Cisco CloudCenter: Get the Hybrid IT Advantage

Term of the Day


An ideavirus is an idea that spreads through various networks like the Internet and grows rapidly within a target population. It usually comes from a single person. The term ideavirus was coined by... (Read on)

Past Terms: Cyber Kill ChainCheezburgerCredential Stuffing

Latest Question

In order to securely delete files, users have to understand the specific methods of an operating system and how to get access to the raw data where it resides on a machine. While... (Read on)

The Challenge of Quantum Computing

Quantum computing has the potential to be many times more powerful than the computers we use today, so what's behind this technology and when will we see it put to use?
Common Methods Hackers Are Using To Crack Your Cellular Phone

Cell phone hacking has become a real concern with the widespread use of smartphones. Learn about how hackers get into your phone and what you can do to block their attempts.
How GIS Can Put Your Organization on the Map

Geographic information systems (GIS) are transforming the way we do business, and answering questions we didn't realize we had.
BYOD: A Necessity for Modern Business

Bring your own device (BYOD) allows employees to utilize their own mobile devices for business. While this can be extremely convenient, it can also lead to risk, which is why BYOD management must be in place.
What is the difference between artificial intelligence and neural networks?

Artificial intelligence (AI) and artificial neural networks (ANN) are two exciting and intertwined fields in computer science. There are, however, several differences between the two that are worth knowing about.
Why Not Ternary Computers?

Computers all use binary, right? Well, not quite. Ternary (or 'trinary') computers use three bits instead of two, increasing computing power. So why isn't this structure more widely used?
What Moving an Idea to the Cloud Actually Entails

It seems that everyone is moving 'to the cloud' these days, but what is actually involved in the process? Here we discuss some points you need to know.
Multiplexing: An Intro to How it Works

Ever wondered how all those emails, pictures and tweets can travel over the internet without clashing with each other? In this article we’ll take a high-level look at the technique that makes this possible.
5 Reasons You Should Be Thankful For Hackers

Hackers have a bad reputation, but these tech renegades actually do serve a purpose.
How Blockchain Can Impact Digital Business

Most people associate blockchain with bitcoin. Although that's where blockchain got it's start, this automated ledger system is being used for a wide range of other functions.
The 7 Basic Principles of IT Security

IT professionals use best practices to keep corporate, government and other organizations' systems safe.
Questions About The Cloud That Every CIO Should Be Asking

When it comes to cloud computing, be sure to look before you leap! Ask these 6 questions before deciding on a cloud option for your organization.
4 Reasons Why End Users Need to Participate in Testing Before UAT

User acceptance testing is normally the end users' first chance to give feedback on a project, but is that soon enough? Involving users earlier in the process can save both time and money.
Unicode 101

If you want your applications to be truly global, they have to be able to handle languages other than U.S. English. Unicode provides a relatively painless way to do it.
LAN WAN PAN MAN: Learn the Differences Between These Network Types

These networks may sound confusing, but you'll find the concepts self-explanatory once you understand the meaning behind each acronym.
The Darker Side of SD-WAN Service Insertion

Software-defined WAN may seem like an ideal solution, but it can also add complexity to a network, and in the end, that can negate its positive effects.
Bill Veghte Executive Chairman at Turbonomic

What does it take to change the way people live and work? In the tech world, we tend to assume it's technology, but what about the human factor? We discuss this with Bill Veghte of Turbonomic.
Big Data: How It's Captured, Crunched and Used to Make Business Decisions

Finding ways to turn the flood of data into useful information for business decisions is a growing challenge to the IT profession and C-level executives.
The Do’s and Don’ts of Digital Transformation

It seems like businesses are all trying to jump onto the digital transformation bandwagon, but be sure to look before you leap!
What is the difference between Bluetooth and Wi-Fi?

Bluetooth and Wi-Fi: Find out what separates these two wireless technologies.
View All
Tech Pioneers You've Probably Never Heard Of

As in any field, there are big-name pioneers in tech. Here we look at some of those who made a huge impact but received much less recognition. 
Introduction to Databases

No matter what part of IT you work in, you have to store data at one point or another, and it doesn't hurt for just about everybody to have some knowledge of databases and how they work. 
8 Steps to Understanding IP Subnetting

Understanding IP subnetting is a fundamental requirement for almost any IT pro. But although the concepts are simple, there is a general difficulty in understanding the topic. We break it down in eight simple steps. 
Creative Disruption: The Changing Landscape of Technology

Learn about the history behind some major technological innovations - and how they changed the world. 
How Spreadsheets Changed the World: A Short History of the PC Era

The introduction of spreadsheets helped launch the movement that eventually brought computers to home users. Writer John McMullen was there when it happened. Hear the story first-hand, based about his experiences working in the field. 
View All

A quality of storage service (QoSS) is a service that is geared toward accommodating disk storage by optimizing a storage system. The quality of storage service may... Read more

Embedded intelligence is a term for a self-referential process in technology where a given system or program has the ability to analyze its own operations. Embedded... Read more

Memory-resident malware is a type of malware that inserts itself into a computer or device in a particular way, loading its own program into permanent memory. This... Read more

Deep stubborn networks are networking models that support the evolution of artificial intelligence in key ways. In these networks, different network components work... Read more

Intelligence amplification (IA) is the idea that technologies can be assistive to human intelligence, rather than being composed of technologies that create an... Read more
View All

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.