Browse Definitions :

Find Technology-Specific Sites

TechTarget gives technology professionals and executives the information they need to perform their jobs – from developing strategy, to making cost-effective purchase decisions and managing their organizations' technology projects. Bookmark this page for easy access to the TechTarget network of technology-specific websites.

Browse TechTarget Sites by Topic

Application Development

SearchAppArchitecture

Over 4 million programmers, architects, IT managers, and developers turn to our site for industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, Business Process Management (BPM), application integration and APIs, software containers and microservices design and development, DevOps, and more.

  • API testing

    API testing is a type of software testing that analyzes an application program interface (API) to verify it fulfills its expected functionality, security, performance and reliability.

  • RESTful API (REST API)

    A RESTful API is an architectural style for an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data.

  • API economy

    The API economy refers to the set of business models and practices designed around the use of APIs in today's digital economy.

SearchSoftwareQuality

SearchSoftwareQuality.com is the online community for developers, architects and executives interested in building secure and quality software.

  • software toolchain

    A software toolchain is a set of software development tools used in combination with one another to complete complex software development tasks or to deliver a software product.

  • Agile retrospective

    An Agile retrospective is a meeting that’s held at the end of an iteration in Agile development.

  • Disciplined Agile Delivery (DAD)

    Disciplined Agile Delivery (DAD) is a scalable Agile software delivery framework.

TheServerSide

TheServerSide.com is the world’s largest online community for enterprise Java architects and developers, providing daily news, tech talk interviews with key industry figures, design patterns, discussion forums, tutorials and more.

  • Snake case

    Snake case is a naming convention where a developer replaces spaces between words with an underscore.

  • git stash

    Git stash is a built-in command with the distributed version control tool in Git that locally stores all the most recent changes in a workspace and resets the state of the workspace to the prior commit state.

  • GraalVM

    GraalVM is a tool for developers to write and execute Java code.

Back to Top

Business Intelligence / Analytics

SearchBusinessAnalytics

SearchBusinessAnalytics.com is dedicated to serving the information needs of business and IT professionals.

  • edge analytics

    Edge analytics is an approach to data collection and analysis in which an automated analytical computation is performed on data at a sensor, network switch or other device instead of waiting for the data to be sent back to a centralized data store.

  • predictive analytics

    Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast activity, behavior and trends.

  • text mining (text analytics)

    Text mining is the process of exploring and analyzing large amounts of unstructured text data aided by software that can identify concepts, patterns, topics, keywords and other attributes in the data.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • Microsoft MyAnalytics

    Microsoft MyAnalytics, formerly Delve Analytics, is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.

  • content sprawl

    Content sprawl is a condition of an organization’'s content assets in which proliferation and unmanaged growth have led to an unwieldy mass that is difficult to manage.

  • enterprise content management (ECM)

    Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.

SearchCRM

SearchCRM.com is a free resource dedicated to Customer Relationship Management (CRM) decision makers.

SearchCustomerExperience

SearchCustomerExperience keeps our readers up-to-speed on emerging trends in customer data analytics, customer self-service, omnichannel customer service, artificial intelligence (AI), contact center technology, marketing software, sales technology, digital experience management, sales force automation and web content management.

  • Oracle Customer Experience Cloud (Oracle CX Cloud)

    The Oracle Customer Experience Cloud (Oracle CX Cloud) is a suite of cloud-based tools for CRM and sales, marketing, customer service, e-commerce and other tools.

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

  • omnichannel

    Omnichannel -- also spelled omni-channel -- is a multichannel approach to sales that seeks to provide customers with a seamless shopping experience, whether they're shopping online from a desktop or mobile device, by telephone, or in a brick-and-mortar store.

SearchDataManagement

SearchDataManagement.com is a guide for data management professionals and business leaders.

  • Google BigQuery

    Google BigQuery is a cloud-based big data analytics web service for processing very large read-only data sets.

  • data catalog

    A data catalog is a metadata management tool designed to help organizations find and manage large amounts of data – including tables, files and databases – stored in their ERP, human resources, finance and e-commerce systems as well as other sources like social media feeds.

  • OLAP (online analytical processing)

    OLAP (online analytical processing) is a computing method that enables users to easily and selectively extract and query data in order to analyze it from different points of view.

SearchSQLServer

SearchSQLServer.com is dedicated to serving the information needs of database developers and administrators working with Microsoft's flagship database enterprise server, SQL Server.

