Term of the Day

Light Pen

A light pen is a light-sensitive computer input device, basically a stylus, that is used to select text, draw pictures and interact with user interface elements on a computer screen or monitor. The light... (Read on)

Past Terms: DiodeUnstructured DataSelf-Describing Message

Latest Question

While virtualization is a general strategy for getting more out of in-house hardware resources, containerization is a specific type of hardware virtualization. Containerization... (Read on)
What Can the Zeta Architecture Do for Enterprise?

Zeta Architecture combines enterprise architecture with solutions architecture, allowing businesses to save time and better utilize resources. 
A Loon-y Proposition - Your Future Wireless May Be Brought To You By a Hot Air Balloon

Google is known for unique and ambitious projects, and Loon is no exception - it uses hot air balloons to broadcast Wi-Fi signals, providing free access in areas that wouldn't normally have coverage. 
How Apache Spark Helps Rapid Application Development

Rapid application development is key to efficiency. Apache Spark is helping developers test their ideas even more quickly and easily than ever before. 
Why Use Cloud Access Security Brokers?

Cloud access security brokers are gaining popularity, but what exactly are they and how do they help keep you secure in the cloud? 
Destroying Data DIY

You don't want others getting their hands on your sensitive data, but at the same time, you don't want to spend the money to get your data wiped professionally. Here are some data destruction methods to suit your needs. 
The Basics of IT Planning

Every organization should have a thorough IT plan in place, but many do not. Get started on your IT planning with these tips. 
Should You Worry About Rowhammer?

Rowhammer is a memory problem that could be exploited via the Web. Learn about what it is and what's being done to counter it. 
6 Free Ways to Take Control of Your Internet Privacy

Your online activities could open you up to a world of trouble, like hackers, identity thieves and malware. Here are some tips for keeping your personal info private and keeping your online surfing safe. 
How Apache Drill Makes Data Analysis Easier for Everyone

Analysis of big data can make or break a business. That used to mean hiring specialists, but now that analysis can be done by anyone with Apache Drill. 
Ditch Your Inbox? No-Email Initiatives and What They're For

For many in the business world, email equals stress. Some are trying to reduce dependence on email in order to help employees de-stress, but are the alternatives any better? 
Pardon Moi? Top Siri Fail Messages

For many, Siri has become invaluable in assisting with day-to-day tasks, but even with her advanced voice recognition technology, she's sometimes more humorous than helpful. 
What is the Influence of Open Source on the Apache Hadoop Ecosystem?

Apache Hadoop is the best-known and most widely used tool for big data analytics. How does its open-source status affect it? 
What Exactly Is Application-Centric IT Management?

Application-centric IT management is a new trend in IT, but just what is it? Industry leaders explain how it works and what it means to them. 
Cloud Computing: Top Twitter Influencers to Follow

Stay on top of the latest developments in cloud computing by following these cloud experts on Twitter. 
Big Data in the Cloud - How Secure is Our Data?

Greater volumes of big data are being stored in the cloud every day, but how safe is that data? We examine threats and methods of countering them. 
How Can We Handle Internet of Things (IoT) Generated Data Ethically?

The Internet of Things is generating data at an ever-increasing pace, but are there rules and guidelines as to how that data can be used? In many cases, rules are unclear, leading to confusion and ambiguity. 
How Far is Your Data From Your Analytics?  An Overview of the SVoD Analytics Landscape

People are gravitating away from traditional television, and more toward alternative delivery methods for entertainment, leading to the development of subscription video on demand (SVoD) analytics platforms. 
What Technologies Can Counter Big Data Security Threats?

Big data is a big deal - for both businesses and hackers. Even though big data can be a lucrative target for cybercriminals, there are methods of defending your data. 
Reducing VM Troubleshooting Time

Virtual machines are essentially computers within computer, which means that when things go wrong, there are extra layers that must be checked. Here are some tips for quickly and effectively troubleshooting your VM problems. 
10 Signs You're Computer Illiterate

Just how well do you understand computers? If the answer is "barely," then here are some explanations to help you on your way to computer literacy. 
View All
Tech Pioneers You've Probably Never Heard Of

As in any field, there are big-name pioneers in tech. Here we look at some of those who made a huge impact but received much less recognition. 
Introduction to Databases

No matter what part of IT you work in, you have to store data at one point or another, and it doesn't hurt for just about everybody to have some knowledge of databases and how they work. 
8 Steps to Understanding IP Subnetting

Understanding IP subnetting is a fundamental requirement for almost any IT pro. But although the concepts are simple, there is a general difficulty in understanding the topic. We break it down in eight simple steps. 
Creative Disruption: The Changing Landscape of Technology

Learn about the history behind some major technological innovations - and how they changed the world. 
How Spreadsheets Changed the World: A Short History of the PC Era

The introduction of spreadsheets helped launch the movement that eventually brought computers to home users. Writer John McMullen was there when it happened. Hear the story first-hand, based about his experiences working in the field. 
View All

A lumen (lm) is the International System of Units (SI) measurement for luminous flux (brightness). It is defined as: the amount of light emitted when considering a... Read more 

In IT, an influencer is an individual who has the ability to sway an audience through a digital platform. This term is often used in relation to social media... Read more 

An ink cartridge is a container for the liquid ink used in some types of printers, most notably inkjet printers. It is not used in laserjet and dot-matrix printers... Read more 

An infrared light-emitting diode (IRLED) is a special-purpose LED that emits infrared signals. Specifically, it is a semiconductor device that releases infrared... Read more 

In IT, information design refers to the effective presentation of information. It involves crafting data and presenting them in ways that allow them to be perceived... Read more 
View All

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
Techopedia on Twitter

Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join 138,000+ IT pros on our weekly newsletter

3 Amazing Management Tools -- All Free
3 Amazing Management Tools -- All Free:
Attention network admins, get the top tools from Solarwinds. No expiration, 100% free.
Free 30 Day Trial – VMTurbo Operations Manager
Free 30 Day Trial – VMTurbo Operations Manager:
Handles the scale and complexity of today’s virtual and cloud environments for you, keeping your application owners happy while maximizing...