Articles by

Vangie Beal

Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Vangie Beal

Project Management Software

Project management software is a business application designed to assist project managers and their teams organize the step-by-step process of...

Project Management

Project management starts with a detailed work plan that includes step-by-step processes designed to meet specific targeted goals during the...

Knowledge Worker

A knowledge worker is the phrase used to describe an employee tasked with collecting, preparing, processing and also distributing the...

Deep Learning

Deep learning is a subset of machine learning that processes data and creates patterns for use in decision making. Deep...

helium hard disk drive (HDD)

A helium drive is a high capacity hard disk drive (HDD) that is helium-filled. This hard drive technology replaces the...

Full Stack Developer

In technology development, full stack refers to an entire computer system or application from the front end to the back...

Disruptive Innovation (Disruptive Technology)

Disruptive innovation is a term used to describe a product or service that starts out small or simple and moves...

DisplayPort (DP)

DisplayPort (DP) is an audio/video (A/V) display interface used to connect a video source to a display device. For example,...

BEC – business email compromise

Business email compromise (BEC) is a type of corporate financial scam that specifically targets organizations conducting business abroad. This scam...

Facts about IT and Coding Boot Camps

The following coding and IT boot camp facts and statistics provide an introduction to the changing trends in education and...

Certified Information Systems Auditor (CISA)

The Information Systems Audit and Control Association (ISACA) issues certification to the people responsible for ensuring that the IT and...

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) is a professional designation to describe hackers that perform legitimate services for organizations and IT companies....