Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » Did You Know »
Computer Science
  • Halloween Tech: Weird, Spooky and Odd Technology Terms

    To celebrate Halloween tech-style, we're bringing you a fun — but totally legit — list of some of the spookiest acronyms and tech term oddities we've come across while compiling the Webopedia database. »

  • The Difference Between Server and Desktop Virtualization?

    Server virtualization and desktop virtualization can be a confusing topic if you don't know the inherent differences between the two virtualization technologies. »

  • Wi-Fi Definition is Not Wireless Fidelity

    Wi-Fi is the name of a wireless networking technology that uses radio waves to provide high-speed network and Internet connections. This Webopedia "Did You Know..." article explains Wi-Fi technology: how it works and misconceptions about Wireless Fidelity. »

  • Windows 7 Networking: Using HomeGroups

    Windows 7's HomeGroup feature makes home networking easier by letting you set up a simple password-protected network with other Windows 7 systems. »

  • 802.11n Ratified: What It Means for Wi-Fi Products

    At long last, the IEEE has ratified the 802.11n standard. The finalized standard promises backwards-compatibility and adds new capabilities. »

  • How to Completely Erase a Hard Disk Drive

    The two most common ways to erase a hard drive is by formatting or wiping the drive. In this article we'll look at both approaches and discuss security issues and methods to clean the hard drive using format and disk wipe techniques. »

  • How to Protect Against Card Skimming

    Card skimming is the practice of using an electronic device to record account data encoded on the magnetic stripe on a credit, debit or ATM card »

  • How to Convert a Physical PC into a Virtual One

    Learn not only how to turn a physical PC in to a virtual PC, but find out why you would want to make the change. »

  • Network File Recovery: How To 'Undelete' a Delete

    When you delete files from shares on your network they really vanish. Unlike local files, they are permanently deleted instead of being sent to the recycle bin where you can recover them if needed. Obviously, this may become a huge problem if you accidentally delete an important document. »

  • Networking With the Windows 7 Beta

    Windows 7 makes finding and connecting to wireless networks easier. You can configure a WLAN connection while you perform the initial setup procedure. »

  • What is Open Source Software?

    We discuss open source software, the basics behind the Open Source Initiative (OSI), and Free Software Licensing. »

  • The Difference Between Notebook and Desktop Memory

    Before you can upgrade your system memory, you have to first find out what type of memory is supported by your motherboard. »

  • How to Network Your Files With NFS

    Network File System (NFS), is the original file-sharing method among UNIX-based computers. Originally developed by Sun, NFS is still widely used. »

  • Getting Started With Green Computing

    Going green means using the least amount of resources for the greatest gain, and best practices that focus on conservation to reduce a company's carbon footprint. »

  • How Wireless Networks Work

    A wireless network or Wireless Local Area Network (WLAN) serves the same purpose as a wired one - to link a group of computers. »

  • Understanding Software Development Lifecycle

    For programmers, the software development life cycle (SDLC) is an organization's standards surrounding the creation and maintenance of applications. »

  • How to Defrag a Hard Drive

    Disk Defragmenter locates fragments of files stored on a disk and copies them to a single file at a point on the disk that has enough free space. »

  • Data Backup Basics for Business

    What is backup, data backup, data storage, incremental, differentia, data, recovery, software, flash drive, optical media, »

  • What is Enterprise Search?

    While the name is a bit misleading, enterprise search systems are used by small and mid-size businesses as well as enterprises. Enterprise search systems typically do not search the public Internet, but rather only what is contained within the firewall on the organization's own private corporate network. »

  • Different Types of Memory Cards

    Memory cards are used for storage, but there are different kinds and types of memory cards. Confused? Webopedia has you covered with all the different types and formats of memory cards, their sizes, prices, and more. »

  • Understanding LAMP and Its Effect on Web Development

    If you're at all familiar with open source software, chances are you've heard the phrase "LAMP stack" before. But do you know what LAMP actually is? »

  • Metadata: Data About Data

    Metadata is "data about data". Learn what Information you might unknowingly be disclosing with your files. »

  • Storage Virtualization: Myths, Realities and Other Considerations

    The fundamental idea behind virtualization is to abstract, emulate and facilitate aggregation among different capabilities. »

  • The Differences Between WEP and WPA

    WPA has been a mainstream technology for years now, but WEP remains a standard feature on virtually every wireless router on store shelves today. »

  • Understanding SCSI, ATA, SAS and SATA

    This guide is designed to help you understand the differences between parallel and serial interfaces, including SCSI, ATA, SAS and SATA. »

  • Understanding Hardware-Assisted Virtualization

    An online computer dictionary and Internet search engine for Internet terms and technical support. »

  • 2007 Technology Trends

    An online computer dictionary and internet search engine for internet terms and techincal support. »

  • Understanding IPv6

    We're going to spend time teaching you a number of wonderful things about IPv6, such as why network administrators need to get their duffs up and implement it. »

  • All About Network Access Controls

    If you're planning to implement a network access control system (NAC) to ensure only authorized users can access corporate resources, you're in good company. »

