Browse Definitions :

Find Technology-Specific Sites

TechTarget gives technology professionals and executives the information they need to perform their jobs – from developing strategy, to making cost-effective purchase decisions and managing their organizations' technology projects. Bookmark this page for easy access to the TechTarget network of technology-specific websites.

Browse TechTarget Sites by Topic

Application Development

Ajaxian

Ajaxian is a resource for software developers who work with Ajax, PHP, ASP.net, jQuery, Javascript, NodeJS, noSQL, FP and Visualization.

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • Red Hat OpenShift

    Red Hat OpenShift is a multifaceted, open source container application platform from Red Hat Inc. for the development, deployment and management of applications.

  • cloud application

    A cloud application, or cloud app, is a software program where cloud-based and local components work together.

  • iPaaS (integration platform as a service)

    Integration platform as a service (iPaaS) is a set of automated tools for connecting software applications that are deployed in different environments. iPaaS is often used by large business-to-business (B2B) enterprises that need to integrate on-premises applications and data with cloud applications and data.

SearchMicroservices

SearchMicroservices.com provides readers with industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, business process management (BPM), application integration and APIs, software containers, microservices and DevOps.

  • API economy

    API economy (application programming interface economy) is a general term that describes the way application programming interfaces (APIs) can positively affect an organization's profitability.

  • software stack

    A software stack is a collection of independent components that work together to support the execution of an application. The components, which may include an operating system, architectural layers, protocols, run-time environments, databases and function calls, are stacked one on top of each other in a hierarchy. Typically, the lower level components in the hierarchy interact with hardware, while the higher level components in the hierarchy perform specific tasks for the end user.

  • microservices

    Microservices, or microservice architecture, is an approach to application development in which a large application is built as a suite of modular components or services.

SearchSoftwareQuality

SearchSoftwareQuality.com is the online community for developers, architects and executives interested in building secure and quality software.

  • continuous integration (CI)

    Continuous integration (CI) is a software engineering practice in which frequent, isolated changes are immediately tested and reported on when they are added to a larger code base.

  • application

    An application, also referred to as an application program or application software, is a computer software package that performs a specific function directly for an end user or, in some cases, for another application.

  • application program

    An application, also referred to as an application program or application software, is a computer software package that performs a specific function directly for an end user or, in some cases, for another application.

SearchWinDevelopment

SearchWinDevelopment.com is a unique online resource for developers, architects and development managers tasked with building and maintaining enterprise applications using Visual Basic, C# and the Microsoft .NET platform.

  • scripting language

    A scripting language is a form of programming language that is usually interpreted rather than compiled. Scripting languages are typically converted into machine code on the fly during runtime by a program called an interpreter.

  • Internet

    The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).

  • domain name

    A domain name locates an organization or other entity on the Internet. For example, the domain name "www.totalbaseball.com" locates an Internet address for "totalbaseball.com" at Internet point 199.0.0.2 and a particular host server named "www."

TheServerSide

TheServerSide.com is the world’s largest online community for enterprise Java architects and developers, providing daily news, tech talk interviews with key industry figures, design patterns, discussion forums, tutorials and more.

  • Java Development Kit (JDK)

    The Java Development Kit (JDK) provides the foundation upon which all applications that are targeted toward the Java platform are built.

  • HTML (Hypertext Markup Language)

    HTML (Hypertext Markup Language) is a text-based approach to describing how content contained within an HTML file is structured.

  • CSS (cascading style sheets)

    This definition explains the meaning of CSS (cascading style sheets) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.

Back to Top

Business Intelligence / Analytics

BeyeNETWORK

BeyeNETWORK.com is the primary site of the BeyeNETWORK, providing viewers with access to the thought leaders in business intelligence, performance management, business integration, information quality, data warehousing and more.

SearchBusinessAnalytics

SearchBusinessAnalytics.com is dedicated to serving the information needs of business and IT professionals.

  • big data analytics

    Big data analytics is the often complex process of examining large and varied data sets -- or big data -- to uncover information including hidden patterns, unknown correlations, market trends and customer preferences that can help organizations make informed business decisions.

