ALERT

Cisco CloudCenter: Get the Hybrid IT Advantage

Melissa Rudy

Articles by Melissa Rudy


Reducing VM Troubleshooting Time Reducing VM Troubleshooting Time Reducing VM Troubleshooting Time Reducing VM Troubleshooting Time


Virtual machines are essentially computers within computer, which means that when things go wrong, there are extra layers that must be...

Using Root Cause Analysis to Investigate Application Issues Using Root Cause Analysis to Investigate Application Issues Using Root Cause Analysis to Investigate Application Issues Using Root Cause Analysis to Investigate Application Issues


Finding the symptoms of problems is easy, but tracking down the underlying cause can be a bit trickier. A combination of root cause...

Staying Safe When Using Public Wi-Fi Connections Staying Safe When Using Public Wi-Fi Connections Staying Safe When Using Public Wi-Fi Connections Staying Safe When Using Public Wi-Fi Connections


Public Wi-Fi is a modern convenience that many people take for granted. However, tapping into public Wi-Fi could be putting your data at...

How Network Virtualization is Used as a Security Tool How Network Virtualization is Used as a Security Tool How Network Virtualization is Used as a Security Tool How Network Virtualization is Used as a Security Tool


Network virtualization is quickly becoming a security tool, but one must understand it and avoid common mistakes in order for it to be...

What to Consider When Choosing a Network Virtualization Platform What to Consider When Choosing a Network Virtualization Platform What to Consider When Choosing a Network Virtualization Platform What to Consider When Choosing a Network Virtualization Platform


There are a number of network virtualization platforms out there, but each has its strengths and weaknesses. Choosing the right one...

Can Niche Cloud Providers Compete with the 'Big Guys'? Can Niche Cloud Providers Compete with the 'Big Guys'? Can Niche Cloud Providers Compete with the 'Big Guys'? Can Niche Cloud Providers Compete with the 'Big Guys'?


Amazon, Google and Microsoft dominate in the field of cloud computing, but a number of niche providers are competing with them. Can the...

Barriers to PaaS: Why Many Businesses Are Opting Out of Platform-as-a-Service Barriers to PaaS: Why Many Businesses Are Opting Out of Platform-as-a-Service Barriers to PaaS: Why Many Businesses Are Opting Out of Platform-as-a-Service Barriers to PaaS: Why Many Businesses Are Opting Out of Platform-as-a-Service


PaaS can potentially be a good solution for some small businesses, but depending on a business's specific needs, it may be better to look...

How Retailers Can Safeguard Against Holiday Hackers How Retailers Can Safeguard Against Holiday Hackers How Retailers Can Safeguard Against Holiday Hackers How Retailers Can Safeguard Against Holiday Hackers


As the holidays approach and shoppers shift into high gear, so do hackers. Protect yourself and your business against data breaches so that...

The Future of Virtualization: What’s New for 2015? The Future of Virtualization: What’s New for 2015? The Future of Virtualization: What’s New for 2015? The Future of Virtualization: What’s New for 2015?


Virtualization is gaining popularity. Here's what experts are expecting from it in 2015

The Top 3 Advantages of Virtualization The Top 3 Advantages of Virtualization The Top 3 Advantages of Virtualization The Top 3 Advantages of Virtualization


Many companies are shifting toward virtualization, but is it right for your company? Here we examine some of the benefits that...

Virtualization Security: Tips to Prevent VM Hyper Jumping Virtualization Security: Tips to Prevent VM Hyper Jumping Virtualization Security: Tips to Prevent VM Hyper Jumping Virtualization Security: Tips to Prevent VM Hyper Jumping


If you're running virtual machines, you may be vulnerable to hyper jumping attacks. But there are precautions you can take to lessen your...

Tech Terms You Ought to Know Tech Terms You Ought to Know Tech Terms You Ought to Know Tech Terms You Ought to Know


Technology rules today's society, and if you can't keep up, you might get left behind. Stay up to date by learning about these tech terms

Is Cutting Energy Waste a Problem Big Data Can Solve? Is Cutting Energy Waste a Problem Big Data Can Solve? Is Cutting Energy Waste a Problem Big Data Can Solve? Is Cutting Energy Waste a Problem Big Data Can Solve?


Big data is used to analyze nearly everything. Can it be used to help reduce energy waste

What the $#@! Is Data Discovery? What the $#@! Is Data Discovery? What the $#@! Is Data Discovery? What the $#@! Is Data Discovery?


