its network and systems regularly for vulnerabilities, but old-fangled tools made this a painful and time-consuming effort. Find out how new and improved vulnerability scanners make life easier...

How to Choose the Best Vulnerability Scanning Tool for Your Business

How to Choose the Best Vulnerability Scanning Tool for Your Business

Any shop with Internet access must scan its network and systems regularly for vulnerabilities, but old-fangled tools made this a painful and time-consuming effort. Find out how new and improved vulnerability scanners make life easier...

How to explain the cloud to end users

Popular culture has exposed a fundamental knowledge gap in the ordinary consumer. Even though our smartphones are set up to auto-save pics to our online accounts, we enjoy hours of streaming videos and music, and we regularly use...

How to Explain the Cloud to End Users

How to Explain the Cloud to End Users

'Nobody understands the cloud,' says a lead character in the summer comedy 'Sex Tape.' The cloud and cloud computing have become an essential part of IT infrastructures -- but could your employees use a Cloud 101 primer? Put another...

Can Digital Rights Management and the Open Web Coexist?

The Netflix-backed Encrypted Media Extensions (EME) proposal, and recent revelations that requirements for DRM in HTML5 are confidential, have generated furor among advocates of the Open Web. Let's cut through the hyperbole.

Can Digital Rights Management and the Open Web Coexist?

The Netflix-backed Encrypted Media Extensions (EME) proposal, and recent revelations that requirements for DRM in HTML5 are confidential, have generated furor among advocates of the Open Web. Let's cut through the hyperbole.

Can Digital Rights Management and the Open Web Coexist?

The Netflix-backed Encrypted Media Extensions (EME) proposal, and recent revelations that requirements for DRM in HTML5 are confidential, have generated furor among advocates of the Open Web. Let's cut through the hyperbole.

Leading-edge UTM: What C-level execs need to know

A variety of security specialist firms now offer leading-edge virtual and physical devices for Unified Threat Management (UTM) to raise the security bar ever higher and respond proactively to zero-day threats.

Leading-Edge UTM: What C-Level Execs Need to Know

Network and boundary security are more important than ever for organizations of all sizes. A variety of security specialist firms now offer leading-edge virtual and physical devices for Unified Threat Management (UTM) to raise the...

Leading-Edge UTM: What C-Level Execs Need to Know

Network and boundary security are more important than ever for organizations of all sizes. A variety of security specialist firms now offer leading-edge virtual and physical devices for Unified Threat Management (UTM) to raise the...

Leading-Edge UTM: What C-Level Execs Need to Know

Network and boundary security are more important than ever for organizations of all sizes. A variety of security specialist firms now offer leading-edge virtual and physical devices for Unified Threat Management (UTM) to raise the...

How Adobe is moving on from Flash to embrace HTML5

Adobe Flash is still widely used, but it's seen as obsolete in the face of HTML5. In response, Adobe is taking several steps to adapt and contribute to a HTML5 future without browser plugins.

How Adobe Is Moving on From Flash to Embrace HTML5

Adobe Flash is still widely used, but it's seen as obsolete in the face of HTML5. In response, Adobe is taking several steps to adapt and contribute to a HTML5 future without browser plugins.

How Adobe Is Moving on From Flash to Embrace HTML5

Adobe Flash is still widely used, but it's seen as obsolete in the face of HTML5. In response, Adobe is taking several steps to adapt and contribute to a HTML5 future without browser plugins.

How to ensure SAM and SLM compliance in mobile environments

Software asset management and software license management aren't just for on-premises assets. Find out how they can help you ensure compliance with software policies and agreements across mobile devices as well.

How to Ensure SAM and SLM Compliance in Mobile Environments

Software asset management and software license management aren't just for on-premises assets. Find out how they can help you ensure compliance with software policies and agreements across mobile devices as well.

How to Ensure SAM and SLM Compliance in Mobile Environments

Software asset management and software license management aren't just for on-premises assets. Find out how they can help you ensure compliance with software policies and agreements across mobile devices as well.

Load More