WhatIs
Browse Definitions :
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • #
Login Register
  • TechTarget Network
  • Tech Accelerator
  • News
  • 2024 IT Salary Survey Results
RSS
  • WhatIs
  • Browse Definitions By Topic
    Please select a category
    • Business software
    • Cloud computing
    • Computer science
    • Data analytics and AI
    • Data centers
    • IT management
    • Networking
    • Security
    • Software development
    Business software View All
    • ERP
    • HR management
    • Marketing and CX
    • Microsoft
    • Software applications
    Cloud computing View All
    • Internet applications
    • Internet of Things
    • Web services
    Computer science View All
    • Electronics
    • Internet technologies
    • IT standards and organizations
    • Microprocessors
    • Robotics
    Data analytics and AI View All
    • Algorithms
    • Artificial intelligence
    • Data and data management
    • Database management
    Data centers View All
    • Data backup and disaster recovery
    • Data center management
    • Linux
    • Operating systems
    • Storage Admin
    • Storage and Data Mgmt
    • Virtualization
    IT management View All
    • Certifications
    • IT career paths
    • IT Operations
    • Personal computing
    • Project management
    • Technical support
    Networking View All
    • High-speed networks
    • Network Admin
    • Network hardware
    • Networking and communications
    • Wireless and mobile
    Security View All
    • Authentication and access control
    • Compliance, risk and governance
    • Network security
    • Security Admin
    • Threat management
    Software development View All
    • Agile software development
    • AppDev
    • DevOps
    • Programming
  • Browse Features Resources
    • Business strategies
    • Career resources
    • Emerging tech
    • Tech explainers
  • Follow:
  • Home

New & Updated Definitions

  • What is Centers for Medicare & Medicaid Services (CMS)?

    The Centers for Medicare & Medicaid Services (CMS) is part of the U.S. Department of Health and Human Services. See More.

  • What is a clinical trial?
  • What is AgentOps? What it does and how it powers AI agents
  • What is the application layer?
  • What is computerized physician order entry (CPOE)?
  • What is a stealth virus and how does it work?
  • What is enterprise architecture (EA)?
  • What is succession planning?
  • What is device as a service (DaaS)?
  • Conference news from Pure//Accelerate 2025

    Check out our guide to the annual conference, with key pre-conference material to get you ready and on-the-spot reports from this year's show.

  • Microsoft Inspire 2022 news and conference guide

    Microsoft will explain its partner program evolution and unveil upcoming priorities at its annual partner conference. Read on for news from Microsoft Inspire 2022.

  • IBM Think 2022 news, trends and analysis

    AI adoption is driving advancement of cybersecurity and other business processes. At IBM Think 2022, enterprise leaders will learn how to capitalize on game-changing technologies.

Latest TechTarget resources
  • Networking
  • Security
  • CIO
  • HR Software
  • Customer Experience
Search Networking
  • What is the application layer?

    The application layer is at Layer 7, the top of the Open Systems Interconnection (OSI) communications model. It ensures that an ...

  • What is a self-organizing network (SON) and do you need one?

    A self-organizing network (SON) is an intelligent infrastructure designed to simplify and accelerate the planning, configuration,...

  • What is an enterprise private network (EPN)?

    An enterprise private network (EPN) is a type of private network used by an organization.

Search Security
  • What is a stealth virus and how does it work?

    A stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software.

  • What is file integrity monitoring (FIM)?

    File Integrity Monitoring (FIM) is a security process that continuously monitors and analyzes the integrity of an organization's ...

  • What is information security (infosec)?

    Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of ...

Search CIO
  • What is enterprise architecture (EA)?

    An enterprise architecture (EA) is a conceptual blueprint that defines an organization's structure and operation.

  • CIO job description: Chief information officer responsibilities

    Learn about the role of the chief information officer, including daily responsibilities, necessary skills and how the role is ...

  • What is conduct risk?

    Conduct risk is the potential for a company's actions or behavior to harm its customers, stakeholders or broader market integrity.

Search HRSoftware
  • What is succession planning?

    Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles ...

  • What is HR automation? Examples, benefits and challenges

    Human resources automation, or HR automation, is a method of using software to automate and streamline repetitive and laborious ...

  • What is HR service delivery?

    HR service delivery is a term used to explain how an organization's human resources (HR) department offers services to and ...

Search Customer Experience
  • What is direct marketing?

    Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or ...

  • What is mobile CRM?

    Mobile CRM, or mobile customer relationship management, enables those working in the field or remote employees to use mobile ...

  • What is field service management (FSM)?

    Field service management (FSM) is a system of managing off-site workers and the resources they require to do their jobs ...

  • Browse by Topic
  • Browse Resources
  • About Us
  • Meet The Editors
  • Editorial Ethics Policy
  • Contact Us
  • Advertisers
  • Business Partners
  • Events
  • Media Kit
  • Corporate Site
  • Reprints

All Rights Reserved. Copyright 1999 - 2025, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close