Justin Stoltzfus is an independent blogger and business consultant assisting a range of businesses in developing media solutions for new campaigns and ongoing operations. He is a graduate of James Madison University.
Stoltzfus spent several years as a staffer at the Intelligencer Journal in Lancaster, Penn., before the merger of the city’s two daily newspapers in 2007. He also reported for the twin weekly newspapers in the area, the Ephrata Review and the Lititz Record.
More recently, he has cultivated connections with various companies as an independent consultant, writer and trainer, collecting bylines in print and Web publications, and establishing a reputation for excellence in corporate training, marketing campaigns and other media projects.
Scared of AI? Maybe you should be! Here are some areas of “progress” where AI is advancing very quickly in a way that can seem a little disturbing to us humans!
There's a new category of cloud vendors known as 'born in the cloud.' What sets this new generation of vendors apart from legacy cloud vendors?
Do what you do best and outsource the rest. Which of these 10 things would your business benefit from outsourcing?
Working as a developer means staying on top of best practices that are constantly in flux. Here's our top 5 tips for developers to keep up!
It's hard to say for sure whether Bitcoin will survive, but one thing is certain: It represents the future of payment, either way. Here are five arguments from each side...
Most people don’t associate cutting-edge technology with agriculture, but that is changing with the help of new developments in artificial intelligence and machine...
SQL is an essential part of most databases’ operations, but are you backing it up properly? Here we look at SQL backup issues that can trip up admins.
Why are containers so popular, and how does containerization contribute to efficiency and enhanced operations? Here are some ideas from some of the pioneers.
Computer science is a broad and fundamental part of the technology industry. Online learning offers the ability to learn from anywhere, and get involved as computer...
Here we explore the Controller Area Networks and electronic control units that comprise modern-day vehicles.
Cryptography is a game that everyone has to play — and it’s still evolving in the age of quantum computing and AI.
What's happening in the field of biometrics? Some people would say: not much. Some others, who are closer to the industry, would say a lot is happening.
A guide to what data architects do in modern enterprise IT. Sometimes these professionals seem like the unsung heroes of their departments, but their work is ultimately...
The network administrator is the connector of pieces and the guardian of the network as a whole, but they are also a lot more.
ML is a valuable part of data science. But data science represents the vaster frontier and the context in which machine learning takes place. Here’s the best way to...
What is an AI strategist? It's an interesting question, particularly in how AI is reshaping the business world and revolutionizing how companies sell products and...
The IoT product manager is now very much in demand in today's job world. But what do these individuals do?
Cloud security is a serious issue; how has the cloud changed the cybersecurity game?
The military is likely to soon use these virtual entities for all sorts of outreach and internal management, prodding us to ask: do we have a handle on our robot...
A guide to six interesting Tensorflow courses available at Coursera
In the broadest sense, the business intelligence analyst is responsible for working with business intelligence data, creating insights and establishing ways to utilize...
Algorithm work is part of the vanguard progress of a world in which data scientists are in high demand. Mastering this field requires a lot of learning and training,...
The AWS solutions architect is someone who fits AWS services to an enterprise model. An AWS solutions architect boils down the components of a powerful and...
Big data is the order of the day, but ever since advanced storage media made it possible for us to compile much larger amounts of information, we’ve been trying to...
In the world of enterprise IT, the term “ethical hacker” is quickly gaining ground. On a very basic level, ethical hackers are professionals who break into corporate...
Machine learning is a quickly emerging field. If you want to get started in ML, these 5 online courses are a great place to start!
Hardware engineers need to understand how physical systems are provisioned, but they also need to have an inkling of the return on investment that each option provides...
When it comes to understanding the process of software development, there’s a lot to learn. These Coursera offerings can help you up your game in software development.
Ever since the first and most primitive databases appeared in computer mainframe systems, database administrators have handled the tough job of fully implementing...
Starting out with a machine learning project can be a daunting process for executives who want to take advantage of this IT trend but may lack the in-house knowledge to...
Data engineers are very much in demand these days, but too many executives and others have big questions about what these professionals do. The data engineer is...
Instead of trying to create a wall around an entire private system, more security professionals and companies are focusing their security efforts on the user device,...
A systems analyst is a valuable part of any company that has any significant IT architecture. But sometimes it’s hard to pin down exactly what a systems analyst does,...
Two different approaches to connected devices are making waves in the IT world: machine-to-machine, which focuses on connecting equipment in a physical production space,...
In the digital world, the free flow of data is critically important. When this free flow of data is impeded for any reason, professionals talk about that as a “data silo...
Software engineers are behind the software and apps that we use every day. But what exactly does the role entail? Here we examine the duties of a software engineer.
