Browse Definitions :

Find Technology-Specific Sites

TechTarget gives technology professionals and executives the information they need to perform their jobs – from developing strategy, to making cost-effective purchase decisions and managing their organizations' technology projects. Bookmark this page for easy access to the TechTarget network of technology-specific websites.

Browse TechTarget Sites by Topic

Application Development

Ajaxian

Ajaxian is a resource for software developers who work with Ajax, PHP, ASP.net, jQuery, Javascript, NodeJS, noSQL, FP and Visualization.

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • Red Hat OpenShift

    Red Hat OpenShift is a multifaceted, open source container application platform from Red Hat Inc. for the development, deployment and management of applications.

  • cloud application

    A cloud application, or cloud app, is a software program where cloud-based and local components work together.

  • iPaaS (integration platform as a service)

    Integration platform as a service (iPaaS) is a set of automated tools for connecting software applications that are deployed in different environments. iPaaS is often used by large business-to-business (B2B) enterprises that need to integrate on-premises applications and data with cloud applications and data.

SearchMicroservices

SearchMicroservices.com provides readers with industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, business process management (BPM), application integration and APIs, software containers, microservices and DevOps.

  • API economy

    API economy (application programming interface economy) is a general term that describes the way application programming interfaces (APIs) can positively affect an organization's profitability.

  • software stack

    A software stack is a collection of independent components that work together to support the execution of an application. The components, which may include an operating system, architectural layers, protocols, run-time environments, databases and function calls, are stacked one on top of each other in a hierarchy. Typically, the lower level components in the hierarchy interact with hardware, while the higher level components in the hierarchy perform specific tasks for the end user.

  • microservices

    Microservices, or microservice architecture, is an approach to application development in which a large application is built as a suite of modular components or services.

SearchSoftwareQuality

SearchSoftwareQuality.com is the online community for developers, architects and executives interested in building secure and quality software.

  • synthetic monitoring

    Synthetic monitoring is the use of software to simulate user interaction with a given system rather than simply gathering data about real-world transactions.

  • cross-browser testing

    Cross-browser testing, also called browser testing, is a quality assurance (QA) process that checks whether a web-based application, site or page functions as intended for end users across multiple browsers and devices.

  • pen test (penetration testing)

    Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.

SearchWinDevelopment

SearchWinDevelopment.com is a unique online resource for developers, architects and development managers tasked with building and maintaining enterprise applications using Visual Basic, C# and the Microsoft .NET platform.

  • scripting language

    A scripting language is a form of programming language that is usually interpreted rather than compiled. Scripting languages are typically converted into machine code on the fly during runtime by a program called an interpreter.

  • Internet

    The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).

  • domain name

    A domain name locates an organization or other entity on the Internet. For example, the domain name "www.totalbaseball.com" locates an Internet address for "totalbaseball.com" at Internet point 199.0.0.2 and a particular host server named "www."

TheServerSide

TheServerSide.com is the world’s largest online community for enterprise Java architects and developers, providing daily news, tech talk interviews with key industry figures, design patterns, discussion forums, tutorials and more.

  • Java Development Kit (JDK)

    The Java Development Kit (JDK) provides the foundation upon which all applications that are targeted toward the Java platform are built.

  • HTML (Hypertext Markup Language)

    HTML (Hypertext Markup Language) is a text-based approach to describing how content contained within an HTML file is structured.

  • CSS (cascading style sheets)

    This definition explains the meaning of CSS (cascading style sheets) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.

Back to Top

Business Intelligence / Analytics

BeyeNETWORK

BeyeNETWORK.com is the primary site of the BeyeNETWORK, providing viewers with access to the thought leaders in business intelligence, performance management, business integration, information quality, data warehousing and more.

SearchBusinessAnalytics

SearchBusinessAnalytics.com is dedicated to serving the information needs of business and IT professionals.

  • Ad Hoc Analysis

    Ad hoc analysis is a business intelligence (BI) process designed to answer a single, specific business question.

  • association rules (in data mining)

    Association rules are if-then statements that help to show the probability of relationships between data items within large data sets in various types of databases.

  • business intelligence dashboard

    A business intelligence dashboard is a graphical interface that displays the current status of metrics and key performance indicators (KPIs) for an enterprise.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • Microsoft Power BI

    Microsoft Power BI is a business intelligence platform that provides nontechnical business users with tools for aggregating, analyzing, visualizing and sharing data.

