Browse Definitions:
Definition

mentoring service

A mentoring service is a company that provides professional counseling and advice for individuals and businesses for a fee. A mentoring service may provide career planning, skills training, project guidance, professional contacts, or problem-solving for an individual's career or within a company. A mentoring relationship may be for an unspecified or for a limited duration.

A typical kind of mentoring in information technology is for the management of a software development project. A professional mentor may be hired for any or all of the phases of software development including the initial planning, architecture, design, development, implementation, debugging and testing, and deployment and installation

Face-to-face mentoring is still the most common form of mentoring, but virtual mentoring is gaining popularity. Virtual mentoring uses videoconferencing, the Internet, and e-mail to mentor individuals or companies. This is beneficial for those who own a small business and are unable to leave their workplace and for those who live in rural or remote communities. Virtual mentoring is usually less expensive compared to face-to-face mentoring and provides an individual with more choices for mentors. Even if you choose virtual mentoring, it is recommended to meet with your mentor face-to-face at least once.

This was last updated in September 2005

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchSecurity

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

  • Trojan horse (computing)

    In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • personal cloud storage (PCS)

    Personal cloud storage (PCS) enables users to store data, photos, music, videos and other files on a local network-attached ...

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • wear leveling

    Wear leveling is a process that is designed to extend the life of solid-state storage devices.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close