Main » Did You Know »
Computer Science
  • Halloween Tech: Weird, Spooky and Odd Technology Terms

    To celebrate Halloween tech-style, we're bringing you a fun — but totally legit — list of some of the spookiest acronyms and tech term oddities we've come across while compiling the Webopedia database. »

  • The Difference Between Server and Desktop Virtualization?

    Server virtualization and desktop virtualization can be a confusing topic if you don't know the inherent differences between the two virtualization technologies. »

  • Wi-Fi Definition is Not Wireless Fidelity

    Wi-Fi is the name of a wireless networking technology that uses radio waves to provide high-speed network and Internet connections. This Webopedia "Did You Know..." article explains Wi-Fi technology: how it works and misconceptions about Wireless Fidelity. »

  • Windows 7 Networking: Using HomeGroups

    Windows 7's HomeGroup feature makes home networking easier by letting you set up a simple password-protected network with other Windows 7 systems. »

  • 802.11n Ratified: What It Means for Wi-Fi Products

    The IEEE has ratified the 802.11n standard. The finalized standard promises backwards-compatibility and adds new capabilities. »

  • How to Completely Erase a PC Hard Drive

    The two most common ways to erase a hard drive is by formatting or wiping the drive. We look at both approaches and discuss security issues and techniques. »

  • Tips to Protect Against ATM Card Skimming

    Card skimming uses an electronic device to record account data encoded on the magnetic stripe on a credit or debit card. Learn how to protect yourself from skimming. »

  • How to Convert a Physical PC into a Virtual One

    Learn not only how to turn a physical PC in to a virtual PC, but find out why you would want to make the change. »

  • Network File Recovery: How To 'Undelete' a Delete

    When you delete files from shares on your network they really vanish. Unlike local files, they are permanently deleted instead of being sent to the recycle bin where you can recover them if needed. Obviously, this may become a huge problem if you accidentally delete an important document. »

  • Networking With the Windows 7 Beta

    Windows 7 makes finding and connecting to wireless networks easier. You can configure a WLAN connection while you perform the initial setup procedure. »

  • What is Open Source Software?

    We discuss open source software, the basics behind the Open Source Initiative (OSI), and Free Software Licensing. »

  • The Difference Between Notebook and Desktop Memory

    Before you can upgrade your system memory, you have to first find out what type of memory is supported by your motherboard. »

  • How to Network Your Files With NFS

    Network File System (NFS), is the original file-sharing method among UNIX-based computers. Originally developed by Sun, NFS is still widely used. »

  • Getting Started With Green Computing

    Going green means using the least amount of resources for the greatest gain, and best practices that focus on conservation to reduce a company's carbon footprint. »

  • How Wireless Networks Work

    A wireless network or Wireless Local Area Network (WLAN) serves the same purpose as a wired one — to link a group of computers. »

  • Understanding Software Development Lifecycle

    For programmers, the software development life cycle (SDLC) is an organization's standards surrounding the creation and maintenance of applications. »

  • How to Defrag a Hard Drive

    Disk Defragmenter locates fragments of files stored on a disk and copies them to a single file at a point on the disk that has enough free space. »

  • Data Backup Basics for Business

    What is backup, data backup, data storage, incremental, differentia, data, recovery, software, flash drive, optical media, »

  • What is Enterprise Search?

    While the name is a bit misleading, enterprise search systems are used by small and mid-size businesses as well as enterprises. Enterprise search systems typically do not search the public Internet, but rather only what is contained within the firewall on the organization's own private corporate network. »

  • Different Types of Memory Cards

    Memory cards are used for storage, but there are different kinds and types of memory cards. Confused? Webopedia has you covered with all the different types and formats of memory cards, their sizes, prices, and more. »

  • Understanding LAMP and Its Effect on Web Development

    If you're at all familiar with open source software, chances are you've heard the phrase "LAMP stack" before. But do you know what LAMP actually is? »

  • What is Metadata? Data About Data

    While it does serve a very important role in computing, you do need to remember that metadata can disclose information about you and your business. »

  • Storage Virtualization: Myths, Realities and Other Considerations

    The fundamental idea behind virtualization is to abstract, emulate and facilitate aggregation among different capabilities. »

  • The Differences Between WEP and WPA

    WPA has been a mainstream technology for years now, but WEP remains a standard feature on virtually every wireless router on store shelves today. »

  • Understanding SAS, SATA, SCSI and ATA

    This guide is designed to help you understand the differences between parallel and serial interfaces, including SCSI, ATA, SAS and SATA. »

  • Understanding Hardware-Assisted Virtualization

    Virtualization solutions enable you to run multiple VMs (virtual machines) by using a single physical system to create multiple virtual systems. »

  • 2007 Technology Trends

    Our Top 10 Tech Terms list represents some technologies that could be the best to hit mainstream in 2006 while others represent new technologies sure to make even more headlines in 2007. »

  • Understanding IPv6

    We're going to spend time teaching you a number of wonderful things about IPv6, such as why network administrators need to get their duffs up and implement it. »

  • All About Network Access Controls

    If you're planning to implement a network access control system (NAC) to ensure only authorized users can access corporate resources, you're in good company. »

