Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Edge computing enhances network performance by processing data closer to the source, reducing latency, optimizing bandwidth, and improving real-time capabilities. Here is our explainer.
By Stephen Cooper in Net Admin on February 10, 2025
Not sure whether to choose open-source or proprietary SDN? Learn the key benefits and drawbacks to help you make the best decision.
By Stephen Cooper in Net Admin on January 31, 2025
Software-defined networks offer a logical layer on top of the actual physical network that you operate. Find out about revamping your network with this strategy.
By Stephen Cooper in Net Admin on January 31, 2025
A software-defined network disconnects your logical network structure from its dependence on specific hardware. We explore how SDN works with cloud-based infrastructure.
By Stephen Cooper in Net Admin on January 31, 2025
Digital Experience Monitoring, or DEM, helps businesses understand how end-users are engaging with digital tools and networks. DEM solutions combine multiple tools, such as Real-User Monitoring (RUM) and Application Performance Monitoring (APM) to identify end-user issues that can then be resolved to improve system and asset performance.
By Stephen Cooper in Net Admin on January 2, 2025
The healthcare sector has an especially strong need for digital protection due to the large volumes of sensitive data that it holds and processes.
By Stephen Cooper in Net Admin on March 4, 2025
Kualitee is a product of Kualitatem Pvt. Ltd. We look into the business behind the software QA tool.
By Stephen Cooper in Net Admin on December 13, 2024
The company behind ISL Online is called XLAB d.o.o. From Slovenia. We profile the business.
By Stephen Cooper in Net Admin on December 13, 2024
UnderDefense is a managed security service provider that will run your Security Operations Center for you. We spotlight the company. 
By Stephen Cooper in Net Admin on December 13, 2024
Page 8 of 71