Browse Definitions:

Find Technology-Specific Sites

TechTarget gives technology professionals and executives the information they need to perform their jobs – from developing strategy, to making cost-effective purchase decisions and managing their organizations' technology projects. Bookmark this page for easy access to the TechTarget network of technology-specific websites.  

Browse TechTarget Sites by Topic

Application Development

Ajaxian

Ajaxian is a resource for software developers who work with Ajax, PHP, ASP.net, jQuery, Javascript, NodeJS, noSQL, FP and Visualization.

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • iPaaS (integration platform as a service)

    Integration platform as a service (iPaaS) is a set of cloud-based tools that enables software engineers to deploy, manage, govern and integrate applications and services. iPaaS is also referred to as cloud-based integration.

  • cloud database

    A cloud database is a collection of content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform.

  • Workday

    Workday is a web-based ERP software vendor that specializes in human capital management and financial management applications.

SearchMicroservices

SearchMicroservices.com provides readers with industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, business process management (BPM), application integration and APIs, software containers, microservices and DevOps.

  • BSA | The Software Alliance

    BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive growth in the digital economy. BSA’s policy team works with governments and public stakeholders across the globe to support the global software industry on issues including data privacy and security, intellectual property and trade.

  • enterprise service bus (ESB)

    An enterprise service bus (ESB) is a middleware tool used to distribute work among connected components of an application.

  • microservices

    Microservices are a form of application development where the app is built as a set of services, automating processes at a more rapid pace than monolithic application.

SearchSoftwareQuality

SearchSoftwareQuality.com is the online community for developers, architects and executives interested in building secure and quality software.

  • Scrum

    Scrum is a collaborative Agile development framework that breaks large processes down into small pieces in order to streamline efficiency.

  • unit testing

    Unit testing is a software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinized for proper operation. Unit testing is often automated but it can also be done manually.

  • BizDevOps (Business, Development and Operations)

    BizDevOps, also known as DevOps 2.0, is an approach to software development that encourages developers, operations staff and business teams to work together so the organization can develop software more quickly, be more responsive to user demand and ultimately maximize revenue.

SearchWinDevelopment

SearchWinDevelopment.com is a unique online resource for developers, architects and development managers tasked with building and maintaining enterprise applications using Visual Basic, C# and the Microsoft .NET platform.

  • scripting language

    A scripting language is a form of programming language that is usually interpreted rather than compiled. Scripting languages are typically converted into machine code on the fly during runtime by a program called an interpreter.

  • Internet

    The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).

  • domain name

    A domain name locates an organization or other entity on the Internet. For example, the domain name "www.totalbaseball.com" locates an Internet address for "totalbaseball.com" at Internet point 199.0.0.2 and a particular host server named "www."

TheServerSide

TheServerSide.com is the world’s largest online community for enterprise Java architects and developers, providing daily news, tech talk interviews with key industry figures, design patterns, discussion forums, tutorials and more.

  • Java Platform, Enterprise Edition (Java EE)

    The Java Platform, Enterprise Edition (Java EE) is a collection of Java APIs owned by Oracle that software developers can use to write server-side applications. It was formerly known as Java 2 Platform, Enterprise Edition, or J2EE.

  • JAR file (Java Archive)

    A Java Archive, or JAR file, contains all of the various components that make up a self-contained, executable Java application, deployable Java applet or, most commonly, a Java library to which any Java Runtime Environment can link.

  • Java annotations

    Within the Java development kit (JDK), there are simple annotations used to make comments on code, as well as meta-annotations that can be used to create annotations within annotation-type declarations.

Back to Top

Business Intelligence / Analytics

BeyeNETWORK

BeyeNETWORK.com is the primary site of the BeyeNETWORK, providing viewers with access to the thought leaders in business intelligence, performance management, business integration, information quality, data warehousing and more.

SearchBusinessAnalytics

SearchBusinessAnalytics.com is dedicated to serving the information needs of business and IT professionals.

  • business analytics (BA)

    Business analytics (BA) is the practice of iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.

  • R programming language

    The R programming language is an open source scripting language for predictive analytics and data visualization.

  • big data analytics

    Big data analytics is the process of examining large and varied data sets -- i.e., big data -- to uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful information that can help organizations make more-informed business decisions.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • Microsoft Office Delve

    Microsoft Delve is a discovery and collaboration tool within Office 365 that uses machine learning to help users work more efficiently.

