Scott Matteson

Analyst

Scott Matteson is a senior systems administrator and freelance technical writer who also performs consulting work for small organizations. He resides in the Greater Boston area with his wife and three children.

Latest articles from Scott Matteson

  • Research

    IaaS Research: The State of IaaS in the Enterprise 2017

    Infrastructure as a Service (IaaS) allows companies to use virtualized resources for services like email, file servers, databases, and security services. Rather than maintaining an internal data cente...

    February 24, 2017 by

  • Research

    Enterprise IoT Research 2017: Benefits, Trends, and Security Concerns

    A recent Tech Pro Research survey asked what IoT data companies are collecting, and how it’s being used. This report contains those findings. 38 percent of respondents to a Tech Pro Research survey...

    January 31, 2017 by

  • Tools & Templates

    Wireless networking policy

    Wireless networks can greatly aid organizations by providing easy connectivity for workers, whether internal employees or external guests. Many users these days are familiar with configuring their de...

    June 30, 2016 by

  • Tools & Templates

    Securing Linux policy

    Linux is a powerful and customizable operating system which has been the backbone of many businesses for decades. A derivative of the UNIX operating system, Linux is available as a free, open-source a...

    June 27, 2016 by

  • Tools & Templates

    DHCP usage policy

    Dynamic Host Configuration Protocol, also known as DHCP, is a networking protocol whereby IP addresses are handed out to computer clients (servers, workstations, tablets, or smartphones for instance) ...

    June 27, 2016 by

  • Article

    Google Apps vs. Office 365: A side-by-side analysis

    Google Apps and Office 365 are top contenders among online productivity suites. See how they compare in terms of features, then download our cost breakdown and calculator to determine your own needs.

    June 8, 2016 by

  • Tools & Templates

    Home usage of company-owned equipment policy

    The Bring Your Own Device (BYOD) movement has been a fixture in many organizations for years, providing better flexibility for users and lower costs for businesses by permitting employees to use thei...

    May 31, 2016 by

  • Tools & Templates

    Securing Windows policy

    It’s not an exaggeration to state that Windows has been used in the business world for generations. Debuting in 1981 in the form of Windows 1.0 (a desktop operating system) more than twenty versions ...

    May 31, 2016 by

  • Downloads

    SDN and the data center: Deployment plans, business drivers, and preferred vendors

    The need for greater agility and control to manage environments more effectively has produced evolutionary advances over the past few years. One such example is Software Defined Networking (SDN), whi...

    May 31, 2016 by

  • Tools & Templates

    Shadow IT policy

    Shadow IT is a recent phenomenon whereby technology, services or systems are used within or by employees in an organization without knowledge of or approval from the IT department. Shadow IT has aris...

    May 26, 2016 by