  • data sampling

    Data sampling is a statistical analysis technique used to select, manipulate and analyze a representative subset of data points to identify patterns and trends in the larger data set being examined.

  • self-service business intelligence (BI)

    Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and work with corporate data even if they do not have a background in statistical analysis, BI or data mining.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • content services platform

    A content services platform is cloud-based SaaS software that enables users to create, share, collaborate on and store text, audio and video content.

  • Microsoft SharePoint

    Microsoft SharePoint is a document management and collaboration platform that helps companies manage archives, documents, reports and other content that is vital to the business process.

  • e-signature

    An e-signature (electronic signature) is a digital version of a traditional pen and ink signature.

SearchCRM

SearchCRM.com is a free resource dedicated to Customer Relationship Management (CRM) decision makers.

  • Cold Calling

    Cold calling is the business practice of reaching out to a potential customer or client who has not opted into a contact list with the desire to generate a sale or secure support.

  • revenue operations (RevOps)

    Revenue operations (RevOps) is the strategic integration of sales, marketing and service departments to provide a better end-to-end view to administration and management, while leaving day-to-day processes within the departments.

  • emotions analytics (EA)

    Emotions analytics (EA) software collects data on how a person communicates verbally and nonverbally to understand the person's mood or attitude.

SearchDataManagement

SearchDataManagement.com is a guide for data management professionals and business leaders.

  • customer data integration (CDI)

    Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.

  • MongoDB

    MongoDB is an open source database management system (DBMS) that uses a document-oriented database model which supports various forms of data.

  • data warehouse

    A data warehouse is a federated repository for all the data collected by an enterprise's various operational systems, be they physical or logical.

SearchSQLServer

SearchSQLServer.com is dedicated to serving the information needs of database developers and administrators working with Microsoft's flagship database enterprise server, SQL Server.

  • U-SQL

    U-SQL is a Microsoft query language that combines a declarative SQL-like syntax with C# programming, enabling it to be used to process both structured and unstructured data in big data environments.

  • Microsoft Azure Cosmos DB

    Azure Cosmos DB is a Microsoft cloud database that supports multiple ways of storing and processing data. As such, it is classified as a multimodel database.

  • Microsoft SQL Server

    Microsoft SQL Server is a relational database management system, or RDBMS, that supports a wide variety of transaction processing, business intelligence and analytics applications in corporate IT environments

Back to Top

Business Software

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • Red Hat OpenShift

    Red Hat OpenShift is a multifaceted, open source container application platform from Red Hat Inc. for the development, deployment and management of applications.

  • cloud application

    A cloud application, or cloud app, is a software program where cloud-based and local components work together.

  • iPaaS (integration platform as a service)

    Integration platform as a service (iPaaS) is a set of automated tools for connecting software applications that are deployed in different environments. iPaaS is often used by large business-to-business (B2B) enterprises that need to integrate on-premises applications and data with cloud applications and data.

SearchDomino

SearchDomino.com is a leading source for Lotus Notes and Domino-specific information for enterprise IT professionals.

  • knowledge management (KM)

    Knowledge management is a concept in which an enterprise consciously and comprehensively gathers, organizes, shares and analyzes its knowledge in terms of resources, documents, and people skills.

  • Instant Messaging: Glossary

    This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.

  • iNotes (iNotes Web Access)

    iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.

SearchERP

SearchERP was built to help startups, small and mid-sized businesses, and large corporations better leverage ERP technologies and strategies to eliminate legacy platforms that cause data silos, improve business processes, boost profitability, improve financial reporting and gain more visibility.

  • procure to pay (P2P)

    Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.

  • two-tier ERP

    Two-tier ERP is a technology strategy taken by large, multinational enterprises that uses tier 1 ERP for financials and other core common processes at the corporate level and tier 2 ERP for divisions, subsidiaries and smaller locations of the company to address specific needs.

  • JDA Software

    JDA Software is a software and consultancy company that specializes in selling supply chain management products and services to businesses.

SearchHRSoftware

Find unbiased news, analysis, resources and the latest strategies to better manage HR and HCM functions at your organization.