  • Microsoft Flow

    Microsoft Flow is cloud-based software that allows employees to create and automate workflows and tasks across multiple applications and services without help from developers.

  • cloud content management

    Cloud content management is the process of collecting, delivering, retrieving, governing and managing information within a cloud-based hosting environment.

SearchCRM

SearchCRM.com is a free resource dedicated to Customer Relationship Management (CRM) decision makers.

  • brand ambassador

    A brand ambassador is an advocate of a particular company's products and services.

  • outbound call

    An outbound call is one initiated by a call center agent to a customer on behalf of a call center or client.

  • chat channels

    Chat channels are technologies enabling companies to engage with customers in live conversations.

SearchDataManagement

SearchDataManagement.com is a guide for data management professionals and business leaders.

  • big data

    Big data is an evolving term that describes a large volume of structured, semi-structured and unstructured data that has the potential to be mined for information and used in machine learning projects and other advanced analytics applications.

  • data catalog

    A data catalog is a metadata management tool designed to help organizations find and manage large amounts of data – including tables, files and databases – stored in their ERP, human resources, finance and e-commerce systems as well as other sources like social media feeds.

  • data modeling

    Data modeling is the process of documenting a complex software system design as an easily understood diagram, using text and symbols to represent the way data needs to flow.

SearchSQLServer

SearchSQLServer.com is dedicated to serving the information needs of database developers and administrators working with Microsoft's flagship database enterprise server, SQL Server.

  • Azure Data Studio (formerly SQL Operations Studio)

    Azure Data Studio is a Microsoft tool, originally named SQL Operations Studio, for managing SQL Server databases and cloud-based Azure SQL Database and Azure SQL Data Warehouse systems.

  • U-SQL

    U-SQL is a Microsoft query language that combines a declarative SQL-like syntax with C# programming, enabling it to be used to process both structured and unstructured data in big data environments.

  • Microsoft Azure Cosmos DB

    Azure Cosmos DB is a Microsoft cloud database that supports multiple ways of storing and processing data. As such, it is classified as a multimodel database.

Back to Top

Business Software

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • Red Hat OpenShift

    Red Hat OpenShift is a multifaceted, open source container application platform from Red Hat Inc. for the development, deployment and management of applications.

  • cloud application

    A cloud application, or cloud app, is a software program where cloud-based and local components work together.

  • iPaaS (integration platform as a service)

    Integration platform as a service (iPaaS) is a set of automated tools for connecting software applications that are deployed in different environments. iPaaS is often used by large business-to-business (B2B) enterprises that need to integrate on-premises applications and data with cloud applications and data.

SearchDomino

SearchDomino.com is a leading source for Lotus Notes and Domino-specific information for enterprise IT professionals.

  • knowledge management (KM)

    Knowledge management is a concept in which an enterprise consciously and comprehensively gathers, organizes, shares and analyzes its knowledge in terms of resources, documents, and people skills.

  • Instant Messaging: Glossary

    This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.

  • iNotes (iNotes Web Access)

    iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.

SearchERP

SearchERP was built to help startups, small and mid-sized businesses, and large corporations better leverage ERP technologies and strategies to eliminate legacy platforms that cause data silos, improve business processes, boost profitability, improve financial reporting and gain more visibility.

  • Demand Planning

    Demand planning is the process of forecasting the demand for a product or service so it can be produced and delivered more efficiently and to the satisfaction of customers.

  • computer-aided software engineering (CASE)

    Computer-aided software engineering (CASE) describes a broad set of labor-saving tools used in software development.

  • procure to pay (P2P)

    Procure to pay is the process of requisitioning, purchasing, receiving, paying for and accounting for goods and services.

SearchHRSoftware

Find unbiased news, analysis, resources and the latest strategies to better manage HR and HCM functions at your organization.

  • candidate experience

    Candidate experience reflects a person's feelings about going through a company's job application process.

  • recruitment process outsourcing (RPO)

    Recruitment process outsourcing (RPO) involves an employer turning the responsibility of finding potential job candidates over to a third-party service provider.

  • recruitment

    Recruitment is the process of finding, screening, hiring and eventually onboarding job candidates.

SearchSalesforce

SearchSalesforce.com is a resource for Salesforce news, expert advice, technical tips and career guidance as well as a forum for community interaction. The site focuses on the Salesforce customer relationship management (CRM) platform as well as its ecosystem of partners.