  • What is digital asset management (DAM)?

    Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions. Rich media assets include images, video, audio and other multimedia content.

  • Microsoft MyAnalytics

    Microsoft MyAnalytics, formerly Delve Analytics, is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.

SearchCRM

SearchCRM.com is a free resource dedicated to Customer Relationship Management (CRM) decision makers.

  • consumer packaged goods (CPG)

    Consumer packaged goods (CPG) is an industry term for merchandise that customers use up and replace on a frequent basis.

  • marketing campaign management

    Marketing campaign management is the planning, executing, tracking and analysis of direct marketing campaigns.

  • sales forecast

    A sales forecast is a projection of achievable revenue. The terms sales forecast and sales budgets are sometimes used as synonyms, but budgets are projected before the fiscal year begins and forecasts take place once the fiscal year is underway.

SearchDataManagement

SearchDataManagement.com is a guide for data management professionals and business leaders.

  • NoSQL (Not Only SQL database)

    NoSQL and Not Only SQL describe an approach to database design that implements a key-value store, document store, column store or graph format for data.

  • multimodel database

    A multimodel database is a data processing platform that supports multiple data models, which define the parameters for how the information in a database is organized and arranged.

  • data analytics (DA)

    Data analytics (DA) is the science of examining raw data with the purpose of drawing conclusions about that information.

SearchSQLServer

SearchSQLServer.com is dedicated to serving the information needs of database developers and administrators working with Microsoft's flagship database enterprise server, SQL Server.

  • data mining

    Data mining is the process of sorting through large data sets to identify patterns and establish relationships to solve problems through data analysis.

  • query

    A query is a question, often expressed in a formal way. A database query can be either a select query or an action query.

  • Microsoft SQL Server Management Studio (SSMS)

    Microsoft SQL Server Management Studio (SSMS) is an integrated environment to manage a SQL Server infrastructure.

Back to Top

Business Software

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • iPaaS (integration platform as a service)

    Integration platform as a service (iPaaS) is a set of cloud-based tools that enables software engineers to deploy, manage, govern and integrate applications and services. iPaaS is also referred to as cloud-based integration.

  • cloud database

    A cloud database is a collection of content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform.

  • Workday

    Workday is a web-based ERP software vendor that specializes in human capital management and financial management applications.

SearchDomino

SearchDomino.com is a leading source for Lotus Notes and Domino-specific information for enterprise IT professionals.

  • knowledge management (KM)

    Knowledge management is a concept in which an enterprise consciously and comprehensively gathers, organizes, shares and analyzes its knowledge in terms of resources, documents, and people skills.

  • Instant Messaging: Glossary

    This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.

  • iNotes (iNotes Web Access)

    iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.

SearchExchange

SearchExchange.com is dedicated to serving the information needs of administrators and managers of Microsoft Exchange and Outlook messaging applications.

  • discovery mailbox

    A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.

  • poison mailbox

    A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store.

  • IMAP (Internet Message Access Protocol)

    IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).

SearchFinancialApplications

SearchFinancialApplications.com is dedicated to serving the information needs of business and IT professionals using technology to manage finance and human resources (HR) functions.

  • nine-box grid

    The nine-box grid is a human resource management (HRM) tool used by supervisors to rate the performance and potential of employees.

  • Workboard

    Workboard is an application for improving a company's strategic planning, boosting teamwork and collaboration, and tracking the goals and performance of employees.

  • software robotics

    Software robotics is the use of bot programs to automate computer tasks normally performed by people. Software robotics is synonymous with robotic process automation (RPA) and is the less widely used term, except in the financial services industry.

SearchManufacturingERP

SearchManufacturingERP.com provides manufacturing IT and business professionals with information on enterprise resource planning (ERP) technology and ERP best practices in the manufacturing industry today.

  • pick to light

    Pick to light is order-fulfillment technology that employs alphanumeric displays and buttons at storage locations to guide the manual "picking" and recording of items for shipment.

  • dual sourcing

    Dual sourcing is the supply chain management practice of using two suppliers for a given component, raw material, product or service. Companies use this approach to lower the risk of relying on a single supplier, a practice called single sourcing. Sole sourcing, in contrast, means only one source is available.

  • manufacturing process management (MPM)

    Manufacturing process management (MPM) is the discipline of defining how products are manufactured so production processes can be made more efficient and responsive.

SearchSalesforce

SearchSalesforce.com is a resource for Salesforce news, expert advice, technical tips and career guidance as well as a forum for community interaction. The site focuses on the Salesforce customer relationship management (CRM) platform as well as its ecosystem of partners.

  • cross-sell

    Cross-sell is a marketing term for the practice of suggesting related products or services to a customer who is considering buying something.

  • sales funnel

    A sales funnel, also called a purchase funnel, is the visual representation of the customer journey, depicting the sales process from awareness to action.

  • viral marketing

    Viral marketing is any marketing technique that induces websites or users to pass on a marketing message to other sites or users, creating a potentially exponential growth in the message's visibility and effect.

SearchSAP

SearchSAP.com is the SAP community's resource for news, expert advice, technical tips and career guidance.

  • SAP Production Planning

    SAP Production Planning is a component of the SAP ERP system known as ERP Central Component (ECC) that helps businesses plan the manufacturing, sale, and distribution of goods.

  • SAP Project System (PS)

    SAP Project System is a module in the SAP ERP system that enables tightly controlled project management from planning to completion.

  • SAP S/4HANA Finance

    SAP S/4HANA Finance is a financial application in the SAP S/4HANA ERP platform.

Back to Top

CIO Strategies

ComputerWeekly

ComputerWeekly.com is the leading provider of news, analysis, opinion, information and services for the UK IT community. The site serves as an advocate for UK IT professionals and the role of technology in improving organisations in all sectors of business and public life.

ebizQ

ebizQ is the insider’s guide to next-generation business process management. The site offers a growing collection of independent editorial articles on BPM trends, issues, challenges and solutions, all targeted to business and IT BPM professionals.

SearchCIO

SearchCIO.com provides technology management strategies designed exclusively for the enterprise CIO. Our award-winning team of editors and industry luminaries offer strategic advice and technology best practices to help streamline global IT operations.

  • Six Sigma

    Six Sigma is an approach to data-driven management that seeks to improve quality by measuring how many defects there are in a process and systematically eliminating them until there are as close to zero defects as possible.

  • ICT (information and communications technology, or technologies)

    ICT, or information and communications technology (or technologies), is the infrastructure and components that enable modern computing.

  • Total Quality Management (TQM)

    Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • PCI DSS compliance (Payment Card Industry Data Security Standard compliance)

    Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public companies in the United States to protect investors' interests.

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives. Cyborg anthropology as a discipline originated at the 1993 annual meeting of the American Anthropological Association.

Back to Top

Channel Resources

MicroScope

Stay ahead with IT Business management and technology news and articles on UK laws, regulations, credit and finance, selling, sales management, marketing and supplier relationships.

SearchITChannel

If you're a value-added reseller (VAR), information technology reseller or a systems integrator, all of your research needs are met at SearchITChannel.com.

  • professional services

    Professional services, in the IT context, are services that a contractor or product vendor provides to help customers plan, design, implement and manage technology projects and systems.

  • consultant (consulting)

    A consultant is an experienced individual in a given field who provides expert advice for a fee. Consultants typically work as independent contractors and are hired on a short-term basis. A consultant may also be an employee at a consulting firm.

  • share of wallet (SOW) or wallet share

    Share of wallet (SOW) is a marketing metric used to calculate the percentage of a customer's spending for a type of product or service that goes to a particular company.

Back to Top

Cloud

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchAWS

From cloud infrastructure to applications, development, security, big data, storage and more, SearchAWS.com provides meaningful insight from award-winning editors, research analysts and industry experts on one of the fastest-growing cloud services providers, Amazon Web Services.

  • AWS Security Token Service

    The AWS Security Token Service is an Amazon Web Services (AWS) software tool that enables an IT administrator to grant trusted users temporary and limited access credentials to public cloud resources.

  • AWS Management Console

    The AWS Management Console is a browser-based GUI for Amazon Web Services (AWS).

  • Amazon Lumberyard

    Amazon Lumberyard is a cross-platform video game development engine that connects to the Amazon Web Services (AWS) public cloud.

SearchCloudComputing

SearchCloudComputing.com is the Web's most comprehensive resource for cloud computing news, analysis and case studies.

  • Cloud Foundry

    Cloud Foundry is an open source cloud platform as a service (PaaS) on which developers can build, deploy, run and scale applications on public and private cloud models.

  • cloud bursting

    Cloud bursting is an application deployment model in which an application normally runs in a private cloud or local data center but can also run in a public cloud when the demand for computing capacity spikes.

  • IBM Bluemix Local

    IBM Bluemix Local is a private version of the IBM Bluemix public cloud platform. Users deploy the IBM Bluemix Local platform on their own on-premises hardware, behind their firewall within their own data center.

SearchCloudProvider

At SearchCloudProvider.com you'll find news and resources on building cloud services with robust data center, network, storage and security elements; enabling service delivery and management; delivering specific cloud applications; and evaluating and selecting cloud technology, solutions and platforms.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

  • Microsoft Intune

    Microsoft Intune (formerly Windows Intune) is a cloud-based desktop and mobile device management tool that helps organizations provide their employees with access to corporate applications, data, and resources from the device of their choice.

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • AWS CloudTrail

    AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS).

  • cloud access security broker (CASB)

    Cloud access security brokers (CASBs) are tools or services that enforce an organization's security policies in a public cloud environment.

  • CAIQ (Consensus Assessments Initiative Questionnaire)

    The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud provider.

SearchCloudStorage

SearchCloudStorage.com provides vendor-neutral guidelines on all your cloud storage related concerns – such as selecting the vendor that best fits your needs, determining which of the many available cloud storage services may be appropriate for your company, and using the cloud to relieve ongoing headaches with your backups, archives, and disaster recovery plans.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an underlying part of the transaction.

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or public cloud storage service.

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA platforms.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • virtual private server (VPS) or virtual dedicated server (VDS)

    A virtual private server (VPS), also called a virtual dedicated server (VDS), is a virtual server that appears to the user as a dedicated server, but that is actually installed on a computer serving multiple websites.

  • Virtual Machine Management Service

    Virtual Machine Management Service, also known as VMMS or vmms.exe, is the main module in Microsoft Windows operating system that controls all aspects of Hyper-V server virtualization.

  • virtual

    In computing, virtual is a digitally replicated version of something real. The replication, which is created with software, may not be an exact copy of the real thing, but it is similar enough in essence to be described as a digital rendition.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • Citrix Secure Browser

    Citrix Secure Browser is virtualization software that allows web applications to run in incompatible browsers.

  • Citrix Receiver

    Citrix Receiver is a suite of products that allows client devices to connect to various desktop virtualization services offered by Citrix.

  • virtual desktop infrastructure (VDI)

    Virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware Cloud Foundation

    VMware Cloud Foundation is an integrated software stack that uses SDDC Manager -- an automated lifecycle management tool -- to bundle compute (vSphere), storage (VMware vSAN) and network virtualization (NSX) into a single platform that can deployed on premises as a private cloud or run as a service within a public cloud.

  • VMware Identity Manager

    VMware Identity Manager is an Identity as a Service (IDaaS) offering that provides single sign-on (SSO) capabilities and user-based controls for web, cloud and mobile applications.

  • VMware vCloud Air Hybrid Cloud Manager

    VMware vCloud Air Hybrid Cloud Manager uses a network extension to allow users to manage both on and off-premises from a single interface.

Back to Top

Consumer Product Review

Brighthand

Brighthand.com offers SmartPhone, handheld computer, and cell phone reviews and news. Our active forum community is a great source of information on SmartPhones and related devices.

DigitalCameraReview

DigitalCameraReview.com offers digital camera reviews and news, a forum community, digital camera price comparisons, deals and coupons on digital cameras and accessories.

NotebookReview

NotebookReview.com offers the latest notebook and laptop reviews, as well as price comparisons, support forums and news."

TabletPCReview

TabletPCReview.com offers Tablet PC reviews and ratings, price comparisons, as well as support forums and news.

TechnologyGuide

TechnologyGuide.com is a family of product review and evaluation websites that are the leading source for information on the latest desktop and notebook computers, software and printers, wireless smartphones, digital cameras, and other devices for both the consumer and business markets.

Back to Top

Data Center Management

Search400

Search400.com is an online information resource for the latest news, tech tips and expert advice for the iSeries professional.

  • Quiz: iSeries (AS/400) History

    2003 marks the 15th anniversary of the AS/400 (now called the iSeries), so we thought we'd take a look back and see how it's changed over the years.

  • Quiz: iSeries (AS/400) Commands

    The iSeries (AS/400) is one of IBM's greatest success stories.

  • OS/400

    OS/400 is IBM's operating system for its AS/400 and AS/400e line of business computers. (Continued...)

SearchCloudProvider

At SearchCloudProvider.com you'll find news and resources on building cloud services with robust data center, network, storage and security elements; enabling service delivery and management; delivering specific cloud applications; and evaluating and selecting cloud technology, solutions and platforms.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

  • Microsoft Intune

    Microsoft Intune (formerly Windows Intune) is a cloud-based desktop and mobile device management tool that helps organizations provide their employees with access to corporate applications, data, and resources from the device of their choice.

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

SearchDataCenter

SearchDataCenter.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • infrastructure (IT infrastructure)

    Infrastructure is the foundation or framework that supports a system or organization. In computing, infrastructure is composed of physical and virtual resources that support the flow, storage, processing and analysis of data.

  • remote hands

    Remote hands is a service offered by colocation providers that allows customers to delegate management tasks to a technician hired by the provider.

  • The Paris Agreement

    The Paris Agreement is an international agreement intended to reduce the emission of greenhouse gases and combat global climate change. The Paris Agreement aims to accelerate and intensify global response to climate change through technical, financial, industrial and other means.

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is the leading source for tactical expert advice and best practices on desktop management and security. The site provides essential resources including the latest tips, tutorials, webcasts, white papers and more.

  • Microsoft Edge Web Notes

    Microsoft Edge Web Notes is a feature in Microsoft's Edge browser that lets users draw, highlight or type directly on webpages and web apps.

  • Microsoft Windows 10 Long Term Servicing Branch

    Microsoft Windows 10 Long Term Servicing Branch is a licensing structure available for operating system updates in Windows 10 Enterprise.

  • Microsoft Office 365 suite

    Microsoft Office 365 suite is a hosted, online version of Microsoft Office software. IT administrators access it from a web-based portal to set up new user accounts, control access to features and see the status of all Office 365 services and tools.

SearchEnterpriseLinux

SearchEnterpriseLinux.com is the Web's best resource for Linux admins and managers.

  • Puppet (Puppet Labs)

    Puppet is an open source systems management tool for centralizing and automating configuration management. Administrators can encode the configuration of a service as a policy, which Puppet then monitors and enforces.

  • Linux operating system

    Linux is a Unix-like, open source and community-developed operating system for computers, servers, mainframes, mobile devices and embedded devices.

  • logical volume management (LVM)

    Logical volume management (LVM), a form of storage virtualization, offers system administrators a more flexible approach to managing disk storage space than traditional partitioning.

SearchITOperations

As hybrid cloud deployments, containers, microservices and DevOps continue to become part of a data center's infrastructure, IT operations pros are facing a new set of responsibilities. Because they must be agile and able to manage next-gen apps in blended environments, the roles and responsibilities of development and operation teams are blending. 

  • Nagios

    Nagios is an open source monitoring system for computer systems. It was designed with core components to run on the Linux operating system and can monitor devices running Linux, Windows and Unix OSes.

  • DevOps as a Service

    DevOps as a Service (DaaS) is a delivery model for a set of tools that facilitates collaboration between an organization's software development team and the operations team. In this delivery model, the DaaS provider collects the disparate tools that cover various aspects of the overall process and connects these tools to work together as one unit.

  • site reliability engineering (SRE)

    Site reliability engineering (SRE) is the application of scripting and automation to IT operations tasks such as maintenance and support. The goal of SRE is to swiftly fix bugs and remove manual work in rote tasks.

SearchWindowsServer

SearchWindowsServer.com is dedicated to serving the information needs of Windows server professionals. The site provides targeted news, expert advice, tips, tutorials, learning guides, webcasts, white papers and more.

  • Internet Information Services (IIS)

    Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files.

  • Microsoft

    Microsoft is a leading global vendor of computer software; hardware for computer, mobile and gaming systems; and cloud services.

  • Microsoft Network Device Enrollment Service (NDES)

    Microsoft Network Device Enrollment Service (NDES) is a security feature in Windows Server 2008 R2 and later Windows Server operating versions. NDES provides and manages certificates used to authenticate traffic and implement secure network communication with devices that might not otherwise possess valid domain credentials.

