Browse Definitions :

Write for us!

Have knowledge to share? Want to advance your career? Write for us! 

WhatIs.com is a self-education tool about information technology with over 10,000 terms and resources available. A TechTarget-owned website, WhatIs.com provides our visitors with in-depth, problem-solving technical content. The majority of our content is written by staff and industry thought leaders, but we always have room for contributions from within the enterprise IT community. Become a contributor, promote your personal brand and join our legion of influencers in every major enterprise technology segment.

In this IT encyclopedia, we provide writers with the opportunity to contribute up-and-coming technology definitions by explaining what it is, what it does, how it works, who uses it and why it's important.

To discuss your ideas for contributing or updating a term, please send an email to contributor@TechTarget.com.

General Submission Guidelines

What topics can I write about?
When coming up with definition ideas, ask yourself: Would an explanation of this term be beneficial to a wide audience? Is this term still relevant or heavily used? Do I understand the term well enough to translate it into plain English? Are there enough external resources for me to gather information about the term? It also helps to check if the definition already exists on WhatIs.com, or any of the TechTarget websites, and whether it needs to be written from scratch or simply updated.

Can I contribute to a definition that is already published on the site?

Of course! If you see a definition that needs updating or you have important information that would make our readers more informed about the topic, please share it with us.

Are there any guidelines to writing a definition?

The main goal about writing a definition is to answer the six crucial questions:

  1. What is it?
  2. What does it do?
  3. How does it work?
  4. Who uses it?
  5. Why is it important?
  6. Is there anything else I need to know in order to be knowledgeable on the subject?

A more in-depth list of guidelines and tips can be given upon request.

Can I reuse the articles I write for TechTarget ?
Content must be previously unpublished and contributors must agree not to republish the content, except as part of a longer book written primarily by the contributor.

How long should my content be?
While there is no limit to the length of content, we encourage a minimum of 500 words. We have found 500 - 1000 words to be the sweet spot for both readability and searchability. If we agree to publish your article, we will send you a writer's agreement that defines our required criteria in more detail. 

What do I get when I write for TechTarget?
If your content is accepted for publication, you will be listed as the contributor for the definition and the opportunity to provide a link. Links can be direct to a LinkedIn profile, company website or a dedicated TechTarget contributor page.

Can I link to my company or organization's website in the content I write?
Links to company-related information and products can be added to your contributor tag.

Can I include links in my article?
As a contributor, you can suggest links but TechTarget editors will have the last call. 

What visibility will I receive?
Your work will be eligible to be featured in a newsletter and promoted across social media.

Can I link to my TechTarget article from other websites?
Links on social media and blogs are a great way to stir up readership and increase visibility. 

Can I respond to comments?
You bet, interaction is always welcome; comments and discussion are indications of great content. 

Can I include photos or videos?
Photos and videos are welcome, but please be sure you have the right to use the material and that you credit your sources.

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

  • WPA3

    WPA3, also known as Wi-Fi Protected Access 3, is the third version of the security certification program developed by the Wi-Fi ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

Close