Browse Definitions:

Find Technology-Specific Sites

TechTarget gives technology professionals and executives the information they need to perform their jobs – from developing strategy, to making cost-effective purchase decisions and managing their organizations' technology projects. Bookmark this page for easy access to the TechTarget network of technology-specific websites.  

Browse TechTarget Sites by Topic

Application Development

Ajaxian

Ajaxian is a resource for software developers who work with Ajax, PHP, ASP.net, jQuery, Javascript, NodeJS, noSQL, FP and Visualization.

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • cloud database

    A cloud database is a collection of content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform.

  • Workday

    Workday is a web-based ERP software vendor that specializes in human capital management and financial management applications.

  • NoOps

    NoOps (no operations) is the concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there is no need for a dedicated team to manage software in-house. 

SearchMicroservices

SearchMicroservices.com provides readers with industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, business process management (BPM), application integration and APIs, software containers, microservices and DevOps.

  • microservices

    Microservices are a form of application development where the app is built as a set of services, automating processes at a more rapid pace than monolithic application.

  • Java

    Java is a widely used programming language expressly designed for use in the distributed environment of the internet.

  • data type

    A data type, in programming, is a classification that specifies which type of value a variable has and what type of mathematical, relational or logical operations can be applied to it without causing an error.

SearchSoftwareQuality

SearchSoftwareQuality.com is the online community for developers, architects and executives interested in building secure and quality software.

  • unit testing

    Unit testing is a software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinized for proper operation. Unit testing is often automated but it can also be done manually.

  • BizDevOps (Business, Development and Operations)

    BizDevOps, also known as DevOps 2.0, is an approach to software development that encourages developers, operations staff and business teams to work together so the organization can develop software more quickly, be more responsive to user demand and ultimately maximize revenue.

  • debugging

    Debugging, in computer programming and engineering, is a multistep process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it.

SearchWinDevelopment

SearchWinDevelopment.com is a unique online resource for developers, architects and development managers tasked with building and maintaining enterprise applications using Visual Basic, C# and the Microsoft .NET platform.

  • scripting language

    A scripting language is a form of programming language that is usually interpreted rather than compiled. Scripting languages are typically converted into machine code on the fly during runtime by a program called an interpreter.

  • Internet

    The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).

  • domain name

    A domain name locates an organization or other entity on the Internet. For example, the domain name "www.totalbaseball.com" locates an Internet address for "totalbaseball.com" at Internet point 199.0.0.2 and a particular host server named "www."

TheServerSide

TheServerSide.com is the world’s largest online community for enterprise Java architects and developers, providing daily news, tech talk interviews with key industry figures, design patterns, discussion forums, tutorials and more.

  • JAR file (Java Archive)

    A Java Archive, or JAR file, contains all of the various components that make up a self-contained, executable Java application, deployable Java applet or, most commonly, a Java library to which any Java Runtime Environment can link.

  • Java annotations

    Within the Java development kit (JDK), there are simple annotations used to make comments on code, as well as meta-annotations that can be used to create annotations within annotation-type declarations.

  • Java assert

    Java assert is one of 50 reserved keywords that are protected from use as identifiers for program elements such as objects, classes and variables. Assert's function is to make a claim that a given statement is always true.

Back to Top

Business Intelligence / Analytics

BeyeNETWORK

BeyeNETWORK.com is the primary site of the BeyeNETWORK, providing viewers with access to the thought leaders in business intelligence, performance management, business integration, information quality, data warehousing and more.

SearchBusinessAnalytics

SearchBusinessAnalytics.com is dedicated to serving the information needs of business and IT professionals.

  • SAS Institute Inc.

    SAS Institute Inc. is a software vendor that specializes in advanced and predictive analytics applications, as well as business intelligence and data visualization tools.

  • Qlik

    Qlik is a software company in the self-service business intelligence and data visualization market. It has tools for business users, as well as developers.

  • predictive analytics

    Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast future activity, behavior and trends. It involves the creation of predictive models that place a numerical value, or score, on the likelihood of a particular event happening.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • What is digital asset management (DAM)?

    Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions. Rich media assets include images, video, audio and other multimedia content.

