Scott Matteson


Scott Matteson is a senior systems administrator and freelance technical writer who also performs consulting work for small organizations. He resides in the Greater Boston area with his wife and three children.

Latest articles from Scott Matteson

  • Tools & Templates

    Wireless networking policy

    Wireless networks can greatly aid organizations by providing easy connectivity for workers, whether internal employees or external guests. Many users these days are familiar with configuring their dev...

    June 30, 2016 by

  • Tools & Templates

    Securing Linux policy

    Linux is a powerful and customizable operating system which has been the backbone of many businesses for decades. A derivative of the UNIX operating system, Linux is available as a free, open-source a...

    June 27, 2016 by

  • Tools & Templates

    DHCP usage policy

    Dynamic Host Configuration Protocol, also known as DHCP, is a networking protocol whereby IP addresses are handed out to computer clients (servers, workstations, tablets, or smartphones for instance) ...

    June 27, 2016 by

  • Article

    Google Apps vs. Office 365: A side-by-side analysis

    Google Apps and Office 365 are top contenders among online productivity suites. See how they compare in terms of features, then download our cost breakdown and calculator to determine your own needs.

    June 8, 2016 by

  • Tools & Templates

    Home usage of company-owned equipment policy

    The Bring Your Own Device (BYOD) movement has been a fixture in many organizations for years, providing better flexibility for users and lower costs for businesses by permitting employees to use their...

    May 31, 2016 by

  • Tools & Templates

    Securing Windows policy

    It’s not an exaggeration to state that Windows has been used in the business world for generations. Debuting in 1981 in the form of Windows 1.0 (a desktop operating system) more than twenty versions o...

    May 31, 2016 by

  • Downloads

    SDN and the data center: Deployment plans, business drivers, and preferred vendors

    The need for greater agility and control to manage environments more effectively has produced evolutionary advances over the past few years. One such example is Software Defined Networking (SDN), whic...

    May 31, 2016 by

  • Tools & Templates

    Shadow IT policy

    Shadow IT is a recent phenomenon whereby technology, services or systems are used within or by employees in an organization without knowledge of or approval from the IT department. Shadow IT has arise...

    May 26, 2016 by

  • Research

    Research: The evolution of enterprise software UX

    Enterprise software can perform a wide range of tasks from financial tracking and calculations to big data assessment, conducting staff-related operations, performing messaging functions and more. It ...

    May 2, 2016 by

  • Tools & Templates

    Hardware decommissioning policy

    Every hardware device has a finite lifespan or viable period of use. Both business and consumers alike are familiar with the retirement of old gadgets and the acquisition of new ones. In fact, entire ...

    April 27, 2016 by