WhatIs
Browse Definitions :
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • #
Login Register
  • TechTarget Network
  • Tech Accelerator
  • News
  • 2024 IT Salary Survey Results
RSS
  • WhatIs
  • Browse Definitions By Topic
    Please select a category
    • Business software
    • Cloud computing
    • Computer science
    • Data analytics and AI
    • Data centers
    • IT management
    • Networking
    • Security
    • Software development
    Business software View All
    • ERP
    • HR management
    • Marketing and CX
    • Microsoft
    • Software applications
    Cloud computing View All
    • Internet applications
    • Internet of Things
    • Web services
    Computer science View All
    • Electronics
    • Internet technologies
    • IT standards and organizations
    • Microprocessors
    • Robotics
    Data analytics and AI View All
    • Algorithms
    • Artificial intelligence
    • Data and data management
    • Database management
    Data centers View All
    • Data backup and disaster recovery
    • Data center management
    • Linux
    • Operating systems
    • Storage Admin
    • Storage and Data Mgmt
    • Virtualization
    IT management View All
    • Certifications
    • IT career paths
    • IT Operations
    • Personal computing
    • Project management
    • Technical support
    Networking View All
    • High-speed networks
    • Network Admin
    • Network hardware
    • Networking and communications
    • Wireless and mobile
    Security View All
    • Authentication and access control
    • Compliance, risk and governance
    • Network security
    • Security Admin
    • Threat management
    Software development View All
    • Agile software development
    • AppDev
    • DevOps
    • Programming
  • Browse Features Resources
    • Business strategies
    • Career resources
    • Emerging tech
    • Tech explainers
  • Follow:
  • Home

New & Updated Definitions

  • What is phishing? Understanding enterprise phishing threats

    Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person to trick users into revealing sensitive information. See More.

  • What is a virtual CISO (vCISO)? Does your business need one?
  • What is cyber resilience?
  • What are beans in Java and Spring?
  • What is a power distribution unit (PDU)?
  • What is a virtual CISO (vCISO)? Does your business need one?
  • What is CCTV (closed-circuit television)?
  • What is single sign-on (SSO)?
  • What is a qubit (quantum bit)?
Latest TechTarget resources
  • Networking
  • Security
  • CIO
  • HR Software
  • Customer Experience
Networking
  • What is signal-to-noise ratio and how is it measured?

    A signal-to-noise ratio compares the strength of a desired signal with any undesired signals created by background noise.

  • What is the OSI model? The 7 layers of OSI explained

    The OSI model (Open Systems Interconnection model) is a multilayered reference model that shows how computer systems and ...

  • What is shielded twisted pair (STP) and how does it work?

    Shielded twisted pair (STP) is a kind of cable made up of smaller wires where each small pair of wires is twisted together and ...

Security
  • What is phishing? Understanding enterprise phishing threats

    Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person to trick users into revealing ...

  • What is a virtual CISO (vCISO)? Does your business need one?

    The virtual chief information security officer (vCISO) is a C-suite-level security professional or service provider who offers ...

  • What is a virtual CISO (vCISO)? Does your business need one?

    The virtual chief information security officer is a C-suite-level security professional or service provider who offers CISO-level...

Search CIO
  • What is a quantum circuit? Quantum vs. classical circuit

    Quantum circuits are systems consisting of logic gates that operate on quantum bits (qubits) to process information and perform ...

  • What is prescriptive analytics?

    Prescriptive analytics is a type of data analytics that provides guidance on what should happen next.

  • What is the Risk Management Framework (RMF)?

    The Risk Management Framework (RMF) is a template and guideline organizations use to identify, eliminate and minimize risks.

HRSoftware
  • What is an applicant tracking system (ATS)?

    An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job ...

  • What is manager self-service?

    Manager self-service is a type of human resource management (HRM) platform that gives supervisors immediate access to employee ...

  • What is performance management software?

    Performance management software is a tool that enables human resources (HR) teams to measure and track the performance of ...

Customer Experience
  • What is field service management (FSM)?

    Field service management (FSM) is a system of managing off-site workers and the resources they require to do their jobs ...

  • What are customer service and support?

    Customer service is the support organizations offer to customers before, during and after purchasing a product or service.

  • What is quality of experience (QoE or QoX)?

    Quality of experience (QoE or QoX) is a measure of the overall level of a customer's satisfaction and experience with a product ...

  • Browse by Topic
  • Browse Resources
  • About Us
  • Meet The Editors
  • Editorial Ethics Policy
  • Contact Us
  • Advertisers
  • Business Partners
  • Events
  • Media Kit
  • Corporate Site
  • Reprints

All Rights Reserved. Copyright 1999 - 2025, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close