Back to Top

Database

SearchOracle

Visit SearchOracle.com for information and tips for the Oracle community. The site provides comprehensive coverage of all Oracle-specific news, trends and developments in the database industry.

  • Oracle

    Oracle is one of the largest vendors in the enterprise IT market, offering a wide variety of software and hardware technologies for use in corporate applications.

  • stored procedure

    A stored procedure is a group of statements with a specific name, which are stored inside a database, such as MySQL or Oracle.

  • distributed database

    A distributed database is a database in which portions of the database are stored on multiple computers within a network.

Back to Top

Disaster Recovery / Compliance

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • PCI DSS compliance (Payment Card Industry Data Security Standard compliance)

    Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders' personal information.

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public companies in the United States to protect investors' interests.

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives. Cyborg anthropology as a discipline originated at the 1993 annual meeting of the American Anthropological Association.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • Microsoft Office Delve

    Microsoft Delve is a discovery and collaboration tool within Office 365 that uses machine learning to help users work more efficiently.

  • What is digital asset management (DAM)?

    Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions. Rich media assets include images, video, audio and other multimedia content.

  • Microsoft MyAnalytics

    Microsoft MyAnalytics, formerly Delve Analytics, is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • Oracle RMAN (Oracle Recovery Manager)

    Oracle RMAN (Oracle Recovery Manager) is a utility built into Oracle databases to automate backup and recovery; it includes features not available in third-party backup tools.

  • online data backup (remote data backup)

    Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a provider.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

SearchDisasterRecovery

Natural disasters, internal threats, user error and terrorist acts are realities that IT must take into consideration in their efforts to effectively protect their digital assets. Fortunately, SearchDisasterRecovery.com is the premier online resource for IT professionals responsible for disaster recovery planning.

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an event.

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration responsibilities to a third-party provider.

Back to Top

Emerging Technologies

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • IoT policy (Internet of Things policy)

    An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.

  • MEMS (micro-electromechanical systems)

    A MEMS (microelectromechanical system) is a miniature machine that has both mechanical and electronic components.

  • embedded system

    An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, that is designed for a specific function or for specific functions within a larger system.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

  • ONOS (Open Network Operating System)

    ONOS (Open Network Operating System) is an operating system (OS) designed for network service providers to help build carrier-grade software-defined networks architected for high scalability, availability and performance

  • NFV MANO (network functions virtualization management and orchestration)

    NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.

  • overlay network

    An overlay network is a telecommunications network that is built on top of another network and is supported by its infrastructure.

Back to Top

Healthcare IT

SearchHealthIT

SearchHealthIT.com is the health care technology professional’s how-to guide to building and managing an electronic health care infrastructure.

  • Centers for Disease Control and Prevention (CDC)

    Promoting a healthy general public and sharing data about chronic diseases are main goals of the Centers for Disease Control and Prevention (CDC).

  • American Health Information Management Association (AHIMA)

    The American Health Information Management Association (AHIMA) is a professional organization that promotes the business and clinical uses of electronic and paper-based medical information.

  • revenue cycle management (RCM)

    Revenue cycle management (RCM) is the financial process, utilizing medical billing software, that healthcare facilities use to track patient care episodes from registration and appointment scheduling to the final payment of a balance.

Back to Top

Networking

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • IoT policy (Internet of Things policy)

    An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.

  • MEMS (micro-electromechanical systems)

    A MEMS (microelectromechanical system) is a miniature machine that has both mechanical and electronic components.

  • embedded system

    An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, that is designed for a specific function or for specific functions within a larger system.

SearchEnterpriseWAN

SearchEnterpriseWAN.com is one of the largest and most active online communities dedicated to the enterprise wide area network.

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).

  • virtual private network (VPN)

    A virtual private network creates an encrypted connection over a less secure network when the network infrastructure cannot provide enough security to connected systems.

  • ISDN (Integrated Services Digital Network)

    ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.

SearchMobileComputing

SearchMobileComputing.com provides comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise.

  • text messaging (texting or wireless messaging)

    Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.

  • FaceTime

    FaceTime is an Apple video telephony application that allows users to make a video call over the internet with a forward-facing camera on iOS and macOS devices.

