Browse Definitions :

Find Technology-Specific Sites

TechTarget gives technology professionals and executives the information they need to perform their jobs – from developing strategy, to making cost-effective purchase decisions and managing their organizations' technology projects. Bookmark this page for easy access to the TechTarget network of technology-specific websites.

Browse TechTarget Sites by Topic

Application Development

SearchAppArchitecture

Over 4 million programmers, architects, IT managers, and developers turn to our site for industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, Business Process Management (BPM), application integration and APIs, software containers and microservices design and development, DevOps, and more.

  • REST (REpresentational State Transfer)

    REST (REpresentational State Transfer) is an architectural style for developing web services.

  • software stack

    A software stack is a collection of independent components that work together to support the execution of an application.

  • API testing

    API testing is a type of software testing that analyzes an application program interface (API) to verify it fulfills its expected functionality, security, performance and reliability.

SearchSoftwareQuality

SearchSoftwareQuality.com is the online community for developers, architects and executives interested in building secure and quality software.

  • performance testing

    Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.

  • software toolchain

    A software toolchain is a set of software development tools used in combination with one another to complete complex software development tasks or to deliver a software product.

  • Agile retrospective

    An Agile retrospective is a meeting that’s held at the end of an iteration in Agile development.

TheServerSide

TheServerSide.com is the world’s largest online community for enterprise Java architects and developers, providing daily news, tech talk interviews with key industry figures, design patterns, discussion forums, tutorials and more.

  • Java Mission Control

    Java Mission Control is a performance-analysis tool that renders sampled JVM metrics in easy-to-understand graphs, tables, histograms, lists and charts.

  • Java Flight Recorder

    Java Flight Recorder is a Java Virtual Machine (JVM) profiler that gathers performance metrics without placing a significant load on resources.

  • Kebab case

    Kebab case -- or kebab-case -- is a programming variable naming convention where a developer replaces the spaces between words with a dash.

Back to Top

Business Intelligence / Analytics

SearchBusinessAnalytics

SearchBusinessAnalytics.com is dedicated to serving the information needs of business and IT professionals.

  • business analytics (BA)

    Business analytics (BA) is the iterative, methodical exploration of an organization's data, with an emphasis on statistical analysis.

  • edge analytics

    Edge analytics is an approach to data collection and analysis in which an automated analytical computation is performed on data at a sensor, network switch or other device instead of waiting for the data to be sent back to a centralized data store.

  • predictive analytics

    Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast activity, behavior and trends.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • web content management system (WCMS)

    A web content management system (WCMS) is a type of content management system (CMS) that provides an organization with a way to manage digital information on a website through creating and maintaining content without prior knowledge of web programming or markup languages.

  • knowledge management (KM)

    Knowledge management is the process by which an enterprise gathers, organizes, shares and analyzes its knowledge in a way that is easily accessible to employees.

  • content management system (CMS)

    A content management system (CMS) is an application program for creating and managing digital content in a collaborative environment.

SearchCRM

SearchCRM.com is a free resource dedicated to Customer Relationship Management (CRM) decision makers.

SearchCustomerExperience

SearchCustomerExperience keeps our readers up-to-speed on emerging trends in customer data analytics, customer self-service, omnichannel customer service, artificial intelligence (AI), contact center technology, marketing software, sales technology, digital experience management, sales force automation and web content management.

  • Oracle Customer Experience Cloud (Oracle CX Cloud)

    The Oracle Customer Experience Cloud (Oracle CX Cloud) is a suite of cloud-based tools for CRM and sales, marketing, customer service, e-commerce and other tools.

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

  • omnichannel

    Omnichannel -- also spelled omni-channel -- is a multichannel approach to sales that seeks to provide customers with a seamless shopping experience, whether they're shopping online from a desktop or mobile device, by telephone, or in a brick-and-mortar store.

SearchDataManagement

SearchDataManagement.com is a guide for data management professionals and business leaders.

  • feature engineering

    Feature engineering is the process that takes raw data and transforms it into features that can be used to create a predictive model using machine learning or statistical modeling, such as deep learning.

  • NoSQL (Not Only SQL database)

    NoSQL is an approach to database design that can accommodate a wide variety of data models, including key-value, document, columnar and graph formats.

  • Google BigQuery

    Google BigQuery is a cloud-based big data analytics web service for processing very large read-only data sets.

Back to Top

Business Software

SearchERP

SearchERP was built to help startups, small and mid-sized businesses, and large corporations better leverage ERP technologies and strategies to eliminate legacy platforms that cause data silos, improve business processes, boost profitability, improve financial reporting and gain more visibility.

  • general ledger (GL)

    A general ledger (GL) is a set of numbered accounts a business uses to keep track of its financial transactions and to prepare financial reports.

