Bio
Justin Stoltzfus is an independent blogger and business consultant assisting a range of businesses in developing media solutions for new campaigns and ongoing operations. He is a graduate of James Madison University.Stoltzfus spent several years as a staffer at the Intelligencer Journal in Lancaster, Penn., before the merger of the city’s two daily newspapers in 2007. He also reported for the twin weekly newspapers in the area, the Ephrata Review and the Lititz Record.More recently, he has cultivated connections with various companies as an independent consultant, writer and trainer, collecting bylines in print and Web publications, and establishing a reputation for excellence in corporate training, marketing campaigns and other media projects.
Articles by Justin Stoltzfus
-
Internet Access Around the Globe: A Look at the Last 10 Years
Throughout the 2010s, we've seen a mixed bag of improvements and continued challenges around internet adoption and access across the... -
What Do Massive Open Online Courses (MOOCs) Mean for Education?
A decade ago, the concept of remote learning was still fairly new.Now, of course, we have a robust environment of... -
Job Role: Ethical Hacker
In general, an ethical hacker is a soldier in the arms race between cybersecurity experts and those who want to... -
Virtual Reality Gaming: What Lies Ahead?
Ten years ago, few of us had heard about virtual reality (VR), let alone seen it demonstrated in any appreciable... -
SoLoMo Marketing in 2022: Unraveling the Future of Search
In the early days of the internet, the idea of SoLoMo marketing -- blending social marketing with local and mobile... -
Uncle Sam in the Cloud? Federal Trends in Cloud Use
When we reported on federal spending in the cloud a few years ago, American federal agencies were spending several billion... -
The Transaction Processing System in 2022: A Blockchain World
Blockchains and cryptocurrencies have changed a lot of things, but one of them is the nature of transaction processing. But... -
Cybersecurity Dashboards: 3 Advancements Driving Progress
Understanding the evolution of cybersecurity dashboards is key to understanding current best practices and methods for protecting networks and data.In... -
Data Silos: What They Are and How to Deal With Them
Are data silos still a problem in 2022? You bet. But the IT landscape is constantly evolving; the ways silos... -
4 Technologies Changing M2M
According to analysts at Future Market Insights Blog, the machine-to-machine (M2M) market will be valued at $376 billion by 2032.... -
5 Weird Ways Technology Is Changing Our Behavior
Emerging technology is having a major impact on human behavior. Here are five major ways tech is influencing how we... -
Perimeter Security Isn't Dead: 4 New Solutions to Consider
Cybersecurity trends have advanced and shifted drastically in recent years, particularly due to the COVID-19 pandemic. This "new normal" we... -
Bye Bye Boss, Hello Office of the Future: 2022 Coronavirus Edition
Here's how we put it just a few years ago, in reporting on some of the biggest trends in workplace... -
Can the Blockchain Be Hacked?
As blockchain processes become more and more a part of our financial lives, people are asking each other – can... -
A Laymen's Guide to Neural Networks
When you're talking about machine learning and artificial intelligence these days, you're likely to find yourself talking about neural networks.... -
6 (Scary) Things AI Is Getting Better at Doing
New AI tech is constantly being introduced. And just as constantly, warnings and frantic concerns are raised. Sometimes the concerns... -
Born in the Cloud: The Next Generation of Cloud Services: New Approaches
Years ago, we were talking about cloud native design as the lodestar for modern workload systems.Now, we see the cloud... -
Top Services to Outsource (if You Don't Already)
If you are a tech professional working on an important project, what can you delegate to others to make your... -
5 Tips for Developers Navigating a Rapidly Changing Industry
The IT development world isn't what it used to be in some important ways. That has new developers and engineers... -
The 6 Most Amazing AI Advances in Agriculture
When we think about agriculture, we tend to think about old-school farming. But although many of us might think that... -
5 SQL Backup Issues Database Admins Need to Be Aware Of
For many years, SQL has been the standard for database handling and putting all sorts of useful information into a... -
How Can Containerization Help with Project Speed and Efficiency?
If you’ve heard anything about network virtualization, the practice of abstracting networks from the bare metal and provisioning them with... -
Online Learning: 10 Essential Computer Science Courses
While we all know that staying at home is best for everyone to help protect from spreading COVID-19, self-isolation doesn’t... -
Your Car, Your Computer: ECUs and the Controller Area Network
In years past, a shade-tree mechanic could diagnose and repair his own automobile with some degree of simplicity.I spent many... -
Data Quality: Why Diversity is Essential to Train AI
As artificial intelligence (AI) is quickly getting more robust and gaining capabilities, people are looking more closely at why it's... -
Job Role: Information Security Engineer
What is an information security engineer (ISE)? For this particular job role, the definition rests on some pretty elaborate jargon... -
Job Role: Cryptographer
To mathematicians and those interested in the science of encryption, the job of a cryptographer is an interesting one.Basically, cryptographers... -
Biometrics: New Advances Worth Paying Attention To
What's happening in the field of biometrics?Some people would say "not much." But some others, who are closer to the... -
Job Role: Data Architect
In enterprise IT, the data architect has their own important and unique role. Sometimes these professionals seem like the unsung... -
Job Role: Network Administrator
The network administrator is one of the less obscure job roles you'll see in today's IT world. It's familiar to... -
How to Recognize Machine Learning (And How Data Science Stands Apart)
In this new world of artificial intelligence (AI) and data management, it’s easy to get confused by some of the... -
Job Role: AI Strategist
What is an AI strategist? It's an interesting question, particularly in the context of how artificial intelligence (AI) is reshaping... -
Job Role: IoT Product Manager
Many of us who have been paying attention to tech trends would say the world of the Internet of Things... -
How Cloud Computing is Changing Cybersecurity
As it has emerged over the past few years, the cloud has really revolutionized business and allowed us to do... -
Job Role: Machine Learning Engineer
A machine learning engineer (MLE) is a key part of a team working for a business that wants to benefit... -
AI in the Army: How Virtual Assistants Will Impact US Military Ranks
America's military is an early adopter of many technologies, and now there's quite a bit of attention to how new... -
TensorFlow: 6 Courses to Become an Open-Source ML Framework Pro
Tensorflow is one of the machine learning (ML) engineer’s favorite open-source libraries for representing the code functions involved in ML,... -
Job Role: Business Intelligence Analyst
A business intelligence analyst has a key role in a company. This job is related to integral software and data... -
Conquering Algorithms: 4 Online Courses to Master the Heart of Computer Science
Learning about the construction of machine learning and artificial intelligence algorithms is not a simple process. These are some of... -
Job Role: AWS Solution Architect
Among the various job roles related to AWS services, the AWS solutions architect is one that is valuable for many... -
Understanding Big Data: 6 Online Courses to Help You Best Understand Your Data