  • 360 review

    A 360 review, or 360-degree review, is a feedback collection process aimed at helping employees at all levels obtain responses from various parts of an organization in order to develop and sharpen their professional skills.

  • employee resource groups (ERGs)

    Employee resource groups are workplace clubs or more formally realized affinity group organized around a shared interest or identity.

  • digital HR

    Digital HR is the digital transformation of HR services and processes through the use of social, mobile, analytics and cloud (SMAC) technologies.

SearchSalesforce

SearchSalesforce.com is a resource for Salesforce news, expert advice, technical tips and career guidance as well as a forum for community interaction. The site focuses on the Salesforce customer relationship management (CRM) platform as well as its ecosystem of partners.

  • marketing automation

    Marketing automation is a type of software that allows companies to effectively target customers with automated marketing messages across channels including email, websites, social media and text messages to generate sales leads.

  • partner relationship management (PRM)

    Partner relationship management (PRM) is a combination of the software, processes and strategies companies use to streamline business processes with partners who sell their products.

  • Salesforce Solution Architect

    A Salesforce Solution Architect is someone who has been certified for demonstrating the capabilities to build and design solutions across Salesforce platforms.

SearchSAP

SearchSAP.com is the SAP community's resource for news, expert advice, technical tips and career guidance.

  • Fieldglass

    SAP Fieldglass is a cloud-based software platform that allows companies to manage external workforces, including contractors, temporary workers, contingent labor, and statement of work (SOW) employees.

  • SAP BW (Business Warehouse)

    SAP Business Warehouse (BW) is a model-driven data warehousing product based on the SAP NetWeaver ABAP platform.

  • SAP indirect access

    SAP indirect access is the license violation that occurs when SAP customers allow third-party applications to communicate with SAP system data.

Back to Top

CIO Strategies

ComputerWeekly

ComputerWeekly.com is the leading provider of news, analysis, opinion, information and services for the UK IT community. The site serves as an advocate for UK IT professionals and the role of technology in improving organisations in all sectors of business and public life.

ebizQ

ebizQ is the insider’s guide to next-generation business process management. The site offers a growing collection of independent editorial articles on BPM trends, issues, challenges and solutions, all targeted to business and IT BPM professionals.

SearchCIO

SearchCIO.com provides technology management strategies designed exclusively for the enterprise CIO. Our award-winning team of editors and industry luminaries offer strategic advice and technology best practices to help streamline global IT operations.

  • business process

    A business process is an activity or set of activities that can accomplish a specific organizational goal.

  • IT service catalog

    An IT service catalog is a list of technology resources and offerings available from the IT service provider within an organization.

  • IT asset management (ITAM)

    IT asset management (information technology asset management, or ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from retaliatory action for voluntarily disclosing information about dishonest or illegal activities occurring in a government organization.

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies or assets between parties under certain conditions.

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A risk map helps companies identify and prioritize the risks associated with their business.

Back to Top

Channel Resources

MicroScope

Stay ahead with IT Business management and technology news and articles on UK laws, regulations, credit and finance, selling, sales management, marketing and supplier relationships.

SearchITChannel

If you're a value-added reseller (VAR), information technology reseller or a systems integrator, all of your research needs are met at SearchITChannel.com.

  • deal registration

    Deal registration is a common feature of vendors' channel partner programs in which a channel partner, such as a value-added reseller (VAR), informs the vendor about a sales lead.

  • VMware Partner Network

    The VMware Partner Network is a global channel partner program with benefits and support to provide VMware's virtualization and cloud technology.

  • RMM software (remote monitoring and management software)

    RMM software (remote monitoring and management software) is a type of application that IT service providers use to maintain their clients' IT infrastructure and systems.

Back to Top

Cloud

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchAWS

From cloud infrastructure to applications, development, security, big data, storage and more, SearchAWS.com provides meaningful insight from award-winning editors, research analysts and industry experts on one of the fastest-growing cloud services providers, Amazon Web Services.

  • AWS Single Sign-On (AWS SSO)

    AWS Single Sign-On (AWS SSO) is a service from Amazon Web Services that enables IT to manage user access to multiple applications and AWS accounts from a single, centralized console.