  • Microsoft MyAnalytics

    Microsoft MyAnalytics, formerly Delve Analytics, is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.

  • Microsoft Flow

    Microsoft Flow is a cloud-based software tool that allows employees to create and automate workflows across multiple applications and services without the need for developer help.

SearchCRM

SearchCRM.com is a free resource dedicated to Customer Relationship Management (CRM) decision makers.

  • consumer packaged goods (CPG)

    Consumer packaged goods (CPG) is an industry term for merchandise that customers use up and replace on a frequent basis.

  • marketing campaign management

    Marketing campaign management is the planning, executing, tracking and analysis of direct marketing campaigns.

  • sales forecast

    A sales forecast is a projection of achievable revenue. The terms sales forecast and sales budgets are sometimes used as synonyms, but budgets are projected before the fiscal year begins and forecasts take place once the fiscal year is underway.

SearchDataManagement

SearchDataManagement.com is a guide for data management professionals and business leaders.

  • data analytics (DA)

    Data analytics (DA) is the science of examining raw data with the purpose of drawing conclusions about that information.

  • DataOps (data operations)

    DataOps (data operations) is an approach to designing, implementing and maintaining a distributed data architecture that will support a wide range of open source tools and frameworks in production.

  • predictive modeling

    Predictive modeling is a process that uses data mining and probability to forecast outcomes. Each model is made up of a number of predictors, which are variables that are likely to influence future results.

SearchSQLServer

SearchSQLServer.com is dedicated to serving the information needs of database developers and administrators working with Microsoft's flagship database enterprise server, SQL Server.

  • Microsoft SQL Server Management Studio (SSMS)

    Microsoft SQL Server Management Studio (SSMS) is an integrated environment to manage a SQL Server infrastructure.

  • database (DB)

    A database is a collection of information that is organized so that it can be easily accessed, managed and updated.

  • Microsoft SQL Server

    Microsoft SQL Server is a relational database management system, or RDBMS, that supports a wide variety of transaction processing, business intelligence and analytics applications in corporate IT environments

Back to Top

Business Software

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • cloud database

    A cloud database is a collection of content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform.

  • Workday

    Workday is a web-based ERP software vendor that specializes in human capital management and financial management applications.

  • NoOps

    NoOps (no operations) is the concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there is no need for a dedicated team to manage software in-house. 

SearchDomino

SearchDomino.com is a leading source for Lotus Notes and Domino-specific information for enterprise IT professionals.

  • knowledge management (KM)

    Knowledge management is a concept in which an enterprise consciously and comprehensively gathers, organizes, shares and analyzes its knowledge in terms of resources, documents, and people skills.

  • Instant Messaging: Glossary

    This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.

  • iNotes (iNotes Web Access)

    iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.

SearchExchange

SearchExchange.com is dedicated to serving the information needs of administrators and managers of Microsoft Exchange and Outlook messaging applications.

  • discovery mailbox

    A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.

  • poison mailbox

    A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store.

  • IMAP (Internet Message Access Protocol)

    IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).

SearchFinancialApplications

SearchFinancialApplications.com is dedicated to serving the information needs of business and IT professionals using technology to manage finance and human resources (HR) functions.

  • software robotics

    Software robotics is the use of bot programs to automate computer tasks normally performed by people. Software robotics is synonymous with robotic process automation (RPA) and is the less widely used term, except in the financial services industry.

  • Tagetik

    Tagetik is a software vendor of cloud-based and on-premises applications on a single platform for enterprise performance management.

  • HipChat

    Atlassian HipChat allows employees to collaborate, work as teams and manage goals, all in real time, whether they work in the same office building or are located around the world.

SearchManufacturingERP

SearchManufacturingERP.com provides manufacturing IT and business professionals with information on enterprise resource planning (ERP) technology and ERP best practices in the manufacturing industry today.

  • go-live (go live)

    In software development, go-live is the time at which code moves from the test environment to the production environment. As a verb, go-live means to make such an event happen.

  • virtual manufacturing

    Virtual manufacturing (VM) is the use of computers to model, simulate and optimize the critical operations and entities in a factory plant.