Big data is the order of the day — but ever since advanced storage media made it possible for us... -
Breaking Into Machine Learning: 5 Online Courses to Help You Get Started
The post includes affiliate linksWant to become a machine learning master?Don’t we all! Machine learning is hot right now, and... -
Job Role: Hardware Engineer
“Have you tried turning it off and turning it on again?”This siren song of the traditional IT fix-it guy lives... -
6 Software Development Concepts You Can Learn Through Online Courses
The post includes affiliate linksWhen it comes to understanding the process of software development, there’s a lot to learn.Beginners will... -
Job Role: Database Administrator
What Does a Database Administrator Do?The job of the database administrator (DBA) has been front and center in the corporate... -
4 Myths About Starting a Machine Learning Project
It’s not a thing to take lightly – starting out with a machine learning project can be a daunting process... -
Job Role: Data Engineer
Data engineers are very much in demand these days, but too many executives and others have big questions about what... -
Job Role: Systems Analyst
A systems analyst is a valuable part of any company that has any significant IT architecture. But sometimes it’s hard... -
Job Role: Software Engineer
What does a software engineer do? The simple answer is that he or she is involved in software engineering, in... -
IT Security: What to Expect in 2019
Cybersecurity has become a big deal.With the proliferation of data breaches in the corporate world, in addition to all of... -
Why Superintelligent AIs Won't Destroy Humans Anytime Soon
If you’re paying attention to what people are talking about in the technology space, you may have heard some version... -
Data Science: What to Expect in 2019
Data science is rapidly changing. New advances in AI and machine learning mean that data can be applied in brand... -
Job Role: Data Analyst
The job role of a data analyst in today’s tech market is broadly defined.In general, experts talk about data analysts... -
Job Role: Data Scientist
What does a data scientist do in the context of artificial intelligence and machine learning work? Lots of pros who... -
Job Role: IoT Solutions Architect
The internet of things (IoT) is a real juggernaut among emerging technologies. It's not just another small step in enterprise... -
6 Efficiency Tips for Database Admins
How do you make sure that database operations are running smoothly? Here are some common guidelines for better database administration.Delegate... -
When DevOps Goes Bad
DevOps – it's an innovative idea and intriguing proposition, that companies can improve software production and other operations by becoming... -
Talking Embedded Analytics with Qlik
It's an exciting time for embedded analytics – in fact, it's an exciting time in the tech world in general.Cloud... -
DevOps Managers Explain What They Do
The concept of “DevOps,” of blending the two processes of software development and software operation, has moved mountains in the... -
Cybersecurity: How New Advances Bring New Threats - And Vice Versa
What are cybersecurity professionals talking about? How do companies work to protect systems in an age where it seems like... -
Simply Secure: Changing Password Requirements Easier on Users
There are big changes coming down the pike that both systems administrators and regular users might love – they have... -
6 Big Advances You Can Attribute to Artificial Neural Networks
We know that our world is changing quickly – but there are a lot of concrete technology advances that you... -
4 Reasons Why BYOD Is No Longer An Optional Strategy
“Bring your own device” started out as a clever buzzword, but now it's something that a lot of people take... -
Making Networks More Secure in the Age of Cybersecurity
In the tech media and in the boardroom, talk about cybersecurity is everywhere. It's even becoming a staple of the... -
Slow Dancing With Technology: Debugging, the Programmer and the Machine
Anyone who has worked on coding even the most basic projects knows that the process requires a good bit of... -
What Mean Time Between Failures Really Means
Many tech-heads are familiar with the pretty unreadable acronym MTBF. It stands for mean time between failures, and quite a... -
Nanotechnology: The Biggest Little Innovation in Tech
To more than a few people, nanotechnology has an inherently ominous tone. After all, avid sci-fi readers won’t soon forget... -
5 Ways to Go Undetected Online
As the internet continues to evolve, and smartphone platforms help us to accomplish more and more of the communications we... -
Using Product Management Features in a CRM Solution
At first glance, many readers will incorrectly recognize the words "product management" as "project management" because, while project management is... -
Is the Cloud Catching on in Your Doctor's Office?
When doctors or physician groups brainstorm on ways to use cloud computing in their businesses, they often come up with... -
What You Should Know About Service-Level Agreements
A lot of individual consumers have never heard of a service-level agreement (SLA), or if they have, it’s been hidden,... -
Turbonomic: Bringing Autonomics to Virtualization
In a dramatic new move to highlight some very interesting new software capabilities, VMTurbo officially announced in August that its... -
A Tour of Deep Learning Models
In a new era of rapid technical advancement, people are getting serious about using deep learning systems.A few years ago,... -
Naming Conventions: What's the Big Deal?
Most people with a passing knowledge of computer science understand the need for something like "a = 1" – but... -
The Work of Ten Pros: 10x Developers - Are They Real?
Have you ever heard of a 10x programmer? If you’re not in the tech world, the answer is probably no,... -
When SQL Isn't Enough: Controls for Massive New Data Centers
With all the buzz about enormous NSA data centers holding gazillions of data bits about our private lives, there’s one... -
5 Ways Companies Can Cut Cloud Costs
How much is your cloud costing you?It’s a fair question for business leaders who have to fit all of their... -
Distance Charging - Juice Up Your Smartphone From the Next Room?
Imagine if the next time you wanted to charge your smartphone, instead of hooking it up to a wire and... -
New Generators Put Modern Algorithms to Work on ASCII Art
Remember ASCII art?Well, maybe not. But like other old-school elements of primitive computing, it had its day, right next to... -
5 Ways Our Cars Have Become Computers
Every time you turn around, it seems like more and more new digital and electronic gear is being put into... -
Why Hybrid Hosting Is Becoming a Popular Cloud Hosting Solution
There's a new term that’s getting thrown around out there in the tech world: “hybrid hosting.” Although Chief Information Officers... -
A Loon-y Proposition - Your Future Wireless May Be Brought To You By a Hot Air Balloon
So what's new with Google these days? Well, one project that has actually been going on for a while has... -
Why Use Cloud Access Security Brokers?
Look at many lists of top technologies for this year, and you'll see "Cloud Access Security Brokers" (CASB) near the... -
Should You Worry About Rowhammer?
It sounds like something out of Lord of the Rings – a giant attacker with a big sword, hammering away... -
Ditch Your Inbox? No-Email Initiatives and What They're For
When email was new, it was something that offered us major improvements in our lives. The potential for quick and... -
What Exactly Is Application-Centric IT Management?
For quite a while now, mobile designers, software programmers and whole lot of others have understood intuitively that the “app”... -
Solar Clothes? Perovskite Adds Potential for Charging Fibers
We all want new kinds of power chargers – items that give our smartphones, laptops and other gear juice in... -
Does Your Web Project Need Sass?