  • AWS PrivateLink

    AWS PrivateLink is a networking feature provided by Amazon Web Services (AWS) that eases and secures connectivity between Amazon Virtual Private Clouds (VPCs), other Amazon cloud services and on-premises applications.

  • Amazon Transcribe

    Amazon Transcribe is a speech recognition service that transcribes audio files into text.

SearchCloudComputing

SearchCloudComputing.com is the Web's most comprehensive resource for cloud computing news, analysis and case studies.

  • cloud integration

    Cloud integration refers to the combination of tools, technologies and practices an enterprise can use to connect applications, systems, data and even entire IT environments.

  • cloud migration

    Cloud migration is the process of moving data, applications or other business elements to a cloud computing environment.

  • Infrastructure as a Service (IaaS)

    Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • CAIQ (Consensus Assessments Initiative Questionnaire)

    The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud service provider.

  • virtual firewall

    A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment.

  • Cloud Security Alliance (CSA)

    The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • hardware virtualization

    Hardware virtualization, which is also known as server virtualization or simply virtualization, is the abstraction of computing resources from the software that uses those resources.

  • physical to virtual (P2V)

    Physical to virtual (P2V) is a term that refers to the migration of an operating system (OS), application programs and data from a computer's main hard disk to a virtual machine.

  • hardware-assisted virtualization

    Hardware-assisted virtualization is the use of a computer's physical components to support the mechanism that abstracts and manages the computer's underlying resources from its operating system and the applications that run on it.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • PCoIP (PC over IP)

    PC over IP (PCoIP) is a remote display protocol that Teradici developed for delivering remote desktops and applications to endpoints.

  • eG Innovations

    eG Innovations is an end-user experience and infrastructure monitoring software vendor best known for its eG Enterprise product.

  • Lakeside Software

    Lakeside Software is a desktop monitoring software company known for its SysTrack product, which provides performance data and analytics for physical and virtual desktops.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware ESXi

    VMware ESXi is an operating system-independent hypervisor based on the VMkernel operating system that interfaces with agents that run on top of it. ESXi stands for Elastic Sky X Integrated.

  • VMware vRealize Log Insight (formerly vCenter Log Insight)

    VRealize Log Insight is a log collection and analytics virtual appliance that enables administrators to collect, view, manage and analyze syslog data.

  • VMware Cloud on AWS

    VMware Cloud on AWS is a hybrid cloud service that runs the VMware software-defined data center (SDDC) stack in the AWS public cloud.

Back to Top

Consumer Product Review

Brighthand

Brighthand.com offers SmartPhone, handheld computer, and cell phone reviews and news. Our active forum community is a great source of information on SmartPhones and related devices.

DigitalCameraReview

DigitalCameraReview.com offers digital camera reviews and news, a forum community, digital camera price comparisons, deals and coupons on digital cameras and accessories.

NotebookReview

NotebookReview.com offers the latest notebook and laptop reviews, as well as price comparisons, support forums and news."

TabletPCReview

TabletPCReview.com offers Tablet PC reviews and ratings, price comparisons, as well as support forums and news.

TechnologyGuide

TechnologyGuide.com is a family of product review and evaluation websites that are the leading source for information on the latest desktop and notebook computers, software and printers, wireless smartphones, digital cameras, and other devices for both the consumer and business markets.

Back to Top

Data Center Management

Search400

Search400.com is an online information resource for the latest news, tech tips and expert advice for the iSeries professional.

  • Quiz: iSeries (AS/400) History

    2003 marks the 15th anniversary of the AS/400 (now called the iSeries), so we thought we'd take a look back and see how it's changed over the years.

  • Quiz: iSeries (AS/400) Commands

    The iSeries (AS/400) is one of IBM's greatest success stories.

  • OS/400

    OS/400 is IBM's operating system for its AS/400 and AS/400e line of business computers. (Continued...)

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • hyperconvergence

    Hyperconvergence -- also spelled hyper-convergence -- is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

  • NetApp FlexPod

    NetApp FlexPod is a reference architecture for server, storage and networking components that are pretested and validated to work together as an integrated infrastructure stack.

