Browse Definitions:

Learning Guides

A TechTarget learning guide is an educational tool for a self-directed adult learner who works with information technology. Can't find a guide for the subject you need to learn more about? Let us know!

  • SQL guide for Oracle users

    Whether you are a newbie or a seasoned expert looking to tweak query performance, this learning guide to the structured query language (SQL) has something for you. These seven chapters can help you figure out how to get the data you need by looking at solutions to real-world problems.

  • Guide to Oracle freeware and shareware

    This list of free and low-cost tools and utilities will help Oracle DBAs and developers do your job better.

  • Bits & Bytes column library archive

    Bits & Bytes column library archive -- 2003 to 2004

  • Learning Guide: SAN management

    Managing your SANs has always been challenging. So, to help you along with the process we've assembled arguably the most comprehensive listing of the SAN management tools and resources on the Web -- the "Learning Guide to SAN management". Take a look here for advice, tips and articles on tools, techniques and concepts that will help you plan a SAN, increase utilization and keep your networks running 24/7.

  • Fast Guide: iSCSI

    If you need to come up to speed rapidly on iSCSI, you've come to the right place. In this Fast Guide, we touch upon the basics and then we walk you through the pros and cons of iSCSI and Fibre Channel.

  • Fast Guide: XP SP2 security

    This fast guide organizes news and expert advice that will help address your XP SP2 security issues and concerns. You'll learn about the new security enhancements in XP SP2, how to prepare for your service pack refresh and even some tips and tricks to resolve post-installation security problems.

  • Fast guide to RPG IV resources and Redbooks

    Need information fast on RPG IV? Take a look at these resources. We've found Redbooks, training and FAQs for everyone from novice users to experienced pros.

  • A guide to simplifying data centre management

    A complete guide to data centre management in the UK, covering management strategies, data recovery and virtualisation management.

  • Data analysis and business intelligence tutorial

    Everything you need to know about business intelligence and data management, in the UK. This guide includes information on business data usage, data quality and business analytics.

  • IT services and managed services

    A complete guide to IT services in the UK covering outsourcing, managed service providers and cloud services.

  • Reflections on 2011 and predictions for 2012

    With 2011 now behind us we have taken a look back at technology trends throughout last year, in addition to looking ahead to what 2012 may hold. In this guide you will find 2011 roundups on virtualisation, cloud computing, outsourcing, storage, data management, careers and the IT channel.

  • The network administrators’ guide

    In our network administrator tutorial, learn about network security and network management.

  • Green computing energy efficiency guide

    A guide to choosing green computing for your IT department. Learn how and why you should consider improving energy efficiency techniques within your business.

  • Cloud computing risk management: Assessing key risks of cloud computing

  • A guide to embracing IT consumerisation

    How can IT departments cost effectively support smartphones, tablets and people who wish to bring in their own devices to work?

  • Virtualisation

    While virtualisation may be considered the best way forward for data centre infrastructure, there are plenty of barriers to successful adoption.

  • Best data storage products 2011

    The Storage magazine/SearchStorage.com 2011 Products of the Year awards recogonize the best storage products in six categories.

  • A guide to buying storage hardware and software

    A guide to purchasing storage hardware and software: hard disks, tape drives, disk storage, and virtual storage.

  • A quick guide to IT security

    Everything you need to know on cyber-attacks, data protection, malware and computer viruses

  • A UK guide to government and public sector IT

    A guide to support IT professionals in making well informed decisions about technologies used within public sector organisations.

  • The Budget 2012: Are you better or worse off?

    As the Chancellor of the Exchequer George Osborne reveals the contents of his red box this year, find out all the news from the Budget 2012.

  • How to comply with the EU cookie law

    Effective from 26 May 2012 the EU cookie law requires websites to gain permission from users, before planting cookies. Find out how to comply and what fines you may face if you don’t.

  • Supplier profile: SAP

    In this SAP supplier profile you will find news, tips and research on the vendor.

  • EMC World 2012: Big data, cloud services and VMAX shape the agenda

    The SearchStorage.com news team provided news and analysis from the 2012 show. Read about EMC's roadmap here.

  • Supplier profile: Symantec

    In this Symantec guide you will find a special nine-page report from Computer Weekly analysing the challenges facing Symantec.

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchSecurity

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

  • Trojan horse (computing)

    In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • personal cloud storage (PCS)

    Personal cloud storage (PCS) enables users to store data, photos, music, videos and other files on a local network-attached ...

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • wear leveling

    Wear leveling is a process that is designed to extend the life of solid-state storage devices.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close