If you're into Web design, you might run across the term Sass (and its derivative, SCSS) — and if you're... -
5 Research Tools for Enterprise in a New Business World
In the age of the cloud and big data, lots of us understand that data is one of a company's... -
5 Bad Business Intelligence Habits to Avoid at All Costs
Are you looking to make your business more efficient and profitable? Business intelligence (BI) is a powerful tool for achieving... -
Aggregated Security with OpenDNS
With corporate security becoming such a nightmare for so many different firms, it makes sense for companies to go beyond... -
SEO's Not Dead, It's Just Changing
Big changes in the search industry have a lot of people wondering just what's up with search engine optimization. This... -
Does a Car Really Need a 'Smart Key'?
Not too long ago, I drove a Prius for the first time. The handling and comfort were great, and the... -
New Visual Basic: New Name, New Features
Microsoft Visual Basic has been a favorite for object-oriented programmers since, well, before the millennium — but now it's getting... -
3 Big Headaches for Virtualization Software Users
Using virtualization products is a common way that businesses tap into the potential of hardware and network virtualization.Virtualization is offering... -
5 Things Mobile Virtualization Will Do
Mobile virtualization is one of the biggest new words in the IT lexicon. Essentially, this design concept brings the benefits... -
5 Big Cloud Security Features for Enterprise Use
Although cloud computing is becoming more and more established in enterprise networking, people are still discovering what the cloud is.... -
The Future is Bright for OLED Displays
The next frontier in display technology is promising ultra-light, ultra-thin, flexible screens with vivid color display. It's called Organic Light... -
5 Geek Terms That Are Cooler Than They Sound
So much of today's IT language sounds pretty incomprehensible to the average person. In fact, the true power of some... -
Virtualization Versus the Cloud
One thing that you will sometimes hear about network virtualization is that it is like the cloud in supporting elasticity,... -
Cloud Computing and Carbon Footprints: Why Cloud Solutions Are Green Solutions
A lot of people in the IT industry have an intuitive grasp of how cloud computing processes make business systems... -
5 Ways to Get Value Out of Your Business Data
There's a lot of talk these days about what's involved in creating big data IT setups, from the use of... -
Recycling Old Tech - It's the Law
If you’re thinking about getting rid of old desktop computer towers, televisions or peripherals, you’ll want to take a look... -
I Hear Dead People? Natural Language Tech Makes Past and Present Voices Come Alive
These days, most computer voices are passé. You probably don’t get too amped up about cyborgs and robots when you... -
Sudden Interface Changes: Why Disorienting Users Can Hurt
In the digital world, even small changes to the tools we use on a daily basis can have big consequences.... -
No, That's Not My Hand In There! Why Sockpuppet Marketing Is Bad News
Sockpuppet marketing sounds cute and fun, immediately invoking scenes from children's television. (Lamb Chop, anyone?) Some companies actually use sockpuppets... -
The Analytical Engine: A Look Back at Babbage's Timeless Designs
The analytical engine - it’s not a flashy name, but this creation of the late 1800s would have been impressive,... -
Computer Programming for the People?
It's a fact: We are increasingly connected to computers and other devices. In many cases, we’ve almost come to see... -
The Simple Answer to Many Major Security Breaches? Thumb Drives
Network administrators can do a lot to mitigate security risks. They can install cutting-edge anti-virus and anti-malware programs, monitor their... -
E-Textiles: Will Your Clothes Be Smarter Than You?
Some day, our clothes will be able to talk to us. Your T-shirt will know your secrets. Your pants will... -
The New Technology That Could Double Wireless Spectrum Efficiency
It’s no secret that wireless frequency spectrum is becoming a valuable commodity. As millions and millions of users have switched... -
Eat This Tweet: Creating Life Cycles for Social Media Messages
We’ve all heard a lot of lecturing about how information that goes out over the Internet or through wireless networks... -
Video: Vijay Kumar on Agile Aerial Robots, Artificial Intelligence
Welcome to the future. In a February 2012 TED talk in Long Beach, California, University of Pennsylvania professor Vijay Kumar... -
VIDEO: Rajat Taneja on Video Games as the Biggest Big Data Challenge
In a 2013 Strata Conference talk in Santa Clara, California, Electronic Arts Chief Technology Officer Rajat Taneja offered detailed insights... -
Video: George Dyson on Big Data's Birth and Where It's Headed
At the London 2012 Strata Conference, author and tech historian George Dyson talked about how humanity arrived at today’s world... -
5 Things to Look for in CISPA's Replacement
The emergence of the Cyber Intelligence Sharing and Protection Act (CISPA) has been an ongoing saga about how the American... -
Video: Sugata Mitra on the Cloud-Based Schools of the Future
Dr. Sugata Mitra, an educational researcher and professor of educational technology at Newcastle University, took to the stage at TED2013... -
Video: Drew Conway and Jake Porway on Data Without Borders
In a 2011 presentation at Strata New York, Jake Porway and Drew Conway talked about the role of Data Without... -
Video: Kate Crawford of Microsoft on Big Data Vs. Data With Depth
A fascinating presentation by Kate Crawford, principal researcher at Microsoft Research, at the 2013 Strata Conference takes a closer look... -
An Introduction to Candidate Keys
Without any context, it would be hard to guess what people are talking about when they talk about candidate keys.... -
Video: Mike Olson, CEO of Cloudera, on Hadoop and Future Research Possibilities
As it is, says Cloudera CEO Mike Olson, the Hadoop analytics platform has some significant limitations involving speed and complexity.... -
Video: Ray Kurzweil on 'Exponential' Tech Advancement
At last year’s SXSW event, eminent IT guru Ray Kurzweil spoke about continued advances in technology and how they can... -
DevOps 101
A new buzzword is making the rounds in the tech community, especially on digital resumes. It’s called DevOps, which is... -
Raiding the 'Headquarters' of Click Fraud Operations
New efforts to bring cybercriminals to justice are reading more like hard-boiled fiction than the sort of paper pushing enforcement... -
Trans-Atlantic Cable: The Real Infrastructure of the Internet
When using the Internet, it’s easy to ignore the infrastructure behind this so-called web of virtual connections. But as users... -
Why Tech Companies Use Code Names
Take a look through the archives of the code names for past tech projects, and what you’ll see might look... -
Revolution In Hard Drives: Frickin' Laser Beams
Try counting to 10 in one second. OK. Now try counting to a trillion.It’s the nature of extremely large numbers... -
How Much Do Online Marketers Know About You?
There’s a huge sea change at work in today’s marketing world, and we’re witnessing it everywhere: Consumers are waking up... -
Raspberry Pi Revolution: Return to Computer Basics?
A brand-new device cleverly called Raspberry Pi began making headlines long before its February 2012 release; but then the news... -
Cloud Computing for Vehicles: Tomorrow's High-Tech Car
Cloud computing is a somewhat general term for a broad category of technology services. At its core, cloud computing is... -
The Carbon Footprint of a Web Search: Who's Green?