  • Einstein Voice

    Einstein Voice is a voice user interface (VUI) that uses natural language processing (NLP), voice recognition and artificial intelligence (AI) to translate and perform basic administrative tasks for Salesforce customers.

  • Einstein Language

    Einstein Language is a natural language processing (NLP) feature that analyzes and translates consumer's unstructured text into actionable information. Companies with a large influx of customer support emails, social media comments or chat messages can use Einstein Language to filter through the text to flag important messages or forward to the right department.

  • lead scoring

    In the B2B industry, lead scoring is a methodology used by sales and marketing departments to determine the worthiness of leads, or potential customers, by attaching values to them based on their behavior relating to their interest in products or services.

SearchSAP

SearchSAP.com is the SAP community's resource for news, expert advice, technical tips and career guidance.

  • SAP MM (SAP Materials Management)

    SAP MM (Materials Management) is a module in SAP ERP Central Component (ECC) that provides companies with materials, inventory and warehouse management capabilities.

  • SAP NetWeaver

    SAP NetWeaver is a technology platform that allows organizations to integrate data, business processes, elements and more from a variety of sources into unified SAP environments.

  • SAP Business Suite

    SAP Business Suite is a bundle of end-to-end enterprise software applications that integrate data, processes and functions for important areas such as finance, sales and HR, as well as industry-focused features.

Back to Top

CIO Strategies

ComputerWeekly

ComputerWeekly.com is the leading provider of news, analysis, opinion, information and services for the UK IT community. The site serves as an advocate for UK IT professionals and the role of technology in improving organisations in all sectors of business and public life.

ebizQ

ebizQ is the insider’s guide to next-generation business process management. The site offers a growing collection of independent editorial articles on BPM trends, issues, challenges and solutions, all targeted to business and IT BPM professionals.

SearchCIO

SearchCIO.com provides technology management strategies designed exclusively for the enterprise CIO. Our award-winning team of editors and industry luminaries offer strategic advice and technology best practices to help streamline global IT operations.

  • OODA loop

    An OODA loop (Observe, Orient, Decide, Act) is a four-step approach to decision-making that focuses on filtering available information, putting it in context and quickly making the most appropriate decision while also understanding that changes can be made as more data becomes available.

  • executive dashboard

    An executive dashboard is a computer interface that displays the key performance indicators (KPIs) that corporate officers need to effectively run an enterprise.

  • proof of concept (POC)

    A proof of concept (POC) is an exercise in which work is focused on determining whether an idea can be turned into a reality.

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from retaliatory action for voluntarily disclosing information about dishonest or illegal activities occurring in a government organization.

Back to Top

Channel Resources

MicroScope

Stay ahead with IT Business management and technology news and articles on UK laws, regulations, credit and finance, selling, sales management, marketing and supplier relationships.

SearchITChannel

If you're a value-added reseller (VAR), information technology reseller or a systems integrator, all of your research needs are met at SearchITChannel.com.

  • systems integrator

    A systems integrator is an individual or business that builds computing systems for clients by combining hardware, software, networking and storage products from multiple vendors.

  • break/fix

    For IT services companies, break/fix is a method of providing IT support to customers. Services are generally fee-based and rely on a customer contacting the IT services company when repairs and upgrades are needed.

  • hosted services

    Hosted services are applications, IT infrastructure components or functions that organizations access from external service providers, typically through an internet connection.

Back to Top

Cloud

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchAWS

From cloud infrastructure to applications, development, security, big data, storage and more, SearchAWS.com provides meaningful insight from award-winning editors, research analysts and industry experts on one of the fastest-growing cloud services providers, Amazon Web Services.

  • Amazon Comprehend

    Amazon Comprehend is a natural language processing (NLP) service that uses machine learning to analyze and find relationships in text.

  • Amazon S3

    Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service designed for online backup and archiving of data and applications on Amazon Web Services.

  • AWS Serverless Application Model (AWS SAM)

    AWS Serverless Application Model (AWS SAM) is a framework a developer can use to create and deploy serverless applications that run on Amazon's cloud.

SearchCloudComputing

SearchCloudComputing.com is the Web's most comprehensive resource for cloud computing news, analysis and case studies.

  • Google Cloud Functions

    Google Cloud Functions is a serverless, event-driven computing service within Google Cloud Platform.

