Browse Definitions By Topic
- AppDev
- Business software
- Computer Science
- Consumer Tech
- Data Center
- IT Management
- Networking
- Security
- Storage and Data Mgmt
AppDev
Definitions about software applications and development including operating system vocabulary, programming terminology, words about Internet applications and terms used in app/dev.
- Agile, Scrum, XP
- Apple
- DevOps
- Internet applications
- Java
- Linux
- Microsoft
- Open source
- Operating systems
- Programming
- Software applications
- Software development
- Web services, SOA
Recently Published Definitions
- CALMS
CALMS is a conceptual framework for the integration of development and operations (DevOps) teams, functions and systems within an organization.
- Firebase Cloud Messaging (FCM)
Firebase Cloud Messaging (FCM), formerly called Google Cloud Messaging (GCM), is a free cloud service from Google that allows app developers to send ...
Business software
Search or browse for definitions related to the procurement, implementation and management of line of business software applications that are vital to running an enterprise.
Recently Published Definitions
- Google Assistant
Google Assistant is Google’s voice assistant AI for Android devices. It provides a virtual personal assistant experience through a natural language ...
- trademark
A trademark is a logo, image, symbol, word(s), letter(s) or color(s) that is used and sometimes legally registered as a representation of a company.
Computer Science
Definitions about computer science including computing fundamentals vocabulary, protocol and standards terminology, words about microprocessors and terms used in electronics.
- Computing fundamentals
- Electronics
- Fast references
- IT standards and organizations
- Learning guides
- Mathematics
- Microprocessors
- Nanotechnology
- Podcasts
- Protocols
- Quizzes
- Robotics
- Video Production
Recently Published Definitions
- ping strangeness
Ping strangeness is a term used in troubleshooting to describe the incidence of an unusual pattern of ICMP ECHO_REQUEST packets being sent to a ...
- corollary
A corollary is a statement that follows naturally from some other statement that has either been proven or is generally accepted as true.
Consumer Tech
Definitions about consumer technology including Internet acronyms, tech lingo, multimedia definitions, words about personal computing and peripherals as well as terms used in wireless and mobile computing.
- Desktop PCs
- Internet acronyms and lingo
- Internet technologies
- Multimedia and graphics
- Peripherals
- Personal computing
- Printers
- Wireless and mobile
Recently Published Definitions
- Godwin's law
Godwin's law, also known as Godwin's rule of Hitler analogies, is a statement maintaining that if any online discussion continues long enough, ...
- internet meme
An Internet meme is a cultural artifact that spreads rapidly, reaching a very large digital audience within a short period of time. Because internet ...
Data Center
Definitions used in data center management, including hardware, virtualization and cloud computing.
- Cloud computing
- Converged infrastructure
- Data center management
- Disaster recovery
- Hardware
- IT Operations
- Storage hardware
- Virtualization
Recently Published Definitions
- industrial control system (ICS)
An industrial control system (ICS) is integrated hardware and software designed to monitor and control the operation of machinery and associated ...
- dongle
A dongle (pronounced DONG-uhl) is a mechanism for ensuring that only authorized users can copy or use specific software applications, especially very...
IT Management
Search or browse for definitions about information technology (IT) management. Many of our definitions are hosted on technology-specific websites to help you quickly learn about each definition's business and tech context.
- Business and ERP
- Business software
- Compliance
- CRM
- Government IT
- Healthcare IT
- HR management
- IT Procurement
- Network administration
- Project management
- Security management
- SEO
- Software management
- Storage management
Recently Published Definitions
- dark post
A dark post is an inexpensive sponsored message on a social media website that is not published to the sponsor page timeline and will not display in ...
- digital currency
A digital currency is a medium of exchange that is generated, stored and transferred electronically.
Networking
Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.
- Circuit switched services equipment and providers
- Data transmission
- Email and messaging
- High-speed networks
- Internet of Things
- Local area networks (LANs)
- Network hardware
- Network software
- Networking and communications
- Routing and switching
- Smart grid
- Telecom
- Voice over IP (VoIP)
- Wireless LANs
- Wireless technologies
Recently Published Definitions
- IoT analytics (Internet of Things analytics)
IoT analytics is the application of data analysis tools and procedures to realize value from the huge volumes of data generated by connected Internet...
- proximity marketing (hyperlocal marketing)
Proximity marketing, sometimes referred to as hyperlocal marketing, is the wireless delivery of promotional material to mobile users in a specific ...
