Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog

Author - Forrest Stroud

  • Forrest Stroud has been with the QuinStreet Enterprise network of technology websites for 18 years, during which time he has covered everything from consumer technology to small businesses and corporate data centers. He is also the editor of ServerWatch.

  • Operation BugDrop

    Operation BugDrop is a form of malware that surreptitiously infects desktop and laptop computers and uses their microphones to secretly record audio. »

  • AWS Lambda

    Amazon's AWS Lambda is an event-driven computing platform developed by Amazon to automatically fire, or execute code, when a specific event occurs. »

  • website spoofing

    Website spoofing refers to fraudulent websites that masquerade as legitimate sites by copying the design of the website as well as in some cases utilizing a URL similar to the real site. »

  • fake news

    Fake news, or hoax news, refers to false information or propaganda published under the guise of being authentic news. »

  • IFTTT

    IFTTT, an acronym for If This Then That, is a free service that automates connectivity between apps and services. »

  • Amazon Echo Dot

    Amazon Echo Dot is a small cylindrical voice-controlled computing device that connects to Alexa, providing responses to questions and controlling IoT devices. »

  • Amazon Snowball Edge

    Amazon Snowball Edge is designed to provide enterprises with a fast and inexpensive device for transferring large amounts of data into and out of Amazon's Web Services cloud platform. »

  • leap smear

    A Leap Smear is a technique of spreading or "smearing" time over a period of hours to account for leap seconds. »

  • leap second

    A leap second is when one second is added to the Coordinated Universal Time (UTC) to keep clocks throughout the world synchronized with the Earth's ever-slowing rotation. »

  • cognitive computing

    Cognitive computing refers to computing technology and platforms that simulate the thought processes of humans. »

  • Watson

    IBM Watson is a cognitive computing platform built on the DeepQA project and was originally developed to answer questions on the quiz show Jeopardy. »

  • Containers-as-a-Service (CaaS)

    Containers-as-a-Service (CaaS) is an emerging services offering for container-based virtualization in which providers offer a complete framework to customers for deploying and managing containers, applications and clusters. »

  • orchestration

    Orchestration refers to software platforms and services that automate and orchestrate key IT and business processes to simplify operations management. »

  • Ansible

    Ansible is a software platform developed to streamline and simplify cloud provisioning, configuration management, application deployment, intra-service orchestrations and similar emerging ITsystems, processes and infrastructure. »

  • Yakkety Yak

    Yakkety Yak is the Ubuntu codename for version 16.10 of the Ubuntu Linux-based operating system, which was released in October 2016. »

  • Touch Disease

    Touch Disease refers to an issue with Apple iPhone 6 and iPhone 6 Plus smartphones that causes the touch screen to become unresponsive due to a logic board connection failure. »

  • Nougat - Android Codename

    Nougat is the official Android codename for the 7.0 update of the open source Android mobile operating system. »

  • OpenStack Newton

    OpenStack Newton is the successor to the Mitaka release of the OpenStack open source cloud computing platform. »

  • telemedicine

    Telemedicine refers to medical information provided by healthcare professionals to patients via electronic means such as e-mail, text messaging or video chat. »

  • macOS Sierra

    macOS Sierra is version 10.12 of Apple Computer's Mac OS X operating system for Macintosh desktop, laptop and server computers, and it serves as the successor to Mac OS X El Capitan. »

(page 1 of 6 )
LATEST ARTICLES
What's Hot in Tech: AI Tops the List

Like everything in technology, AI touches on so many other trends, like self-driving cars and automation, and Big Data and the Internet of Things... Read More »

DevOp's Role in Application Security

As organizations rush to release new applications, security appears to be getting short shrift. DevSecOps is a new approach that holds promise. Read More »

Slideshow: Easy Editorial SEO Tips to Boost Traffic

This slideshow reviews five easy on-page editorial SEO tips to help drive organic search engine traffic, including the page title, heading,... Read More »

STUDY GUIDES
Java Basics, Part 1

Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »

Java Basics, Part 2

This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »

The 7 Layers of the OSI Model

The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »