Smart Person's Guides

These primers are your one-stop-shop to learn about the most important topics in enterprise tech.

 

Articles about Smart Person's Guides

  • Google Fiber: The smart person's guide

    This comprehensive guide covers the history behind Google's work as an ISP, what Google Fiber offers consumers and businesses, and what it could mean for competitors, such as AT&T.

    Conner Forrest · May 26, 2017, 1:21 PM PST

  • Google Home: The smart person's guide

    Have you been trying to decide between one of several smart home hubs on the market? Let our comprehensive guide to Google Home simplify your choice.

    Brandon Vigliarolo · May 26, 2017, 7:08 AM PST

  • Windows 10: The smart person's guide

    This comprehensive guide covers must-know Windows 10 details, like features, system requirements, upgrade options, and Microsoft's Windows-as-a-service strategy.

    Bill Detwiler · May 25, 2017, 3:46 AM PST

  • VMware vSphere: The smart person's guide

    VMware vSphere is the dominant data center virtualization platform. This smart person's guide provides an introduction to what you need to know about vSphere.

    Keith Townsend · May 22, 2017, 7:11 PM PST

  • Android Nougat: The smart person's guide

    Learn what features and security enhancements Android Nougat has to offer, and why it's important, in this resource guide about the seventh iteration of the Android platform.

    Jack Wallen · May 22, 2017, 4:00 AM PST

  • Free Newsletters, In your Inbox

  • Predictive analytics: The smart person's guide

    IBM Watson is the most well-known example of predictive analytics in use. If your company wants to benefit from predictive analytics, here's what you need to know.

    Mary Shacklett · May 19, 2017, 12:50 PM PST

  • NIST Cybersecurity Framework: The smart person's guide

    President Trump's cybersecurity order made the National Institute of Standards and Technology's framework federal policy. Here's what you need to know about the NIST's Cybersecurity Framework.

    Brandon Vigliarolo · May 19, 2017, 10:06 AM PST

  • Net neutrality: The smart person's guide

    Do internet service providers have a right to throttle certain traffic? That's the question at the heart of net neutrality, and here's everything you need to know about it.

    Brandon Vigliarolo · May 19, 2017, 7:42 AM PST

  • Google Assistant: The smart person's guide

    This comprehensive guide covers the history behind Google's AI-powered Google Assistant, its features, and what it means for the future of Google's business.

    Conner Forrest · May 18, 2017, 5:19 AM PST

  • ​macOS Sierra: The smart person's guide

    This in-depth look at macOS Sierra covers new and exciting features, enhanced integration with iOS, requirements for installation, and how to get the most out of Apple's desktop OS.

    Jesus Vigo · May 17, 2017, 3:47 PM PST

  • Ransomware: The smart person's guide

    This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack.

    James Sanders · May 16, 2017, 3:53 AM PST

  • Hyperconverged infrastructure: The smart person's guide

    This comprehensive guide covers hyperconverged infrastructure, a new strategy for allocating computing and storage resources in data centers.

    James Sanders · May 11, 2017, 10:46 AM PST

  • Kubernetes: The smart person's guide

    Kubernetes is a series of open source projects for automating the deployment, scaling, and management of containerized applications. Find out why the ecosystem matters, how to use it, and more.

    Jack Wallen · May 10, 2017, 1:30 AM PST

  • GitHub: The smart person's guide

    GitHub is a code housing platform that allows developers to store their projects and network with peers. This resource about GitHub covers why the platform matters, how developers use it, and more.

    Jack Wallen · May 8, 2017, 2:00 PM PST

  • Zero day exploits: The smart person's guide

    This guide covers everything you need to know about zero day security exploits, which are secret vulnerabilities used by hackers to infiltrate PCs, networks, mobile phones, and IoT devices.

    Dan Patterson · May 8, 2017, 10:04 AM PST