There’s a battery of questions related to the underlying security of the blockchain. Boiled down into a simple question: you might say – can the blockchain be hacked?
There is so much ahead in the cybersecurity world - with AI and more, companies are evolving to meet the challenges of a connected world.
Will AI take over world and destroy humanity? For many experts, the answer is a resounding “no.” Most would agree that we need ethical, explainable frameworks to direct...
Data science is rapidly changing. New advances in AI and machine learning mean that data can be applied in brand new ways, and in unprecedented modeling systems, to do...
Data analysts are people who collect data and use that data to provide insights. They are “translators” of raw numbers and data points into digestible information that...
What does a data scientist do in the context of artificial intelligence and machine learning work? A better question would be: What do data scientists NOT do?
The IoT is a new and exciting world, and the IoT solutions architect is very much in demand. This professional takes part in a lot of the different steps and processes...
Databases are complicated, and DBAs sometimes can feel overwhelmed by everything that needs to be done. These tips can help keep things in check and running smoothly.
DevOps can be a boon for a business, but only when it's done right. Here we take a look at some of the mistakes to avoid, as told by tech experts.
Embedded analytics is the key to helping businesses make better, more informed decisions. Here we talk with Catherine Frye about how Qlik is implementing embedded...
Here we explain what a DevOps manager does ... and why that's important.
Day-to-day management is changing fast, but is the end of the brick-and-mortar office drawing near? As more and more people are able to work remotely, physical office...
AI and IoT are bringing exciting new advancements, not just for ordinary folks, but for hackers as well. As malicious entities try to exploit new technologies, see how...
The latest changes in NIST password requirements are welcome changes for both users and administrators: no more special characters, and no more periodic password resets!...
Cybersecurity consists on an intricate web of technologies, all working side by side to protect your digital assets. Here we take a look at these technologies, and why...
Artificial neural networks are paving the way for scientific, social and economic breakthroughs. Here's a closer look at some of the advances we can thank ANNs for.
Not long ago, bring your own device (BYOD) was a hot new trend, but now it's simply a reality of modern business. Find out why BYOD has become more than just a passing...
Threats are constantly evolving, and so must your security. Here we take a look at some of the most important aspects of modern cybersecurity.
Thoughtful leaders have dreamed up a more fluid software release structure to bridge the development and production environments, but computer programming still has an...
Have you seen the figure MTBF on computer and electronics packaging? Chances are, it doesn't mean what you think it does.
Like many buzzwords, most people are familiar with the term nanotechnology without knowing what it really means, or how advances in nanotech are likely to influence the...
Online privacy and security are big concerns these days, but protecting yourself online is easier than you might think.
Knowing more about how a product fits into a greater high-tech methodology for today’s businesses, as well as understanding how product management fits into a CRM suite,...
Medical cloud services are making headway in health care with the migration to electronic medical records for doctors and physician practices.
SLAs may be dense, awkward documents, but they play a big role in how third-party vendors offer services to corporations and businesses. Learn more about them here.
VMTurbo has become Turbonomic. This name change also signifies a shift toward autonomic computing - systems managing their own resources for optimum efficiency, with...
Conventions are guidelines that are meant to be followed, but what happens when they're not? In programming, Yoda conditions alter the normal syntax, and programmers...
The 10x developer - a developer who's ten times as productive as average developers - is somewhat of a mythological figure in the world of tech. But does this myth have...
How do companies and government agencies conquer the limitations of the traditional data handling pathway? Here we'll take a look at one very promising option: Software...
Cloud services have become indispensable for business, but with ever-increasing pressure to keep budgets in line, tech professionals are looking for ways to cut costs.
Is it better to have access to limited parts of the Internet than to have no access at all? This is a hotly debated question surrounding Internet access in developing...
What if you could charge your smartphone throughout the day, without ever having to remove it from your pocket or purse? That's what the next generation of wireless...
ASCII art, once a response to the limitations of computers, is showing a resurgence in popularity with new algorithms that can automatically generate complex ASCII...
Cars are constantly becoming more high tech, but not everyone agrees these 'upgrades' are for the best.
The U.S. government is beginning to utilize cloud computing for its convenience and cost savings.
Hybrid hosting most commonly refers to the use of both public and private cloud hosting solutions. But how does this work, and how can it benefit you?
Google is known for unique and ambitious projects, and Loon is no exception - it uses hot air balloons to broadcast Wi-Fi signals, providing free access in areas that...
Cloud access security brokers are gaining popularity, but what exactly are they and how do they help keep you secure in the cloud?
Rowhammer is a memory problem that could be exploited via the Web. Learn about what it is and what's being done to counter it.
