Browse Definitions :

Word of the Day

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and monitor network devices and their functions.See More

Newest and Updated Terms

Know-IT-All

  • The essential Wi-Fi 6 glossary

    This Wi-Fi 6 glossary delves into various features and capabilities the new generation of Wi-Fi technology offers, as well as what organizations can expect from Wi-Fi 6 devices.

  • 4 digital transformation terms to know

    As technology evolves, businesses have no choice but to follow. Digital transformations are inevitable in order to keep customers and employees satisfied.

Buzzword Alert

pandemic plan

A pandemic plan is a documented strategy for business continuity in the event of a widespread outbreak of a dangerous infectious disease.

Read More

Essential Knowledge

How can CIOs improve their IT mentorship programs?

According to Deloitte's Anjali Shaikh, CIOs are no better than their C-suite peers at mentoring. An IT talent shortage demands CIOs do better. Here's...

Embedded IT, global talent to define future of IT jobs

As more businesses identify as tech companies, what's the future of IT jobs? Many IT teams will work remotely on a gig-by-gig basis and their ...

IT career skills: Does being a specialist make a difference?

When it comes to developing IT skills, is it better to be the jack-of-all-trades or master of one? Airtel's Harmeen Mehta shares her perspective in ...

Computer vision, machine learning skills help fuel surge in AI jobs

A report by the world's No. 1 job site, Indeed, finds there are more AI jobs than ever, but job-seeker interest is leveling out. What accounts for ...

-ADS BY GOOGLE

SearchCompliance

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close