Q&A with our Tech Experts

No stupid questions here. Techopedia staff has answered many commonly asked technology questions and also assembled a number of experts who will answer your questions in basically any area of IT.

Featured Tech Experts

Amit Levi

VP of product and Marketing at Anodot

Amit Levi is VP of product and marketing at Anodot. He is passionate about turning data into insights. Over the past 15 years, he’s been proud to accompany the development of the analytics market. Having held managerial positions in several leading startups, Amit brings vast experience in planning, developing, and shipping large scale data and analytics products to top mobile and web companies. An expert in product and data, his mantra is “Good judgment comes from experience and experience comes from bad judgment.”

Chad Hodges

Executive Vice President at Enterprise Networking Solutions

Chad Hodges, executive vice president at Enterprise Networking Solutions, Inc. (ENS-Inc), is responsible for all aspects of business development and vision for the company, including the planning and execution of partner and customer development.

Greg Jehs

Director of Enterprise Engagement at Meridian IT

Greg Jehs is the Director of Enterprise Engagement at Meridian IT. Greg has over 16 years of dedicated IT experience. Upon graduating from Barry University, he spent over 2 years as a Systems Architect at R&D Systems Group Inc before moving to Meridian IT. At Meridian, he has progressed from a Software Architect and Director of Data Management to a Director of Datacenter Solutions before moving into his current role last year. In addition to his hands-on experience, Greg has benefited deeply from the Meridian team, of which over two-thirds are vendor certified specialists with expertise in IT infrastructure, security & privacy, managed services, mobility, unified communications, social business, and equipment leasing.

Q&As

0Filter
Loading Questions, please wait...
Ensemble learning has various benefits for machine learning projects. Many of these are related to using a large number of relatively simple nodes to aggregate some inputs and output results.For...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Fundamentally, a cyber threat intelligence analyst is someone who specializes in collecting, interpreting and understanding the significance of threat intelligence information. Unlike a security...
Answered by: Gene Yoo
Chief Executive Officer at Resecurity
One of the biggest downsides of the introduction of Web 3.0 is the extreme vulnerability of integrated data. Since only one account will contain all your personal data and sensitive information, once...
Answered by: Claudio Buttice
Data Analyst, Contributor
Let’s start by understanding what threat hunting is: It’s a process of looking — line by line and event by event — for indicators of very specific threats. It’s not a...
Answered by: Gene Yoo
Chief Executive Officer at Resecurity
The question of whether machine learning programs will eventually replace human physicians is an interesting one. It has its basis in technological advancements that we’ve already seen –...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Men and women are biologically different, and that’s a fact. Our brains are wired (somewhat) differently, and although we have a lot in common, there also a lot of physical differences that...
Answered by: Claudio Buttice
Data Analyst, Contributor
So what's involved in becoming a good data scientist? One way to think about data scientists is that they are the curators and analysts of large data sets. Essentially, there are four fundamental...
Answered by: Jorge Sagastume
Vice President, EscrowTech International, Inc
For more than a decade, healthcare organizations have invested millions of dollars building data warehouses and armies of data analysts with the sole purpose of making better decisions with data to...
Answered by: Mohan Giridharadas
Founder and CEO at LeanTaaS
Data mining and machine learning are two very different terms – but they are often both used in the same context, which is the ability of parties to refine and sort data to come up with...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Corporate data backup is a really broad but important topic. There are many approaches available today depending on what data you’re talking about. However, on the most basic level you want...
Answered by: David Cullum
Director of Information Systems at TBI
The very essence of what Web 3.0 brings to the table is an “intelligent” internet that will be able to understand the needs of the user and react accordingly. Websites and online...
Answered by: Claudio Buttice
Data Analyst, Contributor
Data analytics in telecom is huge. Whether it’s analyzing sales data to project where you think different products’ final sales numbers should be, analyzing churn rates to see how you can...
Answered by: David Cullum
Director of Information Systems at TBI
Machine learning and artificial intelligence principles are rapidly changing how computing works. One of the key ways that this is happening is with weighted or probabilistic inputs that change...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Vulnerability scans are fundamentally compute intensive; that’s just the nature of the beast, and they need to be done repeatedly, over and over again, because of the number of vulnerabilities...
Answered by: Deepak Kumar
Founder and Chief Technology Officer at Adaptiva
The discipline of data visualization gives us practically infinite ways to show off what's happening with machine learning algorithms. It's worth thinking about exactly why data visualization...
Answered by: Justin Stoltzfus
Contributor, Reviewer
To some experts, blockchain may be the very force driving the transition from Web 2.0 to Web 3.0. A bold statement, indeed, but it cannot be denied that it holds some truth.One of the principal...
Answered by: Claudio Buttice
Data Analyst, Contributor
No. Hygiene is about remediating known vulnerabilities, applying all important patches quickly, and hardening all systems settings by ensuring they match the latest security benchmarks. That said,...
Answered by: Deepak Kumar
Founder and Chief Technology Officer at Adaptiva
Steve Jobs’ life is a story of success, and has become a source of inspiration for many tech pros across the world. His inspirational speeches have become a cornerstone upon which many young...
Answered by: Claudio Buttice
Data Analyst, Contributor
Attackers place most of their efforts on exploiting endpoints, and new endpoint exploits are appearing at an ever-increasing rate. There are too many updates to the OS and applications are released...
Answered by: Deepak Kumar
Founder and Chief Technology Officer at Adaptiva
For businesses, endpoints remain an important attack surface to harden for a few reasons:Ubiquity: Large companies have hundreds of thousands of endpoints dispersed across hundreds or thousands of...
Answered by: Deepak Kumar
Founder and Chief Technology Officer at Adaptiva
More
Go back to top