Term of the Day

Hot Potato Routing

Hot potato routing is a routing technique enabling packet routing without storing them in buffers. Instead, this technique continuously transfers data packets until... Read more

Past Terms: BluejackingOff the GridAnalytical Engine

Latest Question

Secure browsing involves the use of special security architecture to allow for Web browsing that is more protected from various kinds of...read on
What the $#@! Is Data Discovery?

What exactly is data discovery? Here we take an in-depth look at this process and how it can help your business. 
Take That, Big Data! Why Small Data May Pack a Bigger Punch

While big data can be immensely helpful to business, small data is often overlooked. Here are some of little data's big advantages. 
5 Ways to Get Value Out of Your Business Data

Your business is surely collecting data. But the question is, what are you doing with that data? Here we examine ways to put that data to good use. 
Can Big Data Analytics Close the Business Intelligence Gap?

Big data has become essential in modern business, but most companies aren't using it to its full potential due to lack of proper analytics. Here we take a look at what the future holds for big data analytics. 
Web Roundup: Big Data Scores at the World Cup

The more big data analytics are used by major organizations, the more privacy and security becomes a concern. Read more about it in some of the top tech stories that made news in the past week. 
5 Twitter Tools You Should Be Using

Twitter can be a great business and marketing tool, but only if it's done right. These tools will help you get more out of your Twitter account. 
Trusting Encryption Just Got a Lot Harder

Edward Snowden's revelations of government access to personal data has cast suspicion on just how secure "encrypted" data really is. Can encryption still be trusted to protect your data? 
Data Analytics: Experts to Follow on Twitter

Want to connect with the most influential voices talking about Data Analytics? Follow this group on Twitter. 
Data Scientists: The New Rock Stars of the Tech World

The data scientist role is fast becoming the most sought after career of the technology world. We asked top data scientist Jake Porway from The New York Times about how he got his job, and his tips for success in the field. 
The 10 Most Important Hadoop Terms You Need to Know and Understand

In order to really understand big data, you need to understand a bit about Hadoop. Here we'll take a look at the top terms you'll hear in regards to Hadoop - and what they mean. 
Google's End-to-End Encryption Isn't What It Seems

Google tries to make end-to-end email encryption simple to use. It will be, but there are caveats. Learn more about it here. 
Will Computers Be Able to Imitate the Human Brain?

The notion of The Singularity has been hotly debated for years. Will robots rule the world? Find out what both sides of the debate have to say. 
Web Roundup: Mobile Releases, DSL Ripoffs and Microsoft's Plea for Positive Press

New phones are entering the market just as fast as large tech giants are getting exposed for their less-than-ethical operations. Check out which tech stories made the news this week. 
7 Points to Consider When Drafting a BYOD Security Policy

Bring-your-own-device policies are becoming more common in businesses today. But before implementing them at your company, here are some things to consider. 
Why Android Anti-Malware Apps Are a Good Idea

Malware doesn't just affect computers anymore - it's becoming an ever-increasing threat to Android devices as well. Learn about Android anti-malware apps and how they can help your device stay infection free. 
5 Essential Things That Keep a Data Center Running

High specification buildings called data centers house most of today's business-critical Internet. And the technology is like something out of a blockbuster movie. 
Encryption Just Isn't Enough: 3 Critical Truths About Data Security

Once data has been disseminated from its originator, keeping it secure can be quite a challenge. Here we discuss some strategies for keeping your data out of the wrong hands. 
6 Ways to Keep Apps From Oversharing Your Personal Data

While you’re sharing your life with your apps, those useful tools are broadcasting your information to the rest of the world. Find out how to protect yourself. 
Web Roundup: Privacy, Internet Speeds and Room for Innovation in the Digital Music Industry

Privacy concerns and lawsuits have yet to put a damper on innovation and development in the mobile industry. Check out some of the top stories about mobile technology that appeared in the news this week. 
Is This a Potential Cure for Malicious Android Apps?

Android marketplaces are not vetting applications sufficiently. A North Carolina State University research team has a solution that will make it difficult for bad guys to use marketplaces for propagating malicious Android apps. 
View All
Tech Pioneers You've Probably Never Heard Of

As in any field, there are big-name pioneers in tech. Here we look at some of those who made a huge impact but received much less recognition. 
Introduction to Databases

No matter what part of IT you work in, you have to store data at one point or another, and it doesn't hurt for just about everybody to have some knowledge of databases and how they work. 
8 Steps to Understanding IP Subnetting

Understanding IP subnetting is a fundamental requirement for almost any IT pro. But although the concepts are simple, there is a general difficulty in understanding the topic. We break it down in eight simple steps. 
Creative Disruption: The Changing Landscape of Technology

Learn about the history behind some major technological innovations - and how they changed the world. 
How Spreadsheets Changed the World: A Short History of the PC Era

The introduction of spreadsheets helped launch the movement that eventually brought computers to home users. Writer John McMullen was there when it happened. Hear the story first-hand, based about his experiences working in the field. 
View All

Internet routing is the process of transmitting and routing IP packets over the Internet between two or more nodes. It is the same as standard routing procedures... Read more 

A Wireless Intrusion Prevention System (WIPS) prevents unauthorized network access by monitoring a radio spectrum and looking for unusual network activity.  

A business systems analyst is a person whose job it is to apply business goals to the IT system of an enterprise.  

An SQL injection attack is an attempt to issue SQL commands to a database via a website interface. This is to gain stored database information, including usernames... Read more 

Web content syndication is a process in which materials of the transmitting website are distributed around various receiving sites. In most cases, web syndication... Read more 
View All

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
Techopedia on Twitter

Sign up for Techopedia's Free Newsletter!
Techwise Webinar Series
How Can Analytics Improve Business?
Register for this episode of TechWise to learn from two of the most experienced analysts in the business: Dr. Robin Bloor, Chief Analyst of The Bloor Group, and Dr. Kirk Borne, Data Scientist, George Mason University.

Email Newsletter

Join 138,000+ IT pros on our weekly newsletter