  • VMware AirWatch

    VMware AirWatch is an enterprise mobility software provider based in Atlanta. AirWatch, a division of virtualization vendor VMware, provides technologies that help IT administrators deploy, secure and manage mobile devices, applications and data, as well as Windows 10 and Apple Mac computers.

SearchNetworking

SearchNetworking.com is one of the largest and most active online communities dedicated to the enterprise network.

  • Mbps (megabits per second)

    Megabits per second (Mbps) are a unit of measurement for bandwidth and throughput on a network. Each megabit is equal to 1 million bits.

  • ARPANET

    ARPANET was the network that became the basis for the Internet. Based on a concept first published in 1967, ARPANET was developed under the direction of the U.S. Advanced Research Projects Agency (ARPA). In 1969, the idea became a modest reality with the interconnection of four university computers.

  • subnet mask (subnetting)

    A subnet mask is a 32- or 128-bit number that segments an existing IP address in a TCP/IP network and divides that address into discrete network and host addresses.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

  • ONOS (Open Network Operating System)

    ONOS (Open Network Operating System) is an operating system (OS) designed for network service providers to help build carrier-grade software-defined networks architected for high scalability, availability and performance

  • NFV MANO (network functions virtualization management and orchestration)

    NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.

  • overlay network

    An overlay network is a telecommunications network that is built on top of another network and is supported by its infrastructure.

SearchTelecom

Whether you're an IT Pro looking for advice on building-out an infrastructure to support new customer demands or a product manager seeking new tech insights to boost ARPU, SearchTelecom.com is a critical online resource for IT and business professionals.

  • fiber optics (optical fiber)

    Fiber optics, or optical fiber, refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic strand or fiber.

  • IPTV (Internet Protocol television)

    IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as opposed to traditional cable or satellite signals.

  • dense wavelength division multiplexing (DWDM)

    Dense wavelength division multiplexing (DWDM) is a technology that puts data from different sources together on an optical fiber, with each signal carried at the same time on its own separate light wavelength.

SearchUnifiedCommunications

SearchUnifiedCommunications.com provides a reliable source of how-to tips and best practices for implementing, managing and securing VoIP and advanced IP applications, enabling IT professionals to take advantage of the cost savings and new features and benefits associated with converged enterprise network.

  • communications platform as a service (CPaaS)

    Communications platform as a service (CPaaS) is a cloud-based service that allows organizations to add real-time communication capabilities like voice, video and messaging to business applications by deploying application program interfaces (APIs).

  • Session Initiation Protocol (SIP)

    Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.

  • VoIP (voice over IP)

    VoIP enables voice and multimedia communications, such as phone calls, over the internet and other IP-based networks, and allows enterprises to operate a single voice and data network.

Back to Top

Security

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • AWS CloudTrail

    AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS).

  • cloud access security broker (CASB)

    Cloud access security brokers (CASBs) are tools or services that enforce an organization's security policies in a public cloud environment.

  • CAIQ (Consensus Assessments Initiative Questionnaire)

    The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud provider.

SearchFinancialSecurity

IT professionals turn to SearchFinancialSecurity.com for the information they require to keep their corporate data and assets secure.

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Shared Assessments Program

    Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.

  • Common Vulnerabilities and Exposures (CVE)

    Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.

SearchMidmarketSecurity

SearchMidmarketSecurity.com is the only security-specific information resource geared toward midsize companies that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, a selection of highly focused security e-newsletters and more - all at no cost.

  • unified threat management (UTM)

    Unified threat management (UTM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console.

  • endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication.

SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure.

  • Web application firewall (WAF)

    A Web application firewall (WAF) is a firewall that monitors, filters or blocks traffic to and from a Web application. WAFs are especially useful to companies that provide products or services over the Internet.

  • MD5

    The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.

Back to Top

Social Media

ITKnowledgeExchange

Find technology questions and answers in this community of information technology (IT) experts and professionals.

Back to Top

Storage

SearchCloudStorage

SearchCloudStorage.com provides vendor-neutral guidelines on all your cloud storage related concerns – such as selecting the vendor that best fits your needs, determining which of the many available cloud storage services may be appropriate for your company, and using the cloud to relieve ongoing headaches with your backups, archives, and disaster recovery plans.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an underlying part of the transaction.

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or public cloud storage service.

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA platforms.

