Browse Definitions :

Word of the Day

OCR

OCR (optical character recognition) is the use of technology to distinguish printed or handwritten text characters inside digital images of physical documents, such as a scanned paper document.See More

Word of the Day Archive

Newest and Updated Terms

Know-IT-All

Buzzword Alert

insider threat

Insider threat is a category of risk posed by humans who have access to an organization's physical or digital assets. Such threats are usually attributed to employees or former employees, but may also arise from third parties, including contractors, temporary workers or customers.

Read More

Essential Knowledge

Kroger buys into Google Cloud migration, despite challenges

It wasn't easy for Kroger to migrate its customer-facing search engine to Google Cloud, but it happened fast, thanks to proper planning and the right...

CEO switch continues BMC's multi-cloud management push

BMC has reappointed company veteran Bob Beauchamp as CEO as it forges ahead with a strategic shift into multi-cloud management tools and away from ...

Explore FAQs on Azure subscription management

For some IT teams, particularly those new to Microsoft's public cloud, Azure subscriptions spark a number of pressing questions related to billing, ...

Automation drives next wave of multi-cloud management tools

The current cloud landscape indicates a clear need for management tools that can span multiple platforms -- and they'll likely place an emphasis on ...

  • Solve a Problem

    Buyer's Guides

    Is your IT team looking to make a purchase that will hopefully solve a business problem? Visit our Buyer's Guide section to get essential insights on all types of software and hardware solutions.

    Browse Buyer's Guides
  • File Extension Look-up

    Every File Format in the World

    This tech resource allows you to look up file extensions by name or suffix. Browse alphabetically to find the format you are looking for. Learn what program it is associated with.

    Look Up a File Extension
  • Learning Guides

    Get up to Speed Quickly

    Has your boss thrown you in new tech waters and expected you to know how to swim? Our comprehensive learning guides will help you stay afloat.

    Browse Learning Guides
  • Cheat Sheets

    Our Favorite Cheat Sheets

    How many times have you had to look up how to do something in Excel? Or ask to borrow a co-worker's list of Linux commands? Sometimes you just need a cheatsheet.

    Explore Cheat Sheets

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close