Find a Tech Definition
Browse By Topic
-
Application Development
- Agile, Scrum, XP
- Apple
- Internet applications
- Linux
- Open source
- Operating systems
- Programming
- Software applications
- Software development
- Web services, SOA
- Windows
Recently Published
- Apache Lucene - Apache Lucene is a freely available information retrieval software library that works with fields...
- Microsoft FIM (Microsoft Forefront Identity Manager) - Microsoft Forefront Identity Manager (FIM) is a self-service identity management software suite.
- Opscode Chef - Chef is an open-source systems management and cloud infrastructure automation framework created b...
-
Computer Science
- Computing fundamentals
- Electronics
- IT standards and organizations
- Mathematics
- Microprocessors
- Nanotechnology
- Protocols
- Robotics
Recently Published
- computer forensics (cyber forensics) - Computer forensics is the application of investigation and analysis techniques to gather and pres...
- polynomial interpolation - Polynomial interpolation is a method of estimating values between known data points. When graphic...
- NAND flash memory - NAND flash memory is a type of non-volatile storage technology that does not require power to ret...
-
Consumer Technology
- Desktop PCs
- Internet acronyms and lingo
- Internet technologies
- Multimedia and graphics
- Peripherals
- Personal computing
- Printers
- Wireless and mobile
Recently Published
- Apple Authorized Service Provider (Apple ASP) - An Apple Authorized Service Provider (Apple ASP) is an individual or organization that can legall...
- reverse image search - Reverse image search is a technology that takes an image file as a search engine input query and ...
- SoMoClo (social, mobile and cloud) - SoMoClo (social, mobile and cloud) is the convergence of collaborative, on-the-go technologies th...
-
Data Center
Recently Published
- ambient air cooling - Ambient air cooling is the use of naturally cool air surrounding a building, such as a data cente...
- computer forensics (cyber forensics) - Computer forensics is the application of investigation and analysis techniques to gather and pres...
- managed hosting - Managed hosting is an IT operations model in which a service provider leases dedicated servers an...
-
IT Management
- Business software
- Business terms
- Call centers
- Compliance
- Government IT
- Healthcare IT
- Network administration
- Project management
- Search engine optimization (SEO)
- Security management
- Software management
- Storage management
Recently Published
- authorized service provider (ASP) - An authorized service provider (ASP) is an individual or an organization that is permitted to ser...
- hosted services - Hosted services are outsourced information technology (IT) systems and functions. A hosted servic...
- managed hosting - Managed hosting is an IT operations model in which a service provider leases dedicated servers an...
-
Learning Tools
Recently Published
- Khan Academy - The Khan Academy is a non-profit educational organization that provides free video tutorials and ...
- Agile glossary: Words-2-Go - This Agile glossary provides brief definitions of important terms and concepts in Agile and Scrum...
- PCI DSS Requirements Fast Guide - A chart that lists the 6 control objectives and 12 requirements that make up the Payment Card Ind...
-
Networking
- Circuit switched services equipment and providers
- Data transmission
- Email and messaging
- High-speed networks
- Local area networks (LANs)
- Network hardware
- Network software
- Networking and communications
- Routing and switching
- Smart grid
- Telecom
- Voice over IP (VoIP)
- Wireless LANs
- Wireless technologies
Recently Published
- Microsoft FIM (Microsoft Forefront Identity Manager) - Microsoft Forefront Identity Manager (FIM) is a self-service identity management software suite.
- Microsoft Connectivity Analyzer (MCA) - The Microsoft Connectivity Analyzer (MCA) is a tool that lets admins and users alike run connecti...
- Microsoft Exchange 2013 Managed Store - The Microsoft Exchange 2013 Managed Store is a mechanism used in Exchange Server 2013 to isolate ...
-
Security
- Application security
- Authentication
- Malware
- Network security
- Security threats and countermeasures
- Spyware
Recently Published
- DCPromo (Domain Controller Promoter) - DCPromo (Domain Controller Promoter) is a tool in Active Directory that installs and removes Acti...
- virtual patching - Virtual patching is the quick development and short-term implementation of a security policy mean...
- mobile app security - Mobile app security is the extent of protection that mobile device application programs (apps) ha...
-
Storage and Data Management
- Backup and recovery
- Business intelligence - business analytics
- Content management
- Customer data management
- Data and data management
- Data deduplication
- Database
- Network-attached storage (NAS)
- Storage-area network (SAN)
Recently Published
- data hygiene - Data hygiene is the collective processes conducted to ensure the cleanliness of data. Data is con...
- Amazon RedShift - Amazon RedShift is a fully managed petabyte-scale data warehouse service. RedShift is designed fo...
- Amazon Dynamo Database (DDB) - Amazon Dynamo Database (DDB) is a fully-managed NoSQL database service. Dynamo Database is known ...
cloud broker
A cloud broker is a third-party individual or business that acts as an intermediary between the purchaser of a cloud computing service and the sellers of that service. More
Quote of the Day

"As cloud literacy increases, customers may not value the 'middleman' cloud broker role." -- Tom Nolle
-
Test Yourself
___________ is/are data that describes other data.
a. tags
b. metadata
c. attributes
Answer -
Buzzword Alert
object storage
Watch a short, animated explanation of this trending buzzword.
-
Know-IT-All
Object storage services lessen burden of 'big data'
With cloud object storage services, providers can help enterprises efficiently store and analyst 'big data' in the cloud.
Object storage draws praise, objections
SNW verdict on object storage: it doesn't have to be difficult to implement, but when is it necessary?
-
Hottest Terms
Essential Knowledge on Storage
NTP Software taps into cloud for secure file management
NTP Software branches into secure file management, but says its Universal File Access technology isn't a sync-and-share service.
-
Independent report
Technology Priorities for 2013
Where are IT organisations spending their precious IT funds in 2013? Find out which priorities have increased in importance and which ones have fallen behind.
-
Storage
Five Strategies for Using Flash in Your Next Storage Project
Learn how to deploy flash technology to deliver the right data, at the right time, at the right cost to fit your needs.
Visit now -
Improve business agility
The benefits of a converged infrastructure
Learn how organizations are able to leverage a converged infrastructure and service automation to decrease the testing window, accelerate system refreshes and enable the rapid deployment of new environments.
Visit Today