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • Oracle RMAN (Oracle Recovery Manager)

    Oracle RMAN (Oracle Recovery Manager) is a utility built into Oracle databases to automate backup and recovery; it includes features not available in third-party backup tools.

  • online data backup (remote data backup)

    Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a provider.

  • encryption key management

    Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

SearchSMBstorage

SearchSMBstorage.com provides tailored instructions on how to tackle the most common SMB storage issues surrounding Network Attached Storage, iSCSI, online backup, disaster recovery services, data security, and many more.

  • Shared SAS

    Shared serial-attached SCSI (SAS) is a method for attaching more than one server to a storage array via individual point-to-point or SAS switched connections.

  • desktop NAS

    Desktop NAS (network-attached storage) is a device that stores and serves the file-level data of networked computers.

  • SAN-in-a-box

    A SAN-in-a-box, also known as a SAN-in-a-can or a SAN kit, is a data storage device that includes all the basic SAN components are in a single package.

SearchSolidStateStorage

Solid state/flash memory technologies are not new. Traditionally viewed as being far superior to disk technologies in terms of performance and speed, until recently practical and affordable flash storage applications were few and far between. But that is changing quickly. New, innovative applications are hitting the market fast. With data centers that are growing in complexity – and data that is growing in volume – storage managers need innovations that can meet today’s challenges. And creative applications of flash, DRAM and other solid-state technologies are filling those needs.

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across multiple SSDs.

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage hierarchy.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

SearchStorage

The TechTarget Storage Media Group has built a community of the largest and most audience of storage decision-makers on the web.

  • secondary storage

    Secondary storage is used to protect inactive data written from a primary storage array to a nonvolatile tier of disk, flash or tape.

  • VRAM (video ram)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

  • ZFS

    ZFS is a local file system and logical volume manager created by Sun Microsystems to control the placement, storage and retrieval of data in enterprise computing systems.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

Back to Top

Vendor Research

KnowledgeStorm

Browse the database of business technology software products and services.

Back to Top

Virtualization

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • virtual private server (VPS) or virtual dedicated server (VDS)

    A virtual private server (VPS), also called a virtual dedicated server (VDS), is a virtual server that appears to the user as a dedicated server, but that is actually installed on a computer serving multiple websites.

  • Virtual Machine Management Service

    Virtual Machine Management Service, also known as VMMS or vmms.exe, is the main module in Microsoft Windows operating system that controls all aspects of Hyper-V server virtualization.

  • virtual

    In computing, virtual is a digitally replicated version of something real. The replication, which is created with software, may not be an exact copy of the real thing, but it is similar enough in essence to be described as a digital rendition.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • Citrix Secure Browser

    Citrix Secure Browser is virtualization software that allows web applications to run in incompatible browsers.

  • Citrix Receiver

    Citrix Receiver is a suite of products that allows client devices to connect to various desktop virtualization services offered by Citrix.

  • virtual desktop infrastructure (VDI)

    Virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware Cloud Foundation

    VMware Cloud Foundation is an integrated software stack that uses SDDC Manager -- an automated lifecycle management tool -- to bundle compute (vSphere), storage (VMware vSAN) and network virtualization (NSX) into a single platform that can deployed on premises as a private cloud or run as a service within a public cloud.

  • VMware Identity Manager

    VMware Identity Manager is an Identity as a Service (IDaaS) offering that provides single sign-on (SSO) capabilities and user-based controls for web, cloud and mobile applications.

  • VMware vCloud Air Hybrid Cloud Manager

    VMware vCloud Air Hybrid Cloud Manager uses a network extension to allow users to manage both on and off-premises from a single interface.

Back to Top

White Papers and Webcasts

BitPipe

A free library of IT white papers, webcasts and product information to help with your IT purchase decisions. Research the latest tools, technologies and techniques and compare offerings from thousands to technology companies.

Back to Top

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • Web application firewall (WAF)

    A Web application firewall (WAF) is a firewall that monitors, filters or blocks traffic to and from a Web application. WAFs are ...

  • MD5

    The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • secondary storage

    Secondary storage is used to protect inactive data written from a primary storage array to a nonvolatile tier of disk, flash or ...

  • VRAM (video ram)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

  • ZFS

    ZFS is a local file system and logical volume manager created by Sun Microsystems to control the placement, storage and retrieval...

SearchSolidStateStorage

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close