Browse Definitions :

Word of the Day

zero-trust (security model)

The zero trust model is a security model used by IT professionals that requires strict identity and device verification regardless of the user’s location in relation to the network perimeter.See More

Word of the Day Archive

Newest and Updated Terms


Buzzword Alert

unstructured data

Unstructured data is information, in many different forms, that doesn't hew to conventional data models and thus typically isn't a good fit for a mainstream relational database.

Read More

Essential Knowledge

Ethical concerns of AI call growing adoption into question

AI tools are getting easier to use every day, putting powerful tools into the hands of potentially malicious users. The time to think about the ...

Clashes between AI and data privacy affect model training

Enterprises' lax data rules reveal weaknesses around AI and model training -- particularly machine learning's reliance on unrestrained big data ...

Organizations hire ethicists for AI ethical concerns

As organizations wrestle with AI ethical concerns, they need to create AI ethicist roles or develop teams to consider issues around data governance, ...

Enterprise consumer relationships are building trust in AI

Transparency is an increasingly important component of consumer trust. If you want to win over consumers whose data is being collected, start with ...

  • Certifications


    Use this CCNA practice test as study material to prepare for the Cisco CCNA Routing and Switching 200-125 exam. With 20 questions on a range of topics, we're not playing around.

    Take the Quiz
  • IT Management


    Think you know what it takes to create a positive employee experience for your workers? Take this EX quiz to test your savvy and see where you need work.

    Take the quiz
  • IT Infrastructure


    Are you up to speed on composable disaggregated infrastructure and technology? Take our quiz to find out if you know how composability works and how it can benefit you.

    Take the quiz
  • Cloud


    Are you familiar with the vendor services and tools that can support a cloud migration? Take this quiz and see what you know about cloud migration services.

    Take the quiz



  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...


  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.