Browse Definitions:

Learning Guides

A TechTarget learning guide is an educational tool for a self-directed adult learner who works with information technology. Can't find a guide for the subject you need to learn more about? Let us know!

  • Developer shortage survival guide

    This developer shortage survival guide discusses hiring and training strategies for software developers.

  • CIO guide to project management basics, DevOps and Agile

    In this Essential Guide, learn project management basics and get expert advice on how to get the most out of DevOps and i an Agile digital strategy.

  • Quick Start Glossary: Project Management

    You can print out this glossary for a fast reference to essential project management-related terms. Online, brief explanations are linked to our full definitions of the terms.

  • Game-changing enterprise authentication technologies and standards

    This Security School explores next-generation authentication technologies, standards and methods that may soon replace the personal-password system.

  • The rise of scale-out network-attached storage

    Scale-out NAS is being implemented across the storage landscape, with major vendors and startups releasing new and upgraded products. This guide discusses product offerings and how organizations use scale-out.

  • Security School Course Catalog from SearchSecurity.com

    Check out SearchSecurity's catalog of free online security courses led by information security experts on today's most popular security topics.

  • Distributed denial-of-service attack defense

    This Security School offers need-to-know information about distributed denial-of-service attack defense, prevention and best practices.

  • Performing an authenticated vulnerability scan

    This Security School covers need-to-know topics for performing an authenticated vulnerability scan, including myths and misconceptions to be aware of.

  • Improving security management with SIEM

    This Security School explains the best methods for infosec pros to effectively use SIM to get the best data in order to improve incident response, change management processes and security policies overall.

  • Managing BYOD endpoint security

    This newly updated Security School lesson breaks down BYOD challenges and help you develop a strategy that cuts across the myriad threats and platforms inside your organization.

  • Windows XP end of life and Windows 7 / Windows 8 migration

    More than 12 years after its release, Windows XP is at the end of its life, at least in terms of support. Microsoft has released a few operating systems since then but many organizations have stuck with XP. For one thing, Vista was as unpopular as XP was popular. Also, most older computers just don’t have the guts, hardware-wise, to run the newer Microsoft systems. Whatever the reasons, though, support is ending and if you’re running XP, you’re going to have to move, accommodate or pay the price. To the rescue: Our guide to XP end of life and Windows 7 / Windows 8 migration.

  • Endpoint security controls: Moving beyond antivirus

    Mike Rothman discusses enterprise endpoint security controls for threat protection and explains how to determine which are best for your enterprise environment.

  • Next-generation firewalls: Must-have NGFW features

    Gain insight to help you decide whether a next-generation firewall is right for you and how to make its deployment and management smooth and successful.

  • Agile glossary: Words-2-Go

    This Agile glossary provides brief definitions of important terms and concepts in Agile and Scrum software development and project management.

  • Fast Guide to Microsoft's RemoteFX

    This guide covers how Microsoft RemoteFX works, limitations only found in the fine print, and how it compares to remote desktop protocols from VMware, Citrix and Quest Software.

  • SQL Server tutorials

    SearchSQLServer.com's tutorials provide the in-depth information SQL Server database administrators and developers are seeking on Microsoft's flagship database enterprise server, SQL Server and its latest release SQL Server 2008. Our SQL Server tutorials address areas you need to know about, including performance, migration strategies and business intelligence.

  • Multimedia and Graphics Learning Guides

    We've gathered a our learning resources about multimedia and graphics. You'll find information about DTV, DVD and more. Then see below, our larger collection of resources. Need more basic information before you get started? See our definitions for multimedia, digital multimedia broadcasting, IPTV�and streaming media.

  • Messaging and Email Learning Guides

    We've gathered a collection of our learning guides and tutorials on messaging and email-related topics. You'll find administration tips, and information about application integration, backup and recovery, and dealing with spam -- among other topics. Then see below, our messaging and email-related quizzes and our larger collection of resources. Need more basic information before you get started? See our definitions for email, instant messaging, malware and spam.

  • VoIP Learning Guides

    We've gathered a collection of our learning guides and tutorials on VoIP-related topics. You'll find learning guides about VoIP deployment and administration, security, performance, ROI and more. Then see, below, our VoIP quizzes and cheat sheets and our larger collection of learning resources.

  • SAP Learning Guides

    We've gathered a collection of our learning guides and tutorials on SAP-related topics. You'll find learning guides about ERP, SCM, BI, Business Warehouse, Basis and more. Then see, below, our SAP quizzes and cheat sheets and our larger collection of learning resources.

  • Learn IT: The Power of the Database

    An introduction to the power of the database

  • Compliance Learning Guides

    We've gathered a collection of our learning guides and tutorials about compliance. You'll find in depth information about legislation, such as Sarbanes-Oxley and HIPAA, and standards, such as PCI and FFIEC.

  • Internet Learning Guides

    We've gathered a collection of our learning guides and tutorials on Internet-related topics. You'll find learning guides for spam, security, SEO and more.

  • Linux Learning Guides

    We've gathered a collection of our learning guides and tutorials on Linux topics. You'll find learning guides for desktop Linux, Linux and virtualization, Linux distributions and more.

  • Data Center Learning Guides

    We've gathered a collection of our learning guides and tutorials on data centers. You'll find in depth information about data center planning and design, data center management, green data centers and more. Then, read on for more resources.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close