WhatIs
Browse Definitions :
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • #
Login Register
  • TechTarget Network
  • Tech Accelerator
  • News
  • 2024 IT Salary Survey Results
RSS
  • WhatIs
  • Browse Definitions By Topic
    Please select a category
    • Business software
    • Cloud computing
    • Computer science
    • Data analytics and AI
    • Data centers
    • IT management
    • Networking
    • Security
    • Software development
    Business software View All
    • ERP
    • HR management
    • Marketing and CX
    • Microsoft
    • Software applications
    Cloud computing View All
    • Internet applications
    • Internet of Things
    • Web services
    Computer science View All
    • Electronics
    • Internet technologies
    • IT standards and organizations
    • Microprocessors
    • Robotics
    Data analytics and AI View All
    • Algorithms
    • Artificial intelligence
    • Data and data management
    • Database management
    Data centers View All
    • Data backup and disaster recovery
    • Data center management
    • Linux
    • Operating systems
    • Storage Admin
    • Storage and Data Mgmt
    • Virtualization
    IT management View All
    • Certifications
    • IT career paths
    • IT Operations
    • Personal computing
    • Project management
    • Technical support
    Networking View All
    • High-speed networks
    • Network Admin
    • Network hardware
    • Networking and communications
    • Wireless and mobile
    Security View All
    • Authentication and access control
    • Compliance, risk and governance
    • Network security
    • Security Admin
    • Threat management
    Software development View All
    • Agile software development
    • AppDev
    • DevOps
    • Programming
  • Browse Features Resources
    • Business strategies
    • Career resources
    • Emerging tech
    • Tech explainers
  • Follow:
  • Home

New & Updated Definitions

  • What is fuzzy logic?

    Fuzzy logic is an approach to computing based on degrees of truth rather than the usual true or false -- 1 or 0 -- Boolean logic on which the modern computer is based. See More.

  • What is conduct risk?
  • What is HIMSS (Healthcare Information and Management Systems Society)?
  • What is data quality and why is it important?
  • What is meaningful use stage 3?
  • What is security theater?
  • What is governance, risk and compliance (GRC)?
  • What is Microsoft Managed Desktop (MMD)?
  • What are functional requirements?
  • Conference news from Pure//Accelerate 2025

    Check out our guide to the annual conference, with key pre-conference material to get you ready and on-the-spot reports from this year's show.

  • Microsoft Inspire 2022 news and conference guide

    Microsoft will explain its partner program evolution and unveil upcoming priorities at its annual partner conference. Read on for news from Microsoft Inspire 2022.

  • IBM Think 2022 news, trends and analysis

    AI adoption is driving advancement of cybersecurity and other business processes. At IBM Think 2022, enterprise leaders will learn how to capitalize on game-changing technologies.

Latest TechTarget resources
  • Networking
  • Security
  • CIO
  • HR Software
  • Customer Experience
Search Networking
  • What is fiber to the home (FTTH)?

    Fiber to the home (FTTH) is the installation and use of optical fiber from a central point to individual buildings to provide ...

  • What is an SDN controller (software-defined networking controller)?

    A software-defined networking controller is an application in SDN architecture that manages Flow control for improved network ...

  • What is a network service provider (NSP)?

    A network service provider (NSP), also known as a backbone provider, is a company that owns, operates and sells access to ...

Search Security
  • What is governance, risk and compliance (GRC)?

    Governance, risk and compliance (GRC) refers to an organization's strategy, or framework, for handling the interdependencies of ...

  • What is integrated risk management (IRM)?

    Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization's security, ...

  • What is COMSEC (communications security)?

    Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic or to any written ...

Search CIO
  • What is conduct risk?

    Conduct risk is the potential for a company's actions or behavior to harm its customers, stakeholders or broader market integrity.

  • What are the COSO frameworks?

    The COSO frameworks are documents that provide guidance on establishing internal controls and enterprise risk management (ERM) ...

  • What is the three lines model and what is its purpose?

    The three lines model is a risk management approach to help organizations identify and manage risks effectively by creating three...

Search HRSoftware
  • What is a talent pool?

    A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.

  • What is a 360 review?

    A 360 review, or 360-degree review, is a continuous performance management strategy aimed at helping employees at all levels ...

  • What is a talent pipeline?

    A talent pipeline is a pool of candidates who are ready to fill a position.

Search Customer Experience
  • What is direct marketing?

    Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or ...

  • What is mobile CRM?

    Mobile CRM, or mobile customer relationship management, enables those working in the field or remote employees to use mobile ...

  • What is field service management (FSM)?

    Field service management (FSM) is a system of managing off-site workers and the resources they require to do their jobs ...

  • Browse by Topic
  • Browse Resources
  • About Us
  • Meet The Editors
  • Editorial Ethics Policy
  • Contact Us
  • Advertisers
  • Business Partners
  • Events
  • Media Kit
  • Corporate Site
  • Reprints

All Rights Reserved. Copyright 1999 - 2025, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close