Q&A With Our Tech Experts

No stupid questions here. Techopedia staff has answered many commonly asked technology questions and also assembled a number of experts who will answer your questions in basically any area of IT.

Featured Tech Experts

Ben Richardson

CEO

Ben Richardson is the director of Acuity Training, one of the UK’s leading providers of classroom-based Excel training.

Richard Conn

Senior Director

Richard Conn is the Senior Director for Demand Generation at 8x8, a leading communication platform. Conn is an analytical and results-driven leader with a track record of achieving major ROI improvements in fast-paced, competitive B2B environments.

Doug Kersten

Chief Information Security Officer

Doug Kersten is the Chief Information Security Officer at Appfire. Kersten brings more than two decades of security leadership experience to this role, having led IT and security programs for some of the world’s top financial institutions and law firms.

Q&As

A NetFlow collector is a specific part of NetFlow operations that enables administrators to collect IP network traffic, ...

Answered by: Contributor
View the Answer

Although there are many ways to configure network components, a few of them have emerged as the most common and standard...

Answered by: Contributor
View the Answer

Both NetFlow and sFlow are network traffic monitoring tools, and both have the word "flow" in their names. Bey...

Answered by: Contributor
View the Answer

The internet of things (IoT) will bring a physical hardware component to the big data ecosystem. With big data, large po...

Answered by: Contributor
View the Answer

The Apache open-source Hadoop data handling resource and related tools are becoming influential in the big data world. B...

Answered by: Contributor
View the Answer

Software-defined networking is a network concept where, in network architecture, the network’s "control plane...

Answered by: Contributor
View the Answer

The issue of mobile phones causing different types of cancers is related to what we now know about the technologies that...

Answered by: Contributor
View the Answer

Security and privacy are closely linked, and both are part of the emerging debate on new technologies. However, security...

Answered by: Contributor
View the Answer

There's more than one way to track devices by location. Guides on locational tracking point out that with traditiona...

Answered by: Contributor
View the Answer

The difference between a mobile operating system (OS) and a computer OS has to do with how individual tech companies hav...

Answered by: Contributor
View the Answer

Home users can benefit from many aspects of cloud computing services. While many cloud vendors and providers target a gr...

Answered by: Contributor
View the Answer

Erasing or "wiping" the storage media of an Apple iPad device is fairly easy. Unlike with some other types of ...

Answered by: Contributor
View the Answer

The terms privacy, confidentiality and security have a lot in common as they apply to modern-day information technology,...

Answered by: Contributor
View the Answer