Browse Definitions :
Definition

TechTarget Featured Topics

A Featured Topic is a collection of resources designed to bring you up to speed quickly on a particular IT subject. Click on the name of a TechTarget site to see current and past Featured Topics.

Applications
SearchCIO Featured Topics
E-commerce Strategies, Content Management...

SearchCRM Featured Topics
Call Center Management, Web analytics, Personalization strategies...

SearchSAP Featured Topics
ASAP (AcceleratedSAP), The SAP Java connection, The power of portals...

Core Technologies
SearchDatabase Featured Topics
Spotlight on Oracle, Relational fundamentals, SQL Server tips and tricks...

SearchSecurity Featured Topics
Careers in IT security, Biometrics, Securing your remote workforce...

SearchStorage Featured Topics
SAN/NAS training resources, Storage management best practices, RAID tips and techniques...

SearchSystemsManagement
Installation and upgrade management, Performance management tools & techniques, Wireless infrastructure management...

SearchWebServices Featured Topics
Web services standards, SOAP Crash Course, XML Crash Course, WSDL, UDDI, BPEL...

Networking
SearchNetworking Featured Topics
Prepping for IPv6, Network management, Top Ten Tips for VPNs...

Development
SearchVB Featured Topics
VB Database Code Downloads, Visual Basic for Applications, The VB Top Ten...

Platforms
Search390 Featured Topics
CICS and COBOL, Upgrading to z/OS, The ABCs of XML...

Search400 Featured Topics
Managing your iSeries, iSeries user groups, The 400/Windows connection...

SearchDomino Featured Topics
R4/R5/Rnext Migration, Domino and iSeries, Discovery Server...

SearchHP Featured Topics
Advice for HP-UX admins, Network Node Manager, Logical Volume Manager...

SearchSolaris Featured Topics
Assigning permissions, Sun and storage, Role Based Access Control...

SearchWin2000 Featured Topics
.NET, IIS security, Ten solutions to perennial printer problems...

This was last updated in April 2005
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close