Browse Definitions By Topic
- AppDev
- Business software
- Computer Science
- Consumer Tech
- Data Center
- IT Management
- Networking
- Security
- Storage and Data Mgmt
AppDev
Definitions about software applications and development including operating system vocabulary, programming terminology, words about Internet applications and terms used in app/dev.
- Agile, Scrum, XP
- Apple
- DevOps
- Internet applications
- Java
- Linux
- Microsoft
- Open source
- Operating systems
- Programming
- Software applications
- Software development
- Web services, SOA
Recently Published Definitions
- CALMS
CALMS is a conceptual framework for the integration of development and operations (DevOps) teams, functions and systems within an organization.
- Firebase Cloud Messaging (FCM)
Firebase Cloud Messaging (FCM), formerly called Google Cloud Messaging (GCM), is a free cloud service from Google that allows app developers to send ...
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.
Recently Published Definitions
- Google Assistant
Google Assistant is Google’s voice assistant AI for Android devices. It provides a virtual personal assistant experience through a natural language ...
- trademark
A trademark is a logo, image, symbol, word(s), letter(s) or color(s) that is used and sometimes legally registered as a representation of a company.
Computer Science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.
- Computing fundamentals
- Electronics
- Fast references
- IT standards and organizations
- Learning guides
- Mathematics
- Microprocessors
- Nanotechnology
- Podcasts
- Protocols
- Quizzes
- Robotics
- Video Production
Recently Published Definitions
- ping strangeness
Ping strangeness is a term used in troubleshooting to describe the incidence of an unusual pattern of ICMP ECHO_REQUEST packets being sent to a ...
- corollary
A corollary is a statement that follows naturally from some other statement that has either been proven or is generally accepted as true.
Consumer Tech
Definitions about consumer technology including Internet acronyms, tech lingo, multimedia definitions, words about personal computing and peripherals as well as terms used in wireless and mobile computing.
- Desktop PCs
- Internet acronyms and lingo
- Internet technologies
- Multimedia and graphics
- Peripherals
- Personal computing
- Printers
- Wireless and mobile
Recently Published Definitions
- Godwin's law
Godwin's law, also known as Godwin's rule of Hitler analogies, is a statement maintaining that if any online discussion continues long enough, ...
- internet meme
An Internet meme is a cultural artifact that spreads rapidly, reaching a very large digital audience within a short period of time. Because internet ...
Data Center
Definitions used in data center management, including hardware, virtualization and cloud computing.
- Cloud computing
- Converged infrastructure
- Data center management
- Disaster recovery
- Hardware
- IT Operations
- Storage hardware
- Virtualization
Recently Published Definitions
- industrial control system (ICS)
An industrial control system (ICS) is integrated hardware and software designed to monitor and control the operation of machinery and associated ...
- dongle
A dongle (pronounced DONG-uhl) is a mechanism for ensuring that only authorized users can copy or use specific software applications, especially very...
IT Management
Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.
- Business and ERP
- Business software
- Compliance
- CRM
- Government IT
- Healthcare IT
- HR management
- IT Procurement
- Network administration
- Project management
- Security management
- SEO
- Software management
- Storage management
Recently Published Definitions
- operating model
An operating model is a visual representation of how an organization delivers value to its internal and external customers.
- dark post
A dark post is an inexpensive sponsored message on a social media website that is not published to the sponsor page timeline and will not display in ...
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.
- Circuit switched services equipment and providers
- Data transmission
- Email and messaging
- High-speed networks
- Internet of Things
- Local area networks (LANs)
- Network hardware
- Network software
- Networking and communications
- Routing and switching
- Smart grid
- Telecom
- Voice over IP (VoIP)
- Wireless LANs
- Wireless technologies
Recently Published Definitions
- IoT analytics (Internet of Things analytics)
IoT analytics is the application of data analysis tools and procedures to realize value from the huge volumes of data generated by connected Internet...
- proximity marketing (hyperlocal marketing)
Proximity marketing, sometimes referred to as hyperlocal marketing, is the wireless delivery of promotional material to mobile users in a specific ...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.
