Term of the Day

Windows Remote Management

Windows Remote Management (WinRM) is a utility shipped with Windows Vista that allows system administrators to run management scripts remotely. Remote connections are remotely managed using the... (Read on)

Past Terms: Internet Protocol Version 6Classless Interdomain RoutingAnycast

Latest Question

With file integrity monitoring, IT professionals compare different versions of files against a baseline using tools like a "checksum" or hash "image" of a file, to spot important... (Read on)
CP/M: The Story of the OS That Almost Succeeded Over Windows

In the late '70s, CP/M seemed poised to take the lead in the emerging market of PC operating systems. What happened to this former powerhouse? 
A Look at the Growth of Cloud Services

Author Todd D. Lyle discusses cloud computing, the differences between different types of cloud services, their business applications and the future of the cloud. 
5 Insights About Big Data (Hadoop) as a Service

Hadoop is a great way to get the most out of big data, but there are numerous other tools that can work with Hadoop to provide even more useful results. Here we explore some tools for handling big data and Hadoop. 
SEO's Not Dead, It's Just Changing

SEO has been a standard practice to elevate search rankings, but with recent changes in Google's search algorithms, SEO is shifting away from keyword stuffing and toward more meaningful content. 
Agile Software Development 101

This software development method encourages collaboration and flexibility to help deliver a high-quality product. 
How Big Data Impacts Data Centers

With big data being generated at increasingly rapid rates, it can be more than some data centers can handle. There are several factors that must be considered for a data center to handle big data well. 
A Closer Look at FreeBSD

Whether you realize it or not, there's a good chance that FreeBSD is is running behind the scenes on devices that you use every day. 
10 Ways Virtualization Can Improve Security

Properly deployed virtualization techniques can provide security to software, hardware, storage and the network environment. But virtualization is only one of many tools in the security arsenal. 
Can Niche Cloud Providers Compete with the 'Big Guys'?

Amazon, Google and Microsoft dominate in the field of cloud computing, but a number of niche providers are competing with them. Can the smaller providers survive when pitted against such powerful entities? 
Top 3 Wi-Fi Security Vulnerabilities

Wi-Fi technology has resulted in an explosion of connectivity, but this communication medium has some vulnerabilities. If proper precautions aren't taken, networks may be left wide open to hackers. 
Does a Car Really Need a 'Smart Key'?

Smart keys may seem like modern marvels of technology, but they're not always as smart as their name implies. Smart keys can cause numerous problems that were never issues with traditional keys. 
How to Get Windows 10 Features in Windows 8.1

With the widespread frustration many users feel toward Windows 8, Windows 10 will be a welcome change. However, some of the features that many are looking forward to are already available in Windows 8 and 8.1. 
Are Wearable Devices a Threat to Corporate Networks?

IT journalists and consumers are eager to get their hands on wearable devices, but company IT departments are wary. Here we look at some of the security threats they pose. 
Security: Top Twitter Influencers to Follow

Want to stay on top of new developments in cybersecurity? Check out this list of people to follow on Twitter. 
New Visual Basic: New Name, New Features

Microsoft is releasing its newest version of Visual Basic with the Visual Studio 2015 package. Visual Basic 14 includes new features to enable more powerful programming. 
What the $#@! Is Hadoop?

Hadoop seems to be everywhere you look, but what exactly is it? What does it do, how does it work, and why is it so useful? 
3 Big Headaches for Virtualization Software Users

Businesses are rapidly turning to virtualization software to solve their problems, but they often don't consider any of the challenges that come with implementing this solution. 
10 Insights Into NoSQL

Although RDBMS has been around longer, NoSQL is gaining ground, and it has many advantages that make it an excellent solution for databases. 
Grounding the Cloud: What You Need to Know About Cloud Service Brokers

Author Todd D. Lyle shares an excerpt from his book, Grounding the Cloud: Basics and Brokerages. He discusses cloud services brokers, and their role as middlemen between your business and the intricacies of the cloud. 
Why Linux has Failed on the Desktop

It seems that Linux will never become a mainstream OS for desktops, but it is highly popular with developers and is the basis for the Android operating system. 
View All
Tech Pioneers You've Probably Never Heard Of

As in any field, there are big-name pioneers in tech. Here we look at some of those who made a huge impact but received much less recognition. 
Introduction to Databases

No matter what part of IT you work in, you have to store data at one point or another, and it doesn't hurt for just about everybody to have some knowledge of databases and how they work. 
8 Steps to Understanding IP Subnetting

Understanding IP subnetting is a fundamental requirement for almost any IT pro. But although the concepts are simple, there is a general difficulty in understanding the topic. We break it down in eight simple steps. 
Creative Disruption: The Changing Landscape of Technology

Learn about the history behind some major technological innovations - and how they changed the world. 
How Spreadsheets Changed the World: A Short History of the PC Era

The introduction of spreadsheets helped launch the movement that eventually brought computers to home users. Writer John McMullen was there when it happened. Hear the story first-hand, based about his experiences working in the field. 
View All

Windows Remote Management (WinRM) is a utility shipped with Windows Vista that allows system administrators to run management scripts remotely. Remote connections... Read more 

An XML bomb is a piece of XML code that is syntactically valid and correct but can cause a program that compiles or runs it to crash or hang. An XML bomb can be... Read more 

A zombie process is a process in its terminated state. This usually happens in a program that has parent-child functions. After a child function has finished... Read more 

WirelessHD (WiHD) is a standard for the wireless transmission of high-definition video data content meant for consumer electronic devices. The standard is... Read more 

A wireless distribution system (WDS) is a method of interconnecting access points in a wireless local area network (WLAN), whether or not they are connected through... Read more 
View All

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
Techopedia on Twitter


'@Techopedia'
Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join 138,000+ IT pros on our weekly newsletter

Resources
Free 30 Day Trial: SolarWinds® Log & Event Manager
Free 30 Day Trial: SolarWinds® Log & Event Manager:
Use this powerful SIEM to tackle compliance audits, perform root cause analysis and manage all logs in one place.
Free 30 Day Trial – VMTurbo Operations Manager
Free 30 Day Trial – VMTurbo Operations Manager:
Handles the scale and complexity of today’s virtual and cloud environments for you, keeping your application owners happy while maximizing...