Term of the Day

Wireless Intrusion Prevention System (WIPS)

A Wireless Intrusion Prevention System (WIPS) prevents unauthorized network access by monitoring a radio spectrum and looking for unusual network activity.

Past Terms: FolksonomyDirect Attached StorageDirect Access File System

Latest Question

Learning about general security for Facebook profiles and pages generally involves working with advanced security settings and features, and...read on
7 Steps for Learning Data Mining and Data Science

Data science is best learned by doing, but a good foundation of statistics and machine learning matters too. Check out some top resources here. 
What the $#@! Is Data Discovery?

What exactly is data discovery? Here we take an in-depth look at this process and how it can help your business. 
Take That, Big Data! Why Small Data May Pack a Bigger Punch

While big data can be immensely helpful to business, small data is often overlooked. Here are some of little data's big advantages. 
5 Ways to Get Value Out of Your Business Data

Your business is surely collecting data. But the question is, what are you doing with that data? Here we examine ways to put that data to good use. 
Can Big Data Analytics Close the Business Intelligence Gap?

Big data has become essential in modern business, but most companies aren't using it to its full potential due to lack of proper analytics. Here we take a look at what the future holds for big data analytics. 
Web Roundup: Big Data Scores at the World Cup

The more big data analytics are used by major organizations, the more privacy and security becomes a concern. Read more about it in some of the top tech stories that made news in the past week. 
5 Twitter Tools You Should Be Using

Twitter can be a great business and marketing tool, but only if it's done right. These tools will help you get more out of your Twitter account. 
Trusting Encryption Just Got a Lot Harder

Edward Snowden's revelations of government access to personal data has cast suspicion on just how secure "encrypted" data really is. Can encryption still be trusted to protect your data? 
Data Analytics: Experts to Follow on Twitter

Want to connect with the most influential voices talking about Data Analytics? Follow this group on Twitter. 
Data Scientists: The New Rock Stars of the Tech World

The data scientist role is fast becoming the most sought after career of the technology world. We asked top data scientist Jake Porway from The New York Times about how he got his job, and his tips for success in the field. 
The 10 Most Important Hadoop Terms You Need to Know and Understand

In order to really understand big data, you need to understand a bit about Hadoop. Here we'll take a look at the top terms you'll hear in regards to Hadoop - and what they mean. 
Google's End-to-End Encryption Isn't What It Seems

Google tries to make end-to-end email encryption simple to use. It will be, but there are caveats. Learn more about it here. 
Will Computers Be Able to Imitate the Human Brain?

The notion of The Singularity has been hotly debated for years. Will robots rule the world? Find out what both sides of the debate have to say. 
Web Roundup: Mobile Releases, DSL Ripoffs and Microsoft's Plea for Positive Press

New phones are entering the market just as fast as large tech giants are getting exposed for their less-than-ethical operations. Check out which tech stories made the news this week. 
7 Points to Consider When Drafting a BYOD Security Policy

Bring-your-own-device policies are becoming more common in businesses today. But before implementing them at your company, here are some things to consider. 
Why Android Anti-Malware Apps Are a Good Idea

Malware doesn't just affect computers anymore - it's becoming an ever-increasing threat to Android devices as well. Learn about Android anti-malware apps and how they can help your device stay infection free. 
5 Essential Things That Keep a Data Center Running

High specification buildings called data centers house most of today's business-critical Internet. And the technology is like something out of a blockbuster movie. 
Encryption Just Isn't Enough: 3 Critical Truths About Data Security

Once data has been disseminated from its originator, keeping it secure can be quite a challenge. Here we discuss some strategies for keeping your data out of the wrong hands. 
6 Ways to Keep Apps From Oversharing Your Personal Data

While you’re sharing your life with your apps, those useful tools are broadcasting your information to the rest of the world. Find out how to protect yourself. 
Web Roundup: Privacy, Internet Speeds and Room for Innovation in the Digital Music Industry

Privacy concerns and lawsuits have yet to put a damper on innovation and development in the mobile industry. Check out some of the top stories about mobile technology that appeared in the news this week. 
View All
Tech Pioneers You've Probably Never Heard Of

As in any field, there are big-name pioneers in tech. Here we look at some of those who made a huge impact but received much less recognition. 
Introduction to Databases

No matter what part of IT you work in, you have to store data at one point or another, and it doesn't hurt for just about everybody to have some knowledge of databases and how they work. 
8 Steps to Understanding IP Subnetting

Understanding IP subnetting is a fundamental requirement for almost any IT pro. But although the concepts are simple, there is a general difficulty in understanding the topic. We break it down in eight simple steps. 
Creative Disruption: The Changing Landscape of Technology

Learn about the history behind some major technological innovations - and how they changed the world. 
How Spreadsheets Changed the World: A Short History of the PC Era

The introduction of spreadsheets helped launch the movement that eventually brought computers to home users. Writer John McMullen was there when it happened. Hear the story first-hand, based about his experiences working in the field. 
View All

A thermal printer is a printer that makes use of heat in order to produce the image on paper. Due to quality of print, speed, and technological advances it has... Read more 

A satellite phone is a telephone that has the ability to connect to orbiting satellites. Similar to terrestrial mobile phones, they can connect to voice and short... Read more 

Internet routing is the process of transmitting and routing IP packets over the Internet between two or more nodes. It is the same as standard routing procedures... Read more 

A Wireless Intrusion Prevention System (WIPS) prevents unauthorized network access by monitoring a radio spectrum and looking for unusual network activity.  

A business systems analyst is a person whose job it is to apply business goals to the IT system of an enterprise.  
View All

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
Techopedia on Twitter

Sign up for Techopedia's Free Newsletter!
Techwise Webinar Series
How Can Analytics Improve Business?
Register for this episode of TechWise to learn from two of the most experienced analysts in the business: Dr. Robin Bloor, Chief Analyst of The Bloor Group, and Dr. Kirk Borne, Data Scientist, George Mason University.

Email Newsletter

Join 138,000+ IT pros on our weekly newsletter