Browse Definitions :



 Backup and Recovery
  • Backup and Recovery
  • Backup School I
  • Backup School II
  • iSeries Backup and Recovery Commands
  • iSeries Word Scramble: Backup & Recovery


  Business Intelligence


  • Compliance
  • Compliance II: The letter of the law
  • Regulatory compliance


   Computing Fundamentals
  • CICS History Quiz
  • Computer Trivia #1
  • Computer Trivia #2
  • Computer Nostalgia
  • Computer Nostalgia 2.0
  • Do you speak Geek? A Vital Video Quiz
  • File Extensions
  • ESA, XI and the new era of integration
  • Help Desk Basics
  • IT Vocabulary
  • Laptops
  • Logic Chips
  • Know-IT-All Admin Challenge: The Sequel
  • Name my claim to fame!
  • Performance Tuning
  • Peripherals
  • Processing Power
  • Ruling Your IT Universe
  • Short & Sweet!
  • Troubleshooting Microsoft Technologies
  • Workstations





   Data Management








  • AS/400
  • iSeries Commands
  • iSeries Trivia
  • Who's Who in the iSeries World
  • Who's Who in the iSeries World II


  Learning and Careers


   Messaging and E-mail
  • Email Marketing and the Spam Problem
  • Email Security
  • Exchange Geek-o-Meter
  • RU IM Savvy?
  • Spam, Spam and More Spam
  • Writing for Business


  • A Taste For Tech
  • Acronym-o-phobia
  • Artificial Intelligence
  • Do you eat Geek?
  • Do you speak Geek: Believe IT or Not!
  • Do you speak Geek: Are you an IT-know-it-all?
  • Do you speak Geek during the holidays?
  • Do you speak Geek, Greek, or Elvish?
  • Do you speak Geek with the Simpsons?
  • Down the chimney, through the firewall: Holiday quiz
  • Ego Booster
  • Famous People in IT
  • Fear of Nanopants and Other Scary Technologies
  • Great Geeks in History
  • Halloween: Do you speak Geek?
  • Halloween II: Do you speak -- EEK! -- Geek?
  • Halloween III: Tech or Treat!
  • IM Lingo 4U
  • IT's About Taxes
  • IT's About Time!
  • IT's For Latin Lovers
  • IT Lives! Enter the Geekosphere!
  • IT Potpourri
  • Looney Tunes
  • Major IT Players: How'd They Start Out?
  • Romancing the Geek
  • Offshore Outsourcing
  • SHARE celebrates its 50th
  • Star Trek Tech: Do you speak Geek?
  • Star Wars Tech, Then and Now
  • Thanksgiving: Talkin' Tech Turkey
  • The Robots are Coming!
  • Top Tech Picks for 2006
  • Weird and Wonderful Geekspeak
  • What the Dickens?
  • Who Done IT? A Murder Mystery
  • What kind of geek are you?
  • Winter Blues




   Open Source
  • Linux Basics
  • March of the Penguin
  • More Fun with Open Source
  • Open and Shut
  • Romancing the Penguin
  • Romancing the Penguin II: The Lovers
  • Romancing the Penguin III: Raiders of the Lost OS
  • Romancing the Penguin IV: Temple of Doom
  • Samba Server Types & Security Modes


   Operating Systems
  • IIS 6 Administration
  • Linux Basics for Windows Pro
  • Linux and Open Source-friendly Databases
  • Linux Security
  • Linux Tools
  • Linux, Windows Migration & Interoperability
  • Windows Geek-o-Meter









  • Top 10 hot storage technologies
  • Database Basics
  • Data Storage
  • Data Storage Hardware
  • Disk Jockey
  • Greening the Cube Farm
  • Improve your Memory!
  • IP Storage
  • Network-Attached Storage
  • RAID
  • SAN: Do you speak Geek?
  • Storage Area Networks
  • Storage Basics
  • Storage Networking
  • Storage Management Survival School
  • Storage Management II
  • Storage Smarts
  • Tape
  • Test Your IQ: Business Continuity
  • Top 25 Data Storage Terms




  • Hip to SIP
  • Voice over IP
  • VoIP Call Center


   Wireless & Mobile
This was last updated in August 2009
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • chief risk officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory ...

  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...