Browse Definitions :

Word of the Day

digital signature

A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.See More

Newest and Updated Terms

Know-IT-All

Buzzword Alert

nonfungible token (NFT)

A nonfungible token (NFT) is a type of cryptographic asset that is unique and used to create and authenticate ownership of digital assets.

Read More

Essential Knowledge

11 data science skills for machine learning and AI

As companies realize the power of data, they're tasked with finding data science practitioners with AI and ML skill sets to help them use the data to...

Cutting through the fear of how AI will affect jobs through automation

Dive into Steven Shwartz's recent book, 'Evil Robots, Killer Computers, and Other Myths,' with a chapter excerpt on employment and the future of work.

Free machine learning course: Using ML algorithms, practices and patterns

This 13-lesson series offers an overview of machine learning and its applications for those hoping to break into the machine learning job market or ...

Do you have competitive data science key skills?

Data scientists should be familiar with a variety of programming languages, machine learning algorithms and databases and must be able to communicate...

  • Continuing Professional Education

    IT Book Chapters

    Browse through our list of free chapter downloads.

    Go
  • Continuing Professional Education

    Career Planning and Development

    Find the latest career path advice, including advice about skills gaps and what tech skills are likely to pay the most.

    Go
  • Continuing Professional Education

    Certifications and Training

    Browse practice questions for specific IT certification exams.

    Go
  • Continuing Professional Education

    Cheat Sheets and Templates

    A cheat sheet is a quick look-up reference chart or set of simple, brief instructions. A template helps you for accomplish a specific task.

    Go
  • Continuing Professional Education

    IT and Business Management

    Effective IT and business management enables an organization to optimize resources and staffing, improve business processes and communication and enforce best practices.

    Go
  • Continuing Professional Education

    Project Management

    IT project management includes overseeing projects for software development, hardware installations, network upgrades, cloud computing and virtualization rollouts, business analytics and data management projects and implementing IT services.

    Go
  • Continuing Professional Education

    Quizzes

    Take a few minutes to test your knowledge about the vocabulary used in information technology and business.

    Go
  • Continuing Professional Education

    Technology Basics

    Tech Accelerator is a learning resource for cybersecurity, storage, AI, data analytics, DevOps, networking, customer experience management, HR, and related business topics.

    Go
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

  • promiscuous mode

    In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close