Advertisement · 728 × 90
#
Hashtag
#TechJargon101
Advertisement · 728 × 90
Video

In today's Tech Jargon 101, we take a look at Load Balancer. Load balancers are important components in modern application infrastructure, allowing traffic and workloads to be split evenly between multiple servers and enabling high-availability services.

#TechJargon101

0 0 0 0
Video

In today's Tech Jargon 101, we take a look at Brute Force Attack, when a hacker uses trial & error to iterate over hundreds, thousands or even millions of potential credentials in an attempt to gain access to an app, service or device.

#TechJargon101 #technology #cybersecurity #bruteforceattack

0 0 0 0
Video

In today's Tech Jargon 101, we're taking a look at RAM, how it differs from other kinds of memory, and why its costs are skyrocketing.

#TechJargon101 #technology #ram #hardware #computing #memory

0 1 0 0
Video

In today's Tech Jargon 101, we take a look at Git, the indispensable version control tool that's the underpinning of most modern software development, allowing developers to manage their code and collaborate with other developers.

#TechJargon101 #softwaredevelopment #versioncontrol #git

2 0 0 0
Video

In today's Tech Jargon 101 we're talking about Markdown, the ubiquitous plain text formatting syntax used extensively by AI tools, and thousands of web, mobile and desktop apps.

#TechJargon101 #tech #markdown #ai #syntax #programming

0 0 0 0
Video

Any site or app that accepts user-submitted data, like comments or contact form submissions, could be susceptible to Cross Site Scripting (XSS) attacks used to steal users' data, accounts and worse.

#TechJargon101 #XSS #CrossSiteScripting #cybersecurity

1 0 0 0
Video

Did you know every video, photo and file you share contains hidden information you might not realize you're sharing? Metadata is embedded in every file you create and can lead to unintentionally sharing confidential, sensitive or private information.

#TechJargon101 #Metadata #Files #Cybersecurity

1 0 0 0
Video

JPG is no longer the king of the hill when it comes to images on the web – developed by Google as a more modern file format, WebP offers great image quality and more features, all at a reduced file size.

#TechJargon101 #WebP #ImageFormats #Optimization #WebPerformance

1 0 0 0
Video

We can't rely on tools that only recognize known threats, instead we need to detect & react to suspicious behavior – that's where EDR, or Endpoint Detection & Response comes in, allowing IT teams to protect against even novel cybersecurity threats.

#TechJargon101 #EDR #Networking #Cybersecurity

1 0 0 0
Video

An anchor tag is a great browser feature that enables direct linking to content deep within a webpage, which is especially useful for pages with lots of content. Learn more in today's Tech Jargon 101.

#TechJargon101 #Browsers #WebBrowsers

1 0 0 0
Video

Domain controllers are a central component of corporate networks, being responsible for authentication, authorization, policy enforcement and directory services for all devices and resources. Learn more in today's Tech Jargon 101.
#TechJargon101 #DomainController #Networking #Cybersecurity

0 0 0 0
Video

Most data shared between online services is transmitted in a format called JSON, which is easily readable by both humans & computers. JSON is ubiquitous across the web, allowing easy interoperability between tools and services.
#TechJargon101 #JSON #Data

0 0 0 0
Video

SSL Certificates are like IDs for services on the Internet, helping to ensure your data stays secure when transmitting between devices. Learn more in today's Tech Jargon 101.

#TechJargon101 #SSL #TLS #Internet #Technology

0 0 0 0
Video

DNS Zones are how domains are organized and managed, allowing all the various organizations and administrators the level of control they need, from the root of the domain name system, all the way down to individual domains and subdomains. Learn more in today's Tech Jargon 101.

#TechJargon101 #DNS

0 0 0 0
Video

Nearly every device on a corporate network creates detailed logs with vital information that can be used to detect threats, but that information is much more useful when aggregated with logs & events from all the devices in a network.