The term "carbon footprint" is ubiquitous these days, and you're likely to see it mentioned in relation to everything from...
Q&A by Justin Stoltzfus
-
What is the difference between little endian and big endian?
The difference between big endian and little endian systems has to do with the order in which a sequence of... -
How can unstructured data benefit your business's bottom line?
Unstructured data can be very valuable to a business in many different kinds of scenarios. It can help organizations discover... -
What are some of the dangers of using machine learning impulsively without a business plan?
When people use machine learning without investing enough time in planning, it’s no surprise that the results will be inferior.Project... -
What is TensorFlow’s role in machine learning?
As one of the top tools for machine learning (ML), Google's TensorFlow open-source resource pack for neural networks and machine... -
Why are companies paying so much for AI professionals?
Professionals involved in working on artificial intelligence (AI) technologies have been making a lot of money for a while. The... -
Are autonomous vehicles safer than cars operated by humans?
As one of the most fundamental questions in the technology world, this one is a little tough to answer. The... -
Why aren’t more people choosing cybersecurity as a career?
It's a big question – all over the IT industry, cybersecurity professionals are very much in demand. Companies need help... -
What can virtual machine use cases tell companies about systems?
There are many ways that companies can use virtual machine use cases to learn more about how virtualization components work... -
Why are people talking about the 'tipping point' for machine learning?
There are a few different reasons why people are talking about the “tipping point” of machine learning and how this... -
Why do security professionals consider bitcoin and cryptocurrency mining a potential for 'parasitic' hacker activity?
There are a few predominant reasons why experts in cybersecurity will talk about Bitcoin and cryptocurrency mining being linked to... -
What is a virtual local area network (VLAN) and why would I use one?
A virtual local area network (VLAN) is an abstracted LAN that is created to operate through the data link layer... -
What is the difference between scale-out versus scale-up?
Scaling up and scaling out are two IT strategies that both increase the processing power and storage capacity of systems.... -
What is the difference between a mobile hotspot and tethering?
A: Mobile hotspots and tethering services offer similar results for users, but they work a little bit differently.A mobile hotspot... -
How will hyperautomation affect current understanding of automation?
While hyperautomation is an extremely important term in today's technology conversations, it's also one that is fairly subjective and broad.In... -
Supervised learning vs. unsupervised learning: What’s the difference?
The difference between supervised and unsupervised learning is that only one of these processes, supervised learning, takes advantage of labeled... -
What’s the difference between a data scientist and a decision scientis
A decision scientist is a technology professional who is mainly focused on making technologies work for decision-making processes within an... -
What is the difference between a composite key, primary key and foreign key?
The difference between a composite key, a foreign key and a primary key is a good illustration of the complex... -
What are the biggest uses of SQL today?
The biggest uses of Structured Query Language (SQL) today have to do with using a long-established conventional language for relational... -
Why are SQL injection and query string manipulation gaining in cybercrime popularity?
SQL injection, along with the related manipulation of query strings, is widely cited as one of the most popular ways... -
What are some significant challenges companies are facing when it comes to management reporting?
Companies face an array of serious challenges in management reporting, which is essentially a broad-spectrum approach to providing information to... -
How are top enterprises effectively applying IoT to their BI strategies?
The idea of applying the Internet of Things (IoT) to business intelligence (BI) is now becoming a mainstream part of... -
Can there ever be too much data in big data?
The answer to the question is a resounding YES. There can absolutely be too much data in a big data... -
How do machine learning professionals use structured prediction?
Machine learning professionals use structured prediction in a whole multitude of ways, typically by applying some form of machine learning... -
Why is a confusion matrix useful in machine learning?
There are a number of ways to talk about why a confusion matrix is valuable in machine learning (ML) –... -
Why is it important for data scientists to seek transparency?
Transparency is essentially important in data science projects and machine learning programs, partly because of the complexity and sophistication that... -
Why is so much of machine learning behind the scenes - out of sight of the common user?
This fundamental question about machine learning takes into account many different aspects of how these complicated programs work, and what... -
Why is Python so popular in machine learning?
There are a number of reasons why the Python programming language is popular with professionals who work on machine learning... -
What is 'precision and recall' in machine learning?
There are a number of ways to explain and define “precision and recall” in machine learning. These two principles are... -
What are some of the biggest challenges with legacy migration?
The challenges of legacy migration projects are many and diverse. They depend on the scope of the migration process, for... -
Why are GPUs important for deep learning?
The use of graphics processing units (GPUs) has particular importance for the field of deep learning. The reason has to... -
Why would companies invest in decision automation?
Businesses may invest in decision automation for any number of reasons. However, there are some overarching fundamental principles that illustrate... -
What’s a simple way to describe bias and variance in machine learning?
There are any number of complicated ways to describe bias and variance in machine learning. Many of them utilize significantly... -
What are some of the main benefits of ensemble learning?
Ensemble learning has various benefits for machine learning projects. Many of these are related to using a large number of... -
Will machine learning make doctors obsolete?
The question of whether machine learning programs will eventually replace human physicians is an interesting one. It has its basis... -
What's the difference between machine learning and data mining?
Data mining and machine learning are two very different terms – but they are often both used in the same... -
How does a weighted or probablistic approach help AI to move beyond a purely rules-based or deterministic approach?
Machine learning and artificial intelligence principles are rapidly changing how computing works. One of the key ways that this is... -
Why is data visualization useful for machine learning algorithms?
The discipline of data visualization gives us practically infinite ways to show off what's happening with machine learning algorithms. It's... -
Why are some companies contemplating adding 'human feedback controls' to modern AI systems?
Some companies working with cutting-edge AI technology are working to institute human controls for these systems, giving machine learning and... -
What's the difference between augmented reality and virtual reality?
In some ways, virtual reality and augmented reality are a lot alike. However, they are not the same thing.Virtual reality... -
What does 'connectionism' mean for business AI?
The concept of artificial intelligence is applied to business in many different ways, and big shifts in artificial intelligence research... -
What are some advantages of multi-cloud deployments?
Multi-cloud deployments involve a company selecting more than one cloud vendor or provider, and putting different workloads into each platform,... -
What does a data management platform do?
The core function of a data management platform is to take in information from diverse sources and present it well.... -
What is server sprawl and what can I do about it?
Server sprawl is the inefficient or improper provisioning of servers to handle workloads. Server sprawl happens when underutilized servers proliferate... -
Why run ML training on a local machine and then run regular execution on a server?
The question of how to structure a machine learning project and its train and test phases has a lot to... -
How can containerization be a good choice for a machine learning project environment?
Some companies are moving toward containerization for machine learning projects, based on some of the benefits that container setups offer... -
Why are artificial recurrent neural networks often hard to train?
The difficulty of training artificial recurrent neural networks has to do with their complexity.One of the simplest ways to explain... -
What's behind the big 'quantum rush'?
