WhatIs
Browse Definitions :
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • #
Login Register
  • TechTarget Network
  • Tech Accelerator
  • News
  • 2024 IT Salary Survey Results
RSS
  • WhatIs
  • Browse Definitions By Topic
    Please select a category
    • Business software
    • Cloud computing
    • Computer science
    • Data analytics and AI
    • Data centers
    • IT management
    • Networking
    • Security
    • Software development
    Business software View All
    • ERP
    • HR management
    • Marketing and CX
    • Microsoft
    • Software applications
    Cloud computing View All
    • Internet applications
    • Internet of Things
    • Web services
    Computer science View All
    • Electronics
    • Internet technologies
    • IT standards and organizations
    • Microprocessors
    • Robotics
    Data analytics and AI View All
    • Algorithms
    • Artificial intelligence
    • Data and data management
    • Database management
    Data centers View All
    • Data backup and disaster recovery
    • Data center management
    • Linux
    • Operating systems
    • Storage Admin
    • Storage and Data Mgmt
    • Virtualization
    IT management View All
    • Certifications
    • IT career paths
    • IT Operations
    • Personal computing
    • Project management
    • Technical support
    Networking View All
    • High-speed networks
    • Network Admin
    • Network hardware
    • Networking and communications
    • Wireless and mobile
    Security View All
    • Authentication and access control
    • Compliance, risk and governance
    • Network security
    • Security Admin
    • Threat management
    Software development View All
    • Agile software development
    • AppDev
    • DevOps
    • Programming
  • Browse Features Resources
    • Business strategies
    • Career resources
    • Emerging tech
    • Tech explainers
  • Follow:
  • Home

New & Updated Definitions

  • What is a stablecoin?

    A stablecoin is a type of cryptocurrency designed to maintain a stable market value by pegging its price to a reserve asset, such as a fiat currency, e.g., U.S. dollar; a commodity, like gold; or even another cryptocurrency. See More.

  • What is GSM (Global System for Mobile Communications)?
  • What is an object in programming?
  • What is deepfake technology?
  • What is LARP (live-action role-playing)?
  • What is the OSI model? The 7 layers of OSI explained
  • What is DevOps as a service?
  • What is FileZilla?
  • What is cross-docking?
  • Conference news from Pure//Accelerate 2025

    Check out our guide to the annual conference, with key pre-conference material to get you ready and on-the-spot reports once the show launches.

  • Microsoft Inspire 2022 news and conference guide

    Microsoft will explain its partner program evolution and unveil upcoming priorities at its annual partner conference. Read on for news from Microsoft Inspire 2022.

  • IBM Think 2022 news, trends and analysis

    AI adoption is driving advancement of cybersecurity and other business processes. At IBM Think 2022, enterprise leaders will learn how to capitalize on game-changing technologies.

Latest TechTarget resources
  • Networking
  • Security
  • CIO
  • HR Software
  • Customer Experience
Search Networking
  • What is the OSI model? The 7 layers of OSI explained

    The OSI model (Open Systems Interconnection model) is a multilayered reference model that shows how computer systems and ...

  • What is shielded twisted pair (STP) and how does it work?

    Shielded twisted pair (STP) is a kind of cable made up of smaller wires where each small pair of wires is twisted together and ...

  • What is ping and how does it work?

    Ping (Packet Internet Groper) is a basic internet program that enables a user to test and verify if a particular destination ...

Search Security
  • What is data security posture management (DSPM)?

    Data security posture management, or DSPM, is an approach that combines technologies and processes to provide a holistic view of ...

  • What is a firewall and why do I need one?

    A firewall is a network security device that prevents unauthorized access to a network by inspecting incoming and outgoing ...

  • What is risk appetite?

    Risk appetite is the amount of risk an organization or investor is willing to take in pursuit of objectives it deems have value.

Search CIO
  • What is a risk manager? Roles and responsibilities

    A risk manager is a professional responsible for identifying and mitigating dangers to an organization's operations, reputation, ...

  • What is crowdsourcing?

    Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.

  • What is compliance risk?

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

Search HRSoftware
  • What is team collaboration?

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • What is talent management? Definition, basics and strategy

    Talent management is a strategic approach organizations use to attract, develop, retain, and optimize employees.

  • What is employee experience?

    Employee experience is a worker's perception of the organization they work for during their tenure.

Search Customer Experience
  • What are customer service and support?

    Customer service is the support organizations offer to customers before, during and after purchasing a product or service.

  • What is quality of experience (QoE or QoX)?

    Quality of experience (QoE or QoX) is a measure of the overall level of a customer's satisfaction and experience with a product ...

  • What is voice of the customer? A guide to VOC Strategy

    Voice of the customer (VOC) is the component of customer experience (CX) that focuses on customer needs, wants, expectations and ...

  • Browse by Topic
  • Browse Resources
  • About Us
  • Meet The Editors
  • Editorial Ethics Policy
  • Contact Us
  • Advertisers
  • Business Partners
  • Events
  • Media Kit
  • Corporate Site
  • Reprints

All Rights Reserved, Copyright 1999 - 2025, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close