  • model-based enterprise

    Model-based enterprise (MBE) is an engineering strategy that aims to clarify design intent during the manufacturing process, resulting in better quality of the products, reduced costs and more efficiency.

SearchSalesforce

SearchSalesforce.com is a resource for Salesforce news, expert advice, technical tips and career guidance as well as a forum for community interaction. The site focuses on the Salesforce customer relationship management (CRM) platform as well as its ecosystem of partners.

  • sales funnel

    A sales funnel, also called a purchase funnel, is the visual representation of the customer journey, depicting the sales process from awareness to action.

  • viral marketing

    Viral marketing is any marketing technique that induces websites or users to pass on a marketing message to other sites or users, creating a potentially exponential growth in the message's visibility and effect.

  • Salesforce.com

    Salesforce.com is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco. It was founded in March 1999, in part by former Oracle executive Marc Benioff.

SearchSAP

SearchSAP.com is the SAP community's resource for news, expert advice, technical tips and career guidance.

  • SAP

    SAP SE, a global software company, is one of the largest vendors of ERP and other enterprise applications. The company is headquartered in Walldorf, Germany.

  • ERP (enterprise resource planning)

    Enterprise resource planning (ERP) is an industry term for the broad set of activities that help an organization manage its business.

  • SAP SQL Anywhere

    SAP SQL Anywhere is an embedded RDBMS that makes it possible to develop applications that integrate IoT data with business data and can run outside of traditional data centers.

Back to Top

CIO Strategies

ComputerWeekly

ComputerWeekly.com is the leading provider of news, analysis, opinion, information and services for the UK IT community. The site serves as an advocate for UK IT professionals and the role of technology in improving organisations in all sectors of business and public life.

ebizQ

ebizQ is the insider’s guide to next-generation business process management. The site offers a growing collection of independent editorial articles on BPM trends, issues, challenges and solutions, all targeted to business and IT BPM professionals.

SearchCIO

SearchCIO.com provides technology management strategies designed exclusively for the enterprise CIO. Our award-winning team of editors and industry luminaries offer strategic advice and technology best practices to help streamline global IT operations.

  • ROI (return on investment)

    For a given use of money in an enterprise, the ROI (return on investment) is how much profit or cost saving is realized as a result.

  • stakeholder

    A stakeholder is a person or group who has an interest -- vested or otherwise -- in an enterprise and whose support is required in order for an enterprise to be successful.

  • C-level (C-suite)

    C-level is a term used to describe senior business leaders with high-ranking executive titles.

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public companies in the United States to protect investors' interests.

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives. Cyborg anthropology as a discipline originated at the 1993 annual meeting of the American Anthropological Association.

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of regulatory compliance.

Back to Top

Channel Resources

MicroScope

Stay ahead with IT Business management and technology news and articles on UK laws, regulations, credit and finance, selling, sales management, marketing and supplier relationships.

SearchITChannel

If you're a value-added reseller (VAR), information technology reseller or a systems integrator, all of your research needs are met at SearchITChannel.com.

  • IT solution

    An information technology (IT) solution is a set of related software programs and/or services that are sold as a single package.

  • IBM (International Business Machines)

    IBM (International Business Machines) ranks among the world's largest information technology companies, providing a wide spectrum of hardware, software and services offerings.

  • ISV (independent software vendor)

    An ISV (independent software vendor) makes and sells software products that run on a physical hardware device, on a virtual machine or in the cloud.

Back to Top

Cloud

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchAWS

From cloud infrastructure to applications, development, security, big data, storage and more, SearchAWS.com provides meaningful insight from award-winning editors, research analysts and industry experts on one of the fastest-growing cloud services providers, Amazon Web Services.

  • Elastic Load Balancing (ELB)

    Elastic Load Balancing (ELB) is a load-balancing service for Amazon Web Services (AWS) deployments.

  • Boto

    Boto is a software development kit (SDK) designed to improve the use of the Python programming language in Amazon Web Services. The Boto project started as a customer-contributed library to help developers build Python-based applications in the cloud, converting application programming interface (API) responses from AWS into Python classes.

  • AWS Test Drive

    The AWS Test Drive is a free Amazon Web Services tool that allows consulting and technology partners to test third-party software environments.

SearchCloudComputing

SearchCloudComputing.com is the Web's most comprehensive resource for cloud computing news, analysis and case studies.

  • Google Cloud Storage Nearline

    Google Cloud Storage Nearline is a public cloud storage service from Google intended for data archiving, backup and disaster recovery.

  • cloud infrastructure

    Cloud infrastructure refers to the hardware and software -- such as servers, storage and virtualization software -- required to support cloud computing.

  • Google Cloud Storage Coldline

    Google Cloud Storage Coldline is a public cloud cold storage service from Google intended for archiving and disaster recovery.

SearchCloudProvider

At SearchCloudProvider.com you'll find news and resources on building cloud services with robust data center, network, storage and security elements; enabling service delivery and management; delivering specific cloud applications; and evaluating and selecting cloud technology, solutions and platforms.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

  • Microsoft Intune

    Microsoft Intune (formerly Windows Intune) is a cloud-based desktop and mobile device management tool that helps organizations provide their employees with access to corporate applications, data, and resources from the device of their choice.

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • AWS CloudTrail

    AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS).

  • cloud access security broker (CASB)

    Cloud access security brokers (CASBs) are tools or services that enforce an organization's security policies in a public cloud environment.

  • CAIQ (Consensus Assessments Initiative Questionnaire)

    The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud provider.

SearchCloudStorage

SearchCloudStorage.com provides vendor-neutral guidelines on all your cloud storage related concerns – such as selecting the vendor that best fits your needs, determining which of the many available cloud storage services may be appropriate for your company, and using the cloud to relieve ongoing headaches with your backups, archives, and disaster recovery plans.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an underlying part of the transaction.

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or public cloud storage service.

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA platforms.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • hypervisor

    A hypervisor is a function which abstracts -- isolates -- operating systems and applications from the underlying computer hardware.

  • containerization (container-based virtualization)

    Containerization -- also called container-based virtualization and application containerization -- is an OS-level virtualization method for deploying and running distributed applications without launching an entire VM for each application.

  • Certified OpenStack Administrator

    Certified OpenStack Administrator (COA) is a vendor-agnostic exam designed by the OpenStack Foundation in conjunction with a number of international partners to test an administrator's abilities in cloud management and day-to-day operations.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • virtual desktop infrastructure (VDI)

    Virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server.

  • Citrix XenApp

    Citrix XenApp is an application virtualization product that extends Microsoft Remote Desktop Session Host desktop sessions and apps to users via the Citrix HDX protocol. It can run on Citrix XenServer or other server virtualization platforms.

  • VMware Blast Extreme

    VMware Blast Extreme is a remote display protocol designed to deliver graphics-intensive virtual workloads using the H.264 advanced video compression standard.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware vCloud Air Hybrid Cloud Manager

    VMware vCloud Air Hybrid Cloud Manager uses a network extension to allow users to manage both on and off-premises from a single interface.

  • SysTrack Desktop Assessment for VMware

    SysTrack Desktop Assessment for VMware is a free cloud-based assessment service, developed in conjunction with Lakeside Software, that provides metrics and information about an environment and as well as how to best deploy VMware Horizon.

  • VMware Access Point

    VMware Access Point is a virtual appliance used as a secure gateway which authorized users can access VMware computing resources.

Back to Top

Consumer Product Review

Brighthand

Brighthand.com offers SmartPhone, handheld computer, and cell phone reviews and news. Our active forum community is a great source of information on SmartPhones and related devices.

DigitalCameraReview

DigitalCameraReview.com offers digital camera reviews and news, a forum community, digital camera price comparisons, deals and coupons on digital cameras and accessories.

NotebookReview

NotebookReview.com offers the latest notebook and laptop reviews, as well as price comparisons, support forums and news."

TabletPCReview

TabletPCReview.com offers Tablet PC reviews and ratings, price comparisons, as well as support forums and news.

TechnologyGuide

TechnologyGuide.com is a family of product review and evaluation websites that are the leading source for information on the latest desktop and notebook computers, software and printers, wireless smartphones, digital cameras, and other devices for both the consumer and business markets.

Back to Top

Data Center Management

Search400

Search400.com is an online information resource for the latest news, tech tips and expert advice for the iSeries professional.

  • Quiz: iSeries (AS/400) History

    2003 marks the 15th anniversary of the AS/400 (now called the iSeries), so we thought we'd take a look back and see how it's changed over the years.

  • Quiz: iSeries (AS/400) Commands

    The iSeries (AS/400) is one of IBM's greatest success stories.

  • OS/400

    OS/400 is IBM's operating system for its AS/400 and AS/400e line of business computers. (Continued...)

SearchCloudProvider

At SearchCloudProvider.com you'll find news and resources on building cloud services with robust data center, network, storage and security elements; enabling service delivery and management; delivering specific cloud applications; and evaluating and selecting cloud technology, solutions and platforms.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

  • Microsoft Intune

    Microsoft Intune (formerly Windows Intune) is a cloud-based desktop and mobile device management tool that helps organizations provide their employees with access to corporate applications, data, and resources from the device of their choice.

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • technological convergence

    When different systems or procedures come together into one device or form factor, it's known as technology convergence.

  • VSPEX

    VSPEX is a platform specification from Dell EMC to guide the building of systems for converged and hyper-converged infrastructure (HCI).

  • Pivot3

    Pivot3 is a hyperconverged appliance vendor that has deployed over 16,000 infrastructures and all-flash arrays in over 50 countries around the world.

SearchDataCenter

SearchDataCenter.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • power cycling

    Power cycling is the process of turning hardware off and then turning it on again. In the data center, technicians use power cycling to test the durability and reliability of network components.

  • data center

    A data center (or datacenter) is a facility composed of networked computers and storage that businesses or other organizations use to organize, process, store and disseminate large amounts of data.

  • colocation marketplace

    A colocation marketplace is an online platform that connects colocation users with managed service providers, IT vendors and potential business partners.

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is the leading source for tactical expert advice and best practices on desktop management and security. The site provides essential resources including the latest tips, tutorials, webcasts, white papers and more.

  • Microsoft Windows 10 Long Term Servicing Branch

    Microsoft Windows 10 Long Term Servicing Branch is a licensing structure available for operating system updates in Windows 10 Enterprise.

  • unified endpoint management (UEM)

    Unified endpoint management (UEM) is an approach to securing and controlling personal computers (PCs), smartphones and tablets in a connected, cohesive manner from a single console.

  • Internet Explorer (IE)

    Internet Explorer (IE) is a World Wide Web browser made by Microsoft for use on its Windows operating system.

SearchEnterpriseLinux

SearchEnterpriseLinux.com is the Web's best resource for Linux admins and managers.

  • Puppet (Puppet Labs)

    Puppet is an open source systems management tool for centralizing and automating configuration management. Administrators can encode the configuration of a service as a policy, which Puppet then monitors and enforces.

  • Linux operating system

    Linux is a Unix-like, open source and community-developed operating system for computers, servers, mainframes, mobile devices and embedded devices.

  • logical volume management (LVM)

    Logical volume management (LVM), a form of storage virtualization, offers system administrators a more flexible approach to managing disk storage space than traditional partitioning.

SearchITOperations

As hybrid cloud deployments, containers, microservices and DevOps continue to become part of a data center's infrastructure, IT operations pros are facing a new set of responsibilities. Because they must be agile and able to manage next-gen apps in blended environments, the roles and responsibilities of development and operation teams are blending. 

  • MIS (management information systems)

    MIS, or management information systems, is the software and hardware to support critical business applications. MIS also refers to the staff who select and manage these systems.

  • IT incident report

    An IT incident report is documentation of an event that has disrupted the normal operation of some IT system (or that had the potential to do so) and how that situation was handled.

  • IT service delivery (information technology service delivery)

    IT service delivery is the manner in which a corporation provides information technology access to users throughout an application's lifecycle.

SearchWindowsServer

SearchWindowsServer.com is dedicated to serving the information needs of Windows server professionals. The site provides targeted news, expert advice, tips, tutorials, learning guides, webcasts, white papers and more.

Back to Top

Database

SearchOracle

Visit SearchOracle.com for information and tips for the Oracle community. The site provides comprehensive coverage of all Oracle-specific news, trends and developments in the database industry.