  • Azure Container Instances

    Azure Container Instances is a service that enables a developer to deploy containers on the Microsoft Azure public cloud without having to provision or manage any underlying infrastructure.

  • SPI model

    SPI is an acronym for the most common cloud computing service models, software as a service, platform as a service and infrastructure as a service.

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • SSAE 16

    The Statement on Standards for Attestation Engagements No. 16 (SSAE 16) is a set of auditing standards and guidance on using the standards, published by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA), for redefining and updating how service companies report on compliance controls.

  • software-defined perimeter (SDP)

    Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity.

  • CAIQ (Consensus Assessments Initiative Questionnaire)

    The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud service provider.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • hardware virtualization

    Hardware virtualization, which is also known as server virtualization or simply virtualization, is the abstraction of computing resources from the software that uses those resources.

  • physical to virtual (P2V)

    Physical to virtual (P2V) is a term that refers to the migration of an operating system (OS), application programs and data from a computer's main hard disk to a virtual machine.

  • hardware-assisted virtualization

    Hardware-assisted virtualization is the use of a computer's physical components to support the mechanism that abstracts and manages the computer's underlying resources from its operating system and the applications that run on it.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • Parallels

    Parallels is an application and desktop virtualization software vendor that offers management and delivery platforms for Apple macOS and Microsoft Windows desktop deployments.

  • Goliath Technologies

    Goliath Technologies is a performance monitoring software vendor that offers tools to monitor and analyze data centers, back-end servers and network performance for on-premises and cloud deployments.

  • PCoIP (PC over IP)

    PC over IP (PCoIP) is a remote display protocol that Teradici developed for delivering remote desktops and applications to endpoints.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware ESXi

    VMware ESXi is an operating system-independent hypervisor based on the VMkernel operating system that interfaces with agents that run on top of it. ESXi stands for Elastic Sky X Integrated.

  • VMware vRealize Log Insight (formerly vCenter Log Insight)

    VRealize Log Insight is a log collection and analytics virtual appliance that enables administrators to collect, view, manage and analyze syslog data.

  • VMware Cloud on AWS

    VMware Cloud on AWS is a hybrid cloud service that runs the VMware software-defined data center (SDDC) stack in the AWS public cloud.

Back to Top

Consumer Product Review

Brighthand

Brighthand.com offers SmartPhone, handheld computer, and cell phone reviews and news. Our active forum community is a great source of information on SmartPhones and related devices.

DigitalCameraReview

DigitalCameraReview.com offers digital camera reviews and news, a forum community, digital camera price comparisons, deals and coupons on digital cameras and accessories.

NotebookReview

NotebookReview.com offers the latest notebook and laptop reviews, as well as price comparisons, support forums and news."

TabletPCReview

TabletPCReview.com offers Tablet PC reviews and ratings, price comparisons, as well as support forums and news.

TechnologyGuide

TechnologyGuide.com is a family of product review and evaluation websites that are the leading source for information on the latest desktop and notebook computers, software and printers, wireless smartphones, digital cameras, and other devices for both the consumer and business markets.

Back to Top

Data Center Management

Search400

Search400.com is an online information resource for the latest news, tech tips and expert advice for the iSeries professional.

  • Quiz: iSeries (AS/400) History

    2003 marks the 15th anniversary of the AS/400 (now called the iSeries), so we thought we'd take a look back and see how it's changed over the years.

  • Quiz: iSeries (AS/400) Commands

    The iSeries (AS/400) is one of IBM's greatest success stories.

  • OS/400

    OS/400 is IBM's operating system for its AS/400 and AS/400e line of business computers. (Continued...)

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • DataCore

    DataCore is a software-defined storage (SDS) company, as well as an early storage virtualization software vendor, in Fort Lauderdale, Fla.

  • hyperconvergence

    Hyperconvergence -- also spelled hyper-convergence -- is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

  • NetApp FlexPod

    NetApp FlexPod is a reference architecture for server, storage and networking components that are pretested and validated to work together as an integrated infrastructure stack.

SearchDataCenter

SearchDataCenter.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • Red Hat

    Red Hat is a leading software company in the business of assembling open source components for the Linux operating system and related programs into a distribution package that can easily be ordered and implemented.

  • ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers)

    ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers) is an organization devoted to the advancement of indoor-environment-control technology in the heating, ventilation and air conditioning (HVAC) industry

  • kernel

    The kernel is the essential center of a computer operating system (OS).

