Q&A With Our Tech Experts

No stupid questions here. Techopedia staff has answered many commonly asked technology questions and also assembled a number of experts who will answer your questions in basically any area of IT.

Featured Tech Experts

Ben Richardson

CEO

Ben Richardson is the director of Acuity Training, one of the UK’s leading providers of classroom-based Excel training.

Richard Conn

Senior Director

Richard Conn is the Senior Director for Demand Generation at 8x8, a leading communication platform. Conn is an analytical and results-driven leader with a track record of achieving major ROI improvements in fast-paced, competitive B2B environments.

Doug Kersten

Chief Information Security Officer

Doug Kersten is the Chief Information Security Officer at Appfire. Kersten brings more than two decades of security leadership experience to this role, having led IT and security programs for some of the world’s top financial institutions and law firms.

Q&As

The recycling of mobile phones and devices is very important, partially because of the planned obsolescence and quick ev...

Answered by: Chief Information Security Officer
View the Answer

The terms “mobile” and “wireless” are often used interchangeably but in reality, they are two ve...

Answered by: Chief Information Security Officer
View the Answer

Both mobile communication and mobile computing involve wireless data transfer. The difference is in the kind of data bei...

Answered by: Chief Information Security Officer
View the Answer

The terms "mobile data" and "Wi-Fi" both have to do with distributing different types of digital dat...

Answered by: Chief Information Security Officer
View the Answer

The difference between big data and the open source software program Hadoop is a distinct and fundamental one. The forme...

Answered by: Chief Information Security Officer
View the Answer

Big data and data mining are two different things. Both of them relate to the use of large data sets to handle the colle...

Answered by: Chief Information Security Officer
View the Answer

Li-Fi, which uses visible light to transmit signals wirelessly, is an emerging technology poised to compete with Wi-Fi. ...

Answered by: Chief Information Security Officer
View the Answer

Wi-Fi uses radio waves to broadcast its signal, whereas Li-Fi uses visible light provided by LED bulbs fitted with speci...

Answered by: Chief Information Security Officer
View the Answer

Li-Fi is a wireless optical technology that uses the same 802.11 protocols as Wi-Fi. Since Li-Fi uses visible light comm...

Answered by: Chief Information Security Officer
View the Answer

Google Cloud Print is a service that helps users send documents to printers from a variety of devices. This includes per...

Answered by: Chief Information Security Officer
View the Answer

In general, big data sets help businesses to make decisions based on widely collected information. Big data is used in m...

Answered by: Chief Information Security Officer
View the Answer

Mobile computing is the idea that users can process data or perform digital tasks on mobile devices. This broad category...

Answered by: Chief Information Security Officer
View the Answer

The question of how businesses and enterprises utilize mobile applications is a broad one, but the answer involves sever...

Answered by: Chief Information Security Officer
View the Answer

There are multiple ways to set up cloud storage for your own use. All of them involve looking at the specific technical ...

Answered by: Chief Information Security Officer
View the Answer

There are many ways that cloud computing can help small businesses depending on their core operations, IT infrastructure...

Answered by: Chief Information Security Officer
View the Answer

The Apache software set known as Hadoop is becoming a very popular resource for dealing with big data sets. This type of...

Answered by: Chief Information Security Officer
View the Answer

Both cloud computing and mobile computing have to do with using wireless systems to transmit data. Beyond this, these tw...

Answered by: Chief Information Security Officer
View the Answer

While virtualization is a general strategy for getting more out of in-house hardware resources, containerization is a sp...

Answered by: Chief Information Security Officer
View the Answer

Network analyzers and network scanners may accomplish similar things in network administration, but they work differentl...

Answered by: Contributor
View the Answer

'Managed service provider’ (MSP) and 'public cloud’ are two terms that represent similar ideas in en...

Answered by: Contributor
View the Answer