  • Oracle Corp.

    Oracle Corp. is one of the largest vendors in the enterprise IT market, offering a wide variety of software and hardware technologies for use in corporate applications.

  • distributed database

    A distributed database is a database in which portions of the database are stored on multiple computers within a network.

  • Oracle E-Business Suite

    Oracle E-Business Suite is a set of applications for managing business operations, including customer relationship management, enterprise resource planning and supply chain management processes.

Back to Top

Disaster Recovery / Compliance

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public companies in the United States to protect investors' interests.

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives. Cyborg anthropology as a discipline originated at the 1993 annual meeting of the American Anthropological Association.

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of regulatory compliance.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • What is digital asset management (DAM)?

    Digital asset management (DAM) is a business process for organizing, storing and retrieving rich media and managing digital rights and permissions. Rich media assets include images, video, audio and other multimedia content.

  • Microsoft MyAnalytics

    Microsoft MyAnalytics, formerly Delve Analytics, is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.

  • Microsoft Flow

    Microsoft Flow is a cloud-based software tool that allows employees to create and automate workflows across multiple applications and services without the need for developer help.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • Veritas Backup Exec (Symantec Backup Exec)

    Veritas Backup Exec is a data protection software product that supports virtual, physical and cloud platforms.

  • data deduplication hardware

    Data deduplication hardware is a storage product that eliminates redundant copies of data and retains one instance to be stored. Although these products are sold as appliances or disk libraries, they include software that performs the deduplication.

  • cold backup (offline backup)

    Cold backups are ideal for disaster recovery because they protect important data. But the process requires downtime, so it should be conducted during quiet periods.

SearchDisasterRecovery

Natural disasters, internal threats, user error and terrorist acts are realities that IT must take into consideration in their efforts to effectively protect their digital assets. Fortunately, SearchDisasterRecovery.com is the premier online resource for IT professionals responsible for disaster recovery planning.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration responsibilities to a third-party provider.

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery works, causes of data loss and data recovery techniques.

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation work and testing.

Back to Top

Emerging Technologies

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • MEMS (micro-electromechanical systems)

    A MEMS (microelectromechanical system) is a miniature machine that has both mechanical and electronic components.

  • embedded system

    An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, that is designed for a specific function or for specific functions within a larger system.

  • fog computing (fog networking, fogging)

    Fog computing, also known as fog networking or fogging, brings the benefits of the cloud closer to where data is created: at the network's edge.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

  • NFV MANO (network functions virtualization management and orchestration)

    NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.

  • overlay network

    An overlay network is a telecommunications network that is built on top of another network and is supported by its infrastructure.

  • vCPE (virtual customer premise equipment)

    Virtual customer premise equipment (also referred to as vCPE or cloud CPE) are enterprise network services delivered through software. While providers must manually deploy traditional, physical CPE devices onsite, they can provision and manage vCPE remotely.

Back to Top

Healthcare IT

SearchHealthIT

SearchHealthIT.com is the health care technology professional’s how-to guide to building and managing an electronic health care infrastructure.

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician practices and hospitals.

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare coverage.

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes the first national standards to protect patients' personal health information.

Back to Top

Networking

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • MEMS (micro-electromechanical systems)

    A MEMS (microelectromechanical system) is a miniature machine that has both mechanical and electronic components.

  • embedded system

    An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, that is designed for a specific function or for specific functions within a larger system.

  • fog computing (fog networking, fogging)

    Fog computing, also known as fog networking or fogging, brings the benefits of the cloud closer to where data is created: at the network's edge.

SearchEnterpriseWAN

SearchEnterpriseWAN.com is one of the largest and most active online communities dedicated to the enterprise wide area network.

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).

  • virtual private network (VPN)

    A virtual private network creates an encrypted connection over a less secure network when the network infrastructure cannot provide enough security to connected systems.

  • ISDN (Integrated Services Digital Network)

    ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.

SearchMobileComputing

SearchMobileComputing.com provides comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise.

  • Apple iOS

    Apple iOS is a proprietary mobile operating system for the iPhone, iPad and iPod Touch.