For many in the business world, email equals stress. Some are trying to reduce dependence on email in order to help employees de-stress, but are the alternatives any...
Application-centric IT management is a new trend in IT, but just what is it? Industry leaders explain how it works and what it means to them.
Perovskite is a mineral with unique properties, including the ability to collect solar energy. See the potential applications of this material.
While HTML and CSS have been used for years, Sass is relatively new to the Web development scene. It can greatly simplify the development process, making it a hit with...
While businesses today are focused on data, many are neglecting research. Here we discuss five research tools that can help with research.
Enterprise security is a multifaceted endeavor, often requiring multiple tools to protect against threats. OpenDNS is a tool that attempts to block access to IP...
SEO has been a standard practice to elevate search rankings, but with recent changes in Google's search algorithms, SEO is shifting away from keyword stuffing and toward...
Smart keys may seem like modern marvels of technology, but they're not always as smart as their name implies. Smart keys can cause numerous problems that were never...
Microsoft is releasing its newest version of Visual Basic with the Visual Studio 2015 package. Visual Basic 14 includes new features to enable more powerful programming.
Businesses are rapidly turning to virtualization software to solve their problems, but they often don't consider any of the challenges that come with implementing this...
Mobile virtualization opens up a whole new world of options for mobile computing and communications. It can has the potential to help with security, productivity and...
The cloud is gaining wide popularity as an enterprise tool, but for cloud use to be effective, proper security measures must be taken.
OLEDs are still a relatively new technology, but with their flexibility and energy efficiency, the possibilities are limitless.
You shouldn't judge a book by its cover, and by the same token, shouldn't judge technology by its name. Here are some technologies that sound boring, but in reality are...
These two terms are closely linked, but confusing them is a recipe for disaster in terms of understanding vendor models and pricing.
Cloud computing is becoming a major trend in business, but not only is it economical, it is also environmentally friendly.
Your business is surely collecting data. But the question is, what are you doing with that data? Here we examine ways to put that data to good use.
Many people are accustomed to throwing out their old technology with the trash, but new laws are enforcing proper disposal of unwanted electronic devices.
High-tech consumer devices have changed a lot of us in very fundamental ways, perhaps more than we realize - or would like to admit. Check out some of weird things we do...
Forget canned voices; reproducing real ones is the new goal for natural language processing. Learn more about this technology here.
Sudden interface changes can be a nightmare for unprepared users, and service providers often find that the smallest alterations generate much confusion - even anger.
Sockpuppet marketing is shilling in sheep's clothing. Here, we review this online scourge, its legal ramifications and advice from Google's Matt Cutts.
We look back at the analytical engine for a better view of how humanity created our ever-evolving machines.
This movement has its critics, but it's looking to empower a new generation of computer users. Hear more from both sides of the debate.
Many of the biggest security breaches occurred through a USB stick. Find out how companies are protecting themselves.
Get ready for clothes that "talk" and "listen." New e-textiles are quickly changing what wearable devices can and can't do.
New digital tools could change the face of the wireless industry, where a growing lack of resources is making telecom providers distinctly uneasy. Find out which...
New technologies are helping users destroy digital messages and images they send after a short time, but what really happens to these digital items?
In a February 2012 TED talk in Long Beach, California, University of Pennsylvania professor Vijay Kumar talks about agile aerial robots and the future of artificial...
Entertainment Arts Chief Technology Officer Rajat Taneja offered detailed insights into what’s going on now in the video gaming industry, and how leaders in this field...
This video from the London 2012 Strata Conference provides a rich history of data storage and data handling and a look at the challenges big data faces going forward.
In exploring the boundaries of what's possible in a game world, developers can get closer to answering some broader questions about technology's ability to mimic...
MOOCs are offering a brave new option at a time when traditional college degrees have lost a little of their shine. Learn more about them here.
CISPA failed in the Senate, but that doesn't mean it's dead. Here's what to look for in the next go-round.
Dr. Sugata Mitra, an educational researcher and professor of educational technology at Newcastle University, took to the stage at TED2013 to explain his goals for a...
This talk from the 2011 Strata Conference in New York looks at how big data can be used to solve big problems.
Principal researcher at Microsoft Research Kate Crawford makes the case that while big data is essential to many business applications, there’s more than one way to...
Learn the basics of candidate keys and how they operate in a database.
The Hadoop analytics platform has some significant limitations involving speed and complexity, but industry leaders are working to change that.
At last year’s SXSW event, eminent IT guru Ray Kurzweil spoke about continued advances in technology and how they can be predicted. View the video here.