  • data mining

    Data mining is the process of sorting through large data sets to identify patterns and establish relationships to solve problems through data analysis.

  • data preprocessing

    Data preprocessing describes any type of processing performed on raw data to prepare it for another processing procedure.

  • data aggregation

    Data aggregation is any process whereby data is gathered and expressed in a summary form.

Back to Top

Business Software

SearchERP

SearchERP was built to help startups, small and mid-sized businesses, and large corporations better leverage ERP technologies and strategies to eliminate legacy platforms that cause data silos, improve business processes, boost profitability, improve financial reporting and gain more visibility.

  • production planning

    Production planning is the act of developing a guide for the design and production of a given product or service.

  • What is supply chain management (SCM)?

    Supply chain management (SCM) is the optimization of a product's creation and flow from raw material sourcing to production, logistics and delivery to the final customer.

  • supply chain analytics

    Supply chain analytics refers to the processes organizations use to gain insight and extract value from the large amounts of data associated with the procurement, processing and distribution of goods.

SearchHRSoftware

Find unbiased news, analysis, resources and the latest strategies to better manage HR and HCM functions at your organization.

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee feedback and other unstructured data to quantify and describe how employees feel about their organization.

  • people analytics (HR analytics)

    People analytics, also known as HR analytics and talent analytics, is the use of data analysis on candidate and employee issues to understand their impact on business goals and evaluate the effectiveness of human resources initiatives.

SearchSalesforce

SearchSalesforce.com is a resource for Salesforce news, expert advice, technical tips and career guidance as well as a forum for community interaction. The site focuses on the Salesforce customer relationship management (CRM) platform as well as its ecosystem of partners.

SearchSAP

SearchSAP.com is the SAP community's resource for news, expert advice, technical tips and career guidance.

  • SAP ERP Central Component (SAP ECC)

    SAP ERP Central Component (SAP ECC) is an on-premises enterprise resource planning (ERP) system that is commonly referred to as simply "SAP ERP."

  • SAP BusinessObjects BI

    SAP BusinessObjects BI (SAP BO) is a centralized suite of reporting and analytics tools for business intelligence (BI) platforms.

  • SAP ERP

    SAP ERP is an enterprise resource planning software developed by the company SAP SE.

Back to Top

CIO Strategies

ComputerWeekly

ComputerWeekly.com is the leading provider of news, analysis, opinion, information and services for the UK IT community. The site serves as an advocate for UK IT professionals and the role of technology in improving organisations in all sectors of business and public life.

ebizQ

ebizQ is the insider’s guide to next-generation business process management. The site offers a growing collection of independent editorial articles on BPM trends, issues, challenges and solutions, all targeted to business and IT BPM professionals.

SearchCIO

SearchCIO.com provides technology management strategies designed exclusively for the enterprise CIO. Our award-winning team of editors and industry luminaries offer strategic advice and technology best practices to help streamline global IT operations.

  • disruptive innovation

    Disruptive innovation is the introduction of a product or service into an established industry that performs better and, generally, at a lower cost than existing offerings, thereby displacing the market leaders in that particular market space and transforming the industry.

  • blockchain

    Blockchain is a type of distributed ledger for maintaining a permanent and tamperproof record of transaction-based data.

  • CIO (Chief Information Officer)

    A chief information officer (CIO) is the corporate executive in charge of information technology (IT) strategy and implementation.

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

Back to Top

Channel Resources

MicroScope

Stay ahead with IT Business management and technology news and articles on UK laws, regulations, credit and finance, selling, sales management, marketing and supplier relationships.

SearchITChannel

If you're a value-added reseller (VAR), information technology reseller or a systems integrator, all of your research needs are met at SearchITChannel.com.

  • RMM software (remote monitoring and management software)

    RMM software (remote monitoring and management software) is a type of application that information technology (IT) service providers use to maintain their clients' IT infrastructure and systems.

  • cloud provisioning

    Cloud provisioning is the allocation of a cloud provider's resources and services to a customer.

  • request for proposal (RFP)

    A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.

Back to Top

Cloud

SearchAWS

From cloud infrastructure to applications, development, security, big data, storage and more, SearchAWS.com provides meaningful insight from award-winning editors, research analysts and industry experts on one of the fastest-growing cloud services providers, Amazon Web Services.

  • AWS Glue

    AWS Glue is a cloud service that prepares data for analysis through automated extract, transform, load (ETL) processes.

