Tech Terms Every Tech User Must Know



Similar documents
Things You Need To Know About DDoS Attacks

Open source code and open specifications

Tips for Successful ERP Data Migration

Technical Understanding

data center provider in India

Cloud Computing and Big Data That s Why! Ray Walshe 14 th March 2013

Storage Networking Overview

Online Backup Solution with Disaster Recovery

Read On To Find Out The Must-have Security Features For The Next-gen Cloud:

Data Security. So many businesses leave their data exposed, That doesn t mean you have to Computerbilities, Inc.

Doing Multidisciplinary Research in Data Science

SIPCOM Insight Guide. Keeping your workforce connected through the Cloud

MozyPro Online Backup. Overview and Sales Best Practices

CIS 4930/6930 Spring 2014 Introduction to Data Science Data Intensive Computing. University of Florida, CISE Department Prof.

Introduction to the Mathematics of Big Data. Philippe B. Laval

WHAT IS BIG DATA? David Bechtold

Chapter 12 - Software. Unit 1 Role and function of application software

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

VIRTUALIZATION: THE PUBLIC KNOWLEDGE GAP

The Mysterious Cloud What s In It For Propane? Aaron Cargas acargas@cargas.com CargasEnergy.com Booth: 1339

White Paper - Crypto Virus. A guide to protecting your IT

DATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.

Our Business Continuity Solutions Ensure Long-Term Success

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Botnets: The dark side of cloud computing

The Big Deal about Big Data. Mike Skinner, CPA CISA CITP HORNE LLP

Roger s Cyber Security and Compliance Mini-Guide

The HP IT Transformation Story

Finally, An Easy Way To Never Have To Deal with Computer Problems Again!

TIME S UP 35. Industry 41 Employment & Workplace 49 Taxation 58. Business Backgrounder

Internet threats: steps to security for your small business

Security Consultant Scenario INFO Term Project. Brad S. Brady. Drexel University

Data Backup: Developing an Effective Data Retention Policy. By Global Data Vault

Colocation, Hybrid Cloud & Infrastructure As A Service

Cloud beyond the obvious, an approach for innovation

Is the Cloud right for you? Yes, yes it is.

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

CyberSecurity & Keeping your data safe. October 20, 2015

How cloud computing can transform your business landscape

ZNetLive Malware Monitoring

Cybercrime Prevention and Awareness

Leveraging Data Management to Empower Patients

Introduction to Predictive Analytics. Dr. Ronen Meiri

What You Should Know About Cloud- Based Data Backup

Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary

MEDITECH Disaster Recovery

A G U I D E T O C O - L O C A T I O N

CAP4773/CIS6930 Projects in Data Science, Fall 2014 [Review] Overview of Data Science

EMC Accelerating move to. Brendan Crossey

Frequently Asked Questions about Cloud and Online Backup

Disaster Recovery Plan and Backup Strategy for a website

WHITE PAPER SPON. A Cloud-Client Architecture Provides Increased Security at Lower Cost. Published January 2012 SPONSORED BY

A Future Without Secrets. A NetPay Whitepaper. more for your money

Emerging Trends in Malware - Antivirus and Beyond

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

BIG DATA: ARE YOU READY? Andy Kyiet Demand Flow Intelligence May, 2013

Computer Security, Maintenance and Backup

IBM Information Infrastructure

SCHEDULE 25. Business Continuity

HOW BUSINESSES CAN USE CLOUD COMPUTING TO OPTIMISE THEIR IT INFRASTRUCTURE

What happens when Big Data and Master Data come together?

Could a data breach cause your business to fail?

EXECUTIVE REPORT. Big Data and the 3 V s: Volume, Variety and Velocity

HOSTING SERVICES AGREEMENT

Antivirus Best Practices

The 7 Disaster Planning Essentials

White Paper. Managed IT Services as a Business Solution

The Essential Guide for Protecting Your Legal Practice From IT Downtime

BIG DATA & SOCIAL INNOVATION KENNETH THOMAS, CLIENT MANAGER

E-Business, E-Commerce

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

DISCOVERING ediscovery

The Cloud Hosting Revolution: Learn How to Cut Costs and Eliminate Downtime with GlowHost's Cloud Hosting Services

CHILL IT SUPPORTING YOUR BUSINESS INFORMATION TECHNOLOGY FOR YOUR BUSINESS

CSC590: Selected Topics BIG DATA & DATA MINING. Lecture 2 Feb 12, 2014 Dr. Esam A. Alwagait

RAIDERS OF THE LOST FILE SHARES: DEFENDING ENTERPRISE DATA AGAINST DESTRUCTIVE MALWARE

Microsoft Office 365 for Small Businesses (Plan P1) Top 10 Benefits

Bruce Allison. Steve Moran

5 Simple Ways To Avoid Getting An Avalanche of Spam

DPS HOSTED SOLUTIONS

Countermeasures against Spyware

Open an attachment and bring down your network?

