Browse Definitions :

Word of the Day

DNS attack

A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).See More

Newest and Updated Terms

Know-IT-All

  • The essential Wi-Fi 6 glossary

    This Wi-Fi 6 glossary delves into various features and capabilities the new generation of Wi-Fi technology offers, as well as what organizations can expect from Wi-Fi 6 devices.

  • 4 digital transformation terms to know

    As technology evolves, businesses have no choice but to follow. Digital transformations are inevitable in order to keep customers and employees satisfied.

Buzzword Alert

pandemic plan

A pandemic plan is a documented strategy for business continuity in the event of a widespread outbreak of a dangerous infectious disease.

Read More

Essential Knowledge

How can CIOs improve their IT mentorship programs?

According to Deloitte's Anjali Shaikh, CIOs are no better than their C-suite peers at mentoring. An IT talent shortage demands CIOs do better. Here's...

Embedded IT, global talent to define future of IT jobs

As more businesses identify as tech companies, what's the future of IT jobs? Many IT teams will work remotely on a gig-by-gig basis and their ...

IT career skills: Does being a specialist make a difference?

When it comes to developing IT skills, is it better to be the jack-of-all-trades or master of one? Airtel's Harmeen Mehta shares her perspective in ...

Computer vision, machine learning skills help fuel surge in AI jobs

A report by the world's No. 1 job site, Indeed, finds there are more AI jobs than ever, but job-seeker interest is leveling out. What accounts for ...

-ADS BY GOOGLE

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close