Nations are experimenting with quantum technologies at a rapid pace. The European Union has just set up a “quantum flagship”... -
How can machine learning help to observe biological neurons - and why is this a confusing type of AI?
Machine learning doesn't just model human brain activity – scientists are also using ML-driven technologies to actually look at the... -
How do the Chrome Store's malicious ad blockers show the duplicity that end users face in cybersecurity?
The recent rash of malicious ad blockers dropped from Google's Chrome Store shows how difficult it is to shield end... -
What are some key ways that the IoT is affecting health care?
The internet of things (IoT) is a big, exciting new phenomenon that's changing the technology world and renovating various industries,... -
How does NeuroEvolution of Augmenting Topologies contribute to genetic machine learning?
NeuroEvolution of Augmenting Topologies (NEAT) contributes to genetic machine learning by providing a cutting-edge innovative model based on the principles... -
How does Saudi Arabia's Sophia robot raise frightening new cybersecurity questions?
One of the hottest new artificial intelligence technologies is a life-sized robot made to look and act like a woman.Her... -
Why is data annotation important in some machine learning projects?
Data annotation is important in machine learning because in many cases, it makes the work of the machine learning program... -
How does max pooling help make AlexNet a great technology for image processing?
In AlexNet, an innovative convolutional neural network, the concept of max pooling is inserted into a complex model with multiple... -
What is the difference between IPv4 and IPv6?
There are numerous differences between the IPv4 and IPv6 protocols, but all of them are based on the issue of... -
How can new MIT chips help with neural networks?
New scientific work on neural networks may reduce their power and resource requirements to the point where engineers could put... -
How is machine learning affecting genetic testing?
Machine learning is being applied to genetic testing in many different ways.The applications are nearly endless. Machine learning is helping... -
How might machine learning tools evaluating emotion help with call center problems?
In many ways, the virtual assistance and interactive voice response (IVR) systems in today's call centers are still pretty primitive.However,... -
Will machine learning advances spur cross-platform data set deployment?
What are we talking about when we talk about machine learning and AI in business?Lots of different people have different... -
How is artificial intelligence enabling brain boost to enhance memory with electrical brain stimulation?
New methods of artificial intelligence science are helping researchers to understand more about how the brain works – and in... -
What are the five schools of machine learning?
To those who haven't researched what's behind modern machine learning and artificial intelligence work, all of this effort and research... -
Why are machine learning rational agents so important to retail applications?
Rational agents serve various purposes in machine learning and artificial intelligence projects, but they are particularly useful in retail applications... -
How is the master algorithm changing the machine learning world?
An idea called the "master algorithm" is having an effect on how we view machine learning and artificial intelligence work.The... -
Why are machine learning experts talking about Xavier initialization?
Xavier initialization is an important idea in the engineering and training of neural networks. Professionals talk about using Xavier initialization... -
Why do AI engineers have to worry about intuitive engines?
The idea of human intuition is now a major part of groundbreaking artificial intelligence work – which is why AI... -
How can AI revolutionize consumer markets through automated search?
Although artificial intelligence and machine learning will change many industries, one of the largest impacts will be felt in consumer... -
How do chatbots deal with accents?
With the emergence of newer and more sophisticated chatbots over the past few years, people in many industries are observing... -
Why are some experts saying that AI will 'destroy digital authenticity'?
Machine learning and artificial intelligence are rapidly changing many industries, and really reshaping the ways that we think about technological... -
Why are deep learning, machine learning and AI so important in telemedicine and other types of medical services?
The fields of machine learning and artificial intelligence have many exciting applications to the medical field in general, and telehealth... -
What is the difference between speech to text and chatbots?
The numerous significant differences between speech-to-text technologies and chatbots is part of what's being examined in the rapid evolution of... -
Why is DARPA researching 'explainable AI'?
In general, explainable artificial intelligence is becoming a much heralded part of cutting-edge work in data sciences. It's helping to... -
How does dynamic allocation in the cloud save companies money?
The idea of dynamic allocation of cloud resources solves a number of very important problems for enterprise IT. One of... -
Why might some machine learning projects require enormous numbers of actors?
When you think of machine learning, you tend to think of skilled data scientists working on keyboards in computer rooms.... -
How can engineers evaluate training sets and test sets to spot possible overfitting in machine learning?
To understand how this is done, it's necessary to have a basic grasp of the roles of different data sets... -
Why are companies sourcing GPUs for machine learning?
If you're reading about machine learning, you're probably hearing a lot about the uses of graphics processing units or GPUs... -
Why should companies be considering intent-based networking?
The short answer to why intent-based networking is so important is that company networks are essentially the core infrastructure for... -
Why might companies invest in 'character AI'?
The term "character AI" is not used extensively online – in fact, popular Google results for this term seem to... -
Why is semi-supervised learning a helpful model for machine learning?
Semi-supervised learning is an important part of machine learning and deep learning processes, because it expands and enhances the capabilities... -
Why does 'bagging' in machine learning decrease variance?
Bootstrap aggregation, or "bagging," in machine learning decreases variance through building more advanced models of complex data sets. Specifically, the... -
How can the Chinese restaurant process and other similar machine learning models apply to enterprise AI?
The question of how the Chinese restaurant process can instruct enterprise AI is an interesting one, as right now, companies... -
How can new machine learning capabilities enable the mining of stock documents for financial data?
One of the exciting new frontiers of machine learning and AI is that scientists and engineers are embarking on various... -
How do deep stubborn networks play a role in AI evolution?
On the face of it, deep stubborn networks simply "add functionality" to an existing technological construct, the generative adversarial network... -
Why is feature selection so important in machine learning?
Feature selection is extremely important in machine learning primarily because it serves as a fundamental technique to direct the use... -
How can engineers use gradient boosting to enhance machine learning systems?
Like other kinds of boosting, gradient boosting seeks to turn multiple weak learners into a single strong learner, in a... -
How can a 'random walk' be helpful in machine learning algorithms?
In machine learning, a "random walk" approach can be applied in various ways to help the technology sift through the... -
Why is TensorFlow so popular for machine learning systems?
There's a big trend happening in machine learning (ML) – programmers are flocking toward a tool called TensorFlow, an open-source... -
How can a convolutional neural network enhance CRM?
The emergence of new neural network technologies means a lot for the field of artificial intelligence. Convolutional neural networks, or... -
What are some ways that machine learning systems can be helpful for human resources?
Wherever you look, machine learning is transforming industries. One of the later adopters is the human resources field – at... -
How does network scanning work?
In a general sense, network administrators use network scanning to identify active hosts on a network by evaluating IP addresses... -
How can machine learning work from evident inefficiencies to introduce new efficiencies for business?
One of the biggest potential applications of machine learning systems is the mining of important efficiencies for business processes and... -
Why is consumer ML/AI technology so 'disembodied' compared to industrial mechanical/robotics projects?
