| |
This blog provides an architectural view of IT including concepts, first principles and strategy.
| |
25 Types Of Master Data
posted by John Spacey, this month
A list of criteria for deciding if something is master data or not.
|
| |
SLA vs OLA
posted by John Spacey, this month
The difference between a SLA and a OLA.
|
| |
IT vs ICT
posted by John Spacey, this month
The difference between IT and ICT.
|
| |
Systems vs Software
posted by John Spacey, this month
The difference between systems and software.
|
| |
Algorithms vs Code
posted by John Spacey, last month
The difference between algorithms and code.
|
| |
SLA vs SLO
posted by John Spacey, last month
The difference between Service Level Agreements and Service Level Objectives.
|
| |
16 Examples of SLAs
posted by John Spacey, last month
A definition of service level agreement with a few examples.
|
| |
What is Overfitting?
posted by John Spacey, last month
An overview of overfitting, a common data analysis mistake.
|
| |
What is a Rainbow Table?
posted by John Spacey, last month
A definition of rainbow tables, a type of information security threat.
|
| |
What is a Blockhead?
posted by John Spacey, last month
An artificial type of artificial intelligence.
|
| |
What is a Sandbox?
posted by John Spacey, a few months ago
An overview of sandboxes. An information security technique.
|
| |
Front End vs Back End
posted by John Spacey, a few months ago
The difference between a front end and a back end.
|
| |
Encryption vs Hashing
posted by John Spacey, a few months ago
The difference between encryption and hashing.
|
| |
What is Peer-to-peer?
posted by John Spacey, a few months ago
A definition of peer-to-peer with a technical overview and example.
|
| |
What is Authentication?
posted by John Spacey, a few months ago
A definition of authentication with a few examples.
|
| |
What is Need To Know?
posted by John Spacey, a few months ago
Overview of need to know, an information security technique.
|
| |
What is a Buffer?
posted by John Spacey, a few months ago
A definition of buffer with a few examples.
|
| |
IoT vs Control
posted by John Spacey, a few months ago
The internet of things and control.
|
| |
What is an Animated Gif?
posted by John Spacey, a few months ago
Everything you ever wanted to know about animated GIFs but were afraid to ask.
|
| |
7 Examples of Delete
posted by John Spacey, a few months ago
The definition of delete with examples.
|
| |
Algorithms Guide
posted by John Spacey, a few months ago
A few types of algorithms.
|
|
|