Browse Definitions :

Expert Advice

Looking for real-world technology advice and education? Hear from industry veterans as they share their own best practices, perspectives and lessons learned across a range of topics.

  • CompTIA troubleshooting steps and solving common computer problems

    This excerpt from 'ITF+ CompTIA IT Fundamentals All-in-One Exam Guide, Second Edition,' published by McGraw-Hill Education, provides a practical framework to follow when troubleshooting is necessary.

  • Responsible AI: Executive QnA

    One of the most important steps in implementing Responsible AI is to become deeply sensitive as to how an organization’s deep learning algorithms will ultimately impact real people downstream.

  • Overcoming the challenges of managing your team remotely

    With a vast majority of office employees forced to work remotely from home due to the global pandemic, managers face a new set of worker productivity issues to solve.

  • Why cloud optimization tools can't replace strategy

    Cloud optimization tools can help companies manage costs on a day-to-day basis, but only clear business goals and governance around cloud resources can guide an organization through times of extreme contingency, such as a shift to fully remote work.

  • How to assess and prioritize insider threat risk

    Dealing with the human element in security is tough, but critical. This primer describes the types of insider threats and how to use a risk matrix to assess and rank them by importance.



  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...



  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...