The question of why robotics has not kept pace with machine learning and artificial intelligence (AI) work in consumer electronics... -
How has data scraping for machine learning become the most labor-intensive bottleneck since manual data entry in legacy migration?
One of the practical problems that companies might encounter when trying to start a machine learning (ML) project is the... -
Why are huge numbers of image files important to many machine learning projects?
For companies that are looking to get involved in their first machine learning (ML) investments, the whole process can seem... -
How might the concept of equilibrium inform machine learning projects?
In general, an equilibrium will inform machine learning by seeking to stabilize machine learning environments and create outcomes with a... -
How does Amazon Web Services (AWS) facilitate AI opportunities for clients?
Amazon Web Services (AWS) is a highly evolved comprehensive cloud suite for clients who want a range of resources that... -
Why is bias versus variance important for machine learning?
Understanding the terms "bias" and "variance" in machine learning helps engineers to more fully calibrate machine learning systems to serve... -
How does Occam's razor apply to machine learning?
The use of Occam's razor dates back to William of Ockham in the 1200s – it's the idea that the... -
Why is the "information bottleneck" an important theory in deep learning?
The idea of an “information bottleneck” in artificial neural networks (ANNs) operates on a special principle related to the diffusion... -
How is network mapping different than network monitoring?
Network mapping and network monitoring achieve two different goals, sometimes using similar techniques.Network mapping essentially visualizes the network, to look... -
How can learning agents 'learn to use the web'?
One of the most compelling individual examples of progress with machine learning (ML) and artificial intelligence (AI) involves digital “learning... -
How are companies trying to add a speedometer to artificial intelligence work?
Some of the companies working on the newest advances in artificial intelligence are becoming focused on quantifying the progress that... -
Why is patch management so important in cybersecurity?
The issue of patch management is something that cybersecurity experts often think about in the context of keeping systems safe.... -
How do administrators find bandwidth hogs?
Administrators identify bandwidth hogs through close analysis of a network, looking for IP addresses, devices or applications that may be... -
How might businesses use the AI potential of real-time data systems like SAP HANA?
New cloud-based systems like SAP HANA take advantage of particular hardware and IT architecture setups to utilize the data and... -
What is the difference between a network switch and a network router?
A network switch moves data between two network devices, while a router generally routes data between two connected networks.The router... -
Why is it important to manage a relational database system in the cloud?
Cloud database systems help to give businesses a more versatile way to handle relational database functionality. It's convenient to be... -
How did Moore's law contribute to the current AI revolution?
It's tempting to think of today's progress in artificial intelligence as mainly related to solving logical and data-oriented problems, but... -
How can neural networks affect market segmentation?
New artificial neural networks are useful in a broad spectrum of ways, but one of the most popular applications is... -
How can businesses innovate in managing data center bandwidth?
More sophisticated methods of managing data center bandwidth allow for more consistent performance, and allow administrators to avoid various pitfalls... -
What are some important aspects of file integrity monitoring?
With file integrity monitoring, IT professionals compare different versions of files against a baseline using tools like a "checksum" or... -
How do admins use server monitoring to evaluate network performance?
There are many ways that administrators monitoring servers help with overall system performance, but many of them boil down to... -
Why is multi-factor authentication an important component of cybersecurity?
Capable cybersecurity vendors and consultants often talk about multi-factor authentication (MFA) as a modern best practice. The reason has to... -
Why is machine bias a problem in machine learning?
This question can be answered in two different ways. First, why is machine bias problem, as in, why does it... -
What’s the difference between SEM, SIM and SIEM?
As three very similar yet distinct types of processes, the three acronyms SEM, SIM and SIEM tend to get confused,... -
How are logic gates precursors to AI and building blocks for neural networks?
Logic gates are the logical constructs that make up the framework for path generation in computer processing. The use of... -
How can machine learning and AI help move companies from a perimeter approach to cybersecurity?
Machine learning and artificial intelligence tools have enormous potential to help companies and other parties deal with a spectrum of... -
Can the same machine learning tools work for both retail and manufacturing businesses?
When it comes to tailoring machine learning tools for both retail and manufacturing businesses, there are some significant similarities, but... -
How can machine learning help with maintenance, repair and overhaul (MRO) processes?
Machine learning can help with both predictive and regular maintenance, and the general maintenance, repair and overhaul (MRO) processes that... -
What do network admins accomplish with a bandwidth analyzer or bandwidth monitor?
Bandwidth analyzers and monitors allow network administrators to identify and fix network performance issues, looking at response time and other... -
How might companies use random forest models for predictions?
Companies often use random forest models in order to make predictions with machine learning processes. The random forest uses multiple... -
How is an induction algorithm used in machine learning?
In the field of machine learning, an induction algorithm represents an example of using mathematical principles for the development of... -
What does 'layered security' really mean?
The idea of “layered security” is central to some of the most relevant ideas in cybersecurity today – it's a... -
How might companies use Apache Mahout for machine learning?
In general, companies often use tools like Apache Mahout to develop machine learning solutions for using large data sets in... -
What are some factors that contribute to AI "drift"?
“Artificial intelligence drift” is a relatively obscure term, and you won't see it mentioned a whole lot in online tech... -
How is SIEM different from general event log management and monitoring?
In some ways, security information and event management (SIEM) is different than the normal, average event log management that businesses... -
Why might a company shut down a chatbot AI project?
Companies might shut down artificial intelligence chatbot projects for many reasons, but the most likely ones can be grouped into... -
Why might companies use Amazon Machine Learning and related tools?
One of the most fundamental reasons – probably the most fundamental reason – to use the Amazon Machine Learning (AML)... -
How is bandwidth monitoring different from other types of network monitoring?
Bandwidth monitoring plays a special role in overall network administration. Using bandwidth monitoring tools, administrators assess issues related to internal... -
Why is scalable machine learning important?
Scalable machine learning is a major buzzword in the machine learning industry, partly because getting machine learning processes to scale... -
What are some best practices for cloud encryption?
With so many companies moving data to the cloud in one way or another, encryption has become a major part... -
Why do systems benefit from event log monitoring?
In general, network systems benefit from event log monitoring because these resources and tools help to show administrators more about... -
What's the difference between a CPU and a GPU?
Despite having similar acronyms, a CPU and a GPU are quite different. The biggest difference between a CPU and a... -
How does visibility help with the uncertainty of handing data to a cloud provider?
When it comes time to migrate to the cloud by augmenting on-premises systems with cloud services from vendors, having good... -
How can companies maintain application availability standards?
Maintaining availability for applications can have a broad and significant effect on business processes. In general, making sure that systems... -
Why do cloud providers seek FEDRamp certification?
Many cloud providers look to become certified with FEDRamp, a federal cybersecurity program. The essential reason that so many companies... -
What’s the difference between artificial intelligence, machine learning and deep learning?