  • ERP (enterprise resource planning)

    ERP, or enterprise resource planning, is modular software designed to integrate the main functional areas of an organization's business processes into a unified system.

  • ERP finance module

    The ERP finance module is the software component that handles the main accounting and financial management functions of an enterprise resource planning system.

SearchHRSoftware

Find unbiased news, analysis, resources and the latest strategies to better manage HR and HCM functions at your organization.

  • human capital management (HCM)

    Human capital management (HCM) is a comprehensive set of practices and tools used for recruiting, managing and developing employees.

  • talent acquisition

    Talent acquisition refers to the process employers use for recruiting, tracking and interviewing job candidates, and onboarding and training new employees.

  • human resource management (HRM)

    Human resource management (HRM) is the practice of recruiting, hiring, deploying and managing an organization's employees.

SearchSalesforce

SearchSalesforce.com is a resource for Salesforce news, expert advice, technical tips and career guidance as well as a forum for community interaction. The site focuses on the Salesforce customer relationship management (CRM) platform as well as its ecosystem of partners.

SearchSAP

SearchSAP.com is the SAP community's resource for news, expert advice, technical tips and career guidance.

  • SAP FICO (SAP Finance and SAP Controlling)

    SAP FICO is an important core functional component in SAP ERP Central Component that allows an organization to manage all of its financial data.

  • SAP ERP Central Component (SAP ECC)

    SAP ERP Central Component (SAP ECC) is an on-premises enterprise resource planning (ERP) system that is commonly referred to as simply "SAP ERP."

  • SAP BusinessObjects BI

    SAP BusinessObjects BI (SAP BO) is a centralized suite of reporting and analytics tools for business intelligence (BI) platforms.

Back to Top

CIO Strategies

ComputerWeekly

ComputerWeekly.com is the leading provider of news, analysis, opinion, information and services for the UK IT community. The site serves as an advocate for UK IT professionals and the role of technology in improving organisations in all sectors of business and public life.

SearchCIO

SearchCIO.com provides technology management strategies designed exclusively for the enterprise CIO. Our award-winning team of editors and industry luminaries offer strategic advice and technology best practices to help streamline global IT operations.

  • mPOS (mobile point of sale)

    An mPOS (mobile point-of-sale) is a smartphone, tablet or dedicated wireless device that performs the functions of a cash register or electronic point-of-sale terminal (POS terminal) wirelessly.

  • SWOT analysis (strengths, weaknesses, opportunities and threats analysis)

    SWOT analysis is a framework for identifying and analyzing an organization's strengths, weaknesses, opportunities and threats -- which is what makes up the SWOT acronym.

  • e-commerce

    E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.

Back to Top

Channel Resources

MicroScope

Stay ahead with IT Business management and technology news and articles on UK laws, regulations, credit and finance, selling, sales management, marketing and supplier relationships.

SearchITChannel

If you're a value-added reseller (VAR), information technology reseller or a systems integrator, all of your research needs are met at SearchITChannel.com.

  • service-level agreement (SLA)

    A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.

  • RMM software (remote monitoring and management software)

    RMM software (remote monitoring and management software) is a type of application that information technology (IT) service providers use to maintain their clients' IT infrastructure and systems.

  • cloud provisioning

    Cloud provisioning is the allocation of a cloud provider's resources and services to a customer.

Back to Top

Cloud

SearchAWS

From cloud infrastructure to applications, development, security, big data, storage and more, SearchAWS.com provides meaningful insight from award-winning editors, research analysts and industry experts on one of the fastest-growing cloud services providers, Amazon Web Services.

  • Amazon Simple Storage Service (Amazon S3)

    Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service.

  • Amazon Resource Name (ARN)

    An Amazon Resource Name (ARN) is a file naming convention used to identify a particular resource in the Amazon Web Services (AWS) public cloud.

  • AWS Glue

    AWS Glue is a cloud service that prepares data for analysis through automated extract, transform, load (ETL) processes.

SearchCloudComputing

SearchCloudComputing.com is the Web's most comprehensive resource for cloud computing news, analysis and case studies.

  • PaaS (platform as a service)

    PaaS (platform as a service) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.

  • Infrastructure as a Service (IaaS)

    Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.

  • What is hybrid cloud? Everything you need to know

    A hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between these platforms.

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • cloud access security broker (CASB)

    A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

  • software-defined perimeter (SDP)

    The software-defined perimeter, or SDP, is a security framework that controls access to resources based on identity.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • graphics processing unit (GPU)

    A graphics processing unit (GPU) is a computer chip that renders graphics and images by performing rapid mathematical calculations.

  • Citrix XenApp

    Citrix XenApp, now part of Citrix Virtual Apps and Desktops, was a product that extends Microsoft Remote Desktop Session Host (formerly known as Terminal Services) desktop sessions and applications to users through the Citrix HDX protocol.