What exactly is data discovery? Here we take an in-depth look at this process and how it can help your business

4 Bad Business Intelligence Habits to Avoid at All Costs 4 Bad Business Intelligence Habits to Avoid at All Costs 4 Bad Business Intelligence Habits to Avoid at All Costs 4 Bad Business Intelligence Habits to Avoid at All Costs


Breaking these bad habits in business intelligence is a smart idea! Make sure you're getting the most out of your data by avoiding these...

Never Really Gone: How to Protect Deleted Data From Hackers Never Really Gone: How to Protect Deleted Data From Hackers Never Really Gone: How to Protect Deleted Data From Hackers Never Really Gone: How to Protect Deleted Data From Hackers


Deleting data doesn't necessarily mean that it's permanently gone. Here are some methods for keeping your private data out of the wrong...

6 Ways to Keep Apps From Oversharing Your Personal Data 6 Ways to Keep Apps From Oversharing Your Personal Data 6 Ways to Keep Apps From Oversharing Your Personal Data 6 Ways to Keep Apps From Oversharing Your Personal Data


While you’re sharing your life with your apps, those useful tools are broadcasting your information to the rest of the world. Find out how...

What the $#@! Is Hadoop? What the $#@! Is Hadoop? What the $#@! Is Hadoop? What the $#@! Is Hadoop?


Hadoop seems to be everywhere you look, but what exactly is it? What does it do, how does it work, and why is it so

Destroying Data DIY Destroying Data DIY Destroying Data DIY Destroying Data DIY


You don't want others getting their hands on your sensitive data, but at the same time, you don't want to spend the money to get your data...

6 Outdated Gadgets You Can Toss 6 Outdated Gadgets You Can Toss 6 Outdated Gadgets You Can Toss 6 Outdated Gadgets You Can Toss


Many everyday forms of technology from years past are quickly becoming obsolete due to modern technology. Here's a look at some of the...

Is the NSA Spying on Me? Is the NSA Spying on Me? Is the NSA Spying on Me? Is the NSA Spying on Me?


Ever since we found out the NSA was collecting millions of phone records, it's easy to wonder whether we're all being watched. Here we try...

10 Tech Acronyms You Must Know 10 Tech Acronyms You Must Know 10 Tech Acronyms You Must Know 10 Tech Acronyms You Must Know


In the tech field, there's a lot of jargon that's totally unfamiliar to those who don't call themselves geeks. How many of these acronyms...

5 Things to Remember About the NSA Leaks 5 Things to Remember About the NSA Leaks 5 Things to Remember About the NSA Leaks 5 Things to Remember About the NSA Leaks


Here are five key points to remember about the National Security Agency's (NSA) domestic surveillance program and your electronic security

5 Reasons Why Companies Love Cloud - and Why They Don't 5 Reasons Why Companies Love Cloud - and Why They Don't 5 Reasons Why Companies Love Cloud - and Why They Don't 5 Reasons Why Companies Love Cloud - and Why They Don't


Here's what companies love about the cloud - and what's holding others back

There's an App for That - In Your Car There's an App for That - In Your Car There's an App for That - In Your Car There's an App for That - In Your Car


While some view the idea of transforming cars into smartphones with wheels as frivolous or downright dangerous, the potential for enhancing...

The New Frontier for Hackers: Your Smartphone The New Frontier for Hackers: Your Smartphone The New Frontier for Hackers: Your Smartphone The New Frontier for Hackers: Your Smartphone


Mobile apps have more than their share of security problems. Here's what you need to know

Cloud vs. Local Backup: Which Do You Need? Cloud vs. Local Backup: Which Do You Need? Cloud vs. Local Backup: Which Do You Need? Cloud vs. Local Backup: Which Do You Need?


Should you choose cloud or local backup? The answer depends on a lot of different factors. Learn the pros and cons of each option here

The Device You Don't Think About: Security Tips for Tablet PCs The Device You Don't Think About: Security Tips for Tablet PCs The Device You Don't Think About: Security Tips for Tablet PCs The Device You Don't Think About: Security Tips for Tablet PCs


Most users carry quite a bit of sensitive data on their tablets, which means that skimping on security could be a costly mistake. Find out...

The Basics of Two-Factor Authentication The Basics of Two-Factor Authentication The Basics of Two-Factor Authentication The Basics of Two-Factor Authentication


Many big companies are offering two-step authentication, but while it's better than many of the alternatives, it's no iron fortress

Why APIs Have Become a Big Deal Why APIs Have Become a Big Deal Why APIs Have Become a Big Deal Why APIs Have Become a Big Deal


In a world that runs increasingly on digital information, APIs have become a big deal - and not just for posting to Farmville from your...