  • Understanding NAT and PAT

    Due in large part to alleged NAT support on consumer devices, many people are confused about what NAT, or Network Address Translation, really is. »

  • iSCSI vs. Fibre Channel

    Vendors have been touting the benefits of iSCSI. Since becoming an official standard in 2003, the technology has yet to dominate the storage industry. »

  • Understanding Rootkits

    A rootkit is a tool, or (more commonly) a collection of tools, that an attacker can install on a compromised computer. »

  • The Benefits of Tiered Storage

    Organizations can take full advantage of storage resource management tools to determine the value of their data and establish an ideal storage medium. »

  • Understanding OSPF Routing

    Open Shortest Path First is a link-state interior gateway protocol. It is often used when people discover that RIP isn��t going to work for a large network. »

  • What Is a Virtual Tape Library

    A virtual tape library (VTL) is physically a highly intelligent optimized disk-based storage appliance. »

  • Understanding Routing

    This article is designed to be a gentle introduction into the world of routing issues and concepts. »

  • Perpendicular Hard Drive Recording Technology

    In perpendicular recording, data bits are aligned vertically (not horizontally) - or perpendicular to the disk, allowing room for more data. »

  • Understanding TCP, the Protocol

    TCP is used everywhere, and understanding how TCP operates enables network administrators to properly troubleshoot network communication issues. »

  • New Technology Trends: Top 10 to Know for the New Year

    Technology trends (like everything else) often come and go with the changing tides. Here are the top technology terms for 2005. »

  • How Biometrics Security Works

    Today, the world of enterprise security is increasingly incorporating biometric identifiers as an additional weapon within the security arsenal. »

  • What is the Best Network Operating System?

    A network administrator can effectively operate using various tools available on several platforms, including Windows, OS X, Linux, and FreeBSD. »

  • History of OFDMA and How it Works

    Intrusion detection systems (IDS) are designed to monitor inbound and outbound network activity to identify suspicious patterns that indicate network attacks. »

  • How Surround Sound Works

    Consumers demand realistic entertainment and surround sound plays a big part in delivering an engaging experience. Learn how surround sound works in this Webopedia guide. »

  • What is HDTV?

    While many use the terms Digital Television (DTV) and High-definition Television (HDTV) interchangeably, they are, in fact, two very different things. »

  • Deciphering Wireless Acronyms

    Stumped by acronyms such as WPA2 and WMM? You're not alone. We define these new terms and explain why you should care about them. »

  • Understanding Web Services

    Web service describes a standardized way of integrating Web applications using tXML, SOAP, WSDL and UDDI standards over an Internet protocol backbone. »

  • Common Audio Formats

    The audio codec is actually a computer program that compresses or decompresses digital audio data according to the audio file format specifications. »

  • What Is CPU Overclocking?

    Overclocking is a performance boost technique without purchasing any additional hardware by running a microprocessor at a faster clock speed. »

  • What Is USB?

    USB is supported at the operating system level. Compared to alternative ports such as parallel or serial, USB is very user-friendly. »

  • Intrusion Detection (IDS) and Prevention (IPS) Systems

    Intrusion detection systems (IDS) are designed to monitor inbound and outbound network activity to identify suspicious patterns that indicate network attacks. »

  • All About Adobe PDF

    Short for Portable Document Format, PDF is a file format developed by Adobe Systems. »

  • All About RFID

    Short for radio frequency identification, RFID is a dedicated short range communication (DSRC) technology. »

  • Understanding The Data Link Layer

    Understanding The Data Link Layer. What's more important than IP and routing? Layer 2, the Data Link layer, is where Ethernet lives. »

  • The OSI Reference Model - Understanding Layers

    The OSI Reference Model: it is time to take a trip up the OSI Reference Model, and learn what this mysterious thing is all about. »

  • How Fingerprint Scanners Work

    Biometric fingerprint readers, or scanners, are the most popular and most common form of biometric security devices used. »

  • What Is 64-bit Computing?

    64-bit refers to a processor with registers that store 64-bit numbers. A generalization suggests that 64-bit doubles the data a 32-bit CPU can process. »

  • The Science of Color

    Colors would not be possible without light because color is light either reflected off of objects we see or viewed directly from the light source. »

  • Is It Possible to Eavesdrop on Electromagnetic Radiation?

    Since World War II scientists have known that EMR leaked from devices can be intercepted and with the proper equipment, reconstructed on different devices. »

  • Static Electricity and Computers

    When a computer is opened and internal workings are exposed, there is danger of damaging the computer with static electricity held by the human body. »

QUICK REFERENCE
Webopedia Polls

The trend for the past two years has been for shoppers to spend more online during the holiday season. How do you typically shop for holiday... Read More »

How to Create a Desktop Shortcut to a Website

This Webopedia guide will show you how to create a desktop shortcut to a website using Firefox, Chrome or Internet Explorer (IE). Read More »

Cheat Sheet - Common Ports (PDF)

This list of well-known port numbers specifies the port used by the server process as its contact port. Read More »