  • Wi-Fi (802.11x standard)

    Wi-Fi is the popular term for high-frequency wireless local area network (WLAN) technology and a standard that has gained acceptance in many companies as an alternative to a wired LAN.

  • Bluetooth

    Bluetooth technology allows computers, mobile devices and accessories to easily interconnect with each other. A Bluetooth connection is wireless and works over a short range.

SearchNetworking

SearchNetworking.com is one of the largest and most active online communities dedicated to the enterprise network.

  • Network Time Protocol (NTP)

    Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network.

  • radio frequency (RF, rf)

    Radio frequency is a measurement representing the oscillation rate of electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies ranging from 300 GHz to as low as 9 kHz.

  • telematics

    Telematics uses GPS and mobile devices to send and receive information that helps control remote objects, primarily in the automotive industry.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

  • NFV MANO (network functions virtualization management and orchestration)

    NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.

  • overlay network

    An overlay network is a telecommunications network that is built on top of another network and is supported by its infrastructure.

  • vCPE (virtual customer premise equipment)

    Virtual customer premise equipment (also referred to as vCPE or cloud CPE) are enterprise network services delivered through software. While providers must manually deploy traditional, physical CPE devices onsite, they can provision and manage vCPE remotely.

SearchTelecom

Whether you're an IT Pro looking for advice on building-out an infrastructure to support new customer demands or a product manager seeking new tech insights to boost ARPU, SearchTelecom.com is a critical online resource for IT and business professionals.

  • BGP (Border Gateway Protocol)

    BGP (Border Gateway Protocol) is a protocol that manages how packets are routed across the internet through the exchange of routing and reachability information between edge routers.

  • Telecommunications

    Telecommunications is the transmission of data, voice and video over significant distances by electronic means that use a wide variety of networks and media.

  • CDMA (Code-Division Multiple Access)

    CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications.

SearchUnifiedCommunications

SearchUnifiedCommunications.com provides a reliable source of how-to tips and best practices for implementing, managing and securing VoIP and advanced IP applications, enabling IT professionals to take advantage of the cost savings and new features and benefits associated with converged enterprise network.

  • VoIP (voice over IP)

    VoIP enables voice and multimedia communications, such as phone calls, over the internet and other IP-based networks, and allows enterprises to operate a single voice and data network.

  • web conferencing

    Web conferencing is a form of communication that enables real-time sharing of computer screens, applications or web-based content among two or more devices.

  • video conference (video conferencing)

    A video conference is a live connection between people in separate locations for the purpose of communication, usually involving video, audio and text.

Back to Top

Security

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • AWS CloudTrail

    AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS).

  • cloud access security broker (CASB)

    Cloud access security brokers (CASBs) are tools or services that enforce an organization's security policies in a public cloud environment.

  • CAIQ (Consensus Assessments Initiative Questionnaire)

    The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud provider.

SearchFinancialSecurity

IT professionals turn to SearchFinancialSecurity.com for the information they require to keep their corporate data and assets secure.

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Shared Assessments Program

    Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.

  • Common Vulnerabilities and Exposures (CVE)

    Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.

SearchMidmarketSecurity

SearchMidmarketSecurity.com is the only security-specific information resource geared toward midsize companies that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, a selection of highly focused security e-newsletters and more - all at no cost.

  • unified threat management (UTM)

    Unified threat management (UTM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console.

  • endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication.

SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure.

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple different locations or networks.

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all other applications from running.

Back to Top

Social Media

ITKnowledgeExchange

Find technology questions and answers in this community of information technology (IT) experts and professionals.

Back to Top

Storage

SearchCloudStorage

SearchCloudStorage.com provides vendor-neutral guidelines on all your cloud storage related concerns – such as selecting the vendor that best fits your needs, determining which of the many available cloud storage services may be appropriate for your company, and using the cloud to relieve ongoing headaches with your backups, archives, and disaster recovery plans.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an underlying part of the transaction.

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or public cloud storage service.

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA platforms.

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • technological convergence

    When different systems or procedures come together into one device or form factor, it's known as technology convergence.

  • VSPEX

    VSPEX is a platform specification from Dell EMC to guide the building of systems for converged and hyper-converged infrastructure (HCI).

