Browse Definitions :

Cheat Sheets and Templates

A cheat sheet is a quick look-up reference chart or set of simple, brief instructions for accomplishing a specific task. Can't find the cheat sheet you're looking for? Let us know!

  • IT risk assessment template (with free download)

    Risk assessments are a critical part of a disaster recovery plan. Find out how to prepare a risk assessment and then download the included free template to create one.

  • Top 8 most in-demand IT tech jobs of 2021

    For job seekers in 2021, it's important to find a role that will be in high demand both now and in the coming years. Here are eight of the most promising jobs in technology.

  • CLI commands every IT pro should know

    This excerpt from 'CompTIA A+ Certification All-in-One Exam Guide, Tenth Edition,' published by McGraw-Hill Education, provides an introduction into common command-line prompts for Windows, Linux and macOS.

  • Data breach response: How to plan and recover

    Download a planning guide from CompTIA to ensure your company and your customers are prepared and can respond when a ransomware attack or data breach strikes.

  • Top 9 Highest IT salaries in 2021

    Need guidance on the tech job market? Get a closer look at the IT jobs with the highest projected salaries for 2021.

  • Cheat Sheet - Characters and quotes from The Phoenix Project

    Each of the main characters in The Phoenix Project plays an important role in advancing the book's plot. Through their interactions with each other, the characters help the reader understand the underlying principles of DevOps.

  • Cheat sheet: Glossary for terms mentioned in 'The Phoenix Project'

    Written by authors Gene Kim, George Spafford and Kevin Behr, The Phoenix Project is a narrative-style book about a failing company and how its members save the day by adopting DevOps practices.

  • Data backup plan template: A free download and guide

    Download our free backup planning template to help you get started or improve your current plan. It's important to have critical information laid out in a document.

  • COVID-19 Glossary for Employers and HR Managers

    We will be updating this pandemic glossary frequently over the next few weeks to help you use consistent vocabulary in your crisis communication emails, newsletters, phone scripts and telecommuter updates.

  • Using a pandemic recovery plan template: A free download and guide

    Outbreaks like the latest coronavirus can spread fast. Download our free pandemic planning template and read our step-by-step guide on pandemic planning for businesses.

  • Data center career path: Fast Guide

    Data centers offer competitive salaries, enjoyable work and diverse opportunities for workers in the tech sector whether you want to become an entry-level data center technician or have the necessary skills to become a data center architect.

  • Using a business impact analysis template: A free BIA template and guide

    If you need to perform a business impact analysis, this guide and our free, downloadable BIA template will assist you in your business continuity planning.

  • A free business continuity plan template and guide

    A business continuity plan is critical for an organization when an unplanned event occurs. Follow this template and BC planning guidelines to get on the right path to resilience.

  • IP subnetting: How to calculate subnet masks

    Check out IP subnetting shortcuts on how to do subnet mask calculations and break down IP address classes to route traffic within your network.

  • SDN/NFV end-games, paths forward remain in flux

    In this week's blogs round-up, an analyst predicts that SDN/NFV will see decisive changes in 2016, while a blogger says open source SDN projects are gaining steam.

  • Fast Guide: Enterprise risk

    An enterprise risk is any potential event that could threaten an organization's ability to achieve its financial goals; long term, a risk can be a threat to sustainability. In a business context, risks are broadly categorized as either internal or external, or whether or not they are controllable by the organization. See our guide to types of enterprise risk.

  • Guide to iOS 7, OS X Mavericks and new Apple devices

    Apple devices and OSes are consumer favorites, but they also come with management tools and application features that IT can take advantage of.

  • Cheat sheet: A fast guide to cloud collaboration

    The details on cloud collaboration can be daunting -- consumer vs. enterprise, public vs. on-prem and more. Start with the basics in this cheat sheet.

  • Apple iOS device management cheat sheet

    Managing iPhones, iPads and their apps can get tricky. Sometimes it's good to take a step back and look at the basics of iOS device management.

  • A free risk assessment template for ISO 27001 certification

    Risk assessment is the first important step towards a robust information security framework. Our simple risk assessment template for ISO 27001 makes it easy.

  • Cheat sheet: Talking to clients about cloud computing security risks

    Customers are jumpy about cloud computing security risks, and cloud providers must be ready for their questions with bulletproof answers. Here are questions you can expect.

  • AS/400 Cheat Sheets

    A collection of AS/400 cheat sheets with information about AS/400 and iSeries topics.

  • Delphi Cheat Sheets

    We've gathered cheat sheets for fast reference to information about Delphi. You'll find information about variables, array types, execution and flow control and more. Need more background information before you get started? See our definitions for Delphi, object-oriented programming (OOP) and Web services.

  • A free disaster recovery template for conducting a physical assessment of your DR facilities

    Download our free disaster recovery template to learn how to conduct a physical assessment of your disaster recovery facilities.

  • The speed of end-user and backbone transmission technologies

    This table shows the stated data rates for the most important end-user and backbone transmission technologies.

  • Blogging Cheat Sheets

    We've gathered resources from around the Web to help you create or maintain a blog. You'll find cheat sheets for Word Press, Moving Type and Blogger, among other resources.

  • Social media sites and applications cheat sheet

    This cheat sheet has SearchITChannel.com's top 10 picks for news and blogs on social media sites and applications. See why VARs and vendors alike have jumped on the social networking bandwagon.

  • Microsoft Hyper-V vs. VMware ESX cheat sheet

    This Microsoft Hyper-V vs. VMware ESX cheat sheet offers a world of resources to help you understand the differences between these two top virtualization products. Included are tips, chapter excerpts, news, blogs, special reports and FAQ guides.

  • Microsoft Windows 7 cheat sheet

    Learn how to install Windows 7 and talk to customers about Windows 7 upgrades and new features with this collection of resources on Microsoft's latest operating system.

  • Bypass IVRS - Talk to a real person - cheatsheet

    Cheat sheet quick look-up for how to get a real person on the telephone.

  • VMware how-tos

    SearchServerVirtualization.com brings you a fast guide to our experts' VMware tips. Keep checking back as we'll be updating this guide regularly.

  • IT cheat sheets for all

    They may seem like no-brainers to you, but some of your IT tricks and workarounds look magical to your peers. We've collected our favorite IT cheat sheets on topics ranging from AS/400 to HTML and Outlook so everyone can look like a whiz.

  • How do you pronounce IT?

    How do you pronounce IT? Why, "eye-tee," of course! This page lists many of the most commonly mispronounced words in information technology.

  • Cheat sheet: Access management solutions and their pros and cons

    Popular authentication methods such as passwords, biometrics and two-factor are assessed in this chart.

  • Cheat sheet: Access management solutions and their pros and cons

    A cheat sheet of the most common access solutions with a brief description, and their risks and pros and cons to help you choose the solution that is right for your organization.

  • Table of Physical Constants

    Quick look-up chart.

  • Favorite iSeries cheat sheets

    Here you'll find a collection of valuable cheat sheets gathered from across the iSeries/Search400.com community. These cheat sheet are bits and pieces of information that come from all kinds of sources, IBM manuals, discussion lists an experience from iSeries users. Our members were happy to share their "sacred" cheat sheets –- often more precious to them than their family heirlooms. As one Search400.com member stated, "This may not seem like prize winning info, but oh, the time it has saved me!"

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Twofish

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close