SoLoMo is a mashup of the terms 'social,' 'mobile' and 'local.' Find out more about what it means - and why people are talking about it.
Although the basic idea of DevOps is straightforward, people use and discuss the term in a lot of different ways. Here we take a look at how DevOps is used and what it...
Many different types of businesses invest in a transaction process system as part of IT merchant services or other parts of the software architecture. Learn more about...
Click fraud may be a virtual crime, but its effects are becoming increasingly real for consumers and businesses.
The trans-Atlantic cable is nothing new, but it may just be the next wave in a move to increase connectivity and transmission speed worldwide.
These code names are imbued with a sense of mystery, but what do they really mean? Here we take a look at how - and why - the tech industry is so fond of these funny...
Some new technologies suggest that a terabyte per second data transmission speed may now be within reach. And yes, these technologies include lasers.
Marketers have always gathered data about potential customers, but what they know is getting increasingly specific - and personal.
This device hearkens back to the time of the Commodore and the Atari, when a machine's fundamental controls were not hidden by windows and other dressed-up interfaces.
The idea of using cloud-based services in vehicles is just starting to catch on, providing inspiration for a lot of potential innovations in vehicle design.
The energy used by a set of servers responding to a keyword search may be marginal, but they all add up to significant energy use.
While hyperautomation is an extremely important term in today's technology conversations, it's also one that is fairly subjective...
The difference between supervised and unsupervised learning is that only one of these processes, supervised learning, takes advantage of...
A decision scientist is a technology professional who is mainly focused on making technologies work for decision-making processes within an...
SQL injection, along with the related manipulation of query strings, is widely cited as one of the most popular ways of hacking into a...
The idea of applying the Internet of Things (IoT) to business intelligence (BI) is now becoming a mainstream part of corporate strategy....
Companies face an array of serious challenges in management reporting, which is essentially a broad-spectrum approach to providing...
The answer to the question is a resounding YES. There can absolutely be too much data in a big data project.There are numerous ways in...
Machine learning professionals use structured prediction in a whole multitude of ways, typically by applying some form of machine learning...
There are a number of ways to talk about why a confusion matrix is valuable in machine learning (ML) – but one of the simplest ways...
This fundamental question about machine learning takes into account many different aspects of how these complicated programs work, and what...
Transparency is essentially important in data science projects and machine learning programs, partly because of the complexity and...
There are a number of ways to explain and define “precision and recall” in machine learning. These two principles are...
The use of graphics processing units (GPUs) has particular importance for the field of deep learning. The reason has to do with how deep...
Ensemble learning has various benefits for machine learning projects. Many of these are related to using a large number of relatively...
There are any number of complicated ways to describe bias and variance in machine learning. Many of them utilize significantly complex...
Data mining and machine learning are two very different terms – but they are often both used in the same context, which is the...
The question of whether machine learning programs will eventually replace human physicians is an interesting one. It has its basis in...
The discipline of data visualization gives us practically infinite ways to show off what's happening with machine learning algorithms....
When people use machine learning without investing enough time in planning, it’s no surprise that the results will be inferior...
Unstructured data can be very valuable to a business in many different kinds of scenarios. It can help organizations discover new insights...
Some companies are moving toward containerization for machine learning projects, based on some of the benefits that container setups offer...
The question of how to structure a machine learning project and its train and test phases has a lot to do with how we move through the ML...
There are a few predominant reasons why experts in cybersecurity will talk about Bitcoin and cryptocurrency mining being linked to various...
The recent rash of malicious ad blockers dropped from Google's Chrome Store shows how difficult it is to shield end users from...
One of the hottest new artificial intelligence technologies is a life-sized robot made to look and act like a woman.Her name is Sophia, and...
The internet of things (IoT) is a big, exciting new phenomenon that's changing the technology world and renovating various industries,...
Nations are experimenting with quantum technologies at a rapid pace. The European Union has just set up a “quantum flagship”...
In AlexNet, an innovative convolutional neural network, the concept of max pooling is inserted into a complex model with multiple...
NeuroEvolution of Augmenting Topologies (NEAT) contributes to genetic machine learning by providing a cutting-edge innovative model based...
The difficulty of training artificial recurrent neural networks has to do with their complexity.One of the simplest ways to explain why...
Data annotation is important in machine learning because in many cases, it makes the work of the machine learning program much easier.This...
Machine learning doesn't just model human brain activity – scientists are also using ML-driven technologies to actually look at...
There are numerous differences between the IPv4 and IPv6 protocols, but all of them are based on the issue of a progressive step in...
New scientific work on neural networks may reduce their power and resource requirements to the point where engineers could put their...
What are we talking about when we talk about machine learning and AI in business?Lots of different people have different opinions –...