  • What is virtual desktop infrastructure? VDI explained

    Virtual desktop infrastructure (VDI) is a desktop virtualization technology wherein a desktop operating system, typically Microsoft Windows, runs and is managed in a data center.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware vSphere Client

    The VMware vSphere Client is a web-based application that connects to the vCenter Server so IT administrators can manage installations and handle inventory objects in a vSphere deployment.

  • VMware

    VMware is a virtualization and cloud computing software provider based in Palo Alto, Calif.

  • VMware DRS (Distributed Resource Scheduler)

    VMware DRS (Distributed Resource Scheduler) is a utility that balances computing workloads with available resources in a virtualized environment. The utility is part of a virtualization suite called VMware Infrastructure 3.

Back to Top

Data Center Management

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • data center capacity planning

    Data center capacity planning ensures that an IT organization has enough facility space, power and computing resources to support average and peak workloads.

  • What is hyper-converged infrastructure? Guide to HCI

    Hyper-converged infrastructure is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

  • hyper-converged appliance

    A hyper-converged appliance is a hardware device that provides multiple data center management technologies within a single box.

SearchDataCenter

SearchDataCenter.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • statistical mean, median, mode and range

    The terms mean, median, mode, and range describe properties of statistical distributions.

  • workload

    In computing, a workload, typically, is any program or application that runs on any computer.

  • remote hands

    Remote hands is the general name for a service offered by colocation providers that enables customers to delegate IT management and maintenance tasks in a colocation facility to technicians hired by the provider.

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is the leading source for tactical expert advice and best practices on desktop management and security. The site provides essential resources including the latest tips, tutorials, webcasts, white papers and more.

  • Windows 10 (Microsoft Windows 10)

    Windows 10 is a Microsoft operating system for personal computers, tablets, embedded devices and internet of things devices.

  • hard-drive encryption

    Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.

SearchITOperations

As hybrid cloud deployments, containers, microservices and DevOps continue to become part of a data center's infrastructure, IT operations pros are facing a new set of responsibilities. Because they must be agile and able to manage next-gen apps in blended environments, the roles and responsibilities of development and operation teams are blending. 

  • infrastructure as code

    Infrastructure as code, also referred to as IaC, is an IT practice that codifies and manages underlying IT infrastructure as software.

  • IT operations

    IT operations is the overarching term for the processes and services administered by an organization's information technology (IT) department.

  • What is configuration management? A comprehensive guide

    Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.

Back to Top

Database

SearchOracle

Visit SearchOracle.com for information and tips for the Oracle community. The site provides comprehensive coverage of all Oracle-specific news, trends and developments in the database industry.

  • NetSuite

    NetSuite is a business technology vendor based in San Mateo, California.

  • stored procedure

    A stored procedure is a group of statements with a specific name, which are stored inside a database, such as MySQL or Oracle.

  • object-oriented database management system (OODBMS)

    An object-oriented database management system (OODBMS), sometimes shortened to ODBMS for object database management system, is a database management system (DBMS) that supports the modelling and creation of data as objects.

Back to Top

Disaster Recovery / Compliance

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • web content management system (WCMS)

    A web content management system (WCMS) is a type of content management system (CMS) that provides an organization with a way to manage digital information on a website through creating and maintaining content without prior knowledge of web programming or markup languages.

  • knowledge management (KM)

    Knowledge management is the process by which an enterprise gathers, organizes, shares and analyzes its knowledge in a way that is easily accessible to employees.

  • content management system (CMS)

    A content management system (CMS) is an application program for creating and managing digital content in a collaborative environment.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • data protection management (DPM)

    Data protection management (DPM) comprises the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.

  • Cloud-to-Cloud Backup (C2C Backup)

    C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service. The backup stored on the second cloud service serves the same purpose as an off-site backup.

  • What is cloud backup and how does it work?

    Cloud backup, also known as online backup or remote backup, is a strategy for backing up data that involves sending a copy of the data over a proprietary or public network to an off-site server and storage system.

SearchDisasterRecovery

Natural disasters, internal threats, user error and terrorist acts are realities that IT must take into consideration in their efforts to effectively protect their digital assets. Fortunately, SearchDisasterRecovery.com is the premier online resource for IT professionals responsible for disaster recovery planning.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate recovery, if necessary.

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a natural catastrophe, power outage or another type of business disruption.

Back to Top

Emerging Technologies

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • embedded system

    An embedded system is a combination of computer hardware and software designed for a specific function.

  • fog computing (fog networking, fogging)

    Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.

  • IPv6 address

    An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.

Back to Top

Healthcare IT

SearchHealthIT

SearchHealthIT.com is the health care technology professional’s how-to guide to building and managing an electronic health care infrastructure.