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is the leading source for tactical expert advice and best practices on desktop management and security. The site provides essential resources including the latest tips, tutorials, webcasts, white papers and more.

  • Windows Defender Application Guard

    Windows Defender Application Guard is a security tool built into Microsoft Edge that isolates browser sessions from the desktop in a virtual machine (VM) to prevent any malicious activity from reaching the desktop.

  • desktop computer

    A desktop computer is a personal computing device designed to fit on top of a typical office desk.

  • Windows 7

    Windows 7 is the Microsoft Windows operating system (OS) released commercially in October 2009 as the successor to Windows Vista.

SearchITOperations

As hybrid cloud deployments, containers, microservices and DevOps continue to become part of a data center's infrastructure, IT operations pros are facing a new set of responsibilities. Because they must be agile and able to manage next-gen apps in blended environments, the roles and responsibilities of development and operation teams are blending. 

  • remote server management

    Remote server management is a market segment that includes products and services that enable IT professionals to monitor and control data centers from offsite.

  • Netflix Spinnaker

    Netflix Spinnaker is an open source, multi-cloud continuous delivery application that can be used to release software updates rapidly and efficiently.

  • DevOps

    In its most broad meaning, DevOps is an operational philosophy that promotes better communication between development and operations as more elements of operations become programmable. In its most narrow interpretation, DevOps describes the part of an organization’s information technology (IT) team that creates and maintains infrastructure.

SearchWindowsServer

SearchWindowsServer.com is dedicated to serving the information needs of Windows server professionals. The site provides targeted news, expert advice, tips, tutorials, learning guides, webcasts, white papers and more.

  • Exchange Online

    Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.

  • Resilient File System (ReFS)

    Resilient File System (ReFS) is a file system developed by Microsoft for use on the Windows operating system (OS) that's designed to overcome some of the limitations in the New Technology File System (NTFS).

  • Monad Manifesto

    The Monad Manifesto is a document written by Jeffrey Snover in 2002 that outlined his idea for a new Windows systems administration tool named Monad, which was changed to Windows PowerShell.

Back to Top

Database

SearchOracle

Visit SearchOracle.com for information and tips for the Oracle community. The site provides comprehensive coverage of all Oracle-specific news, trends and developments in the database industry.

  • PL/SQL (procedural language extension to Structured Query Language)

    In Oracle database management, PL/SQL is a procedural language extension to Structured Query Language (SQL).

  • distributed database

    A distributed database is a database that consists of two or more files located in different sites either on the same network or on entirely different networks.

  • Oracle NoSQL Database

    The Oracle NoSQL Database is a nonrelational, horizontally scalable key-value database, with multiple higher-level data abstractions that support data management as binary key-value pairs, JSON objects, and SQL-like tables.

Back to Top

Disaster Recovery / Compliance

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from retaliatory action for voluntarily disclosing information about dishonest or illegal activities occurring in a government organization.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • Microsoft Power BI

    Microsoft Power BI is a business intelligence platform that provides nontechnical business users with tools for aggregating, analyzing, visualizing and sharing data.

  • Microsoft Flow

    Microsoft Flow is cloud-based software that allows employees to create and automate workflows and tasks across multiple applications and services without help from developers.

  • cloud content management

    Cloud content management is the process of collecting, delivering, retrieving, governing and managing information within a cloud-based hosting environment.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • data archiving

    Data archiving migrates infrequently used data to low-cost, high-capacity archive storage for long-term retention.

  • backup

    Backup refers to the copying of physical or virtual files or databases to a secondary location for preservation in case of equipment failure or catastrophe.

  • magnetic tape storage

    Magnetic tape is one of the oldest technologies for electronic data storage.

SearchDisasterRecovery

Natural disasters, internal threats, user error and terrorist acts are realities that IT must take into consideration in their efforts to effectively protect their digital assets. Fortunately, SearchDisasterRecovery.com is the premier online resource for IT professionals responsible for disaster recovery planning.

  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or manmade catastrophe.

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized workloads.

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a simulated disaster scenario.

Back to Top

Emerging Technologies

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • embedded system

    An embedded system is a combination of computer hardware and software, either fixed in capability or programmable, designed for a specific function or functions within a larger system.

