Browse Definitions By Topic
- AppDev
- Business Software
- Computer Science
- Consumer Tech
- Data Center
- IT Mgmt
- Networking
- Study Resources
- Security
- Storage & Data Mgmt
AppDev
Definitions about software applications and development including operating system vocabulary, programming terminology, words about Internet applications and app/dev definitions.
- Agile, Scrum, XP
- Apple
- Internet applications
- Java
- Linux
- Microsoft
- Open source
- Operating systems
- Programming
- Software applications
- Software development
- Web services, SOA
Recently Published Definitions
- building information modeling (BIM)
Building information modeling (BIM) is traditional architectural computer aided design (CAD) with 3D modeling that also incorporates best practice ...
- interrupt
An interrupt is a signal from a device attached to a computer or from a program within the computer that causes the main program that operates the ...
Business Software
These glossaries contain terms related to the development, implementation and management of enterprise business software.
Recently Published Definitions
- GWX (Get Windows 10)
GWX (get Windows 10) is a Windows upgrade app that was initially installed after Windows update KB3035583; the app has been the subject of consumer ...
- Apache Storm
Storm is a free and open source (FOSS) distributed real-time computation system developed by the Apache Foundation.
Computer Science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and electronics definitions.
- Computing fundamentals
- Electronics
- IT standards and organizations
- Mathematics
- Microprocessors
- Nanotechnology
- Protocols
- Robotics
Recently Published Definitions
- pounds per square inch (PSI)
PSI is commonly used to measure the pressure of gasses (pneumatic pressure) or liquids (hydraulic pressure). PSI is also used as a measure of tensile...
- hydraulics
Hydraulics is mechanical function that operates through the force of liquid pressure.
Consumer Tech
Definitions about consumer technology including Internet acronyms, tech lingo, multimedia definitions, words about personal computing and peripherals as well as wireless and mobile definitions.
- Desktop PCs
- Internet acronyms and lingo
- Internet technologies
- Multimedia and graphics
- Peripherals
- Personal computing
- Printers
- Wireless and mobile
Recently Published Definitions
- mobile number privacy
Mobile number privacy is the protection of the phone user’s number from unwanted access.
- omnidirectional antenna
An omnidirectional antenna is a wireless transmitting or receiving antenna that radiates or intercepts radio-frequency (RF) electromagnetic fields ...
Data Center
Definitions about data centers including hardware, virtualization and cloud computing.
- Cloud computing
- Converged infrastructure
- Data center management
- Disaster recovery
- Hardware
- IT Operations
- Storage hardware
- Virtualization
Recently Published Definitions
- VUCA (volatility, uncertainty, complexity and ambiguity)
VUCA is an acronym that stands for volatility, uncertainty, complexity and ambiguity, a combination of qualities that, taken together, characterize ...
- motherboard
A motherboard is the main printed circuit board (PCB) in a computer. The motherboard is a computer’s central communications backbone connectivity ...
IT Mgmt
Definitions about information technology management including compliance vocabulary, business terminology, words about security, storage, network and software management and search engine optimization (SEO).
- Business software
- Business terms
- Compliance
- Customer relationship management
- Government IT
- Healthcare IT
- IT Procurement
- Network administration
- Project management
- Search engine optimization (SEO)
- Security management
- Software management
- Storage management
Recently Published Definitions
- demand generation (demand gen)
Demand generation (demand gen) is an umbrella term for customer acquisition initiatives that are designed to drive awareness and interest about a ...
- purchase intent
Purchase intent is the probability that a consumer will buy a product or service.
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology, words about email and messaging, mobile and wireless.
- Circuit switched services equipment and providers
- Data transmission
- Email and messaging
- High-speed networks
- Internet of Things
- Local area networks (LANs)
- Network hardware
- Network software
- Networking and communications
- Routing and switching
- Smart grid
- Telecom
- Voice over IP (VoIP)
- Wireless LANs
- Wireless technologies
Recently Published Definitions
- acoustical mesh network
An acoustical mesh network is a decentralized communication system that transmits data by using sound to connect computers. There are both legitimate...
- smart hard hat
A smart hard hat is personal protective equipment (PPE) designed to enhance worker performance and safety in construction and related industries ...