  • technological convergence

    Technological convergence is a term that describes the layers of abstraction that enable different technologies to interoperate efficiently as a converged system.

SearchDataCenter

SearchDataCenter.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is the leading source for tactical expert advice and best practices on desktop management and security. The site provides essential resources including the latest tips, tutorials, webcasts, white papers and more.

  • Windows Defender Application Guard

    Windows Defender Application Guard is a security tool built into Microsoft Edge that isolates browser sessions from the desktop in a virtual machine (VM) to prevent any malicious activity from reaching the desktop.

  • desktop computer

    A desktop computer is a personal computing device designed to fit on top of a typical office desk.

  • Windows 7

    Windows 7 is the Microsoft Windows operating system (OS) released commercially in October 2009 as the successor to Windows Vista.

SearchITOperations

As hybrid cloud deployments, containers, microservices and DevOps continue to become part of a data center's infrastructure, IT operations pros are facing a new set of responsibilities. Because they must be agile and able to manage next-gen apps in blended environments, the roles and responsibilities of development and operation teams are blending. 

  • Go (programming language)

    Go, or GoLang, is an open source, general-purpose programming language developed by Google engineers to create dependable and efficient software.

  • continual service improvement

    Continual service improvement is a method to identify and execute opportunities to make IT processes and services better, and to objectively measure the effects of these efforts over time.

  • configuration file

    A configuration file, often shortened to config file, defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context.

SearchWindowsServer

SearchWindowsServer.com is dedicated to serving the information needs of Windows server professionals. The site provides targeted news, expert advice, tips, tutorials, learning guides, webcasts, white papers and more.

  • Microsoft Windows

    Windows is a personal computer operating system from Microsoft that, together with some commonly used business applications such as Microsoft Word and Excel, has become a de facto 'standard' for individual users in most corporations as well as in most homes.

  • Active Directory

    Active Directory (AD) is a Microsoft product that consists of several services that run on Windows Server to manage permissions and access to networked resources.

  • Windows Admin Center (formerly Project Honolulu)

    Windows Admin Center, formerly Microsoft Project Honolulu, is a browser-based utility that manages Windows Server and client operating systems, hyper-converged clusters, and failover clusters.

Back to Top

Database

SearchOracle

Visit SearchOracle.com for information and tips for the Oracle community. The site provides comprehensive coverage of all Oracle-specific news, trends and developments in the database industry.

  • PL/SQL (procedural language extension to Structured Query Language)

    In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL).

  • distributed database

    A distributed database is a database that consists of two or more files located in different sites either on the same network or on entirely different networks.

  • Oracle NoSQL Database

    The Oracle NoSQL Database is a nonrelational, horizontally scalable key-value database, with multiple higher-level data abstractions that support data management as binary key-value pairs, JSON objects, and SQL-like tables.

Back to Top

Disaster Recovery / Compliance

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from retaliatory action for voluntarily disclosing information about dishonest or illegal activities occurring in a government organization.

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies or assets between parties under certain conditions.

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A risk map helps companies identify and prioritize the risks associated with their business.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • content services platform

    A content services platform is cloud-based SaaS software that enables users to create, share, collaborate on and store text, audio and video content.

  • Microsoft SharePoint

    Microsoft SharePoint is a document management and collaboration platform that helps companies manage archives, documents, reports and other content that is vital to the business process.

  • e-signature

    An e-signature (electronic signature) is a digital version of a traditional pen and ink signature.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • off-site backup

    Off-site backup is a method of backing up data to a remote server or to media that is transported off site.

  • data loss

    Data loss is the intentional or unintentional destruction of information, caused by people and or processes from within or outside of an organization.

  • purpose-built backup appliance (PBBA)

    A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.

SearchDisasterRecovery

Natural disasters, internal threats, user error and terrorist acts are realities that IT must take into consideration in their efforts to effectively protect their digital assets. Fortunately, SearchDisasterRecovery.com is the premier online resource for IT professionals responsible for disaster recovery planning.