In many ways, the virtual assistance and interactive voice response (IVR) systems in today's call centers are still pretty primitive...
To those who haven't researched what's behind modern machine learning and artificial intelligence work, all of this effort and...
Rational agents serve various purposes in machine learning and artificial intelligence projects, but they are particularly useful in retail...
Machine learning is being applied to genetic testing in many different ways.The applications are nearly endless. Machine learning is...
An idea called the "master algorithm" is having an effect on how we view machine learning and artificial intelligence work.The...
The idea of human intuition is now a major part of groundbreaking artificial intelligence work – which is why AI engineers pay so...
Xavier initialization is an important idea in the engineering and training of neural networks. Professionals talk about using Xavier...
New methods of artificial intelligence science are helping researchers to understand more about how the brain works – and in some...
Although artificial intelligence and machine learning will change many industries, one of the largest impacts will be felt in consumer...
In general, explainable artificial intelligence is becoming a much heralded part of cutting-edge work in data sciences. It's helping to...
Machine learning and artificial intelligence are rapidly changing many industries, and really reshaping the ways that we think about...
The idea of dynamic allocation of cloud resources solves a number of very important problems for enterprise IT. One of the best ways to...
The short answer to why intent-based networking is so important is that company networks are essentially the core infrastructure for most...
With the emergence of newer and more sophisticated chatbots over the past few years, people in many industries are observing how chatbots...
The numerous significant differences between speech-to-text technologies and chatbots is part of what's being examined in the rapid...
When you think of machine learning, you tend to think of skilled data scientists working on keyboards in computer rooms. There is an...
The fields of machine learning and artificial intelligence have many exciting applications to the medical field in general, and telehealth...
If you're reading about machine learning, you're probably hearing a lot about the uses of graphics processing units or GPUs in...
To understand how this is done, it's necessary to have a basic grasp of the roles of different data sets in a typical machine learning...
Bootstrap aggregation, or "bagging," in machine learning decreases variance through building more advanced models of complex data...
Semi-supervised learning is an important part of machine learning and deep learning processes, because it expands and enhances the...
The question of how the Chinese restaurant process can instruct enterprise AI is an interesting one, as right now, companies in all sorts...
One of the exciting new frontiers of machine learning and AI is that scientists and engineers are embarking on various ways to use...
In machine learning, a "random walk" approach can be applied in various ways to help the technology sift through the large...
Like other kinds of boosting, gradient boosting seeks to turn multiple weak learners into a single strong learner, in a kind of digital...
Feature selection is extremely important in machine learning primarily because it serves as a fundamental technique to direct the use of...
On the face of it, deep stubborn networks simply "add functionality" to an existing technological construct, the generative...
The term "character AI" is not used extensively online – in fact, popular Google results for this term seem to come almost...
There are a few different reasons why people are talking about the “tipping point” of machine learning and how this type of...
Wherever you look, machine learning is transforming industries. One of the later adopters is the human resources field – at first,...
There's a big trend happening in machine learning (ML) – programmers are flocking toward a tool called TensorFlow, an open-source...
The emergence of new neural network technologies means a lot for the field of artificial intelligence. Convolutional neural networks, or...
The question of why robotics has not kept pace with machine learning and artificial intelligence (AI) work in consumer electronics is an...
One of the biggest potential applications of machine learning systems is the mining of important efficiencies for business processes and...
One of the practical problems that companies might encounter when trying to start a machine learning (ML) project is the challenge of...
For companies that are looking to get involved in their first machine learning (ML) investments, the whole process can seem a little...
Understanding the terms "bias" and "variance" in machine learning helps engineers to more fully calibrate machine...
In general, an equilibrium will inform machine learning by seeking to stabilize machine learning environments and create outcomes with a...
The use of Occam's razor dates back to William of Ockham in the 1200s – it's the idea that the simplest and most direct...
Amazon Web Services (AWS) is a highly evolved comprehensive cloud suite for clients who want a range of resources that can facilitate...
One of the most compelling individual examples of progress with machine learning (ML) and artificial intelligence (AI) involves digital...
Some of the companies working on the newest advances in artificial intelligence are becoming focused on quantifying the progress that...
The idea of an “information bottleneck” in artificial neural networks (ANNs) operates on a special principle related to the...
The issue of patch management is something that cybersecurity experts often think about in the context of keeping systems safe. Essentially...
Professionals involved in working on artificial intelligence (AI) technologies have been making a lot of money for a while. The reasons for...
More sophisticated methods of managing data center bandwidth allow for more consistent performance, and allow administrators to avoid...
Cloud database systems help to give businesses a more versatile way to handle relational database functionality. It's convenient to be...