  • Understanding NAT and PAT

    Due in large part to alleged NAT support on consumer devices, many people are confused about what NAT, or Network Address Translation, really is. »

  • iSCSI vs. Fibre Channel

    Vendors have been touting the benefits of iSCSI. Since becoming an official standard in 2003, the technology has yet to dominate the storage industry. »

  • Understanding Rootkits

    A rootkit is a tool, or (more commonly) a collection of tools, that an attacker can install on a compromised computer. »

  • The Benefits of Tiered Storage

    Organizations can take full advantage of storage resource management tools to determine the value of their data and establish an ideal storage medium. »

  • Understanding OSPF Routing

    Open Shortest Path First is a link-state interior gateway protocol. It is often used when people discover that RIP isn��t going to work for a large network. »

  • Virtual Tape Library (VTL) Explained

    Virtual tape is a concept that has been in the data center for many years. It was originally introduced for IBM mainframes. »

  • Perpendicular Hard Drive Recording Technology

    In perpendicular recording, data bits are aligned vertically (not horizontally) - or perpendicular to the disk, allowing room for more data. »

  • Guide to Understanding TCP, the Protocol

    A gentle introduction to help you understand the basics of TCP, the protocol. »

  • New Technology Trends: Top 10 to Know for the New Year

    Technology trends (like everything else) often come and go with the changing tides. Here are the top technology terms for 2005. »

  • How Biometrics Security Works

    Today, the world of enterprise security is increasingly incorporating biometric identifiers as an additional weapon within the security arsenal. »

  • What is the Best Network Operating System?

    A network administrator can effectively operate using various tools available on several platforms, including Windows, OS X, Linux, and FreeBSD. »

  • History of OFDMA and How it Works

    Most of the action takes place at the Media Access Control (MAC) layer (layer 2) and the Physical (PHY) layer (layer 1 or the Air Interface). »

  • How Surround Sound Works

    Consumers demand realistic entertainment and surround sound plays a big part in delivering an engaging experience. Learn how surround sound works in this Webopedia guide. »

  • What is HDTV?

    While many use the terms Digital Television (DTV) and High-definition Television (HDTV) interchangeably, they are, in fact, two very different things. »

  • Deciphering Wireless Acronyms

    Stumped by acronyms such as WPA2 and WMM? You're not alone. We define these new terms and explain why you should care about them. »

  • Understanding Web Services

    Web service describes a standardized way of integrating Web applications using tXML, SOAP, WSDL and UDDI standards over an Internet protocol backbone. »

  • Common Audio Formats

    The audio codec is actually a computer program that compresses or decompresses digital audio data according to the audio file format specifications. »

  • What Is CPU Overclocking?

    Overclocking is a performance boost technique without purchasing any additional hardware by running a microprocessor at a faster clock speed. »

  • What Is USB?

    USB is supported at the operating system level. Compared to alternative ports such as parallel or serial, USB is very user-friendly. »

  • Intrusion Detection (IDS) and Prevention (IPS) Systems

    Intrusion detection systems (IDS) are designed to monitor inbound and outbound network activity to identify suspicious patterns that indicate network attacks. »

  • All About Adobe PDF

    PDF is a file format developed by Adobe Systems and is evolving technology often used by graphic artists, designers and publishers. »

  • All About RFID

    Short for radio frequency identification, RFID is a dedicated short range communication (DSRC) technology. »

  • Understanding The Data Link Layer

    Understanding The Data Link Layer. What's more important than IP and routing? Layer 2, the Data Link layer, is where Ethernet lives. »

  • The OSI Reference Model - Understanding Layers

    The OSI Reference Model: it is time to take a trip up the OSI Reference Model, and learn what this mysterious thing is all about. »

  • How Fingerprint Scanners Work

    Biometric fingerprint readers, or scanners, are the most popular and most common form of biometric security devices used. »

  • What Is 64-bit Computing?

    64-bit refers to a processor with registers that store 64-bit numbers. A generalization suggests that 64-bit doubles the data a 32-bit CPU can process. »

  • The Science of Color

    An overview of primary colors, the absence of color, and the additive and subtractive color systems. »

  • Is It Possible to Eavesdrop on Electromagnetic Radiation?

    Since World War II scientists have known that EMR leaked from devices can be intercepted and with the proper equipment, reconstructed on different devices. »

  • Static Electricity and Computers

    When internal workings of a computer are exposed it is possible to damage the computer with static electricity held by the human body. »

Facts about Cloud Computing in 2017

The following facts and statistics capture the changing landscape of cloud computing and how service providers and customers are keeping up with... Read More »

Facts about Computer Science: Education and Jobs

The following computer science facts and statistics provide a quick introduction to the changing trends in education and related careers. Read More »

Texting & Chat Abbreviations

From A3 to ZZZ this guide lists 1,500 text message and online chat abbreviations to help you translate and understand today's texting lingo. Read More »

The Five Generations of Computers

Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »

Computer Architecture Study Guide

Computer architecture provides an introduction to system design basics for most computer science students. Read More »

Network Fundamentals Study Guide

Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »