Browse Definitions:

Find Technology-Specific Sites

TechTarget gives technology professionals and executives the information they need to perform their jobs – from developing strategy, to making cost-effective purchase decisions and managing their organizations' technology projects. Bookmark this page for easy access to the TechTarget network of technology-specific websites.  

Browse TechTarget Sites by Topic

Application Development

Ajaxian

Ajaxian is a resource for software developers who work with Ajax, PHP, ASP.net, jQuery, Javascript, NodeJS, noSQL, FP and Visualization.

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • Red Hat OpenShift

    Red Hat OpenShift is a multifaceted, open source container application platform from Red Hat Inc. for the development, deployment and management of applications.

  • cloud application

    A cloud application, or cloud app, is a software program where cloud-based and local components work together.

  • iPaaS (integration platform as a service)

    Integration platform as a service (iPaaS) is a set of cloud-based tools that enables software engineers to deploy, manage, govern and integrate applications and services. iPaaS is also referred to as cloud-based integration.

SearchMicroservices

SearchMicroservices.com provides readers with industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, business process management (BPM), application integration and APIs, software containers, microservices and DevOps.

  • applet

    An applet (little application) is a small software program that supports a larger application program. In the past, the term applet was often associated with the Java programming language.

  • open API (public API)

    An open API, also known as a public API, is an application programming interface that allows the owner of a network-accessible service to give universal access to consumers of that service, such as developers.

  • application program interface (API)

    An application program interface (API) is code that allows two software programs to communicate with each other.

SearchSoftwareQuality

SearchSoftwareQuality.com is the online community for developers, architects and executives interested in building secure and quality software.

  • Agile Software Development

    In software application development, Agile is a methodology that anticipates the need for flexibility and applies a level of pragmatism into the delivery of the finished product.

  • test-driven development (TDD)

    Test-driven development (TDD), also called test-driven design, is a method of implementing software programming that interlaces unit testing, programming and refactoring on source code.

  • Scrum

    Scrum is a collaborative Agile development framework that breaks large processes down into small pieces in order to streamline efficiency.

SearchWinDevelopment

SearchWinDevelopment.com is a unique online resource for developers, architects and development managers tasked with building and maintaining enterprise applications using Visual Basic, C# and the Microsoft .NET platform.

  • scripting language

    A scripting language is a form of programming language that is usually interpreted rather than compiled. Scripting languages are typically converted into machine code on the fly during runtime by a program called an interpreter.

  • Internet

    The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).

  • domain name

    A domain name locates an organization or other entity on the Internet. For example, the domain name "www.totalbaseball.com" locates an Internet address for "totalbaseball.com" at Internet point 199.0.0.2 and a particular host server named "www."

TheServerSide

TheServerSide.com is the world’s largest online community for enterprise Java architects and developers, providing daily news, tech talk interviews with key industry figures, design patterns, discussion forums, tutorials and more.

  • Java Platform, Enterprise Edition (Java EE)

    The Java Platform, Enterprise Edition (Java EE) is a collection of Java APIs owned by Oracle that software developers can use to write server-side applications. It was formerly known as Java 2 Platform, Enterprise Edition, or J2EE.

  • JAR file (Java Archive)

    A Java Archive, or JAR file, contains all of the various components that make up a self-contained, executable Java application, deployable Java applet or, most commonly, a Java library to which any Java Runtime Environment can link.

  • Java

    Java is a widely used programming language expressly designed for use in the distributed environment of the internet.

Back to Top

Business Intelligence / Analytics

BeyeNETWORK

BeyeNETWORK.com is the primary site of the BeyeNETWORK, providing viewers with access to the thought leaders in business intelligence, performance management, business integration, information quality, data warehousing and more.

SearchBusinessAnalytics

SearchBusinessAnalytics.com is dedicated to serving the information needs of business and IT professionals.

  • data visualization

    Data visualization is a general term that describes any effort to help people understand the significance of data by placing it in a visual context.

  • Apache Spark

    Apache Spark is an open source parallel processing framework for running large-scale data analytics applications across clustered computers. It can handle both batch and real-time analytics and data processing workloads.

  • social media analytics

    Social media analytics is the practice of gathering data from social media websites and analyzing that data using social media analytics tools to make business decisions.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • content management (CM)

    Content management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format.

  • Bitly

    Bitly is a URL shortener service that enables users to truncate webpage links.

  • decoupled CMS (content management system)

    Pioneered, in the early 2000s, decoupled CMS is an approach to web application deployment for enhancing the performance and security of WCM systems.

SearchCRM

SearchCRM.com is a free resource dedicated to Customer Relationship Management (CRM) decision makers.

  • customer engagement

    Customer engagement is the means by which a company creates a relationship with its customer base to foster brand loyalty and awareness

  • martech (marketing technology)

    Martech is the blending of marketing and technology. It applies to initiatives, efforts, and tools that harness technology to improve marketing efficiency.

  • programmatic marketing

    Programmatic marketing is best defined in two parts. In this case, 'programmatic' refers to a non-human decision-making process that can be initiated in real time.

SearchDataManagement

SearchDataManagement.com is a guide for data management professionals and business leaders.

  • denormalization

    In a relational database, denormalization is an approach to optimizing performance in which the administrator selectively adds back specific instances of duplicate data after the data structure has been normalized.

  • semantic technology

    Semantic technology is a set of methods and tools that provide advanced means for categorizing and processing data, as well as for discovering relationships within varied data sets.

  • data

    In computing, data is information that has been translated into a form that is efficient for movement or processing.

SearchSQLServer

SearchSQLServer.com is dedicated to serving the information needs of database developers and administrators working with Microsoft's flagship database enterprise server, SQL Server.

  • Microsoft SSIS (SQL Server Integration Services)

    Microsoft SSIS (SQL Server Integration Services) is an enterprise data integration, data transformation and data migration tool built into Microsoft's SQL Server database

  • T-SQL (Transact-SQL)

    T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.

  • flat file

    A flat file contains records that have no structured interrelationship. A flat file typically consists of a text file, from which all word processing or other structure characters or markup have been removed.

Back to Top

Business Software

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • Red Hat OpenShift

    Red Hat OpenShift is a multifaceted, open source container application platform from Red Hat Inc. for the development, deployment and management of applications.

  • cloud application

    A cloud application, or cloud app, is a software program where cloud-based and local components work together.

  • iPaaS (integration platform as a service)

    Integration platform as a service (iPaaS) is a set of cloud-based tools that enables software engineers to deploy, manage, govern and integrate applications and services. iPaaS is also referred to as cloud-based integration.

SearchDomino

SearchDomino.com is a leading source for Lotus Notes and Domino-specific information for enterprise IT professionals.

  • knowledge management (KM)

    Knowledge management is a concept in which an enterprise consciously and comprehensively gathers, organizes, shares and analyzes its knowledge in terms of resources, documents, and people skills.

  • Instant Messaging: Glossary

    This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.

  • iNotes (iNotes Web Access)

    iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.

SearchExchange

SearchExchange.com is dedicated to serving the information needs of administrators and managers of Microsoft Exchange and Outlook messaging applications.

  • Microsoft Office 365 Admin Center

    The Microsoft Office 365 Admin Center is the web-based portal administrators use to manage user accounts and configuration settings for the Office 365 subscription services, including Exchange Online and SharePoint Online.

  • Microsoft Office 365 admin roles

    Microsoft Office 365 admin roles give users authorization to perform certain tasks in the Office 365 admin center. Only the global administrator can assign or modify an admin role, which grants the permissions required to control certain functions in Office 365.

  • MAPI over HTTP (Messaging Application Programming Interface over HTTP)

    MAPI over HTTP is the default transport protocol to connect clients to Microsoft Exchange and Exchange Online.

SearchFinancialApplications

SearchFinancialApplications.com is dedicated to serving the information needs of business and IT professionals using technology to manage finance and human resources (HR) functions.

  • general ledger (GL)

    A general ledger (GL) is a set of numbered accounts a business uses to keep track of its financial transactions and to prepare financial reports.

  • Accounts receivable (AR)

    Accounts receivable (AR) is an item in the general ledger (GL) that shows money owed to a business by customers who have purchased goods or services on credit.

  • software robotics

    Software robotics is the use of bot programs to automate computer tasks normally performed by people. Software robotics is synonymous with robotic process automation (RPA) and is the less widely used term, except in the financial services industry.

SearchManufacturingERP

SearchManufacturingERP.com provides manufacturing IT and business professionals with information on enterprise resource planning (ERP) technology and ERP best practices in the manufacturing industry today.

  • supply chain sustainability

    Supply chain sustainability (SCS) is a holistic view of supply chain processes and technologies that addresses the environmental, social and legal aspects of a supply chain's components as well as their economic factors.

  • process mining software

    Process mining software is a type of analytics software that mines the event logs of enterprise applications for trends and patterns that can help improve understanding of the processes and make them more efficient.

  • hybrid manufacturing

    Hybrid manufacturing is a term that describes combining additive manufacturing and subtractive manufacturing in a single machine system.

SearchSalesforce

SearchSalesforce.com is a resource for Salesforce news, expert advice, technical tips and career guidance as well as a forum for community interaction. The site focuses on the Salesforce customer relationship management (CRM) platform as well as its ecosystem of partners.

  • Salesforce Solution Architect

    A Salesforce Solution Architect is someone who has been certified for demonstrating the capabilities to build and design solutions across Salesforce platforms.

  • customer journey map

    A customer journey map is a diagram or several diagrams that depict the stages customers go through when interacting with a company, from buying products online to accessing customer service on the phone to airing grievances on social media.

  • Salesforce DX

    Salesforce DX is a Salesforce product in the App cloud that allows users to develop and manage Salesforce apps throughout the entire platform in a more direct and efficient way.

SearchSAP

SearchSAP.com is the SAP community's resource for news, expert advice, technical tips and career guidance.

  • SAP Leonardo

    SAP Leonardo is a collection of software and services that organizations can use to develop digital transformation applications.

  • SAP HANA

    SAP HANA is an in-memory database and application development platform for processing high volumes of data in real time.

  • ERP (enterprise resource planning)

    Enterprise resource planning (ERP) is an industry term for the broad set of activities that help an organization manage its business. An important goal of ERP software is to facilitate the flow of information so business decisions can be data-driven.

Back to Top

CIO Strategies

ComputerWeekly

ComputerWeekly.com is the leading provider of news, analysis, opinion, information and services for the UK IT community. The site serves as an advocate for UK IT professionals and the role of technology in improving organisations in all sectors of business and public life.

ebizQ

ebizQ is the insider’s guide to next-generation business process management. The site offers a growing collection of independent editorial articles on BPM trends, issues, challenges and solutions, all targeted to business and IT BPM professionals.

SearchCIO

SearchCIO.com provides technology management strategies designed exclusively for the enterprise CIO. Our award-winning team of editors and industry luminaries offer strategic advice and technology best practices to help streamline global IT operations.

  • blockchain

    Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data. A blockchain functions as a decentralized database that is managed by computers belonging to a peer-to-peer (P2P) network. Each of the computers in the distributed network maintains a copy of the ledger to prevent a single point of failure and all copies are updated simultaneously.

  • crowdsourcing

    Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.

  • digital transformation (DX)

    Digital transformation (DX) is the reworking of the products, processes and strategies within an organization by leveraging current technologies.

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.

Back to Top

Channel Resources

MicroScope

Stay ahead with IT Business management and technology news and articles on UK laws, regulations, credit and finance, selling, sales management, marketing and supplier relationships.

SearchITChannel

If you're a value-added reseller (VAR), information technology reseller or a systems integrator, all of your research needs are met at SearchITChannel.com.

  • authorized service provider (ASP)

    An authorized service provider (ASP) is an organization that a product manufacturer has deemed qualified to service products covered under the manufacturer's warranty.

  • distribution channel

    A distribution channel is the network of individuals and organizations involved in the process of moving a product or service from the producer to the end user.

  • systems integrator (SI)

    A systems integrator (SI) is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.

Back to Top

Cloud

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchAWS

From cloud infrastructure to applications, development, security, big data, storage and more, SearchAWS.com provides meaningful insight from award-winning editors, research analysts and industry experts on one of the fastest-growing cloud services providers, Amazon Web Services.

  • AWS Organizations

    AWS Organizations is a cloud service that applies and manages access policies across Amazon Web Services accounts.

  • Amazon EFS (Elastic File System)

    Amazon EFS (Elastic File System) is a cloud-based file storage service for applications and workloads that run in the Amazon Web Services (AWS) public cloud.

  • AWS Import/Export

    AWS Import/Export is a program that enables an IT team to move large amounts of data into and out of the Amazon Web Services public cloud with portable storage devices.

SearchCloudComputing

SearchCloudComputing.com is the Web's most comprehensive resource for cloud computing news, analysis and case studies.

  • cloud computing

    Cloud computing is a general term for the delivery of hosted services over the internet.

  • Microsoft Azure Functions

    Azure Functions is the serverless computing service hosted on the Microsoft Azure public cloud.