Machine learning and artificial intelligence principles are rapidly changing how computing works. One of the key ways that this is...
New cloud-based systems like SAP HANA take advantage of particular hardware and IT architecture setups to utilize the data and also exploit...
It's tempting to think of today's progress in artificial intelligence as mainly related to solving logical and data-oriented...
Capable cybersecurity vendors and consultants often talk about multi-factor authentication (MFA) as a modern best practice. The reason has...
New artificial neural networks are useful in a broad spectrum of ways, but one of the most popular applications is to the marketing world....
The concept of artificial intelligence is applied to business in many different ways, and big shifts in artificial intelligence research...
Logic gates are the logical constructs that make up the framework for path generation in computer processing. The use of logic gates in...
Some companies working with cutting-edge AI technology are working to institute human controls for these systems, giving machine learning...
This question can be answered in two different ways. First, why is machine bias problem, as in, why does it exist in machine learning...
Machine learning and artificial intelligence tools have enormous potential to help companies and other parties deal with a spectrum of...
The idea of “layered security” is central to some of the most relevant ideas in cybersecurity today – it's a way to...
Companies often use random forest models in order to make predictions with machine learning processes. The random forest uses multiple...
When it comes to tailoring machine learning tools for both retail and manufacturing businesses, there are some significant similarities,...
Machine learning can help with both predictive and regular maintenance, and the general maintenance, repair and overhaul (MRO) processes...
One of the most fundamental reasons – probably the most fundamental reason – to use the Amazon Machine Learning (AML)...
Scalable machine learning is a major buzzword in the machine learning industry, partly because getting machine learning processes to scale...
In general, companies often use tools like Apache Mahout to develop machine learning solutions for using large data sets in business...
In the field of machine learning, an induction algorithm represents an example of using mathematical principles for the development of...
“Artificial intelligence drift” is a relatively obscure term, and you won't see it mentioned a whole lot in online tech literature. However...
Companies might shut down artificial intelligence chatbot projects for many reasons, but the most likely ones can be grouped into a couple...
With so many companies moving data to the cloud in one way or another, encryption has become a major part of the overall effort of...
Many cloud providers look to become certified with FEDRamp, a federal cybersecurity program. The essential reason that so many companies...
Many companies are trying to figure out how to send applications and workloads to the cloud. When it comes to designing applications for...
When it comes time to migrate to the cloud by augmenting on-premises systems with cloud services from vendors, having good visibility can...
Maintaining availability for applications can have a broad and significant effect on business processes. In general, making sure that...
There are a number of reasons why the Python programming language is popular with professionals who work on machine learning systems.One of...
Despite having similar acronyms, a CPU and a GPU are quite different. The biggest difference between a CPU and a GPU has to do with the...
The terms “artificial intelligence,” “machine learning” and “deep learning” describe a process that has...
A loosely coupled architecture is generally helpful in scaling many kinds of hardware and software systems. This is one of the primary...
In order to truly make use of the principle of network virtualization, companies need to move away from the hardware dependencies that are...
Virtualized systems can provide big benefits for companies. However, this isn't true in all cases. Businesses have to look at the key...
In many cases, companies can greatly increase the speed of server deployment by utilizing virtualized systems. One of the best ways to...
The virtualization backlash in IT is the idea that some companies may be moving away from that classic virtualization structure, either...
Although elasticity and scalability are two different principles, some IT professionals and other stakeholders tend to think of them as...
Companies may use a virtualization resource summary or some similar tool to look at how a virtualization system is working. A...
Using a demand-driven migration model can help businesses to refine the ways in which they move data and upgrade from legacy systems to new...
Having undersized VMs in a virtualization system is a classic example of improper resource allocation that leads to concrete performance...
Real-time monitoring of hybrid cloud systems enables businesses to do more with the software architectures they use to support operations....
It's a common problem – networks get a lot of pressure from the flood of wireless data that's floating around in any given local area. From...
Wireless and radio interference problems can be a significant source of problems and frustrations for those administrating an enterprise...
The reality is that many different kinds of common household items and other types of devices can interfere with a given wireless signal or...
With so many cloud options at their disposal, many companies are now opting to choose a hybrid cloud approach that merges public and...
In many corporate IT situations, this is the million-dollar question – how to handle the dynamic unpredictability that comes from putting...
IT professionals hear a lot about right-sizing systems on cloud platforms, but many companies are still choosing to utilize on-premises...
To some companies, the open-source OpenStack platform for the cloud offers significant savings and other benefits. But other firms are more...
In the fundamental design of user interfaces, engineers can choose from stateless or stateful systems. A stateless system is one that has...
