A-Z Popular Blog Encyclopedia Search »
Business Guide
 Advertisements
Design

Creativity

What People Are Reading Now

The 100 most recent posts or updates on Simplicable.

8 Examples of Middleware

8 Examples of Middleware

posted by John Spacey, this month
A definition of middleware with examples.
11 Examples of a Runtime Error

11 Examples of a Runtime Error

posted by John Spacey, a few months ago
The definition of runtime error with examples.
40 Examples of the Communications Industry

40 Examples of the Communications Industry

posted by John Spacey, a few months ago
The definition of the communications industry with examples.
40 Examples of Information Systems

40 Examples of Information Systems

posted by John Spacey, a few months ago
A list of common types of information system.
21 Examples of a Computer Program

21 Examples of a Computer Program

posted by John Spacey, a few months ago
The definition of computer program with examples.
100 Types of Technology Platform

100 Types of Technology Platform

posted by John Spacey, a few months ago
The definition of technology platform with examples.
9 Examples of Data Processing

9 Examples of Data Processing

posted by John Spacey, a few months ago
A definition of data processing with examples.
37 Examples of IT Goals

37 Examples of IT Goals

posted by John Spacey, a few months ago
A list of common IT goals with examples.
7 Examples of Software Components

7 Examples of Software Components

posted by John Spacey, a few months ago
A definition of software component with examples.
100 Types of Information Technology Services

100 Types of Information Technology Services

posted by John Spacey, a few months ago
The definition of information technology service with examples.
4 Examples of System Architecture

4 Examples of System Architecture

posted by John Spacey, a few months ago
Examples of system architecture diagrams.
SLA vs OLA

SLA vs OLA

posted by John Spacey, a few months ago
The difference between a SLA and a OLA.
What is Session Management?

What is Session Management?

posted by John Spacey, a few months ago
An overview of session management.
Data Virtualization vs Data Federation

Data Virtualization vs Data Federation

posted by John Spacey, a few months ago
The difference between data virtualization and data federation.
What is Data Authentication?

What is Data Authentication?

posted by John Spacey, a few months ago
A definition of data authentication with an example.
12 Types of Cryptographic Key

12 Types of Cryptographic Key

posted by John Spacey, a few months ago
Definitions of common types of cryptographic key.
25 Types Of Master Data

25 Types Of Master Data

posted by John Spacey, a few months ago
A list of criteria for deciding if something is master data or not.
Data Security vs Information Security

Data Security vs Information Security

posted by John Spacey, a few months ago
The difference between data security and information security.
40 Examples of Security Controls

40 Examples of Security Controls

posted by John Spacey, a few months ago
Examples of IT security controls.
What is a Brute Force Algorithm?

What is a Brute Force Algorithm?

posted by John Spacey, a few months ago
Brute force computing techniques explained.
7 Examples of a Random Seed

7 Examples of a Random Seed

posted by John Spacey, a few months ago
The definition of random seed with examples.
60 Examples of Unstructured Data

60 Examples of Unstructured Data

posted by John Spacey, a few months ago
A definition of unstructured data with examples.
What is a Data Massage?

What is a Data Massage?

posted by John Spacey, a few months ago
The mysteries of data massage.
IT vs ICT

IT vs ICT

posted by John Spacey, a few months ago
The difference between IT and ICT.
44 Examples of Computing Platforms

44 Examples of Computing Platforms

posted by John Spacey, a few months ago
A list of the basic types of computing platform.
Systems vs Software

Systems vs Software

posted by John Spacey, a few months ago
The difference between systems and software.
Security Event vs Security Incident

Security Event vs Security Incident

posted by John Spacey, a few months ago
The difference between a information security event and an incident.
What is a Data Entity?

What is a Data Entity?

posted by John Spacey, a few months ago
A definition of data entity with a few examples.
11 Examples of Non-repudiation

11 Examples of Non-repudiation

posted by John Spacey, a few months ago
A definition of non-repudiation with several common examples.
Algorithms vs Code

Algorithms vs Code

posted by John Spacey, a few months ago
The difference between algorithms and code.
Data Science vs Information Science

Data Science vs Information Science

posted by John Spacey, a few months ago
The difference between data science and information science.
Cryptography: Salt vs Pepper

Cryptography: Salt vs Pepper

posted by John Spacey, a few months ago
The difference between cryptographic salt and pepper.
11 Examples of a Configuration Item