  • protected health information (PHI) or personal health information

    Protected health information (PHI), also referred to as personal health information, generally refers to demographic information, medical histories, test and laboratory results, mental health conditions, insurance information, and other data that a healthcare professional collects to identify an individual and determine appropriate care.

  • HIPAA (Health Insurance Portability and Accountability Act)

    HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security provisions for safeguarding medical information.

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the telecommunications infrastructure.

Back to Top

Networking

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • embedded system

    An embedded system is a combination of computer hardware and software designed for a specific function.

  • fog computing (fog networking, fogging)

    Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.

  • IPv6 address

    An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.

SearchMobileComputing

SearchMobileComputing.com provides comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise.

  • Google Hangouts

    Google Hangouts is a unified communications service that allows members to initiate and participate in text, voice or video chats, either one-on-one or in a group.

  • OTA update (over-the-air update)

    An over-the-air (OTA) update is the wireless delivery of new software, firmware, or other data to mobile devices.

  • Microsoft OneDrive

    OneDrive (formerly SkyDrive) is an online cloud storage service from Microsoft.

SearchNetworking

SearchNetworking.com is one of the largest and most active online communities dedicated to the enterprise network.

  • network engineer

    A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.

  • network performance monitoring

    Network performance monitoring is a process of measuring and monitoring the quality of service of a network to understand if it is properly operating.

  • software-defined networking (SDN)

    Software-defined networking (SDN) is an architecture that abstracts different, distinguishable layers of a network in order to make networks agile and flexible.

SearchUnifiedCommunications

SearchUnifiedCommunications.com provides a reliable source of how-to tips and best practices for implementing, managing and securing VoIP and advanced IP applications, enabling IT professionals to take advantage of the cost savings and new features and benefits associated with converged enterprise network.

  • quality of service (QoS)

    Quality of service (QoS) refers to any technology that manages data traffic to reduce packet loss, latency and jitter on the network.

  • jitter

    Jitter is any deviation in, or displacement of, the signal pulses in a high-frequency digital signal.

  • Cisco Webex

    Cisco Webex is a video conferencing and collaboration product suite.

Back to Top

Security

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • cloud access security broker (CASB)

    A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

  • software-defined perimeter (SDP)

    The software-defined perimeter, or SDP, is a security framework that controls access to resources based on identity.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure.

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage.

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers that are able to prevent attacks launched by quantum computers.

Back to Top

Storage

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • data center capacity planning

    Data center capacity planning ensures that an IT organization has enough facility space, power and computing resources to support average and peak workloads.

  • What is hyper-converged infrastructure? Guide to HCI

    Hyper-converged infrastructure is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

  • hyper-converged appliance

    A hyper-converged appliance is a hardware device that provides multiple data center management technologies within a single box.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • data protection management (DPM)

    Data protection management (DPM) comprises the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.

  • Cloud-to-Cloud Backup (C2C Backup)

    C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service. The backup stored on the second cloud service serves the same purpose as an off-site backup.

  • What is cloud backup and how does it work?

    Cloud backup, also known as online backup or remote backup, is a strategy for backing up data that involves sending a copy of the data over a proprietary or public network to an off-site server and storage system.

SearchStorage

The TechTarget Storage Media Group has built a community of the largest and most audience of storage decision-makers on the web.

  • cloud encryption (cloud storage encryption)

    Cloud encryption is a service offered by cloud storage providers whereby a customer's data is transformed using encryption algorithms into ciphertext and stored in the cloud.

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained.

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

Back to Top

Virtualization

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • graphics processing unit (GPU)

    A graphics processing unit (GPU) is a computer chip that renders graphics and images by performing rapid mathematical calculations.

  • Citrix XenApp

    Citrix XenApp, now part of Citrix Virtual Apps and Desktops, was a product that extends Microsoft Remote Desktop Session Host (formerly known as Terminal Services) desktop sessions and applications to users through the Citrix HDX protocol.

  • What is virtual desktop infrastructure? VDI explained

    Virtual desktop infrastructure (VDI) is a desktop virtualization technology wherein a desktop operating system, typically Microsoft Windows, runs and is managed in a data center.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware vSphere Client

    The VMware vSphere Client is a web-based application that connects to the vCenter Server so IT administrators can manage installations and handle inventory objects in a vSphere deployment.

  • VMware

    VMware is a virtualization and cloud computing software provider based in Palo Alto, Calif.

  • VMware DRS (Distributed Resource Scheduler)

    VMware DRS (Distributed Resource Scheduler) is a utility that balances computing workloads with available resources in a virtualized environment. The utility is part of a virtualization suite called VMware Infrastructure 3.

Back to Top

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close