Study Resources
Learning and research resources including learning guides, cheat sheets, quizzes, quick look-ups and fast references.
- Cheat sheets
- Fast references
- Learning guides
- Podcasting Glossary
- Quick Start Glossaries
- Quizzes
- Video Production Glossary
Recently Published Definitions
- Trick or Treat Halloween Quiz
This WhatIs.com Learn IT quiz will test your knowledge about tech terms that you might find on your doorstep or in your trick-or-treat bag Halloween ...
- Quick Start Glossary: Hybrid cloud
A handy printable glossary of hybrid cloud vocabulary. Online, the terms are linked to our full definitions and more related resources.
Security
Definitions about security including malware vocabulary, security threats and countermeasures terminology, words about viruses and Trojans, access control, authorization and authentication.
- Application security
- Authentication
- Malware
- Network security
- Security threats and countermeasures
- Spyware
Recently Published Definitions
- business email compromise (BEC, man-in-the-email attack)
A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity to ...
- doxing
Doxing is the act of gathering information about a target individual or organization and making it public. The term is hacker-speak for documenting.
Storage & Data Mgmt
Definitions about storage and data management including backup/recovery vocabulary, business intelligence terminology, storage area networks and database management.
- Backup and recovery
- Business intelligence - business analytics
- Content management
- Customer data management
- Data and data management
- Data deduplication
- Database
- Network-attached storage (NAS)
- Storage-area network (SAN)
Recently Published Definitions
- blockchain
Blockchain is a type of distributed ledger that stores a permanent and tamper-proof record of transaction data. Distributed ledgers can be thought of...
- cognitive computing
Cognitive computing is the simulation of human thought processes in a computerized model. The goal of cognitive computing is to create automated IT ...
Word of the Day
Newest and Updated Terms
Know-IT-All
-
Find room to improve change management procedures
Whether your IT shop rigorously follows a service management framework or takes a laissez-faire approach to changes, these examples help hone change management procedures.
-
Can former IT configurations sabotage deployments?
An IT shop experiences performance issues in a long-running deployment that's been operational through many changes. The culprit is probably a build-up of IT configuration artifacts.
Buzzword Alert
feature creep
Feature creep (sometimes known as requirements creep or scope creep) is a tendency for product or project requirements to increase during development beyond those originally foreseen, leading to features that weren't originally planned and resulting risk to product quality or schedule.
Read MoreQuiz Yourself
As change is constant, you should have a process for ______ improvement of your controls and compliance efforts.- A. continual
- B. continuous
Technology Buyer's Guide
Be sure and check out our Technology Guide and see our top picks for laptops, tablets, smartphones, cameras and apps!
Essential Knowledge
Real-life change management examples prove it's harder than it looks
Whether your IT shop rigorously follows a service management framework or takes a laissez-faire approach to changes, these examples help hone change ...
Look inside an advanced Puppet tutorial
Are you using Puppet to its full potential? This chapter excerpt on Puppet automation can help sys admins get the most out of the management tool ...
Cloud, DevOps tips for an IT organization to reach its full potential
IT teams everywhere are locking in budgets, laying plans for the new year, brewing strong pots of coffee and setting these 10 ideas into motion.
-
Storage
Five strategies for using flash in your next project
Learn how to deploy flash technology to deliver the right data, at the right time, at the right cost to fit your needs.
Visit Now -
Improve Business Agility
The benefits of a converged infrastructure
Learn how organizations are able to leverage a converged infrastructure and service automation.
Visit Today -
IT Knowledge Exchange
Have a question for an expert?
Ask a question, answer a question. Join our expert community and get help from your peers.
Visit Now
SearchCompliance
-
cyborg anthropologist
A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...
-
RegTech
RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...
SearchSecurity
-
application whitelisting
Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...
-
security
Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...
SearchHealthIT
-
HIPAA Privacy Rule
The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...
-
HIPAA business associate agreement (BAA)
Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...
SearchDisasterRecovery
-
data recovery
Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...
-
disaster recovery plan (DRP)
A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...
SearchStorage
-
data deduplication
Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...
-
byte
In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...
SearchSolidStateStorage
-
flash file system
Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...
-
IOPS (input/output operations per second)
IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...
SearchCloudStorage
-
RESTful API
A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...
-
cloud storage infrastructure
Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...