In hardware virtualization systems, it's important to understand the entire context of the environment that virtual machines and other...
Modern companies can assess their data center and virtualization operations in many different ways. Many of the most popular models involve...
One of the core values of enterprise automation is its ability to decrease the labor burden on individuals. Traditional system operators...
Companies can pursue cost accounting for cloud services in different ways. Some of the most primitive approaches involve entering raw data...
HTML5 is a common foundation for a business interface for various reasons. Businesses can really benefit from building an interface with...
Working at building cloud-native architectures can help a business to redesign and improve how it sets up and uses its IT systems. The...
Many IT professionals consider it important to build reserve capacity into hardware virtualization systems. This is part of overall...
The decommissioning of applications can be a significant burden for an enterprise, especially one that has tended to update and upgrade or...
In the setup of multiple virtual machines in a network virtualization environment, naming conventions are important. They help to make the...
By changing the ways that IT assets are labeled and handled in architectures, companies can greatly improve the use of network “objects” to...
The importance of matching uptime to infrastructure has to do with how companies ensure efficiencies when they are dealing with...
A desired state in IT is a term for a kind of network equilibrium – in a desired state, everything is aligned as perfectly as possible, to...
There are many ways that companies can use virtual machine use cases to learn more about how virtualization components work in a virtual...
A workload chart for virtualization systems can be a real asset to an IT manager, or anyone else with responsibilities and interests in...
Many businesses are finding their own ways toward the principle of composable infrastructure. Some start small with their own automation...
In some ways, virtual reality and augmented reality are a lot alike. However, they are not the same thing.Virtual reality generally refers...
The practice of rightsizing virtual machines and components of your virtual system can have a good impact on these systems. That's why it's...
Software-defined storage (SDS) as a concept is revolutionizing the ways that businesses handle data storage. In conjunction with the...
Handling the storage component of a modern data management system can be extremely complicated and challenging. Some of the big challenges...
Buyers have a lot to think about when trying to select a platform as a service (PaaS) vendor product. Platform as a service is the top...
The work involved in site reliability engineering (SRE) can vary quite a bit, depending on the companies and systems being worked on. The...
The idea of differentiating storage for I/O-intensive workloads is a process that has roots in traditional IT, but it's also one that's...
In order to really take advantage of all of the benefits of autonomic hyperconvergent platforms, businesses should know how to move into an...
The decision to suspend particular virtual machines (VMs) to meet changing virtual desktop infrastructure (VDI) needs is part of a larger...
Continuous real-time placement of user workloads is one part of a bigger puzzle involving how companies make sure systems can handle the...
Virtual desktop infrastructure (VDI) services provide companies with an alternative for setting up multiple workstations or computers. They...
The process of raw device mapping (RDM) is used in the context of storage area networks (SANs) to help provide segmentation and order for...
N+1 or N+1 redundancy is a popular concept in network virtualization and the design of IT architectures. Companies generally use this...
A cluster capacity dashboard brings transparency to the question of how virtualization environments are set up, and reveals details about...
Generally, companies use quality of service (QoS) tools or address quality of service concerns for virtual machines and virtualization...
Most companies require specific and deliberate strategies and approaches for dealing with application sprawl, a problem that occurs when...
The Amazon Web Services or AWS public cloud system uses a concept called “availability zones” to offer client companies redundancy and...
There are various reasons why companies strive for multi-cloud systems or platform diversity in the cloud. Generally speaking, having...
Distributed denial of service or DDoS attacks are a major threat to today’s businesses.These types of cyberattacks have the ability...
When it comes to cloud procurement, companies have to look carefully at what each individual vendor offers. They have to weigh aspects such...
As a popular open-source choice for deployments, OpenStack does have some concerns for business leaders who are intending to scale a cloud...
Businesses may invest in decision automation for any number of reasons. However, there are some overarching fundamental principles that...
The benefits of workload abstraction in an IT environment have much to do with taking a more sophisticated look at computing systems and...
The process of “lift and shift” for some set of workloads or data environment is commonly defined as a project that simply seeks to “lift”...
Amazon Web Services (AWS) is one of the most popular ways for companies to get involved in a cloud, hardware virtualization and/or...
Businesses and other stakeholders use Kubernetes to build a container environment for applications, and to manage and deploy container...
Although there are many ways to improve app performance in the cloud, companies generally try to identify network performance issues and...
A move toward “self-driving data centers” has evident benefits for companies, and it’s something that many experts are calling an...
Multi-cloud deployments involve a company selecting more than one cloud vendor or provider, and putting different workloads into each...
Businesses can use virtualization health charts to keep on top of how virtual machines, hosts and other elements of a virtualization...