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized workloads.

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a simulated disaster scenario.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

Back to Top

Emerging Technologies

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • Z-Wave

    Z-Wave is a wireless communication protocol used primarily in smart home networks, allowing smart devices to connect and exchange control commands and data with each other.

  • smart home hub (home automation hub)

    A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.

  • smart home or building (home automation or domotics)

    A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

  • software-defined networking (SDN)

    Software-defined networking (SDN) is a network architecture that aims to make data center networks agile and flexible.

  • Network as a Service (NaaS)

    Network as a service (NaaS) is a business model for delivering enterprise-wide area network services virtually on a subscription basis.

  • network orchestration

    Network orchestration is a policy-driven approach to network automation that coordinates the hardware and software components a software application or service requires to run.

Back to Top

Healthcare IT

SearchHealthIT

SearchHealthIT.com is the health care technology professional’s how-to guide to building and managing an electronic health care infrastructure.

  • ICD-10 (International Classification of Diseases, Tenth Revision)

    The International Classification of Diseases, Tenth Edition (ICD-10), is a clinical cataloging system that went into effect for the U.S. healthcare industry on Oct. 1, 2015, after a series of lengthy delays.

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the telecommunications infrastructure.

  • PACS (picture archiving and communication system)

    PACS (picture archiving and communication system) is a medical imaging technology used primarily in healthcare organizations to securely store and digitally transmit electronic images and clinically-relevant reports.

Back to Top

Networking

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • Z-Wave

    Z-Wave is a wireless communication protocol used primarily in smart home networks, allowing smart devices to connect and exchange control commands and data with each other.

  • smart home hub (home automation hub)

    A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.

  • smart home or building (home automation or domotics)

    A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.

SearchEnterpriseWAN

SearchEnterpriseWAN.com is one of the largest and most active online communities dedicated to the enterprise wide area network.

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).

  • ISDN (Integrated Services Digital Network)

    ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.

  • File Transfer Protocol (FTP)

    File Transfer Protocol (FTP) is a client-server standard used to transfer files between computers over the Internet using control and data channels.

SearchMobileComputing

SearchMobileComputing.com provides comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise.

SearchNetworking

SearchNetworking.com is one of the largest and most active online communities dedicated to the enterprise network.

  • small cell

    Small cell is an overarching term for wireless network base stations with a low radio frequency power output, footprint and range.

  • Ethernet

    Ethernet is the traditional technology for connecting wired local area networks (LANs), enabling devices to communicate with each other via a protocol -- a set of rules or common network language.

  • network analytics

    Network analytics is the application of big data principles and tools to the management and security of data networks.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

  • software-defined networking (SDN)

    Software-defined networking (SDN) is a network architecture that aims to make data center networks agile and flexible.

  • Network as a Service (NaaS)

    Network as a service (NaaS) is a business model for delivering enterprise-wide area network services virtually on a subscription basis.

  • network orchestration

    Network orchestration is a policy-driven approach to network automation that coordinates the hardware and software components a software application or service requires to run.

SearchTelecom

Whether you're an IT Pro looking for advice on building-out an infrastructure to support new customer demands or a product manager seeking new tech insights to boost ARPU, SearchTelecom.com is a critical online resource for IT and business professionals.

  • dense wavelength division multiplexing (DWDM)

    Dense wavelength division multiplexing (DWDM) is a technology that puts together -- multiplexes -- data signals from different sources so they can share a single optical fiber pair while maintaining complete separation of the data streams.

  • over-the-top (OTT)

    Over-the-top (OTT) is networking lingo that describes the delivery of content, services or applications over the internet.

  • fiber optics (optical fiber)

    Fiber optics, or optical fiber, refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic strand or fiber.

SearchUnifiedCommunications

SearchUnifiedCommunications.com provides a reliable source of how-to tips and best practices for implementing, managing and securing VoIP and advanced IP applications, enabling IT professionals to take advantage of the cost savings and new features and benefits associated with converged enterprise network.

  • VoIP (voice over IP)

    VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks. VoIP historically referred to using IP to connect private branch exchanges (PBXs), but the term is now used interchangeably with IP telephony.

