ALERT

[WEBINAR] Bulletproof: How Today's Business Leaders Stay on Top

Term of the Day

Self-Balancing Binary Search Tree

A self-balancing binary search tree is a type of data structure that self-adjusts to provide consistent levels of node access. In a self-balancing binary search tree, the connections from the top node to... (Read on)

Past Terms: ScrobbleDeobfuscateOutlier

Latest Question

Handling the storage component of a modern data management system can be extremely complicated and challenging. Some of the big challenges with storage layers have to do with... (Read on)

4 Reasons Why End Users Need to Participate in Testing Before UAT

User acceptance testing is normally the end users' first chance to give feedback on a project, but is that soon enough? Involving users earlier in the process can save both time and money.
Unicode 101

If you want your applications to be truly global, they have to be able to handle languages other than U.S. English. Unicode provides a relatively painless way to do it.
LAN WAN PAN MAN: Learn the Differences Between These Network Types

These networks may sound confusing, but you'll find the concepts self-explanatory once you understand the meaning behind each acronym.
The Darker Side of SD-WAN Service Insertion

Software-defined WAN may seem like an ideal solution, but it can also add complexity to a network, and in the end, that can negate its positive effects.
Bill Veghte Executive Chairman at Turbonomic

What does it take to change the way people live and work? In the tech world, we tend to assume it's technology, but what about the human factor? We discuss this with Bill Veghte of Turbonomic.
Big Data: How It's Captured, Crunched and Used to Make Business Decisions

Finding ways to turn the flood of data into useful information for business decisions is a growing challenge to the IT profession and C-level executives.
The Do’s and Don’ts of Digital Transformation

It seems like businesses are all trying to jump onto the digital transformation bandwagon, but be sure to look before you leap!
What is the difference between Bluetooth and Wi-Fi?

Bluetooth and Wi-Fi: Find out what separates these two wireless technologies.
Reaching Potential Customers With White Papers

White papers occupy an important niche in the realms of technology research and marketing, especially with content marketing.
3 Situations Where You’re Better Off Not Using a CDN

Content delivery networks (CDNs) can be a quick and efficient way to deliver your content to users. However, it isn't always the best option.
7 Tips For A Stand-Out IT Resume

Getting this part of the hiring process right can be tough for technical IT types, who are more likely to shine at writing code than writing good things about themselves.
An Introduction to QR Codes

Likely you've seen QR codes everywhere. Let's take a look at what these codes are, how they work and how they are used.
3 Signs IoT Is the Killer App for Cloud Computing

With its security issues and costs, the cloud has seen limited implementation, particularly outside of the business space. But with the rise of IoT, the cloud will transition into mainstream use as a result of IoT data requirements.
Penetration Testing and the Delicate Balance Between Security and Risk

Penetration testing helps arm system administrators with the information they need to determine acceptable levels of risk in systems and networks.
3 Options That CIOs Have To Consider: Build, Colocation or Cloud

As the amount of data businesses need to manage is continually growing, the CIO must plan ahead. Traditionally the options have been either building or colocation, but now a third has been added: the cloud.
The Ability to Combat Ransomware Just Got a Lot Tougher

Discover how pools of investment money, research and development and the creation of vast distribution channels is speeding up the evolution of ransomware to make it an even greater menace in 2017.
Why Is Java Preferred to Other Languages as a Building Block?

Despite a few flaws, no other language matches up to Java in terms of flexibility and seamless integration with other frameworks and technologies.
SYN Flood Attacks: Simple Yet Significantly Destructive

With a staggering 65,535 TCP ports being made available on a single IP address it's easy to see why there are so many security exploits on the Internet. But while SYN attacks are hardly new, they're still hard to address.
6 Signs That Mobile Is the New Key to Winning at SEO

This update from Google is putting a much heavier emphasis on mobile devices than ever before, meaning that many will need to adjust their SEO strategies.
How to Nurture a Data Scientist

To nurture data scientists, companies need to focus more on culture and organizational structure. Data scientist Ben Lorica provides his take in this guest post.
View All
Tech Pioneers You've Probably Never Heard Of

As in any field, there are big-name pioneers in tech. Here we look at some of those who made a huge impact but received much less recognition. 
Introduction to Databases

No matter what part of IT you work in, you have to store data at one point or another, and it doesn't hurt for just about everybody to have some knowledge of databases and how they work. 
8 Steps to Understanding IP Subnetting

Understanding IP subnetting is a fundamental requirement for almost any IT pro. But although the concepts are simple, there is a general difficulty in understanding the topic. We break it down in eight simple steps. 
Creative Disruption: The Changing Landscape of Technology

Learn about the history behind some major technological innovations - and how they changed the world. 
How Spreadsheets Changed the World: A Short History of the PC Era

The introduction of spreadsheets helped launch the movement that eventually brought computers to home users. Writer John McMullen was there when it happened. Hear the story first-hand, based about his experiences working in the field. 
View All

Target Disk Mode (TDM) is a special boot utility available only for Macintosh computers. Any Macintosh computer booted in Target Disk Mode can be connected to the... Read more

A superconductor is any material that can conduct electricity with no resistance. In most cases, materials such as metallic elements or compounds offer some... Read more

On computer keyboards, system request (SysRq) is a key which has no standard use. It was initially provided as a special key for directly invoking low-level... Read more

A solenoid is a coil of enameled or insulated wire in a corkscrew shape wrapped around a rod-shaped armature usually made of iron. A solenoid is an... Read more

Synchronous Transport Module level-1 (STM-1) is a fiber optic network standard for synchronous digital hierarchy. The transmission format is considered the... Read more
View All

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

Resources
The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.