Browse Definitions :

Write for us!

Have knowledge to share? Want to advance your career? Write for us! 

WhatIs.com is a self-education tool about information technology with over 10,000 terms and resources available. A TechTarget-owned website, WhatIs.com provides our visitors with in-depth, problem-solving technical content. The majority of our content is written by staff and industry thought leaders, but we always have room for contributions from within the enterprise IT community. Become a contributor, promote your personal brand and join our legion of influencers in every major enterprise technology segment.

In this IT encyclopedia, we provide writers with the opportunity to contribute up-and-coming technology definitions by explaining what it is, what it does, how it works, who uses it and why it's important.

To discuss your ideas for contributing or updating a term, please send an email to [email protected].

General Submission Guidelines

What topics can I write about?
When coming up with definition ideas, ask yourself: Would an explanation of this term be beneficial to a wide audience? Is this term still relevant or heavily used? Do I understand the term well enough to translate it into plain English? Are there enough external resources for me to gather information about the term? It also helps to check if the definition already exists on WhatIs.com, or any of the TechTarget websites, and whether it needs to be written from scratch or simply updated.

Can I contribute to a definition that is already published on the site?

Of course! If you see a definition that needs updating or you have important information that would make our readers more informed about the topic, please share it with us.

Are there any guidelines to writing a definition?

The main goal about writing a definition is to answer the six crucial questions:

  1. What is it?
  2. What does it do?
  3. How does it work?
  4. Who uses it?
  5. Why is it important?
  6. Is there anything else I need to know in order to be knowledgeable on the subject?

A more in-depth list of guidelines and tips can be given upon request.

Can I reuse the articles I write for TechTarget ?
Content must be previously unpublished and contributors must agree not to republish the content, except as part of a longer book written primarily by the contributor.

How long should my content be?
While there is no limit to the length of content, we encourage a minimum of 500 words. We have found 500 - 1000 words to be the sweet spot for both readability and searchability. If we agree to publish your article, we will send you a writer's agreement that defines our required criteria in more detail. 

What do I get when I write for TechTarget?
If your content is accepted for publication, you will be listed as the contributor for the definition and the opportunity to provide a link. Links can be direct to a LinkedIn profile, company website or a dedicated TechTarget contributor page.

Can I link to my company or organization's website in the content I write?
Links to company-related information and products can be added to your contributor tag.

Can I include links in my article?
As a contributor, you can suggest links but TechTarget editors will have the last call. 

What visibility will I receive?
Your work will be eligible to be featured in a newsletter and promoted across social media.

Can I link to my TechTarget article from other websites?
Links on social media and blogs are a great way to stir up readership and increase visibility. 

Can I respond to comments?
You bet, interaction is always welcome; comments and discussion are indications of great content. 

Can I include photos or videos?
Photos and videos are welcome, but please be sure you have the right to use the material and that you credit your sources.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close