WhatIs
Browse Definitions :
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • #
Login Register
  • TechTarget Network
  • Tech Accelerator
  • News
  • 2024 IT Salary Survey Results
RSS
  • WhatIs
  • Browse Definitions By Topic
    Please select a category
    • Business software
    • Cloud computing
    • Computer science
    • Data analytics and AI
    • Data centers
    • IT management
    • Networking
    • Security
    • Software development
    Business software View All
    • ERP
    • HR management
    • Marketing and CX
    • Microsoft
    • Software applications
    Cloud computing View All
    • Internet applications
    • Internet of Things
    • Web services
    Computer science View All
    • Electronics
    • Internet technologies
    • IT standards and organizations
    • Microprocessors
    • Robotics
    Data analytics and AI View All
    • Algorithms
    • Artificial intelligence
    • Data and data management
    • Database management
    Data centers View All
    • Data backup and disaster recovery
    • Data center management
    • Linux
    • Operating systems
    • Storage Admin
    • Storage and Data Mgmt
    • Virtualization
    IT management View All
    • Certifications
    • IT career paths
    • IT Operations
    • Personal computing
    • Project management
    • Technical support
    Networking View All
    • High-speed networks
    • Network Admin
    • Network hardware
    • Networking and communications
    • Wireless and mobile
    Security View All
    • Authentication and access control
    • Compliance, risk and governance
    • Network security
    • Security Admin
    • Threat management
    Software development View All
    • Agile software development
    • AppDev
    • DevOps
    • Programming
  • Browse Features Resources
    • Business strategies
    • Career resources
    • Emerging tech
    • Tech explainers
  • Follow:
  • Home

New & Updated Definitions

  • What is 5G-Advanced (5GA or 5.5G)?

    5G-Advanced -- dubbed 5GA or 5.5G -- represents the latest iteration of 5G technology. See More.

  • What is HRIS (human resources information system)?
  • What is edge AI?
  • What is a municipal wireless network (MWN)?
  • What is 5G infrastructure?
  • What is data stewardship?
  • What is a forensic image?
  • What is mobile threat defense (MTD)?
  • What is Centers for Medicare & Medicaid Services (CMS)?
  • Conference news from Pure//Accelerate 2025

    Check out our guide to the annual conference, with key pre-conference material to get you ready and on-the-spot reports from this year's show.

  • Microsoft Inspire 2022 news and conference guide

    Microsoft will explain its partner program evolution and unveil upcoming priorities at its annual partner conference. Read on for news from Microsoft Inspire 2022.

  • IBM Think 2022 news, trends and analysis

    AI adoption is driving advancement of cybersecurity and other business processes. At IBM Think 2022, enterprise leaders will learn how to capitalize on game-changing technologies.

Latest TechTarget resources
  • Networking
  • Security
  • CIO
  • HR Software
  • Customer Experience
Search Networking
  • What is a municipal wireless network (MWN)?

    A municipal wireless network (MWN) is a town or city-wide implementation of a wireless network funded or supported by local ...

  • What is 5G infrastructure?

    5G infrastructure is the combination of hardware and software elements used to construct the fifth generation (5G) of the ...

  • What is the application layer?

    The application layer is at Layer 7, the top of the Open Systems Interconnection (OSI) communications model. It ensures that an ...

Search Security
  • What is a stealth virus and how does it work?

    A stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software.

  • What is file integrity monitoring (FIM)?

    File Integrity Monitoring (FIM) is a security process that continuously monitors and analyzes the integrity of an organization's ...

  • What is information security (infosec)?

    Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of ...

Search CIO
  • What is enterprise architecture (EA)?

    An enterprise architecture (EA) is a conceptual blueprint that defines an organization's structure and operation.

  • CIO job description: Chief information officer responsibilities

    Learn about the role of the chief information officer, including daily responsibilities, necessary skills and how the role is ...

  • What is conduct risk?

    Conduct risk is the potential for a company's actions or behavior to harm its customers, stakeholders or broader market integrity.

Search HRSoftware
  • What is HRIS (human resources information system)?

    A human resources information system (HRIS) is software that aids organizations in maintaining detailed employee information and ...

  • What is succession planning?

    Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles ...

  • What is HR service delivery?

    HR service delivery is a term used to explain how an organization's human resources (HR) department offers services to and ...

Search Customer Experience
  • What is direct marketing?

    Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or ...

  • What is mobile CRM?

    Mobile CRM, or mobile customer relationship management, enables those working in the field or remote employees to use mobile ...

  • What is field service management (FSM)?

    Field service management (FSM) is a system of managing off-site workers and the resources they require to do their jobs ...

  • Browse by Topic
  • Browse Resources
  • About Us
  • Meet The Editors
  • Editorial Ethics Policy
  • Contact Us
  • Advertisers
  • Business Partners
  • Events
  • Media Kit
  • Corporate Site
  • Reprints

All Rights Reserved. Copyright 1999 - 2025, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close