  • Pivot3

    Pivot3 is a hyperconverged appliance vendor that has deployed over 16,000 infrastructures and all-flash arrays in over 50 countries around the world.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • Veritas Backup Exec (Symantec Backup Exec)

    Veritas Backup Exec is a data protection software product that supports virtual, physical and cloud platforms.

  • data deduplication hardware

    Data deduplication hardware is a storage product that eliminates redundant copies of data and retains one instance to be stored. Although these products are sold as appliances or disk libraries, they include software that performs the deduplication.

  • cold backup (offline backup)

    Cold backups are ideal for disaster recovery because they protect important data. But the process requires downtime, so it should be conducted during quiet periods.

SearchSMBstorage

SearchSMBstorage.com provides tailored instructions on how to tackle the most common SMB storage issues surrounding Network Attached Storage, iSCSI, online backup, disaster recovery services, data security, and many more.

  • Shared SAS

    Shared serial-attached SCSI (SAS) is a method for attaching more than one server to a storage array via individual point-to-point or SAS switched connections.

  • desktop NAS

    Desktop NAS (network-attached storage) is a device that stores and serves the file-level data of networked computers.

  • SAN-in-a-box

    A SAN-in-a-box, also known as a SAN-in-a-can or a SAN kit, is a data storage device that includes all the basic SAN components are in a single package.

SearchSolidStateStorage

Solid state/flash memory technologies are not new. Traditionally viewed as being far superior to disk technologies in terms of performance and speed, until recently practical and affordable flash storage applications were few and far between. But that is changing quickly. New, innovative applications are hitting the market fast. With data centers that are growing in complexity – and data that is growing in volume – storage managers need innovations that can meet today’s challenges. And creative applications of flash, DRAM and other solid-state technologies are filling those needs.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so data requests can be met with improved speed.

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchStorage

The TechTarget Storage Media Group has built a community of the largest and most audience of storage decision-makers on the web.

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by temporarily transferring data from RAM to disk storage.

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 zettabytes, a trillion terabytes or a million trillion megabytes.

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte or bit in computing and telecommunications.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

Back to Top

Vendor Research

KnowledgeStorm

Browse the database of business technology software products and services.

Back to Top

Virtualization

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • hypervisor

    A hypervisor is a function which abstracts -- isolates -- operating systems and applications from the underlying computer hardware.

  • containerization (container-based virtualization)

    Containerization -- also called container-based virtualization and application containerization -- is an OS-level virtualization method for deploying and running distributed applications without launching an entire VM for each application.

  • Certified OpenStack Administrator

    Certified OpenStack Administrator (COA) is a vendor-agnostic exam designed by the OpenStack Foundation in conjunction with a number of international partners to test an administrator's abilities in cloud management and day-to-day operations.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • virtual desktop infrastructure (VDI)

    Virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server.

  • Citrix XenApp

    Citrix XenApp is an application virtualization product that extends Microsoft Remote Desktop Session Host desktop sessions and apps to users via the Citrix HDX protocol. It can run on Citrix XenServer or other server virtualization platforms.

  • VMware Blast Extreme

    VMware Blast Extreme is a remote display protocol designed to deliver graphics-intensive virtual workloads using the H.264 advanced video compression standard.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware vCloud Air Hybrid Cloud Manager

    VMware vCloud Air Hybrid Cloud Manager uses a network extension to allow users to manage both on and off-premises from a single interface.

  • SysTrack Desktop Assessment for VMware

    SysTrack Desktop Assessment for VMware is a free cloud-based assessment service, developed in conjunction with Lakeside Software, that provides metrics and information about an environment and as well as how to best deploy VMware Horizon.

  • VMware Access Point

    VMware Access Point is a virtual appliance used as a secure gateway which authorized users can access VMware computing resources.

Back to Top

White Papers and Webcasts

BitPipe

A free library of IT white papers, webcasts and product information to help with your IT purchase decisions. Research the latest tools, technologies and techniques and compare offerings from thousands to technology companies.

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • national provider identifier (NPI)

    A national provider identifier (NPI) is a unique ten-digit identification number required by HIPAA for covered healthcare ...

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close