WhatIs
Browse Definitions :
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • #
Login Register
  • TechTarget Network
  • Tech Accelerator
  • News
  • 2024 IT Salary Survey Results
RSS
  • WhatIs
  • Browse Definitions By Topic
    Please select a category
    • Business software
    • Cloud computing
    • Computer science
    • Data analytics and AI
    • Data centers
    • IT management
    • Networking
    • Security
    • Software development
    Business software View All
    • ERP
    • HR management
    • Marketing and CX
    • Microsoft
    • Software applications
    Cloud computing View All
    • Internet applications
    • Internet of Things
    • Web services
    Computer science View All
    • Electronics
    • Internet technologies
    • IT standards and organizations
    • Microprocessors
    • Robotics
    Data analytics and AI View All
    • Algorithms
    • Artificial intelligence
    • Data and data management
    • Database management
    Data centers View All
    • Data backup and disaster recovery
    • Data center management
    • Linux
    • Operating systems
    • Storage Admin
    • Storage and Data Mgmt
    • Virtualization
    IT management View All
    • Certifications
    • IT career paths
    • IT Operations
    • Personal computing
    • Project management
    • Technical support
    Networking View All
    • High-speed networks
    • Network Admin
    • Network hardware
    • Networking and communications
    • Wireless and mobile
    Security View All
    • Authentication and access control
    • Compliance, risk and governance
    • Network security
    • Security Admin
    • Threat management
    Software development View All
    • Agile software development
    • AppDev
    • DevOps
    • Programming
  • Browse Features Resources
    • Business strategies
    • Career resources
    • Emerging tech
    • Tech explainers
  • Follow:
  • Home

New & Updated Definitions

  • What is dual sourcing?

    Dual sourcing is the supply chain management practice of using two suppliers for a given component, raw material, product or service. See More.

  • What is a natural user interface (NUI)?
  • What are BSD Licenses?
  • What is SAP Fieldglass?
  • What is NTFS and how does it work?
  • What is a talent pipeline?
  • What is a CISO as a service (CISOaaS)?
  • What is Meditech Medical Information Technology, Inc.?
  • What is the domain name system (DNS)?
  • Conference news from Pure//Accelerate 2025

    Check out our guide to the annual conference, with key pre-conference material to get you ready and on-the-spot reports from this year's show.

  • Microsoft Inspire 2022 news and conference guide

    Microsoft will explain its partner program evolution and unveil upcoming priorities at its annual partner conference. Read on for news from Microsoft Inspire 2022.

  • IBM Think 2022 news, trends and analysis

    AI adoption is driving advancement of cybersecurity and other business processes. At IBM Think 2022, enterprise leaders will learn how to capitalize on game-changing technologies.

Latest TechTarget resources
  • Networking
  • Security
  • CIO
  • HR Software
  • Customer Experience
Search Networking
  • What is an SD-branch?

    An SD-branch is a single, automated, centrally managed, software-centric platform that replaces or supplements an existing branch...

  • What is the domain name system (DNS)?

    The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet ...

  • What is attenuation?

    Attenuation is a general term referring to when any type of signal -- digital or analog -- reduces in strength.

Search Security
  • What is a CISO as a service (CISOaaS)?

    CISO as a service, or CISOaaS, is the outsourcing of CISO (chief information security officer) and information security ...

  • What is post-quantum cryptography? Comprehensive guide

    Post-quantum cryptography, also known as quantum encryption or PQC, is the development of cryptographic systems for classical ...

  • What is a message authentication code (MAC)? How it works and best practices

    A message authentication code (MAC) is a cryptographic checksum applied to a message to guarantee its integrity and authenticity.

Search CIO
  • What is a procurement plan?

    A procurement plan -- also called a procurement management plan -- is a document that is used to manage the process of finding ...

  • What is a quantum circuit? Quantum vs. classical circuit

    Quantum circuits are systems consisting of logic gates that operate on quantum bits (qubits) to process information and perform ...

  • What is prescriptive analytics?

    Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.

Search HRSoftware
  • What is a talent pipeline?

    A talent pipeline is a pool of candidates who are ready to fill a position.

  • What is an applicant tracking system (ATS)?

    An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job ...

  • What is manager self-service?

    Manager self-service is a type of human resource management (HRM) platform that gives supervisors immediate access to employee ...

Search Customer Experience
  • What is field service management (FSM)?

    Field service management (FSM) is a system of managing off-site workers and the resources they require to do their jobs ...

  • What are customer service and support?

    Customer service is the support organizations offer to customers before, during and after purchasing a product or service.

  • What is quality of experience (QoE or QoX)?

    Quality of experience (QoE or QoX) is a measure of the overall level of a customer's satisfaction and experience with a product ...

  • Browse by Topic
  • Browse Resources
  • About Us
  • Meet The Editors
  • Editorial Ethics Policy
  • Contact Us
  • Advertisers
  • Business Partners
  • Events
  • Media Kit
  • Corporate Site
  • Reprints

All Rights Reserved. Copyright 1999 - 2025, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close