The terms “artificial intelligence,” “machine learning” and “deep learning” describe a process that has built on itself over the past... -
How might a team make an app "cloud-ready"?
Many companies are trying to figure out how to send applications and workloads to the cloud. When it comes to... -
Why does loosely coupled architecture help to scale some types of systems?
A loosely coupled architecture is generally helpful in scaling many kinds of hardware and software systems. This is one of... -
How might companies deal with hardware dependencies while moving toward a virtualization model?
In order to truly make use of the principle of network virtualization, companies need to move away from the hardware... -
Why does virtualization speed up server deployment?
In many cases, companies can greatly increase the speed of server deployment by utilizing virtualized systems. One of the best... -
What is the virtualization "backlash" and why is it important?
The virtualization backlash in IT is the idea that some companies may be moving away from that classic virtualization structure,... -
Why could a "resource hog" make virtualization difficult?
Virtualized systems can provide big benefits for companies. However, this isn't true in all cases. Businesses have to look at... -
How might a company utilize a virtualization resource summary?
Companies may use a virtualization resource summary or some similar tool to look at how a virtualization system is working.... -
Why do undersized VMs lead to latency and other problems?
Having undersized VMs in a virtualization system is a classic example of improper resource allocation that leads to concrete performance... -
What are some of the positives of a demand-driven migration model?
Using a demand-driven migration model can help businesses to refine the ways in which they move data and upgrade from... -
Why should cloud services offer both elasticity and scalability?
Although elasticity and scalability are two different principles, some IT professionals and other stakeholders tend to think of them as... -
What are some of the values of real-time hybrid cloud monitoring?
Real-time monitoring of hybrid cloud systems enables businesses to do more with the software architectures they use to support operations.... -
Why might a company assess right-sizing on-premises versus in the cloud?
IT professionals hear a lot about right-sizing systems on cloud platforms, but many companies are still choosing to utilize on-premises... -
How can companies deal with “dynamic unpredictability?”
In many corporate IT situations, this is the million-dollar question – how to handle the dynamic unpredictability that comes from... -
What performance issues do users face due to wireless interference problems in an enterprise setting?
Wireless and radio interference problems can be a significant source of problems and frustrations for those administrating an enterprise wireless... -
What kinds of devices can interfere with wireless signals?
The reality is that many different kinds of common household items and other types of devices can interfere with a... -
How do you mitigate wireless interference sources in an enterprise network?
It's a common problem – networks get a lot of pressure from the flood of wireless data that's floating around... -
What are some basic ideas for optimizing hybrid cloud?
With so many cloud options at their disposal, many companies are now opting to choose a hybrid cloud approach that... -
Why do some companies choose Azure or AWS over open-source technologies like OpenStack?
To some companies, the open-source OpenStack platform for the cloud offers significant savings and other benefits. But other firms are... -
What are some advantages and drawbacks of stateless applications?
In the fundamental design of user interfaces, engineers can choose from stateless or stateful systems. A stateless system is one... -
Why is it important to look at the "full stack" in virtualization?
In hardware virtualization systems, it's important to understand the entire context of the environment that virtual machines and other components... -
How does automation help individual system operators?
One of the core values of enterprise automation is its ability to decrease the labor burden on individuals. Traditional system... -
How do companies develop a "data center BMI"?
Modern companies can assess their data center and virtualization operations in many different ways. Many of the most popular models... -
How can companies tally up cloud costs for multi-cloud or complex cloud systems?
Companies can pursue cost accounting for cloud services in different ways. Some of the most primitive approaches involve entering raw... -
Why is a good HTML5 interface important for a business project?
HTML5 is a common foundation for a business interface for various reasons. Businesses can really benefit from building an interface... -
How do companies work toward composable infrastructure?
Many businesses are finding their own ways toward the principle of composable infrastructure. Some start small with their own automation... -
How can a manager use a workload chart?
A workload chart for virtualization systems can be a real asset to an IT manager, or anyone else with responsibilities... -
How can companies work to achieve a desired state?
A desired state in IT is a term for a kind of network equilibrium – in a desired state, everything... -
How can companies cultivate a better approach to “object-based” network changes?
By changing the ways that IT assets are labeled and handled in architectures, companies can greatly improve the use of... -
Why do naming conventions for virtual machines help with IT organization?
In the setup of multiple virtual machines in a network virtualization environment, naming conventions are important. They help to make... -
What are some common challenges in decommissioning applications?
The decommissioning of applications can be a significant burden for an enterprise, especially one that has tended to update and... -
Why is reserve capacity important in systems?
Many IT professionals consider it important to build reserve capacity into hardware virtualization systems. This is part of overall planning... -
What are some values of cloud-native architecture?
Working at building cloud-native architectures can help a business to redesign and improve how it sets up and uses its... -
Why is it important to match uptime to infrastructure?
The importance of matching uptime to infrastructure has to do with how companies ensure efficiencies when they are dealing with... -
What's commonly involved in site reliability engineering?
The work involved in site reliability engineering (SRE) can vary quite a bit, depending on the companies and systems being... -
What are some important considerations for implementing PaaS?
Buyers have a lot to think about when trying to select a platform as a service (PaaS) vendor product. Platform... -
What are some challenges with handling an architecture's storage layers?
Handling the storage component of a modern data management system can be extremely complicated and challenging. Some of the big... -
What are some of the benefits of software-defined storage?
Software-defined storage (SDS) as a concept is revolutionizing the ways that businesses handle data storage. In conjunction with the principles... -
What are some things that rightsizing virtual environments can do for a business?
The practice of rightsizing virtual machines and components of your virtual system can have a good impact on these systems.... -
What are some benefits of continuous real-time placement of user workloads?
Continuous real-time placement of user workloads is one part of a bigger puzzle involving how companies make sure systems can... -
How can stakeholders use the three key operations phases of autonomic hyperconvergent management?
In order to really take advantage of all of the benefits of autonomic hyperconvergent platforms, businesses should know how to... -
Why would managers suspend VMs when VDI instances are not in use?
The decision to suspend particular virtual machines (VMs) to meet changing virtual desktop infrastructure (VDI) needs is part of a... -
Why do companies choose either persistent or non-persistent VDI?
Virtual desktop infrastructure (VDI) services provide companies with an alternative for setting up multiple workstations or computers. They provide virtualized... -
Why would managers differentiate storage for I/O-intensive workloads?
The idea of differentiating storage for I/O-intensive workloads is a process that has roots in traditional IT, but it's also... -
Why would companies assess quality of service for VMs?
Generally, companies use quality of service (QoS) tools or address quality of service concerns for virtual machines and virtualization environments... -
What's the utility of a cluster capacity dashboard?
A cluster capacity dashboard brings transparency to the question of how virtualization environments are set up, and reveals details about... -
How can companies use raw device mapping?