#TechJargon101 #SIEM #NetworkSecurity

0 0 0 0
Video

International standards are incredibly important with technology that's developed, manufactured and used across the world, and ISO has published more than 25,000 standards across many industries.

#TechJargon101 #Technology #Standards #Standardization #International #interoperability

1 0 0 0
Video

You're certainly already familiar with the ubiquitous term "Wi-Fi", but did you know it's just a made up marketing term, piggybacking on the familiarity of the longstanding term "Hi-Fi"? Learn more in today's Tech Jargon 101.

#TechJargon101 #Wifi #WirelessNetworking

1 0 0 0
Video

Botnets can take over more than just PCs – they can infect any vulnerable internet-connected device, including printers, cameras, kids toys and more, turning those devices into a tool for cyberattacks.
#TechJargon101 #Botnet #Security #Internet #Cyberattack #IoT

0 0 0 0
Video

Wonder how cybercriminals take down large websites and online services? DDoS attacks are one of the techniques they use – a brute force method to crash sites by flooding them with an overwhelming amount of Internet traffic.

#TechJargon101 #Cyberattack #Cybersecurity #DDoS

1 0 0 0
Video

Computers need a common language to speak to eachother, just like people. Protocols, and the handshake that occurs between systems to determine which to use, set the groundwork for all digital communications.

#TechJargon101 #Networking #DigitalCommunications

0 0 0 0
Video

APIs serve as the connective tissue between applications and services on your devices and on the Internet, and let software developers drastically expand the functionality they can deliver for users.
#TechJargon101 #API #Software #Development #Integration

0 0 0 0
Video

A port in computer networking is like the suite number of a building – it let's you target a specific application running on a computing device just like you'd address a package to a specific business's suite number at its building address.

#TechJargon101 #Networking #ComputerNetworking

0 0 0 0
Video

Want to look like an elite hacker? Start working with the CLI, or command-line interface, and utilize the hidden power of command-line utilities, enabling advanced scripting, automation and remote management capabilities.
#TechJargon101 #CLI #Programming #Scripting #CommandLine #RemoteManagement #IT

0 0 0 0
Video

Hashing in computer science is a tool used to ensure data integrity and enhance security, and can protect against man-in-the-middle attacks, data corruption and keep your computer safe from tampering.

#TechJargon101 #Algorithm #ComputerScience #ComputerSecurity #Cybersecurity

0 0 0 0
Video

"Have you reset the cache?" is almost as frequent a troubleshooting step for IT support technicians as "Have you rebooted the device?" Learn about what a cache is, why it's used and how it can affect your day-to-day computing life.

#TechJargon101 #Internet #Cache #Technology

0 0 0 0
Video

It might have a scary-sounding name, but daemons are just simple background processes that run all the everyday activities needed to keep computing devices running smoothly and the scheduled tasks to trigger automations and workflows.

#TechJargon101 #automation #daemon #scheduledtasks

0 0 0 0
Video

The visual style of every website and web app you visit is controlled by a technology called CSS, or Cascading Style Sheets. Learn more about the ingenious way CSS works and how you can use its cascading behavior to make your website easier to maintain and update.

#TechJargon101 #website #css

0 0 0 0
Video

You can largely thank CDNs for enabling modern services like streaming video, social platforms and media-heavy websites. By placing content close to the users who access it, they allow for faster downloads, less buffering and better performance.

#TechJargon101 #CDN #Internet #Technology #Streaming

0 0 0 0
Video

While you might think Zero Trust is some cultural or societal condition, it's actually an incredibly important model for modern cybersecurity. Learn about why we follow Zero Trust methodologies, and how it can protect your organization.

#TechJargon101 #ZeroTrust #cybersecurity #LeastPrivilege

0 0 0 0
Video

You've almost certainly heard about HTML, but what you might not know what it looks like or how it works. In today's Tech Jargon 101, let's take a closer look at this foundational technology for viewing content on the web.
#TechJargon101 #HTML #Web #Online #Content

0 0 0 0