Q&A with our Tech Experts

No stupid questions here. Techopedia staff has answered many commonly asked technology questions and also assembled a number of experts who will answer your questions in basically any area of IT.

Featured Tech Experts

Nick L. Kael

Chief Technology Officer (CTO) at Ericom Software

Nick L. Kael is Chief Technology Officer (CTO) at Ericom Software. He has over 24 years experience in the technology industry, including 17 in cybersecurity. He is knowledgeable in areas including web technologies, architecture, infrastructure, networking and development environments.

Vinnie Dessecker

 

Vinnie Dessecker is a senior consultant for big data within Teradata’s Strategy and Governance Center of Excellence. Her work aligns business and technical goals for data and information initiatives, including master data management, metadata management, data quality, content/document management, and the analytic roadmap and business intelligence ecosystems.

Dr. Tehseen Zia

Assistant Professor at Comsats University Islamabad

Dr. Tehseen Zia has Doctorate and more than 10 years of post-Doctorate research experience in Artificial Intelligence (AI). He is assistant professor and leads AI research at Comsats University Islamabad, and co-principle investigator in National Center of Artificial Intelligence Pakistan. In the past, he has worked as research consultant on European Union funded AI project Dream4cars.

Q&As

0Filter
Loading Questions, please wait...
When people use machine learning without investing enough time in planning, it’s no surprise that the results will be inferior.Project managers and other stakeholders who fall into this...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Artificial Intelligence (AI) and fake news seem to be inescapably linked together. On one hand, critics of the newest technologies claim that AI and automation processes have been instrumental in...
Answered by: Claudio Buttice
Data Analyst, Contributor
The idea that “technology” may cause addiction and brain damage is likely nothing but a vastly exaggerated misconception. Although it’s not exactly a “myth” since the...
Answered by: Claudio Buttice
Data Analyst, Contributor
As one of the top tools for machine learning (ML), Google's TensorFlow open-source resource pack for neural networks and machine learning projects has a lot of practical applications in this...
As one of the most fundamental questions in the technology world, this one is a little tough to answer. The long and short of it is that self-driving cars, or autonomous cars, could be safer than...
Professionals involved in working on artificial intelligence (AI) technologies have been making a lot of money for a while. The reasons for the current explosion in the salaries of these tech-savvy...
Answered by: Justin Stoltzfus
Contributor, Reviewer
It's a big question – all over the IT industry, cybersecurity professionals are very much in demand. Companies need help circling the wagons, protecting trade secrets and sensitive data...
There are many ways that companies can use virtual machine use cases to learn more about how virtualization components work in a virtual architecture. Use cases can identify how the virtual machine...
Answered by: Justin Stoltzfus
Contributor, Reviewer
There are a few different reasons why people are talking about the “tipping point” of machine learning and how this type of technology will apply to future applications.First, as the...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Natural language processing (NLP) is one of the latest applications of artificial intelligence (AI). NLP allows computers to process and understand the complexities of human language, and derive...
Answered by: Claudio Buttice
Data Analyst, Contributor
Data analytics is an extremely popular topic in the tech industry, and big data professionals are in high demand. Analytics refers to the software and processes that help businesses to interpret and...
Answered by: Claudio Buttice
Data Analyst, Contributor
IT security is, by nature, an intangible and hard-to-measure objective or service. It can be extremely difficult to accurately evaluate the benefit of security provisions, or to see how well security...
There are a few predominant reasons why experts in cybersecurity will talk about Bitcoin and cryptocurrency mining being linked to various kinds of computing power and energy theft.One of them is the...
Answered by: Justin Stoltzfus
Contributor, Reviewer
A virtual local area network (VLAN) is an abstracted LAN that is created to operate through the data link layer (layer 2) of the OSI network model. Unlike a physical local area network or LAN, in...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Scaling up and scaling out are two IT strategies that both increase the processing power and storage capacity of systems. The difference is in how engineers achieve this type of growth and system...
Answered by: Justin Stoltzfus
Contributor, Reviewer
A: Mobile hotspots and tethering services offer similar results for users, but they work a little bit differently.A mobile hotspot is an offering by various telecom providers to provide localized...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Car manufacturers are realizing there’s extensive untapped revenue to unlock by drawing attention to the passenger — especially when looking to the future as autonomous vehicles advance...
Answered by: Nils Wollny
CEO
In times of uncertainty, companies are under pressure to make the right decisions for their customers quickly and reliably while staying within budget. The complexity and agility of global supply...
Answered by: Jens Beck
Team Manager of Advanced Analytics at Syntax
While hyperautomation is an extremely important term in today's technology conversations, it's also one that is fairly subjective and broad.In general, hyperautomation refers to the move from...
Answered by: Justin Stoltzfus
Contributor, Reviewer
Ideally, only positive impact. If done correctly, peer-to-peer content distribution is invisible to the end user — and only as visible to the administrators as they want it to be. (Also read:...
Answered by: Doug Kennedy
Chief Growth Officer at Adaptiva
More
Go back to top