11 Examples of a Configuration Item

posted by John Spacey, a few months ago
A definition of configuration item with several examples.
Reference Data vs Master Data

Reference Data vs Master Data

posted by John Spacey, a few months ago
The difference between reference data and master data.
SLA vs SLO

SLA vs SLO

posted by John Spacey, a few months ago
The difference between Service Level Agreements and Service Level Objectives.
19 Types of Data Quality

19 Types of Data Quality

posted by John Spacey, a few months ago
An overview of data quality criteria.
6 Examples of an Extranet

6 Examples of an Extranet

posted by John Spacey, a few months ago
A definition of extranet with several examples.
16 Examples of SLAs

16 Examples of SLAs

posted by John Spacey, a few months ago
A definition of service level agreement with a few examples.
Data Custodian vs Data Steward

Data Custodian vs Data Steward

posted by John Spacey, a few months ago
The difference between data custodian and data steward.
52 Examples of IT Quality

52 Examples of IT Quality

posted by John Spacey, a few months ago
An overview of IT quality with examples.
7 Definitions of Computer

7 Definitions of Computer

posted by John Spacey, a few months ago
A few definitions of computer.
Thin Client vs Thick Client

Thin Client vs Thick Client

posted by John Spacey, a few months ago
The difference between thin clients and thick clients.
What is Embrace, Extend And Extinguish?

What is Embrace, Extend And Extinguish?

posted by John Spacey, a few months ago
An overview of embrace, extend and extinguish.
11 Examples of a Bot

11 Examples of a Bot

posted by John Spacey, a few months ago
Bots explained.
When Artificial Intelligence Fails

When Artificial Intelligence Fails

posted by John Spacey, a few months ago
How artificial intelligence can be illogical.
What is an AI Box?

What is an AI Box?

posted by John Spacey, a few months ago
An overview of AI boxes.
What is Human + AI?

What is Human + AI?

posted by John Spacey, a few months ago
An overview of Human + AI.
7 Definitions of Data

7 Definitions of Data

posted by John Spacey, a few months ago
Several useful definitions of data.
6 Types of Password Fatigue

6 Types of Password Fatigue

posted by John Spacey, a few months ago
An overview of password fatigue.
What is Everything Is A File?

What is Everything Is A File?

posted by John Spacey, a few months ago
An overview of everything is a file.
Why Enterprise Architecture Is Valuable

Why Enterprise Architecture Is Valuable

posted by John Spacey, a few months ago
A list of common value propositions for enterprise architecture teams.
6 Examples of Caching

6 Examples of Caching

posted by John Spacey, a few months ago
A few examples of caching.
What is Overfitting?

What is Overfitting?

posted by John Spacey, a few months ago
An overview of overfitting, a common data analysis mistake.
What is Shotgun Debugging?

What is Shotgun Debugging?

posted by John Spacey, a few months ago
An overview of shotgun debugging.
What are Greedy Algorithms?

What are Greedy Algorithms?

posted by John Spacey, a few months ago
An overview of greedy algorithms.
What is an Internet Backbone?

What is an Internet Backbone?

posted by John Spacey, a few months ago
An overview of internet backbones.
What is a Rainbow Table?

What is a Rainbow Table?

posted by John Spacey, a few months ago
A definition of rainbow tables, a type of information security threat.
What is Data Virtualization?

What is Data Virtualization?

posted by John Spacey, a few months ago
An overview of data virtualization.
What is a Blockhead?

What is a Blockhead?

posted by John Spacey, a few months ago
An artificial type of artificial intelligence.
What is Change Request Cycle Time?

What is Change Request Cycle Time?

posted by John Spacey, a few months ago
An overview of change request cycle time.
What is Password Entropy?

What is Password Entropy?

posted by John Spacey, a few months ago
An overview of password entropy.
What is Artificial Knowledge?

What is Artificial Knowledge?

posted by John Spacey, a few months ago
An overview of artificial knowledge.
What is a Security Code Review?

What is a Security Code Review?

posted by John Spacey, a few months ago
An overview of security code review processes.
What is a Data Room?

What is a Data Room?

posted by John Spacey, a few months ago
An overview of data rooms.
Human Error vs Security Vulnerability

Human Error vs Security Vulnerability

posted by John Spacey, a few months ago
Why human error isn't a security vulnerability.
What is Security as a Service?

What is Security as a Service?

posted by John Spacey, a few months ago
An overview of security as a service.
What is Replay Value?

