Browse Definitions :

Word of the Day

whaling attack

A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company.See More

Word of the Day Archive

Newest and Updated Terms

Know-IT-All

  • 6 edge tech terms to know

    Data, devices and distributed computing are all important parts of edge setups. Learn about edge computing components and how you might see them in your organization.

  • Get to know these composable infrastructure terms

    Dig into these terms to get a sense of composable infrastructure and what its disaggregated server capabilities can bring to your IT environment and application workloads.

Buzzword Alert

5G

Fifth-generation wireless (5G) is the latest iteration of cellular technology, engineered to greatly increase the speed and responsiveness of wireless networks.

Read More

Essential Knowledge

How can CIOs improve their IT mentorship programs?

According to Deloitte's Anjali Shaikh, CIOs are no better than their C-suite peers at mentoring. An IT talent shortage demands CIOs do better. Here's...

Embedded IT, global talent to define future of IT jobs

As more businesses identify as tech companies, what's the future of IT jobs? Many IT teams will work remotely on a gig-by-gig basis and their ...

IT career skills: Does being a specialist make a difference?

When it comes to developing IT skills, is it better to be the jack-of-all-trades or master of one? Airtel's Harmeen Mehta shares her perspective in ...

Computer vision, machine learning skills help fuel surge in AI jobs

A report by the world's No. 1 job site, Indeed, finds there are more AI jobs than ever, but job-seeker interest is leveling out. What accounts for ...

  • Solve a Problem

    Buyer's Guides

    Is your IT team looking to make a purchase that will hopefully solve a business problem? Visit our Buyer's Guide section to get essential insights on all types of software and hardware solutions.

    Browse Buyer's Guides
  • File Extension Look-up

    Every File Format in the World

    This tech resource allows you to look up file extensions by name or suffix. Browse alphabetically to find the format you are looking for. Learn what program it is associated with.

    Look Up a File Extension
  • Learning Guides

    Get up to Speed Quickly

    Has your boss thrown you in new tech waters and expected you to know how to swim? Our comprehensive learning guides will help you stay afloat.

    Browse Learning Guides
  • Cheat Sheets

    Our Favorite Cheat Sheets

    How many times have you had to look up how to do something in Excel? Or ask to borrow a co-worker's list of Linux commands? Sometimes you just need a cheatsheet.

    Explore Cheat Sheets

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close