Browse Definitions:

Learning Guides

A TechTarget learning guide is an educational tool for a self-directed adult learner who works with information technology. Can't find a guide for the subject you need to learn more about? Let us know!

  • Managing BYOD endpoint security

    This newly updated Security School lesson breaks down BYOD challenges and help you develop a strategy that cuts across the myriad threats and platforms inside your organization.

  • Windows XP end of life and Windows 7 / Windows 8 migration

    More than 12 years after its release, Windows XP is at the end of its life, at least in terms of support. Microsoft has released a few operating systems since then but many organizations have stuck with XP. For one thing, Vista was as unpopular as XP was popular. Also, most older computers just don’t have the guts, hardware-wise, to run the newer Microsoft systems. Whatever the reasons, though, support is ending and if you’re running XP, you’re going to have to move, accommodate or pay the price. To the rescue: Our guide to XP end of life and Windows 7 / Windows 8 migration.

  • Endpoint security controls: Moving beyond antivirus

    Mike Rothman discusses enterprise endpoint security controls for threat protection and explains how to determine which are best for your enterprise environment.

  • Managing data with an object storage system

    Use this guide to understand everything you need to know about object storage systems as they gain popularity in big data and cloud environments.

  • Next-generation firewalls: Must-have NGFW features

    Gain insight to help you decide whether a next-generation firewall is right for you and how to make its deployment and management smooth and successful.

  • Agile glossary: Words-2-Go

    This Agile glossary provides brief definitions of important terms and concepts in Agile and Scrum software development and project management.

  • Fast Guide to Microsoft's RemoteFX

    This guide covers how Microsoft RemoteFX works, limitations only found in the fine print, and how it compares to remote desktop protocols from VMware, Citrix and Quest Software.

  • SQL Server tutorials

    SearchSQLServer.com's tutorials provide the in-depth information SQL Server database administrators and developers are seeking on Microsoft's flagship database enterprise server, SQL Server and its latest release SQL Server 2008. Our SQL Server tutorials address areas you need to know about, including performance, migration strategies and business intelligence.

  • Learn IT: systems management

    Systems management is the supervision of the information technology systems in an enterprise.

  • Multimedia and Graphics Learning Guides

    We've gathered a our learning resources about multimedia and graphics. You'll find information about DTV, DVD and more. Then see below, our larger collection of resources. Need more basic information before you get started? See our definitions for multimedia, digital multimedia broadcasting, IPTV�and streaming media.

  • Messaging and Email Learning Guides

    We've gathered a collection of our learning guides and tutorials on messaging and email-related topics. You'll find administration tips, and information about application integration, backup and recovery, and dealing with spam -- among other topics. Then see below, our messaging and email-related quizzes and our larger collection of resources. Need more basic information before you get started? See our definitions for email, instant messaging, malware and spam.

  • VoIP Learning Guides

    We've gathered a collection of our learning guides and tutorials on VoIP-related topics. You'll find learning guides about VoIP deployment and administration, security, performance, ROI and more. Then see, below, our VoIP quizzes and cheat sheets and our larger collection of learning resources.

  • SAP Learning Guides

    We've gathered a collection of our learning guides and tutorials on SAP-related topics. You'll find learning guides about ERP, SCM, BI, Business Warehouse, Basis and more. Then see, below, our SAP quizzes and cheat sheets and our larger collection of learning resources.

  • Learn IT: The Power of the Database

    An introduction to the power of the database

  • Compliance Learning Guides

    We've gathered a collection of our learning guides and tutorials about compliance. You'll find in depth information about legislation, such as Sarbanes-Oxley and HIPAA, and standards, such as PCI and FFIEC.

  • Internet Learning Guides

    We've gathered a collection of our learning guides and tutorials on Internet-related topics. You'll find learning guides for spam, security, SEO and more.

  • Linux Learning Guides

    We've gathered a collection of our learning guides and tutorials on Linux topics. You'll find learning guides for desktop Linux, Linux and virtualization, Linux distributions and more.

  • Learn IT: Software development

    Learn an IT concept in 10 easy steps.

  • Learn IT: Unleashing the Power of the Database .

    Learn an IT concept in 10 easy steps.

  • Data Center Learning Guides

    We've gathered a collection of our learning guides and tutorials on data centers. You'll find in depth information about data center planning and design, data center management, green data centers and more. Then, read on for more resources.

  • Computing Fundamentals Learning Guides

    We've gathered all our learning guides and tutorials about computing fundamentals. You'll find resources about hardware and software, memory, processing and peripherals.

  • Fast guide to writing resumes and cover letters

    Quick look-up for how to write resumes and cover letters.

  • Call Center Terms: Glossary

    This is a WhatIs.com glossary for some basic vocabulary about call centers.

  • VMware tutorials and tips

    SearchVMware.com brings you a fast guide to our virtualization experts' VMware tips. Keep checking back, as we'll be updating this guide regularly.

  • Storage Capacity Fast Guide: Storage technologies

    Storage capacity must be carefully planned. Get your clients' storage growth under control with these storage technologies, including tiered storage, storage compression and data deduplication.

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close