What is Replay Value?

posted by John Spacey, a few months ago
An overview of replay value.
What is an Internet Exchange Point?

What is an Internet Exchange Point?

posted by John Spacey, a few months ago
An overview of internet exchange point.
5 Examples of Autoscaling

5 Examples of Autoscaling

posted by John Spacey, a few months ago
A definition of cloud autoscaling with several examples.
What is Darwin Among The Machines?

What is Darwin Among The Machines?

posted by John Spacey, a few months ago
A prediction about artificial intelligence from the year 1863.
What is a Sandbox?

What is a Sandbox?

posted by John Spacey, a few months ago
An overview of sandboxes. An information security technique.
8 Examples of Net Neutrality

8 Examples of Net Neutrality

posted by John Spacey, a few months ago
A definition of net neutrality.
4 Examples of IoT Security

4 Examples of IoT Security

posted by John Spacey, a few months ago
The unique problem of security the internet of things.
Front End vs Back End

Front End vs Back End

posted by John Spacey, a few months ago
The difference between a front end and a back end.
What is Data Integration?

What is Data Integration?

posted by John Spacey, a few months ago
An overview of data integration.
Encryption vs Hashing

Encryption vs Hashing

posted by John Spacey, a few months ago
The difference between encryption and hashing.
What is Referential Integrity?

What is Referential Integrity?

posted by John Spacey, a few months ago
An overview of referential integrity with an example.
What is Peer-to-peer?

What is Peer-to-peer?

posted by John Spacey, a few months ago
A definition of peer-to-peer with a technical overview and example.
What is Need To Know?

What is Need To Know?

posted by John Spacey, a few months ago
Overview of need to know, an information security technique.
What is Telemetry?

What is Telemetry?

posted by John Spacey, a few months ago
The definition of telemetry.
What is the Answer to the Ultimate Question of Life, the Universe, and Everything?

What is the Answer to the Ultimate Question of Life, the Universe, and Everything?

posted by John Spacey, a few months ago
An overview of a well known parody of computing.
What is Authentication?

What is Authentication?

posted by John Spacey, a few months ago
A definition of authentication with a few examples.
What is Telecommand?

What is Telecommand?

posted by John Spacey, a few months ago
An overview of telecommand.
What is Service Management?

What is Service Management?

posted by John Spacey, a few months ago
A definition of service management.
What is Strong Authentication?

What is Strong Authentication?

posted by John Spacey, a few months ago
An overview of strong authentication.
What is a Pixel?

What is a Pixel?

posted by John Spacey, a few months ago
An overview of pixels.
What is a Buffer?

What is a Buffer?

posted by John Spacey, a few months ago
A definition of buffer with a few examples.
What are Reluctant Algorithms?

What are Reluctant Algorithms?

posted by John Spacey, a few months ago
Algorithms that solve problems as slowly as possible.
10 Examples of a Session

10 Examples of a Session

posted by John Spacey, a few months ago
A definition and overview of sessions.
What is Data Transformation?

What is Data Transformation?

posted by John Spacey, a few months ago
A definition of data transformation with a few examples.
What is a Network?

What is a Network?

posted by John Spacey, a few months ago
A definition of network.
What is a Unique Constraint?

What is a Unique Constraint?

posted by John Spacey, a few months ago
A definition of unique constraint and comparison to primary key.
Information Systems vs Information Technology

Information Systems vs Information Technology

posted by John Spacey, a few months ago
Differences between a Information Systems and Information Technology department.
4 Examples of Null Pointer Exceptions

4 Examples of Null Pointer Exceptions

posted by John Spacey, a few months ago
How to prevent, troubleshoot and handle null pointer exceptions.
IoT vs Control

IoT vs Control

posted by John Spacey, a few months ago
The internet of things and control.
What is Telecommunications?

What is Telecommunications?

posted by John Spacey, a few months ago
A definition of telecommunications with a list of common products.
What is Infrastructure as a Service?

What is Infrastructure as a Service?

posted by John Spacey, a few months ago
The definition of infrastructure as a service with comparisons.
What is an Animated Gif?

What is an Animated Gif?

posted by John Spacey, a few months ago
Everything you ever wanted to know about animated GIFs but were afraid to ask.
7 Examples of Delete

7 Examples of Delete

posted by John Spacey, a few months ago
The definition of delete with examples.
3 Examples of an Endpoints

3 Examples of an Endpoints

posted by John Spacey, a few months ago
The three common types of computing endpoint.

more organized view »