Term of the Day


Sandboxing is a computer security term referring to when a program is set aside from other programs in a separate environment so that if errors or security issues occur, those issues will not spread to... (Read on)

Past Terms: AMD VirtualizationStreams And Iteration In A Single Assignment LanguageIntercloud

Latest Question

The issue of mobile phones causing different types of cancers is related to what we now know about the technologies that are involved. While there is no firm evidence to... (Read on)
A Key Question in Enterprise Virtualization: What to Virtualize?

Many businesses are going the route of virtualization, but it isn't always the best move. Consider all the factors involved before moving forward with a virtualization plan. 
5 Things To Know About Cloud Pricing

If you're looking to move your company to the cloud, here are five things you should know about cloud pricing first. 
Who Owns All the Data Collected About You? The Answer May Surprise You

It seems that personal information is anything but personal these days, with firms buying and selling data on people without their consent or knowledge. 
Web Roundup: Security Remains a Top Concern

Get the latest on new threats and privacy concerns in this edition of Web Roundup. 
How Virtualization Drives Efficiency

There are still a few wrinkles to be ironed out, but IT professionals are excited about virtualization's boundless potential. 
10 Virtualization Tips Every Administrator Should Consider

There are many options and features to consider when dealing with virtualization. Here are some important ones that you shouldn't miss. 
Anatomy of a Startup Event - Interview with SXSW Accelerator Pioneer

Techopedia contributor Eric Kavanagh recently sat down with SXSW Accelerator pioneer, Chris Valentine, to learn about how the program has evolved over the past seven years, and why they've been able to trigger roughly $1.78 billion in venture funding. 
The Advantages of Virtualization in Software Development

Virtualization technologies are not only used in hardware or server consolidation. Virtualization also provides valuable tools for software development and testing. 
Choosing Between IaaS and PaaS: What You Need To Know

While IaaS and PaaS are similar in many ways, there are a few key differences between the two cloud computing models. Here we'll provide some guidance on finding the best cloud solution. 
Why Data Loss Happens - and What to Do About It

All hard drives will eventually fail. Its what businesses do to ensure they recover their data that matters. Here we look at the key causes for data loss and how it can be prevented. 
Web Roundup: Is Technology Costing You More Than You Realize?

As technology innovations surge ahead, some apps are falling short on the security side of things. Read about this and more in this week's roundup of the Web's top tech stories. 
Multiplexing: An Intro to How it Works

Ever wondered how all those emails, pictures and tweets can travel over the Internet without clashing with each other? In this article we’ll take a high-level look at the technique that makes this possible. 
Unix/Linux Shells 101

Shells are powerful and highly versatile tools for Unix and Linux. There are numerous shells with different abilities out there, and they are highly customizable to fit your needs. 
12 DNS Records Explained

DNS can be a little daunting. We'll show you how it works by dissecting the most common DNS records. 
Virtualization Security: Tips to Prevent VM Hyper Jumping

If you're running virtual machines, you may be vulnerable to hyper jumping attacks. But there are precautions you can take to lessen your odds of falling prey to this type of attack. 
The Cloud Imperative - What, Why, When and How - TechWise Episode 3 Transcript

Host Eric Kavanagh discusses the cloud and what it can mean for business with representatives from The Bloor Group, Qubole, Cloudant and Attunity. 
A Different Way Of Looking at the Impact of 3-D Printing

3-D printing is poised to revolutionize manufacturing as we know it. Here we take a look at how printing technology has affected us, and where it's going in the future. 
6 Big Myths About Managing Big Data

Big data is big business, but only if it's used properly. Here we examine some myths about big data that may be holding your company back. 
The Top 3 Advantages of Virtualization

Many companies are shifting toward virtualization, but is it right for your company? Here we examine some of the benefits that virtualization can provide. 
View All
Tech Pioneers You've Probably Never Heard Of

As in any field, there are big-name pioneers in tech. Here we look at some of those who made a huge impact but received much less recognition. 
Introduction to Databases

No matter what part of IT you work in, you have to store data at one point or another, and it doesn't hurt for just about everybody to have some knowledge of databases and how they work. 
8 Steps to Understanding IP Subnetting

Understanding IP subnetting is a fundamental requirement for almost any IT pro. But although the concepts are simple, there is a general difficulty in understanding the topic. We break it down in eight simple steps. 
Creative Disruption: The Changing Landscape of Technology

Learn about the history behind some major technological innovations - and how they changed the world. 
How Spreadsheets Changed the World: A Short History of the PC Era

The introduction of spreadsheets helped launch the movement that eventually brought computers to home users. Writer John McMullen was there when it happened. Hear the story first-hand, based about his experiences working in the field. 
View All

Converged storage is a storage structure that blends storage and computation into a single entity. The strategy used in converged storage differs with conventional... Read more 

Location awareness refers to a presence-technology component that provides information about the physical location of a device to another application or user. This... Read more 

A network model is a database model that is designed as a flexible approach to representing objects and their relationships. A unique feature of the network model... Read more 

Small Computer System Interface 3 (SCSI-3) is an ongoing standardization effort for extending the features of SCSI-2. The key goals of SCSI-3 include the following:... Read more 

Software theft means the unauthorized or illegal copying, sharing or usage of copyright-protected software programs. Software theft may be carried out by... Read more 
View All

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
Techopedia on Twitter

Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join 138,000+ IT pros on our weekly newsletter

Free Whitepaper – Bridging the IT Operations Application Owner Gap
Free Whitepaper – Bridging the IT Operations Application Owner Gap:
Conflicting organizational needs all too often create tension between functional silos. Application owners demand more and more resources.
Free 30 Day Trial – VMTurbo Operations Manager
Free 30 Day Trial – VMTurbo Operations Manager:
VMTurbo's flagship product, Operations Manager maintains your virtual and cloud environments in a healthy state. It manages homogeneous and...