  • cloud management

    Cloud management is the exercise of administrative control over public, private and hybrid clouds.

SearchCloudProvider

At SearchCloudProvider.com you'll find news and resources on building cloud services with robust data center, network, storage and security elements; enabling service delivery and management; delivering specific cloud applications; and evaluating and selecting cloud technology, solutions and platforms.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

  • Microsoft Intune

    Microsoft Intune (formerly Windows Intune) is a cloud-based desktop and mobile device management tool that helps organizations provide their employees with access to corporate applications, data, and resources from the device of their choice.

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • AWS CloudTrail

    AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS).

  • cloud access security broker (CASB)

    Cloud access security brokers (CASBs) are tools or services that enforce an organization's security policies in a public cloud environment.

  • CAIQ (Consensus Assessments Initiative Questionnaire)

    The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud provider.

SearchCloudStorage

SearchCloudStorage.com provides vendor-neutral guidelines on all your cloud storage related concerns – such as selecting the vendor that best fits your needs, determining which of the many available cloud storage services may be appropriate for your company, and using the cloud to relieve ongoing headaches with your backups, archives, and disaster recovery plans.

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an underlying part of the transaction.

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or public cloud storage service.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • Xen

    Xen is the open source hypervisor included in the Linux kernel and, as such, it is available in all Linux distributions.

  • VMware vRealize Suite

    VMware vRealize Suite, formerly called vCenter Operations Management Suite, is a software platform designed to help IT administrators build and manage heterogeneous, hybrid clouds.

  • virtual hard drive

    A virtual hard drive file is a container file that acts similar to a physical hard drive.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • published applications

    Published applications are virtual software programs that function as if they were installed locally.

  • virtual desktop

    A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.

  • desktop virtualization

    Desktop virtualization is the concept of isolating a logical operating system instance from the client that is used to access it.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware Workstation Pro

    VMware Workstation Pro is a 64-bit hosted hypervisor intended to implement virtualization on Microsoft Windows and Linux endpoint computers, such as desktop systems.

  • VMware vSAN (formerly Virtual SAN)

    VMware vSAN (VMware Virtual SAN) is a storage feature integrated in the vSphere 5.5 and above kernel that pools disk space from multiple ESXi hosts.

  • vSphere HA (VMware HA)

    VMware vSphere HA (High Availability) is a utility included in VMware's vSphere software that can restart failed virtual machines (VMs) on alternative host servers to reduce application downtime.

Back to Top

Consumer Product Review

Brighthand

Brighthand.com offers SmartPhone, handheld computer, and cell phone reviews and news. Our active forum community is a great source of information on SmartPhones and related devices.

DigitalCameraReview

DigitalCameraReview.com offers digital camera reviews and news, a forum community, digital camera price comparisons, deals and coupons on digital cameras and accessories.

NotebookReview

NotebookReview.com offers the latest notebook and laptop reviews, as well as price comparisons, support forums and news."

TabletPCReview

TabletPCReview.com offers Tablet PC reviews and ratings, price comparisons, as well as support forums and news.

TechnologyGuide

TechnologyGuide.com is a family of product review and evaluation websites that are the leading source for information on the latest desktop and notebook computers, software and printers, wireless smartphones, digital cameras, and other devices for both the consumer and business markets.

Back to Top

Data Center Management

Search400

Search400.com is an online information resource for the latest news, tech tips and expert advice for the iSeries professional.

  • Quiz: iSeries (AS/400) History

    2003 marks the 15th anniversary of the AS/400 (now called the iSeries), so we thought we'd take a look back and see how it's changed over the years.

  • Quiz: iSeries (AS/400) Commands

    The iSeries (AS/400) is one of IBM's greatest success stories.

  • OS/400

    OS/400 is IBM's operating system for its AS/400 and AS/400e line of business computers. (Continued...)

SearchCloudProvider

At SearchCloudProvider.com you'll find news and resources on building cloud services with robust data center, network, storage and security elements; enabling service delivery and management; delivering specific cloud applications; and evaluating and selecting cloud technology, solutions and platforms.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

  • Microsoft Intune

    Microsoft Intune (formerly Windows Intune) is a cloud-based desktop and mobile device management tool that helps organizations provide their employees with access to corporate applications, data, and resources from the device of their choice.

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

SearchDataCenter

SearchDataCenter.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • CMDB (configuration management database)

    A configuration management database (CMDB) is a database that contains all relevant information about the hardware and software components used in an organization's IT services and the relationships between those components.