  • Cellular Vehicle to Everything (C-V2X)

    Cellular Vehicle-to-Everything (C-V2X) is a unified connectivity platform designed to offer vehicles low-latency vehicle-to-vehicle (V2V), vehicle-to-roadside infrastructure (V2I) and vehicle-to-pedestrian (V2P) communication.

  • drone (unmanned aerial vehicle, UAV)

    A drone, in technological terms, is an unmanned aircraft. Drones are more formally known as unmanned aerial vehicles (UAVs) or unmanned aircraft systems (UASes).

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

Back to Top

Healthcare IT

SearchHealthIT

SearchHealthIT.com is the health care technology professional’s how-to guide to building and managing an electronic health care infrastructure.

  • mHealth (mobile health)

    mHealth (mobile health) is a general term for the use of mobile phones and other wireless technology in medical care.

  • ICD-10-CM (Clinical Modification)

    The ICD-10-CM (Clinical Modification) is a system used by physicians and other healthcare providers to classify and code all diagnoses, symptoms and procedures recorded in conjunction with hospital care in the United States.

  • computerized physician order entry (CPOE)

    Computerized physician order entry (CPOE), also known as computerized provider order entry or computerized practitioner order entry, refers to the process of a medical professional entering and sending medication orders and treatment instructions electronically via a computer application instead of on paper charts.

Back to Top

Networking

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • embedded system

    An embedded system is a combination of computer hardware and software, either fixed in capability or programmable, designed for a specific function or functions within a larger system.

  • Cellular Vehicle to Everything (C-V2X)

    Cellular Vehicle-to-Everything (C-V2X) is a unified connectivity platform designed to offer vehicles low-latency vehicle-to-vehicle (V2V), vehicle-to-roadside infrastructure (V2I) and vehicle-to-pedestrian (V2P) communication.

  • drone (unmanned aerial vehicle, UAV)

    A drone, in technological terms, is an unmanned aircraft. Drones are more formally known as unmanned aerial vehicles (UAVs) or unmanned aircraft systems (UASes).

SearchEnterpriseWAN

SearchEnterpriseWAN.com is one of the largest and most active online communities dedicated to the enterprise wide area network.

  • Network Address Translation (NAT)

    A NAT (Network Address Translation or Network Address Translator) is the virtualization of Internet Protocol (IP) addresses. NAT helps improve security and decrease the number of IP addresses an organization needs.

  • frame relay

    Frame relay is an affordable way to transmit switched-packet data within LANs and WANs.

  • tunneling or port forwarding

    Tunneling is the transmission of data intended for use only within a private, usually corporate network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.

SearchMobileComputing

SearchMobileComputing.com provides comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise.

  • Android Oreo

    Android Oreo 8.0 is the eighth major update to the Android operating system that contains newer features and enhancements for application developers.

  • instant app (Google Android instant app)

    A Google Android instant app is a small software program that enables end users to test out a portion of a native Android app without installing it on a device.

  • fronthaul

    Fronthaul, also known as mobile fronthaul, is a term that refers to the connection of the C-RAN, a new type of cellular network architecture of centralized baseband units (BBU), at the access layer of the network to remote standalone radio heads at cell sites.

SearchNetworking

SearchNetworking.com is one of the largest and most active online communities dedicated to the enterprise network.

  • SDN controller (software-defined networking controller)

    An SDN controller is an application in a software-defined networking (SDN) architecture that manages flow control for improved network management and application performance.

  • Enterprise DNS

    Enterprise DNS is an enterprise-class implementation of the domain name system (DNS) that resolves external and internal queries for large organizations in a centrally managed, scalable, automatable and secure way.

  • Network protocol

    A network protocol is a set of established rules that dictates how to format, transmit and receive data so computer network devices -- from servers and routers to endpoints -- can communicate regardless of the differences in their underlying infrastructures, designs or standards.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

SearchTelecom

Whether you're an IT Pro looking for advice on building-out an infrastructure to support new customer demands or a product manager seeking new tech insights to boost ARPU, SearchTelecom.com is a critical online resource for IT and business professionals.

SearchUnifiedCommunications

SearchUnifiedCommunications.com provides a reliable source of how-to tips and best practices for implementing, managing and securing VoIP and advanced IP applications, enabling IT professionals to take advantage of the cost savings and new features and benefits associated with converged enterprise network.

  • VoIP (voice over IP)

    VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks. VoIP historically referred to using IP to connect private branch exchanges (PBXs), but the term is now used interchangeably with IP telephony.