Buh-Bye Remote Control: Things You Can Control With Your Smartphone Buh-Bye Remote Control: Things You Can Control With Your Smartphone Buh-Bye Remote Control: Things You Can Control With Your Smartphone Buh-Bye Remote Control: Things You Can Control With Your Smartphone


Smartphones have deftly deposed remote controls and in many cases, they do a much better job. Find out which apps you need to control...

The 3 Key Components of BYOD Security The 3 Key Components of BYOD Security The 3 Key Components of BYOD Security The 3 Key Components of BYOD Security


BYOD has many benefits, but it also comes with security risk. Here are some of the key ways that companies can secure their data

Warp Speed to Biotech Utopia: 5 Cool Medical Advancements Warp Speed to Biotech Utopia: 5 Cool Medical Advancements Warp Speed to Biotech Utopia: 5 Cool Medical Advancements Warp Speed to Biotech Utopia: 5 Cool Medical Advancements


These five developments seem to be straight out of science fiction, but they're moving toward medical reality - and

3 Ways to Charge Your Devices Without Plugging Them In 3 Ways to Charge Your Devices Without Plugging Them In 3 Ways to Charge Your Devices Without Plugging Them In 3 Ways to Charge Your Devices Without Plugging Them In


Cellphones and other devices can go dead at the most inconvenient times. Fortunately, there are some on-the-road solutions to keep them...

Voice Recognition Technology: Helpful or Painful? Voice Recognition Technology: Helpful or Painful? Voice Recognition Technology: Helpful or Painful? Voice Recognition Technology: Helpful or Painful?


Interacting with conversational electronics is becoming increasingly common - and necessary. But so far, the results are decidedly mixed

GPS Shoes: Making Life Easier, One Step at a Time GPS Shoes: Making Life Easier, One Step at a Time GPS Shoes: Making Life Easier, One Step at a Time GPS Shoes: Making Life Easier, One Step at a Time


GPS shoes are just one of the more interesting applications of GPS technology, which is increasingly becoming a part of our everyday lives

The Windows 8 Cloud: How the New OS Embraces Cloud Technology The Windows 8 Cloud: How the New OS Embraces Cloud Technology The Windows 8 Cloud: How the New OS Embraces Cloud Technology The Windows 8 Cloud: How the New OS Embraces Cloud Technology


Is Microsoft ready to deliver in the brave new world of cloud computing? If the answer's yes, users stand to reap huge benefits

The Four Faces of Windows 8: Edition Roundup The Four Faces of Windows 8: Edition Roundup The Four Faces of Windows 8: Edition Roundup The Four Faces of Windows 8: Edition Roundup


With just four versions to choose from, and perhaps the most clearly defined capacities of any Windows OS before it, most people should...

Windows 8 Is Coming: What You Should Know About Its UI Windows 8 Is Coming: What You Should Know About Its UI Windows 8 Is Coming: What You Should Know About Its UI Windows 8 Is Coming: What You Should Know About Its UI


With Windows 8, Microsoft takes on Apple. Find out how this OS works - and where it falls short

Project Management, Cloud Computing Style Project Management, Cloud Computing Style Project Management, Cloud Computing Style Project Management, Cloud Computing Style


Cloud project management software enables collaboration and reduces costs, but it isn't without a few pitfalls

Fashion for the Uber-Geek: Wearable Technology Fashion for the Uber-Geek: Wearable Technology Fashion for the Uber-Geek: Wearable Technology Fashion for the Uber-Geek: Wearable Technology


Fashionistas might scoff at wearable technology, but for gadget gurus and tech geeks, these space-aged designs may be as good as Gucci

Project Management 101 Project Management 101 Project Management 101 Project Management 101


With all the planning, calculations, scheduling and tracking that goes into successfully seeing a project through to completion, more...

6 Common Tech Mistakes Small Businesses Make 6 Common Tech Mistakes Small Businesses Make 6 Common Tech Mistakes Small Businesses Make 6 Common Tech Mistakes Small Businesses Make


These all-too-common blunders can cost a business a lot of time, money and trouble

Do I Know You? Social Networking Vs. Social Discovery Do I Know You? Social Networking Vs. Social Discovery Do I Know You? Social Networking Vs. Social Discovery Do I Know You? Social Networking Vs. Social Discovery


Social discovery is breaking the pattern of repetitive, mundane updates from the same people we talk to every day and bringing a little...

Email Newsletter

Join over 175,000 subscribers who receive actionable tech insights from Techopedia.

Quotes

  • Being digital should be of more interest than being electronic.
    - Alan Turing, 1947