- Application security
- Authentication
- Malware
- Network security
- Security threats and countermeasures
- Spyware
Recently Published Definitions
- air gapping
Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection.
- weaponized information
Weaponized information is a message or content piece that is designed to affect the recipient's perception about something or someone in a way that ...
Storage and Data Mgmt
Definitions about storage and data management including backup/recovery vocabulary, business intelligence terminology, storage area networks and database management.
- Backup and recovery
- Business intelligence - business analytics
- Content management
- Customer data management
- Data and data management
- Data deduplication
- Database
- Network-attached storage (NAS)
- Solid state storage
- Storage-area network (SAN)
Recently Published Definitions
- metadata management
Metadata management is the oversight of data associated with data assets to ensure that information can be integrated, accessed, shared, linked, ...
- GDPR
General Data Protection Regulation (GDPR) is legislation that will update and unify data privacy laws across in the European Union. GDPR was approved...
Word of the Day
Newest and Updated Terms
Know-IT-All
-
Data infrastructure, digital disruption shape new paths
In the face of burgeoning digital disruption, startups and established companies alike are responding with changes to their big data architectures and data engineering processes.
-
Think customer love, not digital transformation
The tech industry's chatter about digital transformation and disruption are scare tactics that shouldn't distract companies from making purchases based on a customer-focused strategy.
Buzzword Alert
disruptive innovation
Disruptive innovation is the introduction of new technologies, products or services in an effort to promote change and gain advantage over the competition. In this context, the word disruptive does not mean to interrupt or cause disorder -- it means to replace.
Read MoreQuiz Yourself
Also called continuous improvement, this is best known for being used in lean manufacturing and lean programming.- A. What is kanban?
- B. What is kaizen?
Buyer Guides
Researching a new purchase? Our TechTarget Buyer's Guides will help you select the right product to fit the needs of your company. View guides by topic.
Essential Knowledge
Gartner Symposium 2017: Zen and the art of digital business
Companies doing digital projects aren't yet digital businesses, Gartner analysts warn. Deep thought may help. Also: Russia's NSA exploit; Facebook to...
A CTO offers advice on managing acquisition risks
An ambitious project to modernize legacy software has added IT prowess and is driving innovation. One unforeseen consequence? Acquisitions are up, ...
GE digital thread now runs through a 'hub' customer database
GE has rolled out the first phase of digital transformation for its sales function, creating a central customer database and devising governance ...
How GE digital transformation won over the sales force
A major part of the GE digital transformation is getting its 25,000 salespeople on board as it rethinks its vast commercial sales function.
-
Healthcare
Healthcare IT Purchasing Intentions Survey Report
What technology investments are healthcare organizations prioritizing? Get all the details inside.
Download Now -
Security
Getting Your CISSP Certification
This is your introduction to the 10 CISSP domains of ISC2’s Common Body of Knowledge.
Free Download -
Networking
Network Evolution E-Zine: Mobile & Multicloud
How do mobile devices effect enterprise network design? Plus, a Q&A about Adobe’s multicloud strategy to connect to AWS and Azure.
Read Now -
360 Guide
Why the future of IT jobs may give techies a pass
The rise of smart, flexible technology is enabling people without traditional tech backgrounds to fill what once were IT-exclusive positions. How safe is your job?
Learn More
SearchCompliance
-
internal audit (IA)
An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...
-
pure risk (absolute risk)
Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...
SearchSecurity
-
computer exploit
A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...
-
cyberwarfare
Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...
SearchHealthIT
-
precision medicine (PM)
Precision medicine (PM) is a rapidly evolving development in healthcare in which physicians and other caregivers consider ...
-
genomics
Genomics is the study of human genes and chromosomes.
SearchDisasterRecovery
-
business continuity and disaster recovery (BCDR)
Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...
-
business continuity plan (BCP)
A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...
SearchStorage
-
DIMM (dual in-line memory module)
A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.
-
nearline storage
Nearline storage is the on-site storage of data on removable media.
SearchSolidStateStorage
-
3D XPoint
3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.
-
RRAM or ReRAM (resistive RAM)
RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...
SearchCloudStorage
-
Google Cloud Storage
Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.
-
RESTful API
A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...
