Term of the Day

Data Breach

A data breach is an incident that involves the unauthorized or illegal viewing, access or retrieval of data by an individual, application or service. It is a type of security breach specifically designed... (Read on)

Past Terms: Software as a ServiceAutoloaderCyber Incident Response Plan

Latest Question

All sorts of businesses are jumping on the big data bandwagon, but some are having much better results than others. Where do some enterprises go so wrong, and where do others go... (Read on)
The Benefits of Server Virtualization

Virtualizing servers increases productivity and makes life less of a hassle for the IT department. Find out how. 
10 Ways Virtualization Can Improve Security

Properly deployed virtualization techniques can provide security to software, hardware, storage and the network environment. But virtualization is only one of many tools in the security arsenal. 
A Key Question in Enterprise Virtualization: What to Virtualize?

Many businesses are going the route of virtualization, but it isn't always the best move. Consider all the factors involved before moving forward with a virtualization plan. 
5 Things To Know About Cloud Pricing

If you're looking to move your company to the cloud, here are five things you should know about cloud pricing first. 
Who Owns All the Data Collected About You? The Answer May Surprise You

It seems that personal information is anything but personal these days, with firms buying and selling data on people without their consent or knowledge. 
Web Roundup: Security Remains a Top Concern

Get the latest on new threats and privacy concerns in this edition of Web Roundup. 
How Virtualization Drives Efficiency

There are still a few wrinkles to be ironed out, but IT professionals are excited about virtualization's boundless potential. 
10 Virtualization Tips Every Administrator Should Consider

There are many options and features to consider when dealing with virtualization. Here are some important ones that you shouldn't miss. 
Anatomy of a Startup Event - Interview with SXSW Accelerator Pioneer

Techopedia contributor Eric Kavanagh recently sat down with SXSW Accelerator pioneer, Chris Valentine, to learn about how the program has evolved over the past seven years, and why they've been able to trigger roughly $1.78 billion in venture funding. 
The Advantages of Virtualization in Software Development

Virtualization technologies are not only used in hardware or server consolidation. Virtualization also provides valuable tools for software development and testing. 
Choosing Between IaaS and PaaS: What You Need To Know

While IaaS and PaaS are similar in many ways, there are a few key differences between the two cloud computing models. Here we'll provide some guidance on finding the best cloud solution. 
Why Data Loss Happens - and What to Do About It

All hard drives will eventually fail. Its what businesses do to ensure they recover their data that matters. Here we look at the key causes for data loss and how it can be prevented. 
Web Roundup: Is Technology Costing You More Than You Realize?

As technology innovations surge ahead, some apps are falling short on the security side of things. Read about this and more in this week's roundup of the Web's top tech stories. 
Multiplexing: An Intro to How it Works

Ever wondered how all those emails, pictures and tweets can travel over the Internet without clashing with each other? In this article we’ll take a high-level look at the technique that makes this possible. 
The 7 Basic Principles of IT Security

IT professionals use best practices to keep corporate, government and other organizations' systems safe. 
The Cloud Imperative - What, Why, When and How - TechWise Episode 3 Transcript

Host Eric Kavanagh discusses the cloud and what it can mean for business with representatives from The Bloor Group, Qubole, Cloudant and Attunity. 
Unix/Linux Shells 101

Shells are powerful and highly versatile tools for Unix and Linux. There are numerous shells with different abilities out there, and they are highly customizable to fit your needs. 
12 DNS Records Explained

DNS can be a little daunting. We'll show you how it works by dissecting the most common DNS records. 
Virtualization Security: Tips to Prevent VM Hyper Jumping

If you're running virtual machines, you may be vulnerable to hyper jumping attacks. But there are precautions you can take to lessen your odds of falling prey to this type of attack. 
A Different Way Of Looking at the Impact of 3-D Printing

3-D printing is poised to revolutionize manufacturing as we know it. Here we take a look at how printing technology has affected us, and where it's going in the future. 
View All
Tech Pioneers You've Probably Never Heard Of

As in any field, there are big-name pioneers in tech. Here we look at some of those who made a huge impact but received much less recognition. 
Introduction to Databases

No matter what part of IT you work in, you have to store data at one point or another, and it doesn't hurt for just about everybody to have some knowledge of databases and how they work. 
8 Steps to Understanding IP Subnetting

Understanding IP subnetting is a fundamental requirement for almost any IT pro. But although the concepts are simple, there is a general difficulty in understanding the topic. We break it down in eight simple steps. 
Creative Disruption: The Changing Landscape of Technology

Learn about the history behind some major technological innovations - and how they changed the world. 
How Spreadsheets Changed the World: A Short History of the PC Era

The introduction of spreadsheets helped launch the movement that eventually brought computers to home users. Writer John McMullen was there when it happened. Hear the story first-hand, based about his experiences working in the field. 
View All

Pwn is a slang term that means to defeat, often in an extreme way. It was originally used in the context of computer gaming, particularly massively multiplayer... Read more 

ITIL compliance refers to the level of conformance to the Information Technology Infrastructure Library (ITIL), a system of standards developed by the British... Read more 

The traveling salesman problem (TSP) is a popular mathematics problem that asks for the most efficient trajectory possible given a set of points and distances that... Read more 

Schema on write is a traditional technique for database storage that has, in some ways, given way to newer ideas applied to more sophisticated systems. Schema on... Read more 

Workload placement is a term that has developed in reference to managing resources in hardware virtualization systems. It involves the assignment of workloads in... Read more 
View All

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
Techopedia on Twitter


'@Techopedia'
Sign up for Techopedia's Free Newsletter!
Techwise Webinar Series
Understanding the Big Data Landscape
Understanding the Big Data Landscape
Big Data is everywhere, that's for sure. But the big question for today's savvy enterprise is: exactly where does Big Data fit into your organization?

Email Newsletter

Join 138,000+ IT pros on our weekly newsletter

Resources
Free Whitepaper – Bridging the IT Operations Application Owner Gap
Free Whitepaper – Bridging the IT Operations Application Owner Gap:
Conflicting organizational needs all too often create tension between functional silos. Application owners demand more and more resources.
Free 30 Day Trial – VMTurbo Operations Manager
Free 30 Day Trial – VMTurbo Operations Manager:
VMTurbo's flagship product, Operations Manager maintains your virtual and cloud environments in a healthy state. It manages homogeneous and...