The process of raw device mapping (RDM) is used in the context of storage area networks (SANs) to help provide... -
Why might someone use an N+1 approach for a cluster?
N+1 or N+1 redundancy is a popular concept in network virtualization and the design of IT architectures. Companies generally use... -
Why do companies consider platform diversity to be important for cloud systems?
There are various reasons why companies strive for multi-cloud systems or platform diversity in the cloud. Generally speaking, having platform... -
What strategies are companies using to mitigate DDoS attacks?
Distributed denial of service or DDoS attacks are a major threat to today’s businesses.These types of cyberattacks have the ability... -
How do companies balance security, cost, scalability and data access for cloud services?
When it comes to cloud procurement, companies have to look carefully at what each individual vendor offers. They have to... -
How do engineers use availability zones in cloud and networking admin?
The Amazon Web Services or AWS public cloud system uses a concept called “availability zones” to offer client companies redundancy... -
How do companies battle application sprawl?
Most companies require specific and deliberate strategies and approaches for dealing with application sprawl, a problem that occurs when the... -
What are some benefits of self-driving data centers?
A move toward “self-driving data centers” has evident benefits for companies, and it’s something that many experts are calling an... -
What are some concerns companies might have with a "lift and shift" cloud approach?
The process of “lift and shift” for some set of workloads or data environment is commonly defined as a project... -
What is involved in choosing the right EC2 instances for AWS?
Amazon Web Services (AWS) is one of the most popular ways for companies to get involved in a cloud, hardware... -
What are some benefits of workload abstraction?
The benefits of workload abstraction in an IT environment have much to do with taking a more sophisticated look at... -
What are some challenges of scaling in OpenStack?
As a popular open-source choice for deployments, OpenStack does have some concerns for business leaders who are intending to scale... -
How do companies use Kubernetes?
Businesses and other stakeholders use Kubernetes to build a container environment for applications, and to manage and deploy container systems.... -
What methods do companies use to improve app performance in cloud models?
Although there are many ways to improve app performance in the cloud, companies generally try to identify network performance issues... -
How do businesses use virtualization health charts?
Businesses can use virtualization health charts to keep on top of how virtual machines, hosts and other elements of a... -
What are some of the factors that prevent companies from fully adopting the cloud?
Current research indicates that many companies are moving toward cloud vendor services. However, this sea change is not universal, and... -
Will converged, hyper-converged and super-converged systems lead to the demise of stand-alone servers?
Converged and now hyper-converged and super-converged systems are emerging significantly as a new framework for business IT architectures. With converged... -
What are the compliance limitations of public cloud?
In general, the compliance limitations of public cloud have to do with the extent to which public cloud systems can... -
How do firms collect data "at the edge" of a network?
Businesses may use “edge data collection” methods to capture different kinds of information for business intelligence or other operational use.... -
What is the difference between deploying containers inside a VM vs directly on bare metal?
In using relatively new container virtualization technologies, companies and engineers have a choice: whether to install the container systems directly... -
How do companies manage database changes?
Databases are now more complex than ever in nature due to the ever-increasing demand from businesses. These demands include new... -
How is a private cloud platform different from a public cloud platform?
A private cloud platform is a cloud platform that is offered to one customer, and one customer only. By contrast,... -
What is tunneling as it applies to a virtual network?
Tunneling into a virtual network or private network refers to the process of using a public network to transmit data... -
How do containers differ from virtual machines?
Containers and virtual machines are both parts of virtualization systems, where hardware environments are abstracted into a series of virtual... -
What problems do query plan monitoring techniques fix?
Query plan monitoring techniques fix problems with high wait times, bottlenecks and general blockages in a database management system. Specifically,... -
Why should managers guard against database redundancy?
Database managers and other IT professionals should guard against “database redundancy” or “data redundancy” because of all of the negative... -
How do professionals use visual query building tools?
Visual query builders, or visual query building tools, are used to generate and inspect SQL queries in database operations.As a... -
What are some core principles of data governance?
Data is the backbone of nearly every business, be it small, medium or large. And the rate of data generation... -
What does a SQL compliance manager do?
A SQL compliance manager is a complete auditing solution for SQL servers. The basic objective is to track the changes... -
How did people interact with computers before monitors were commonplace?
Before the advent of modern color monitors and displays, earlier computers communicated to humans through a set of more mechanical... -
What does defragmentation do for SQL systems?
Continuous database maintenance and monitoring are the key elements to be considered for running a SQL system smoothly. When a... -
What does a central DBMS interface do?
A central DBMS interface provides user-friendly and structured access to the data contents of a database, or of multiple databases.... -
How do companies create a server inventory?
Companies create server inventories to better manage their IT assets, and to keep tabs on server and system performance. They... -
What is the difference between C and C++?
The biggest fundamental difference between the C computer language first released in 1972, and the C++ programming language released in... -
What kind of maintenance is required for an IT infrastructure?
IT infrastructure maintenance is the key to ensuring business continuity. The IT industry follows certain standard IT infrastructure maintenance principles... -
What is the difference between alpha testing and beta testing?
In IT, alpha testing is commonly defined as a form of internal testing that happens while a product is still... -
How does LAN monitoring differ from larger network monitoring?
In many ways, monitoring a local area network (LAN) is somewhat like monitoring a larger network. Some of the same... -
What is the appeal of NoSQL databases and what pushes companies to move toward implementing them?
There are many reasons why companies might want to make a move to a NoSQL database and away from traditional... -
What does partitioning mean in regards to a database?
Partitioning a database means taking various parts of the data stored in the database and separating them into various partitions,... -
What is the difference between a NoSQL database and a traditional database management system?
A NoSQL database is a database that doesn't use traditional relational database methods. NoSQL databases have different approaches to the... -
What is the difference between DRS and SDRS?
VMWare Distributed Resource Scheduler and VMWare Storage Distributed Resource Scheduler are two similar and related technologies that offer benefits for... -
How are a network analyzer and a network scanner different?
Network analyzers and network scanners may accomplish similar things in network administration, but they work differently.A network analyzer is also... -
What are the most common network topologies?
Although there are many ways to configure network components, a few of them have emerged as the most common and... -
How do administrators use a NetFlow collector?
A NetFlow collector is a specific part of NetFlow operations that enables administrators to collect IP network traffic, and see... -
What's the difference between SharePoint monitoring and server monitoring?
SharePoint monitoring and server monitoring are two different types of monitoring and analysis for network activities. Although they may share... -
What resources are available for Sharepoint monitoring, Exchange monitoring and analysis of other Microsoft products?
The specific types of resources available for Microsoft tools like Sharepoint and Exchange are different for each piece of software... -
What is involved in active directory monitoring?
Active directory monitoring involves looking at the active directory service created by Microsoft for use in Windows networks.Part of this...