Whitepaper. Keeping Your Firm Online When Disaster Strikes

The Consumer Is Not a Moron, She s An Individual

CLOUD COMPUTING: WHAT YOU SHOULD KNOW

Increased MSME and Global Entrepreneurship Due to Cloud Computing

Are Mailboxes Enough?

The BiGuard SSL VPN Appliances

Now, Next and the Future: IT, Big Data and other Implications for RIM. Presented by Michael S. Smith /

IBM and VERITAS Practical disaster recovery

Backup & Disaster Recovery Options

Planning a Backup Strategy

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

About CII Innovation Awards:

Information Services. Protecting information. It s everyone s responsibility

Age of Big data. Presented by: Mohammad Iqbal BCM -2014

Service Availability Metrics

Barracuda Backup Server. Introduction

Transcription:

Tech Terms Every Tech User Must Know Words like data centers, cloud, computer, smartphones, and laptops were at some stage unknown to many, but now these have become standard. In the current scenario, many new tech words have come in that are funny, thoughtful and bizarre. Take for examples words like hot spot, cookies, Bluetooth, spam, virus, etc. How virus became a part of technical world? It is a term used to describe infection caused to human body that leads to sickness. But eventually, it was associated with technology that defines virus as a piece of code that enters within a computer system to steal, corrupt or damage data. Several such odd words exist within the technical domain. Besides, more words are buzzing and this piece will put down some latest words that entered the tech dictionary. 1. Gigaflop Gigaflop is per unit computing speed that is equivalent to one billion floating-point operations per second. It is used to determine processor speed and in what approach computers can manage exhaustive data operations. 2. Brick Brick is defined as breaking a device until it stops functioning completely, especially smartphone. To keep it simple, it is anything you do that can turn your device lifeless and nothing can bring it back to life. No wonder how hard you try to restore the device, it can t be repaired. Thus, the effect is as strong as using a house brick and that s how it got the name. 3. Disruptive Technology Disruptive technology has nothing to do with causing trouble. It is referred to the technology that transforms the conventional approaches of performing tasks or changes the features of products

and services, with an objective to bring improvements in the marketplace. Few examples are cloud solutions, big data, mobile devices, social networking, etc. 4. Dark Data Sounds like it deals with something creepy. As though some data that lies hidden far from anyone s reach in the chamber. But it is nothing like that. Consulting and market research company Gartner Inc. describes dark data as "information assets that organizations collect, process and store in the course of their regular business activity, but generally fail to use for other purposes." Any data within organization that is not analyzed, used, or processed is dark data. It mainly occurs because it is difficult to scrutinize. But it eats up too much space and thus, needs clean up. 5. Deep Web Any information on the web that inaccessible and intentionally or unintentionally hidden from the search engine bots. Data is usually kept hidden from the online world to protect it from invaders. On the other hand, dark web lies inside the deep web, which is smaller than deep web but potentially dangerous. Dark web is where illegal business is executed and is a place for criminal activists. 6. Yottabyte Yottabyte is a quadrillion gigabyte and comes after Zettabyte. For better understanding, Yottabyte is followed by Zettabyte, Exabyte, Petabyte and Terabyte. The fact is no system has yet even reached one Yottabyte. Besides, even all the hard drives combined in the world don t make the gigantic amount. Based on researches, the entire world s computer systems contained nearly 160 Exabyte, which is 1 billion GB. Presently, only the social media giants Facebook, Twitter and Google, deals with Yottabyte. Did you even know these terms exist? For more information contact: Web Werks is an India-based CMMI Level 3 Web Hosting company with 5 carrier neutral data centers in India and USA. Started in 1996, Web Werks has served several Fortune 500 companies with successful projects in the areas of Web Hosting, Data Center Services, Dedicated Servers, Colocation servers, Disaster Recovery Services, VPS Hosting Services, and Cloud Hosting. Web Werks India Pvt. Ltd. +91 8828335555 www.webwerks.in