Q&A with our Tech Experts

No stupid questions here. Techopedia staff has answered many commonly asked technology questions and also assembled a number of experts who will answer your questions in basically any area of IT.

Featured Tech Experts

Marty Puranik

CEO and President of Atlantic.Net

Marty Puranik co-founded Atlantic.Net from his dorm room at the University of Florida in 1994. As CEO and President of Atlantic.Net, one of the first Internet Service Providers in America, Marty grew the company from a small ISP to a large regional player in the region, while observing America's regulatory environment limit competition and increase prices on consumers. To keep pace with a changing industry, over the years he has led Atlantic.Net through the acquisition of 16 Internet companies, tripling the company's revenues and establishing customer relationships in more than 100 countries. Providing cutting-edge cloud hosting before the mainstream did, Atlantic.Net has expanded to eight data centers in three countries.

Nigel Willis

Group CTO, EMEA Region at Ericom

Nigel Willis is Ericom’s Group CTO for the EMEA region. He is CCSK-certified by the Cloud Security Alliance.

Jan Youngren

Cybersecurity and Consumer Protection Specialist at VPNpro

Jan Youngren is a cybersecurity and consumer protection specialist at VPNpro focused on investigations that help readers navigate the complex infosecurity sphere. His research and commentary has been featured in Forbes, ComputerWeekly, PC Mag, TechRadar, ZDNet, The Mirror, Entrepreneur, and many other leading publications around the world.

Q&As

0Filter
Loading Questions, please wait...
It's a big question – all over the IT industry, cybersecurity professionals are very much in demand. Companies need help circling the wagons, protecting trade secrets and sensitive data...
There are many ways that companies can use virtual machine use cases to learn more about how virtualization components work in a virtual architecture. Use cases can identify how the virtual machine...
Answered by: Justin Stoltzfus
Contributor, Reviewer
There are a few different reasons why people are talking about the “tipping point” of machine learning and how this type of technology will apply to future applications.First, as the...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Natural language processing (NLP) is one of the latest applications of artificial intelligence (AI). NLP allows computers to process and understand the complexities of human language, and derive...
Answered by: Claudio Buttice
Data Analyst, Contributor
Data analytics is an extremely popular topic in the tech industry, and big data professionals are in high demand. Analytics refers to the software and processes that help businesses to interpret and...
Answered by: Claudio Buttice
Data Analyst, Contributor
IT security is, by nature, an intangible and hard-to-measure objective or service. It can be extremely difficult to accurately evaluate the benefit of security provisions, or to see how well security...
There are a few predominant reasons why experts in cybersecurity will talk about Bitcoin and cryptocurrency mining being linked to various kinds of computing power and energy theft.One of them is the...
Answered by: Justin Stoltzfus
Contributor, Reviewer
A virtual local area network (VLAN) is an abstracted LAN that is created to operate through the data link layer (layer 2) of the OSI network model. Unlike a physical local area network or LAN, in...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Scaling up and scaling out are two IT strategies that both increase the processing power and storage capacity of systems. The difference is in how engineers achieve this type of growth and system...
Answered by: Justin Stoltzfus
Contributor, Reviewer
A: Mobile hotspots and tethering services offer similar results for users, but they work a little bit differently.A mobile hotspot is an offering by various telecom providers to provide localized...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Car manufacturers are realizing there’s extensive untapped revenue to unlock by drawing attention to the passenger — especially when looking to the future as autonomous vehicles advance...
Answered by: Nils Wollny
CEO
In times of uncertainty, companies are under pressure to make the right decisions for their customers quickly and reliably while staying within budget. The complexity and agility of global supply...
Answered by: Jens Beck
Team Manager of Advanced Analytics at Syntax
While hyperautomation is an extremely important term in today's technology conversations, it's also one that is fairly subjective and broad.In general, hyperautomation refers to the move from...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Ideally, only positive impact. If done correctly, peer-to-peer content distribution is invisible to the end user — and only as visible to the administrators as they want it to be. (Also read:...
Answered by: Doug Kennedy
Chief Growth Officer at Adaptiva
The difference between supervised and unsupervised learning is that only one of these processes, supervised learning, takes advantage of labeled data. The other one, unsupervised learning, does not...
Answered by: Justin Stoltzfus
Contributor, Reviewer
A decision scientist is a technology professional who is mainly focused on making technologies work for decision-making processes within an enterprise.However, the term “decision...
Answered by: Justin Stoltzfus
Contributor, Reviewer
The mobile network state is an indicator on smartphones and similar mobile devices that shows whether the device is connected to a telecom carrier’s mobile network.Since these indicators are...
Answered by: Justin Stoltzfus
Contributor, Reviewer
The difference between a composite key, a foreign key and a primary key is a good illustration of the complex and byzantine nature of relational database standards that make database administration...
Answered by: Justin Stoltzfus
Contributor, Reviewer
At first glance, the deployment of data science seems trivial: just run it on the production server! Closer examination reveals that what was built during data science creation is not what is being...
Answered by: Michael Berthold
Founder and CEO of KNIME
Companies may want to start thinking about the benefits of improved employee mobility and employee satisfaction when implementing a Bring Your Own Device (BYOD) policy.The modern workplace is...
Answered by: Anish Patel
Vice President, Emerging Technologies
More
Go back to top