  • infrastructure (IT infrastructure)

    Infrastructure is the foundation or framework that supports a system or organization.

  • SUSE Manager

    SUSE Manager is an open source infrastructure management tool for Linux systems.

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is the leading source for tactical expert advice and best practices on desktop management and security. The site provides essential resources including the latest tips, tutorials, webcasts, white papers and more.

SearchEnterpriseLinux

SearchEnterpriseLinux.com is the Web's best resource for Linux admins and managers.

SearchITOperations

As hybrid cloud deployments, containers, microservices and DevOps continue to become part of a data center's infrastructure, IT operations pros are facing a new set of responsibilities. Because they must be agile and able to manage next-gen apps in blended environments, the roles and responsibilities of development and operation teams are blending. 

  • Docker

    Docker is an open source software platform to create, deploy and manage virtualized application containers on a common operating system (OS), with an ecosystem of allied tools.

  • software asset management (SAM)

    Software asset management (SAM) is the part of IT asset management that seeks to ensure compliance with license agreements and prevent overspending on software.

  • DevOps

    In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable. In its most narrow interpretation, DevOps describes the part of an organization’s information technology (IT) team that creates and maintains infrastructure.

SearchWindowsServer

SearchWindowsServer.com is dedicated to serving the information needs of Windows server professionals. The site provides targeted news, expert advice, tips, tutorials, learning guides, webcasts, white papers and more.

  • Microsoft Powershell Core

    Microsoft PowerShell Core is the open-source version of the Microsoft PowerShell automation and configuration management tool built on the .NET Core that runs on Windows, Linux and macOS systems.

  • PowerShell

    PowerShell is an object-oriented automation engine and scripting language with an interactive command-line shell that Microsoft developed to help IT professionals configure systems and automate administrative tasks.

  • Windows containers

    Windows containers are abstracted, isolated and portable operating environments supported by the Microsoft Windows Server 2016 operating system and managed with tools such as Docker and PowerShell.

Back to Top

Database

SearchOracle

Visit SearchOracle.com for information and tips for the Oracle community. The site provides comprehensive coverage of all Oracle-specific news, trends and developments in the database industry.

  • Oracle

    Oracle is one of the largest vendors in the enterprise IT market and the shorthand name of its flagship product, a relational database management system (RDBMS) that's formally called Oracle Database.

  • Oracle extents

    Oracle extents are a set of contiguous blocks allocated in an Oracle database.

  • foreign key

    A foreign key is a column or columns of data in one table that connects to the primary key data in the original table.

Back to Top

Disaster Recovery / Compliance

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • content management (CM)

    Content management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format.

  • Bitly

    Bitly is a URL shortener service that enables users to truncate webpage links.

  • decoupled CMS (content management system)

    Pioneered, in the early 2000s, decoupled CMS is an approach to web application deployment for enhancing the performance and security of WCM systems.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • data restore

    Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location.

  • Dell EMC Avamar

    Dell EMC Avamar is a hardware and software data backup product.

  • ghost imaging

    Ghost imaging is a software-driven data backup process that copies the contents of a computer hard disk in a single compressed file or set of files, referred to as an image.

SearchDisasterRecovery

Natural disasters, internal threats, user error and terrorist acts are realities that IT must take into consideration in their efforts to effectively protect their digital assets. Fortunately, SearchDisasterRecovery.com is the premier online resource for IT professionals responsible for disaster recovery planning.

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for unforeseen risks to continued operations.

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an event.

Back to Top

Emerging Technologies

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • smart city

    A smart city is a municipality that uses information and communication technologies to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare.

  • Zigbee

    Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.

  • microcontroller

    A microcontroller is a compact integrated circuit designed to govern a specific operation in an embedded system.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

  • SD-WAN (software-defined WAN)

    Software-defined WAN (SD-WAN) is a technology to distribute network traffic across wide area networks (WAN) that uses software-defined networking (SDN) concepts to automatically determine the most effective way to route traffic to and from branch offices and data center sites.

  • east-west traffic

    East-west traffic, in a networking context, is the transfer of data packets from server to server within a data center. The label east-west comes from network diagram drawings that usually depict local area network (LAN) traffic horizontally.

