A citizen journalist is an amateur journalist who usually publishes online by using a blog or community Web site.
- An internet meme is a cultural phenomenon that spreads from one person to another online, usually in the form of a video or an image with a brief message. (WhatIs.com)
- Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters. In leet speak, characters and combinations of characters are often chosen to resem... (WhatIs.com)
- E-procurement is the business-to-business purchase and sale of supplies and services over the Internet. (SearchCIO.com)
- Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.
- This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...
Social media analytics is the practice of gathering data from blogs and social media websites and analyzing that data to make business decisions. The...
ADP Mobile Solutions allows employees to use their mobile devices to access records such as their pay, schedules, time cards, retirement funds, benefits, contacts and calendar.
Monster Worldwide is an online recruiting company that connects applicants with employers. The company is noted for its flagship site, Monster.com.
Zugata is a continuous performance management tool that allows co-workers to provide feedback on each other's work.
Linux Containers is a project created to provide a distro- and vendor-neutral environment for the development of Linux container technologies.
Zero touch provisioning (ZTP) is a switch feature that allows the devices to be provisioned and configured automatically, eliminating most of the manual labor involved with adding them to a network.
The agile test automation pyramid is a graphical strategy guide for implementing automated software testing. The model splits types of testing into three layers based on the return on investment (ROI) offered by automating that particular type.
Physical security is the protection of people and systems from damage or loss due to physical events such as fire, flood, disasters, crimes or accidents.
A buffer overflow occurs when a program attempts to write more data to a fixed length block of memory, or buffer, than the buffer is allocated to hold. Buffer overflow exploits may enable remote execution of malicious code or denial of service attacks.
A private (secret) key is an encryption key whose value should never be made public. The term may refer to the private key of an asymmetric key pair or a key shared by parties who are using symmetric encryption.
Partitioning a hard disk drive is the first step in preparing it for data storage. A disk partition is a carved out logical space used to manage operating systems and files.
Rambus Dynamic Random Access Memory, or RDRAM (Rambus DRAM), is a type of computer device active memory developed and licensed by Rambus Inc.
The SATA storage protocol transmits data in serial fashion between hard drives and computer systems. The nonprofit SATA-IO industry consortium authors the design specification.
Though it's not as big of a primary storage player anymore, tape is often an archiving vehicle. LTO and LTFS tape technologies have improved capacity and access.
Before the popular Linear Tape-Open Consortium came into existence, Quantum had its proprietary digital linear tape (DLT) format. Learn more about DLT technology here.
Defining what backup is, and the tools and policies to manage it in organizations, comprise a key foundational principle for IT administrators.
An edge router (also called access router) is a network device located at the boundary of a network that connects to external networks, wide area networks (WANs) and the internet.
The domain name system (DNS) maps internet domain names to the internet protocol network addresses they represent and allows websites to use names, rather than difficult-to-remember IP addresses.
PPP (Point-to-Point Protocol) is a standard used to establish a direct connection between two network nodes that enables the transport of multiprotocol data.
Remote Desktop Session Host (RDSH) is a role in Remote Desktop Services (RDS), or Terminal Services, as it was known prior to Windows Server 2008 R2.
Application layering is a technology that delivers individual apps or groups of apps in layers distributed to users' virtual desktops at login. This allows IT to manage and update apps and base images separately.
Citrix AppDisk is a software component of XenApp and XenDesktop that delivers applications in layers independently from the virtual desktop operating system. This process allows administrators to update and manage apps separately from base images.
DCB is a suite of IEEE standards designed to enable lossless transport over Ethernet and a converged network for all data center applications.
Users manage Nutanix hyper-converged infrastructure technology through Prism -- software that provides management of clusters, virtual machines and networking through a single interface.
Hyper-converged software is a type of virtualization platform that turns a commodity server into a hyper-converged appliance that includes compute, storage and server virtualization in one box.