  • QoS (quality of service)

    Quality of service (QoS) refers to any technology that manages data traffic to reduce packet loss, latency and jitter on the network.

  • Microsoft Teams

    Microsoft Teams is cloud-based team collaboration software that is part of the Office 365 suite of applications.

Back to Top

Security

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • SSAE 16

    The Statement on Standards for Attestation Engagements No. 16 (SSAE 16) is a set of auditing standards and guidance on using the standards, published by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA), for redefining and updating how service companies report on compliance controls.

  • software-defined perimeter (SDP)

    Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity.

  • CAIQ (Consensus Assessments Initiative Questionnaire)

    The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud service provider.

SearchFinancialSecurity

IT professionals turn to SearchFinancialSecurity.com for the information they require to keep their corporate data and assets secure.

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Shared Assessments Program

    Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.

  • Common Vulnerabilities and Exposures (CVE)

    Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.

SearchMidmarketSecurity

SearchMidmarketSecurity.com is the only security-specific information resource geared toward midsize companies that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, a selection of highly focused security e-newsletters and more - all at no cost.

  • endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • clean desk policy (CDP)

    A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. Most CDPs require employees to clear their desks of all papers at the end of the day.

  • zombie computer (zombie bot)

    A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet. (Continued)

SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure.

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network such as the internet.

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both.

Back to Top

Social Media

ITKnowledgeExchange

Find technology questions and answers in this community of information technology (IT) experts and professionals.

Back to Top

Storage

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • DataCore

    DataCore is a software-defined storage (SDS) company, as well as an early storage virtualization software vendor, in Fort Lauderdale, Fla.

  • hyperconvergence

    Hyperconvergence -- also spelled hyper-convergence -- is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

  • NetApp FlexPod

    NetApp FlexPod is a reference architecture for server, storage and networking components that are pretested and validated to work together as an integrated infrastructure stack.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • data archiving

    Data archiving migrates infrequently used data to low-cost, high-capacity archive storage for long-term retention.

  • backup

    Backup refers to the copying of physical or virtual files or databases to a secondary location for preservation in case of equipment failure or catastrophe.

  • magnetic tape storage

    Magnetic tape is one of the oldest technologies for electronic data storage.

SearchStorage

The TechTarget Storage Media Group has built a community of the largest and most audience of storage decision-makers on the web.

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data sharing functions through connections to computer systems.

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object storage.

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, such as compact discs (CDs) and DVDs.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

Back to Top

Vendor Research

KnowledgeStorm

Browse the database of business technology software products and services.

Back to Top

Virtualization

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • hardware virtualization

    Hardware virtualization, which is also known as server virtualization or simply virtualization, is the abstraction of computing resources from the software that uses those resources.

  • physical to virtual (P2V)

    Physical to virtual (P2V) is a term that refers to the migration of an operating system (OS), application programs and data from a computer's main hard disk to a virtual machine.

  • hardware-assisted virtualization

    Hardware-assisted virtualization is the use of a computer's physical components to support the mechanism that abstracts and manages the computer's underlying resources from its operating system and the applications that run on it.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • Parallels

    Parallels is an application and desktop virtualization software vendor that offers management and delivery platforms for Apple macOS and Microsoft Windows desktop deployments.

  • Goliath Technologies

    Goliath Technologies is a performance monitoring software vendor that offers tools to monitor and analyze data centers, back-end servers and network performance for on-premises and cloud deployments.

  • PCoIP (PC over IP)

    PC over IP (PCoIP) is a remote display protocol that Teradici developed for delivering remote desktops and applications to endpoints.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware ESXi

    VMware ESXi is an operating system-independent hypervisor based on the VMkernel operating system that interfaces with agents that run on top of it. ESXi stands for Elastic Sky X Integrated.

  • VMware vRealize Log Insight (formerly vCenter Log Insight)

    VRealize Log Insight is a log collection and analytics virtual appliance that enables administrators to collect, view, manage and analyze syslog data.

  • VMware Cloud on AWS

    VMware Cloud on AWS is a hybrid cloud service that runs the VMware software-defined data center (SDDC) stack in the AWS public cloud.

Back to Top

White Papers and Webcasts

BitPipe

A free library of IT white papers, webcasts and product information to help with your IT purchase decisions. Research the latest tools, technologies and techniques and compare offerings from thousands to technology companies.

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of ...

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close