  • ONOS (Open Network Operating System)

    ONOS (Open Network Operating System) is an operating system (OS) designed for network service providers to help build carrier-grade software-defined networks architected for high scalability, availability and performance

Back to Top

Healthcare IT

SearchHealthIT

SearchHealthIT.com is the health care technology professional’s how-to guide to building and managing an electronic health care infrastructure.

  • enterprise master patient index (EMPI)

    An enterprise master patient index (EMPI) is a database that is used to maintain consistent and accurate information about each patient registered by a healthcare organization.

  • HIPAA (Health Insurance Portability and Accountability Act)

    HIPAA (Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information.

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery across the general population or a group of individuals.

Back to Top

Networking

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • smart city

    A smart city is a municipality that uses information and communication technologies to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare.

  • Zigbee

    Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.

  • microcontroller

    A microcontroller is a compact integrated circuit designed to govern a specific operation in an embedded system.

SearchEnterpriseWAN

SearchEnterpriseWAN.com is one of the largest and most active online communities dedicated to the enterprise wide area network.

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).

  • ISDN (Integrated Services Digital Network)

    ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.

  • File Transfer Protocol (FTP)

    File Transfer Protocol (FTP) is a client-server standard used to transfer files between computers over the Internet using control and data channels.

SearchMobileComputing

SearchMobileComputing.com provides comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise.

  • mobile computing (nomadic computing)

    Mobile computing is the use of portable computing devices in conjunction with mobile technology that enables users to access the internet and data on mobile devices anytime, anywhere.

  • end-user computing (EUC)

    End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.

  • text messaging (texting or wireless messaging)

    Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.

SearchNetworking

SearchNetworking.com is one of the largest and most active online communities dedicated to the enterprise network.

  • spectrum analyzer

    A spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency.

  • network hub

    A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.

  • DHCP (Dynamic Host Configuration Protocol)

    DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

  • SD-WAN (software-defined WAN)

    Software-defined WAN (SD-WAN) is a technology to distribute network traffic across wide area networks (WAN) that uses software-defined networking (SDN) concepts to automatically determine the most effective way to route traffic to and from branch offices and data center sites.

  • east-west traffic

    East-west traffic, in a networking context, is the transfer of data packets from server to server within a data center. The label east-west comes from network diagram drawings that usually depict local area network (LAN) traffic horizontally.

  • ONOS (Open Network Operating System)

    ONOS (Open Network Operating System) is an operating system (OS) designed for network service providers to help build carrier-grade software-defined networks architected for high scalability, availability and performance

SearchTelecom

Whether you're an IT Pro looking for advice on building-out an infrastructure to support new customer demands or a product manager seeking new tech insights to boost ARPU, SearchTelecom.com is a critical online resource for IT and business professionals.

  • over-the-top (OTT)

    Over-the-top (OTT) is networking lingo that describes the delivery of content, services or applications over the internet. OTT edge providers typically deliver their content and services to customers on top of network infrastructure that is owned and maintained by internet service providers (ISPs), like Verizon and AT&T.

  • fiber optics (optical fiber)

    Fiber optics, or optical fiber, refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic strand or fiber.

  • IPTV (Internet Protocol television)

    IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as opposed to traditional cable or satellite signals.

SearchUnifiedCommunications

SearchUnifiedCommunications.com provides a reliable source of how-to tips and best practices for implementing, managing and securing VoIP and advanced IP applications, enabling IT professionals to take advantage of the cost savings and new features and benefits associated with converged enterprise network.

  • Skype for Business

    Skype for Business, formerly known as Microsoft Lync Server, is a unified communications (UC) platform that integrates common channels of business communication and online meetings, including instant messaging (IM), presence, voice over IP (VoIP), video conferencing, file transfer, web conferencing, voicemail and email.

  • codec

    A codec is either a hardware device or a software-based process that compresses and decompresses large amounts of data used in voice over IP, video conferencing and streaming media.

  • 4K video resolution

    4K video resolution is high-definition (HD) video that has four times the resolution of 1080p HD video.

Back to Top

Security

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • AWS CloudTrail

    AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS).

  • cloud access security broker (CASB)

    Cloud access security brokers (CASBs) are tools or services that enforce an organization's security policies in a public cloud environment.

  • CAIQ (Consensus Assessments Initiative Questionnaire)

    The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud provider.

SearchFinancialSecurity

IT professionals turn to SearchFinancialSecurity.com for the information they require to keep their corporate data and assets secure.

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Shared Assessments Program

    Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.

  • Common Vulnerabilities and Exposures (CVE)

    Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.

