Home / Articles written by Shelby Hiter
Articles by

Shelby Hiter

Shelby Hiter is a writer with more than five years of experience in writing and editing, focusing on healthcare, technology, data, enterprise IT, and technology marketing. She currently writes for four different digital publications in the technology industry: Datamation, Enterprise Networking Planet, CIO Insight, and Webopedia. When she’s not writing, Shelby loves finding group trivia events with friends, cross stitching decorations for her home, reading too many novels, and turning her puppy into a social media influencer.

Shelby Hiter

Private 5G Network

A private 5G network is a private local area network (LAN) that utilizes 5G cellular technologies and edge device connections...

Rich Communication Services (RCS)

Rich communication services (RCS) is a mobile messaging approach in which session initiation protocol (SIP) and hypertext transfer protocol (HTTP)...

NetOps

NetOps, or network operations, is a network management strategy for automating and optimizing processes across nearly any network type in...

Agile Coach

An agile coach is someone trained in technical or procedural change management who helps to set up agile teams during...

Unified Endpoint Management (UEM)

As enterprise networks become increasingly distributed with growing numbers of remote workers, unified endpoint management (UEM) has become an important...

Blockchain as a Service (BaaS)

Blockchain as a service (BaaS) is a service model provided by third-party vendors to help companies optimize existing blockchain technologies...

Adversarial Machine Learning

Adversarial machine learning (ML) involves the disruption of machine learning practices, which can stall business processes or even cause serious...

What is the Gramm-Leach-Bliley Act (GLBA)?

The Gramm-Leach-Bliley Act (GLBA), passed in 1999, outlines regulations related to financial data protection that must be followed by financial...

Data Discovery

Data discovery is the process of bringing together disparate datasets and creating new threads of meaning with the data. As...

End-to-End Encryption

End-to-end encryption (E2EE) involves encrypting data and information between sending and receiving devices, so no other interceptors without the correct...

6G

6G is the acting name that refers to what will be the sixth generation of cellular technology. Current 6G theoretical...

Quantitative Data

Quantitative data is any set of numerical data, typically used for mathematics or statistics, that can be analyzed and measured...
  • 1
  • 2