Converged and now hyper-converged and super-converged systems are emerging significantly as a new framework for business IT architectures...
Current research indicates that many companies are moving toward cloud vendor services. However, this sea change is not universal, and...
In general, the compliance limitations of public cloud have to do with the extent to which public cloud systems can keep private client...
Tunneling into a virtual network or private network refers to the process of using a public network to transmit data for use in the private...
Containers and virtual machines are both parts of virtualization systems, where hardware environments are abstracted into a series of...
In using relatively new container virtualization technologies, companies and engineers have a choice: whether to install the container...
A private cloud platform is a cloud platform that is offered to one customer, and one customer only. By contrast, public cloud platforms...
The challenges of legacy migration projects are many and diverse. They depend on the scope of the migration process, for example, whether...
Businesses may use “edge data collection” methods to capture different kinds of information for business intelligence or other operational...
Visual query builders, or visual query building tools, are used to generate and inspect SQL queries in database operations.As a declarative...
Database managers and other IT professionals should guard against “database redundancy” or “data redundancy”...
A central DBMS interface provides user-friendly and structured access to the data contents of a database, or of multiple databases. The...
The biggest uses of Structured Query Language (SQL) today have to do with using a long-established conventional language for relational...
Companies create server inventories to better manage their IT assets, and to keep tabs on server and system performance. They may build a...
Query plan monitoring techniques fix problems with high wait times, bottlenecks and general blockages in a database management system....
The biggest fundamental difference between the C computer language first released in 1972, and the C++ programming language released in...
Before the advent of modern color monitors and displays, earlier computers communicated to humans through a set of more mechanical and less...
In IT, alpha testing is commonly defined as a form of internal testing that happens while a product is still being developed, albeit at the...
A virtual local area network (VLAN) is an abstracted LAN that is created to operate through the data link layer (layer 2) of the OSI...
The difference between a composite key, a foreign key and a primary key is a good illustration of the complex and byzantine nature of...
There are many reasons why companies might want to make a move to a NoSQL database and away from traditional relational database systems....
Partitioning a database means taking various parts of the data stored in the database and separating them into various partitions, or...
A NoSQL database is a database that doesn't use traditional relational database methods. NoSQL databases have different approaches to...
Server sprawl is the inefficient or improper provisioning of servers to handle workloads. Server sprawl happens when underutilized servers...
The core function of a data management platform is to take in information from diverse sources and present it well. A data management...
With file integrity monitoring, IT professionals compare different versions of files against a baseline using tools like a "...
In some ways, security information and event management (SIEM) is different than the normal, average event log management that businesses...
As three very similar yet distinct types of processes, the three acronyms SEM, SIM and SIEM tend to get confused, or cause confusion for...
In general, network systems benefit from event log monitoring because these resources and tools help to show administrators more about...
There are many ways that administrators monitoring servers help with overall system performance, but many of them boil down to some...
Active directory monitoring involves looking at the active directory service created by Microsoft for use in Windows networks.Part of this...
The specific types of resources available for Microsoft tools like Sharepoint and Exchange are different for each piece of software that...
SharePoint monitoring and server monitoring are two different types of monitoring and analysis for network activities. Although they may...
A NetFlow collector is a specific part of NetFlow operations that enables administrators to collect IP network traffic, and see where...
Administrators identify bandwidth hogs through close analysis of a network, looking for IP addresses, devices or applications that may be...
Bandwidth monitoring plays a special role in overall network administration. Using bandwidth monitoring tools, administrators assess issues...
In many ways, monitoring a local area network (LAN) is somewhat like monitoring a larger network. Some of the same techniques may be used,...
Bandwidth analyzers and monitors allow network administrators to identify and fix network performance issues, looking at response time and...
In a general sense, network administrators use network scanning to identify active hosts on a network by evaluating IP addresses and more....
Network mapping and network monitoring achieve two different goals, sometimes using similar techniques.Network mapping essentially...
Although there are many ways to configure network components, a few of them have emerged as the most common and standard network topologies...
Network analyzers and network scanners may accomplish similar things in network administration, but they work differently.A network...
Scaling up and scaling out are two IT strategies that both increase the processing power and storage capacity of systems. The difference is...
A network switch moves data between two network devices, while a router generally routes data between two connected networks.The router is...
VMWare Distributed Resource Scheduler and VMWare Storage Distributed Resource Scheduler are two similar and related technologies that offer...
A: Mobile hotspots and tethering services offer similar results for users, but they work a little bit differently.A mobile hotspot is an...
The mobile network state is an indicator on smartphones and similar mobile devices that shows whether the device is connected to a telecom...