Browse Definitions :

Word of the Day

ethical hacker

An ethical hacker, or white hat hacker, is an information security expert authorized by an organization to penetrate computing infrastructure to find security vulnerabilities a malicious hacker could exploit.See More

Newest and Updated Terms

Know-IT-All

Buzzword Alert

GPT-3

GPT-3, or the third generation Generative Pre-trained Transformer, is a neural network machine learning model trained using internet data to generate any type of text.

Read More

Essential Knowledge

How to create customer profiles with examples

Creating customer profiles gives brands a deep understand of their customers' needs and behaviors and results in more successful marketing strategies...

5 customer journey phases for businesses to understand

The customer journey contains a number of stages -- from the presale stage of awareness to post-sale advocacy -- and understanding each phase is key ...

How to create a customer journey map -- with template

Customer journey maps help CX teams delve into the data gathered during a customer's experience. They also help businesses to understand the failures...

CleverTap, Phiture launch customer engagement analytics framework

AIC framework for customer experience analytics, developed in collaboration between CleverTap and Phiture, promises to give marketers actionable ...

  • Continuing Professional Education

    IT Book Chapters

    Browse through our list of free chapter downloads.

    Go
  • Continuing Professional Education

    Career Planning and Development

    Find the latest career path advice, including advice about skills gaps and what tech skills are likely to pay the most.

    Go
  • Continuing Professional Education

    Certifications and Training

    Browse practice questions for specific IT certification exams.

    Go
  • Continuing Professional Education

    Cheat Sheets and Templates

    A cheat sheet is a quick look-up reference chart or set of simple, brief instructions. A template helps you for accomplish a specific task.

    Go
  • Continuing Professional Education

    IT and Business Management

    Effective IT and business management enables an organization to optimize resources and staffing, improve business processes and communication and enforce best practices.

    Go
  • Continuing Professional Education

    Project Management

    IT project management includes overseeing projects for software development, hardware installations, network upgrades, cloud computing and virtualization rollouts, business analytics and data management projects and implementing IT services.

    Go
  • Continuing Professional Education

    Quizzes

    Take a few minutes to test your knowledge about the vocabulary used in information technology and business.

    Go
  • Continuing Professional Education

    Technology Basics

    Tech Accelerator is a learning resource for cybersecurity, storage, AI, data analytics, DevOps, networking, customer experience management, HR, and related business topics.

    Go
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • DMZ in networking

    In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) ...

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • Serial ATA (Serial Advanced Technology Attachment or SATA)

    Serial ATA (Serial Advanced Technology Attachment or SATA) is a command and transport protocol that defines how data is ...

Close