  • QoS (quality of service)

    Quality of service (QoS) refers to any technology that manages data traffic to reduce packet loss, latency and jitter on the network.

  • Microsoft Teams

    Microsoft Teams is cloud-based team collaboration software that is part of the Office 365 suite of applications.

Back to Top

Security

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • CAIQ (Consensus Assessments Initiative Questionnaire)

    The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud service provider.

  • virtual firewall

    A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment.

  • Cloud Security Alliance (CSA)

    The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing.

SearchFinancialSecurity

IT professionals turn to SearchFinancialSecurity.com for the information they require to keep their corporate data and assets secure.

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Shared Assessments Program

    Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.

  • Common Vulnerabilities and Exposures (CVE)

    Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.

SearchMidmarketSecurity

SearchMidmarketSecurity.com is the only security-specific information resource geared toward midsize companies that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, a selection of highly focused security e-newsletters and more - all at no cost.

  • endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • clean desk policy (CDP)

    A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. Most CDPs require employees to clear their desks of all papers at the end of the day.

  • zombie computer (zombie bot)

    A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet. (Continued)

SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure.

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the temporary holding space during information transfer, the buffer, is fed at a lower rate than it is being read from.

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.

Back to Top

Social Media

ITKnowledgeExchange

Find technology questions and answers in this community of information technology (IT) experts and professionals.

Back to Top

Storage

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • hyperconvergence

    Hyperconvergence -- also spelled hyper-convergence -- is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

  • NetApp FlexPod

    NetApp FlexPod is a reference architecture for server, storage and networking components that are pretested and validated to work together as an integrated infrastructure stack.

  • technological convergence

    Technological convergence is a term that describes the layers of abstraction that enable different technologies to interoperate efficiently as a converged system.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • off-site backup

    Off-site backup is a method of backing up data to a remote server or to media that is transported off site.

  • data loss

    Data loss is the intentional or unintentional destruction of information, caused by people and or processes from within or outside of an organization.

  • purpose-built backup appliance (PBBA)

    A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.

SearchStorage

The TechTarget Storage Media Group has built a community of the largest and most audience of storage decision-makers on the web.

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and storage capacity.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

Back to Top

Vendor Research

KnowledgeStorm

Browse the database of business technology software products and services.

Back to Top

Virtualization

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • hardware virtualization

    Hardware virtualization, which is also known as server virtualization or simply virtualization, is the abstraction of computing resources from the software that uses those resources.

  • physical to virtual (P2V)

    Physical to virtual (P2V) is a term that refers to the migration of an operating system (OS), application programs and data from a computer's main hard disk to a virtual machine.

  • hardware-assisted virtualization

    Hardware-assisted virtualization is the use of a computer's physical components to support the mechanism that abstracts and manages the computer's underlying resources from its operating system and the applications that run on it.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • PCoIP (PC over IP)

    PC over IP (PCoIP) is a remote display protocol that Teradici developed for delivering remote desktops and applications to endpoints.

  • eG Innovations

    eG Innovations is an end-user experience and infrastructure monitoring software vendor best known for its eG Enterprise product.

  • Lakeside Software

    Lakeside Software is a desktop monitoring software company known for its SysTrack product, which provides performance data and analytics for physical and virtual desktops.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware ESXi

    VMware ESXi is an operating system-independent hypervisor based on the VMkernel operating system that interfaces with agents that run on top of it. ESXi stands for Elastic Sky X Integrated.

  • VMware vRealize Log Insight (formerly vCenter Log Insight)

    VRealize Log Insight is a log collection and analytics virtual appliance that enables administrators to collect, view, manage and analyze syslog data.

  • VMware Cloud on AWS

    VMware Cloud on AWS is a hybrid cloud service that runs the VMware software-defined data center (SDDC) stack in the AWS public cloud.

Back to Top

White Papers and Webcasts

BitPipe

A free library of IT white papers, webcasts and product information to help with your IT purchase decisions. Research the latest tools, technologies and techniques and compare offerings from thousands to technology companies.

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close