Security
This cyber security glossary explains the meaning of terms about different types of computer security threats as well as words about application security, access control, network intrusion detection, security awareness training and computer forensics.
- Application security
- Authentication
- Malware
- Network security
- Security threats and countermeasures
- Spyware
Recently Published Definitions
- air gapping
Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection.
- weaponized information
Weaponized information is a message or content piece that is designed to affect the recipient's perception about something or someone in a way that ...
Storage and Data Mgmt
Definitions about storage and data management including backup/recovery vocabulary, business intelligence terminology, storage area networks and database management.
- Backup and recovery
- Business intelligence - business analytics
- Content management
- Customer data management
- Data and data management
- Data deduplication
- Database
- Network-attached storage (NAS)
- Solid state storage
- Storage-area network (SAN)
Recently Published Definitions
- metadata management
Metadata management is the oversight of data associated with data assets to ensure that information can be integrated, accessed, shared, linked, ...
- GDPR
General Data Protection Regulation (GDPR) is legislation that will update and unify data privacy laws across in the European Union. GDPR was approved...
Word of the Day
Newest and Updated Terms
Know-IT-All
-
Virtual storage area network evolution
Before the virtual storage area network, there were Fibre Channel storage area networks and iSCSI. And, now it seems that an object storage system will better fit the bill.
-
Essential elements for Fibre Channel functionality
Every administrator knows that storage is the key to any successful virtual data center. The real question is what options should IT departments consider when looking for storage hardware?
Buzzword Alert
virtual SAN appliance (VSA)
A virtual SAN appliance (VSA) is a software bundle that allows a storage manager to turn the unused storage capacity in his network's virtual servers into a storage area network (SAN).
Read MoreQuiz Yourself
This provisions storage on an as-needed basis and can save businesses on up-front storage costs.- A. What is thick provisioning?
- B. What is thin provisioning?
Buyer Guides
Researching a new purchase? Our TechTarget Buyer's Guides will help you select the right product to fit the needs of your company. View guides by topic.
Essential Knowledge
Top tips on network virtualization and network function virtualization
Network virtualization and network function virtualization aim to increase security and scalability and reduce the need for dedicated hardware, ...
Network function virtualization needs to evolve to overcome challenges
Although NFV can help organizations be more agile, the technology still has a long way to go before it can meet evolving data center needs. Read this...
VMware positions NSX-T to support non-vSphere environments
As its NSX virtual networking software gains traction on vSphere, VMware puts more muscle behind a version designed for non-vSphere environments.
2017 Impact Awards: Vote for the Best Software-Defined Infrastructure Product
Vote here in the 2017 Impact Awards for the Best Software-Defined Infrastructure Product.
-
Healthcare
Healthcare IT Purchasing Intentions Survey Report
What technology investments are healthcare organizations prioritizing? Get all the details inside.
Download Now -
Security
Getting Your CISSP Certification
This is your introduction to the 10 CISSP domains of ISC2’s Common Body of Knowledge.
Free Download -
Networking
Network Evolution E-Zine: Mobile & Multicloud
How do mobile devices effect enterprise network design? Plus, a Q&A about Adobe’s multicloud strategy to connect to AWS and Azure.
Read Now -
360 Guide
Why the future of IT jobs may give techies a pass
The rise of smart, flexible technology is enabling people without traditional tech backgrounds to fill what once were IT-exclusive positions. How safe is your job?
Learn More
SearchCompliance
-
internal audit (IA)
An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...
-
pure risk (absolute risk)
Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...
SearchSecurity
-
computer exploit
A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...
-
cyberwarfare
Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...
SearchHealthIT
-
precision medicine (PM)
Precision medicine (PM) is a rapidly evolving development in healthcare in which physicians and other caregivers consider ...
-
genomics
Genomics is the study of human genes and chromosomes.
SearchDisasterRecovery
-
business continuity and disaster recovery (BCDR)
Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...
-
business continuity plan (BCP)
A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...
SearchStorage
-
DIMM (dual in-line memory module)
A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.
-
nearline storage
Nearline storage is the on-site storage of data on removable media.
SearchSolidStateStorage
-
3D XPoint
3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.
-
RRAM or ReRAM (resistive RAM)
RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...
SearchCloudStorage
-
Google Cloud Storage
Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.
-
RESTful API
A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...
