Browse Definitions:

Learning Guides

A TechTarget learning guide is an educational tool for a self-directed adult learner who works with information technology. Can't find a guide for the subject you need to learn more about? Let us know!

  • Fast guide to iSeries SQL

    Need SQL tips and advice? We've compiled some novice iSeries SQL tips and expert advice, as well as more advanced iSeries SQL information, in this Fast Guide to iSeries SQL. After you've spent some time with the material, test your knowledge with our quick quiz.

  • Virtualization in the data center fast guide

    In this fast guide to server virtualization, you'll learn about the different types of virtualization being deployed, products, platforms and virtualization strategies, such as data center disaster recovery.

  • System i FTP: Fast guide to Redbooks and articles

    Need information fast on FTP for the iSeries? Take a look at these publications. We've found Redbooks, articles and FAQs for everyone from novice users to experienced pros.

  • Fast track to iSeries learning resources

    Here's a fast reference to all of our learning resources on Search400.com. You can find information on autonomic computing, backup and recovery, career resources, and more.

  • SQL Server data encryption fast guide

    SQL Server encryption provides that extra protection to secure your database. Yet, it can be cumbersome to implement, and at times frustrating to troubleshoot errors. In this fast guide, get specifics on encrypting your backup files, stored procedures, column data and more.

  • Top five Oracle tutorials, fast guides and news stories of 2006

    We've gathered our most popular learning guides, original news stories, tips and expert responses of the year in these four top-five lists.

  • Oracle tutorial library: SearchOracle.com's learning guides

    One of the best resources SearchOracle.com offers is our collection of learning guides. They're a perfect education tool for the beginner who's just getting started with Oracle or the seasoned professional looking to attain expert status. We've gathered all our Oracle tutorials here in one invaluable list that you can return to again and again whenever you need a helping hand.

  • How to install VMware on Windows Server 2003 - Fast guide

    Installing new software can be difficult, especially with a new technology. Enter VMware expert Andrew Kutz. In this fast guide, he details every part of installing VMware Server on Windows in layman's terms.

  • Active Directory security school: Maintenance and testing

    No matter how secure all the layers of your network might be, an improperly configured Active Directory can render the rest of your security measures useless. So how can you protect yourself from a hacker with their eyes on your AD? How can you recover from such an attack? Find the answers to all of your AD questions in this security school.

  • Active Directory security school: Maintenance and testing

    This is lesson three of our Active Directory security school.

  • Fast Guide: Managing SATA drives

    This Fast Guide is a compilation of SATA-related tips that have appeared on SearchWinComputing.com. As our site devotes more coverage to SATA, expect to see more tips related to upgrades and configuration.

  • Active Directory services: A technology crash course

    This technology crash course on Active Directory services will help you determine what directory services to sell involving the AD architecture.

  • Fast Guide: VoIP encryption

    Most enterprise organizations encrypt critical or sensitive data that transverses the public network. It's a no-brainer. Thus, encrypting voice and data packets transmitted over a VoIP network is also a given, right? Turns out, not so much. By and large, VoIP vendors are building encryption support into their offerings, and across the board companies planning a VoIP migration rank encryption technology as among their top concerns. Ironically, however, most organizations do not actually employ encryption – or at least are reluctant to do – when launching their VoIP network.

  • Fast Guide: Active Directory security

    Windows Active Directory has become one of the key components to enterprise management, and many compaines use it to control large portions of their networks. With so many factors dependent on the successful administration of AD, security is especially important. This guide offers plenty of must-know tips on maintaining a secure AD environment, starting with the basics and moving on to more advanced practices.

  • Fast Guide: Active Directory security

    Windows Active Directory has become one of the key components to enterprise management

  • Server consolidation with server virtualization: An in-depth guide

    In this special report, industry experts offer advice on why, when and how to use virtualization technologies to consolidate server workloads.

  • T-SQL Learning Guide

    Transact-SQL (T-SQL) is no stranger to the SQL Server developer or DBA, but that's no excuse not to become more familiar. Improve your T-SQL skills with these T-SQL overviews, best practices and stored procedures.

  • Crash Course: Oracle basics

    This crash course will bring you up to speed on Oracle DBMS basics for versions 8.x through 9.x, and provide you with an overview of Oracle10g's new tools and features.

  • Fast Guide: Keeping pace with Microsoft certifications

    Microsoft certifications are some of the most sought-after certs on the IT market, and with the upcoming release of Windows Vista, even more cert exams are hitting the streets. This guide features all the latest developments in the world of Microsoft certifications, as well as must-know info on MCSA and MCSE to get your IT career on the fast track to success.

  • Fast Guide: Server consolidation

    Don't be left in the dark! Our fast guide to server consolidation keeps you up to speed on server consolidation basics.

  • Fast Guide: PCI bus

    It's always tempting to pick bleeding-edge technology when making new hardware purchases. One of the few places where this actually pays off is with new system bus technologies -- specifically, the new PCIe bus.

  • Learning Guides from SearchWinIT.com

    Check out our selection of Learning Guides to get extensive information on Active Directory, Group Policy, malware, Windows 2003 migration and more!

  • Fast Guide: Advanced backup

    Trying to make your backups run more smoothly, or thinking about swapping out your existing system for something more current? Our Fast Guide to advanced backup is the place to get started. We'll give you tips on strategy, help you compare your hardware, software and media options, and illustrate the ins and outs of mirroring, replication and snapshots. You'll be an expert in no time.

  • Fast Guide: Avoiding data integrity gotchas

    You may perform a number of tasks for data integrity's sake, assuring that data can only be accessed or modified by those authorized to do so. Yet improperly performing such tasks can harm your data. This fast guide offers tips and tricks to ensure and maintain data integrity, with a particular focus on avoiding the "gotchas" that can compromise your data.

  • Networking Media Group Learning Tools

    Here's a fast reference to our resources on networking and information technology training. You can find information on wireless technologies, networking certifications, routers, VoIP and more. If you know of a topic we should add here, please send us a note!

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close