SearchMidmarketSecurity

SearchMidmarketSecurity.com is the only security-specific information resource geared toward midsize companies that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, a selection of highly focused security e-newsletters and more - all at no cost.

  • unified threat management (UTM)

    Unified threat management (UTM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console.

  • endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication.

SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure.

  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

    A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's scheduled release of the newest security fixes for its Windows operating system and related software applications, as detailed in the Windows Security Updates Guide.

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.

Back to Top

Social Media

ITKnowledgeExchange

Find technology questions and answers in this community of information technology (IT) experts and professionals.

Back to Top

Storage

SearchCloudStorage

SearchCloudStorage.com provides vendor-neutral guidelines on all your cloud storage related concerns – such as selecting the vendor that best fits your needs, determining which of the many available cloud storage services may be appropriate for your company, and using the cloud to relieve ongoing headaches with your backups, archives, and disaster recovery plans.

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an underlying part of the transaction.

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or public cloud storage service.

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • data restore

    Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location.

  • Dell EMC Avamar

    Dell EMC Avamar is a hardware and software data backup product.

  • ghost imaging

    Ghost imaging is a software-driven data backup process that copies the contents of a computer hard disk in a single compressed file or set of files, referred to as an image.

SearchSMBstorage

SearchSMBstorage.com provides tailored instructions on how to tackle the most common SMB storage issues surrounding Network Attached Storage, iSCSI, online backup, disaster recovery services, data security, and many more.

  • Shared SAS

    Shared serial-attached SCSI (SAS) is a method for attaching more than one server to a storage array via individual point-to-point or SAS switched connections.

  • desktop NAS

    Desktop NAS (network-attached storage) is a device that stores and serves the file-level data of networked computers.

  • SAN-in-a-box

    A SAN-in-a-box, also known as a SAN-in-a-can or a SAN kit, is a data storage device that includes all the basic SAN components are in a single package.

SearchSolidStateStorage

Solid state/flash memory technologies are not new. Traditionally viewed as being far superior to disk technologies in terms of performance and speed, until recently practical and affordable flash storage applications were few and far between. But that is changing quickly. New, innovative applications are hitting the market fast. With data centers that are growing in complexity – and data that is growing in volume – storage managers need innovations that can meet today’s challenges. And creative applications of flash, DRAM and other solid-state technologies are filling those needs.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a specially formulated solid dielectric material.

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchStorage

The TechTarget Storage Media Group has built a community of the largest and most audience of storage decision-makers on the web.

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization patterns.

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without involving the processor, cache or OS.

  • software-defined storage (SDS)

    Software-defined storage (SDS) is a computer program that manages data storage resources and functionality and has no dependencies on the underlying physical storage hardware.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

Back to Top

Vendor Research

KnowledgeStorm

Browse the database of business technology software products and services.

Back to Top

Virtualization

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • Xen

    Xen is the open source hypervisor included in the Linux kernel and, as such, it is available in all Linux distributions.

  • VMware vRealize Suite

    VMware vRealize Suite, formerly called vCenter Operations Management Suite, is a software platform designed to help IT administrators build and manage heterogeneous, hybrid clouds.

  • virtual hard drive

    A virtual hard drive file is a container file that acts similar to a physical hard drive.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • published applications

    Published applications are virtual software programs that function as if they were installed locally.

  • virtual desktop

    A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.

  • desktop virtualization

    Desktop virtualization is the concept of isolating a logical operating system instance from the client that is used to access it.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware Workstation Pro

    VMware Workstation Pro is a 64-bit hosted hypervisor intended to implement virtualization on Microsoft Windows and Linux endpoint computers, such as desktop systems.

  • VMware vSAN (formerly Virtual SAN)

    VMware vSAN (VMware Virtual SAN) is a storage feature integrated in the vSphere 5.5 and above kernel that pools disk space from multiple ESXi hosts.

  • vSphere HA (VMware HA)

    VMware vSphere HA (High Availability) is a utility included in VMware's vSphere software that can restart failed virtual machines (VMs) on alternative host servers to reduce application downtime.

Back to Top

White Papers and Webcasts

BitPipe

A free library of IT white papers, webcasts and product information to help with your IT purchase decisions. Research the latest tools, technologies and techniques and compare offerings from thousands to technology companies.

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization ...

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without ...

  • software-defined storage (SDS)

    Software-defined storage (SDS) is a computer program that manages data storage resources and functionality and has no ...

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close