  • Amazon S3

    Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service.

  • Amazon Web Services (AWS)

    AWS (Amazon Web Services) is a comprehensive, evolving cloud computing platform provided by Amazon that includes a mixture of infrastructure as a service (IaaS), platform as a service (PaaS) and packaged software as a service (SaaS) offerings.

SearchCloudComputing

SearchCloudComputing.com is the Web's most comprehensive resource for cloud computing news, analysis and case studies.

  • What is cloud management? Everything you need to know

    Cloud management is the exercise of administrative control over public, private and hybrid clouds.

  • cloud automation

    Cloud automation is a broad term that refers to the processes and tools an organization uses to reduce the manual efforts associated with provisioning and managing cloud computing workloads and services.

  • cloud application performance management (cloud APM)

    Cloud application performance management (cloud APM) is the process of monitoring resources that support software application performance in public cloud, private cloud and hybrid cloud environments, and ultimately taking actions to resolve issues and maintain optimal performance.

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • software-defined perimeter (SDP)

    The software-defined perimeter, or SDP, is a security framework that controls access to resources based on identity.

  • cloud access security broker (CASB)

    A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • server hardware degradation

    Server hardware degradation is the gradual breakdown of the physical parts of a server.

  • hypervisor

    A hypervisor is a function that abstracts -- isolates -- operating systems (OSes) and applications from the underlying computer hardware.

  • server virtualization

    Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware vSphere Client

    The VMware vSphere Client is a web-based application that connects to the vCenter Server so IT administrators can manage installations and handle inventory objects in a vSphere deployment.

  • VMware

    VMware is a virtualization and cloud computing software provider based in Palo Alto, Calif.

  • VMware DRS (Distributed Resource Scheduler)

    VMware DRS (Distributed Resource Scheduler) is a utility that balances computing workloads with available resources in a virtualized environment. The utility is part of a virtualization suite called VMware Infrastructure 3.

Back to Top

Data Center Management

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • data center capacity planning

    Data center capacity planning ensures that an IT organization has enough facility space, power and computing resources to support average and peak workloads.

  • What is hyper-converged infrastructure? Guide to HCI

    Hyper-converged infrastructure is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

  • hyper-converged appliance

    A hyper-converged appliance is a hardware device that provides multiple data center management technologies within a single box.

SearchDataCenter

SearchDataCenter.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • data center services

    Data center services is a collective term for all the supporting components necessary to the proper operation of data center. This includes all the implementation, maintenance and operation of a data center.

  • CMDB (configuration management database)

    A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.

  • infrastructure (IT infrastructure)

    Infrastructure is the foundation or framework that supports a system or organization.

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is the leading source for tactical expert advice and best practices on desktop management and security. The site provides essential resources including the latest tips, tutorials, webcasts, white papers and more.

  • Windows 10 (Microsoft Windows 10)

    Windows 10 is a Microsoft operating system for personal computers, tablets, embedded devices and internet of things devices.

  • hard-drive encryption

    Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.

SearchITOperations

As hybrid cloud deployments, containers, microservices and DevOps continue to become part of a data center's infrastructure, IT operations pros are facing a new set of responsibilities. Because they must be agile and able to manage next-gen apps in blended environments, the roles and responsibilities of development and operation teams are blending. 

  • IT operations

    IT operations is the overarching term for the processes and services administered by an organization's information technology (IT) department.

  • infrastructure as code

    Infrastructure as code, also referred to as IaC, is an IT practice that codifies and manages underlying IT infrastructure as software.

  • What is configuration management? A comprehensive guide

    Configuration management (CM) is an information governance and systems engineering process to ensure consistency among physical and logical assets in an operational environment.

SearchWindowsServer

SearchWindowsServer.com is dedicated to serving the information needs of Windows server professionals. The site provides targeted news, expert advice, tips, tutorials, learning guides, webcasts, white papers and more.

  • Microsoft Windows Subsystem for Linux (WSL)

    Microsoft Windows Subsystem for Linux (WSL) is a series of Microsoft components that allow native Linux 64-bit Executable and Linkable Format (ELF64) binaries to run on the Windows kernel in the Windows 10 operating system (OS).

  • Microsoft Technology Associate (MTA) certification

    Microsoft Technology Associate (MTA) certification is the name of a suite of entry-level certifications offered by Microsoft that signify fundamental technology knowledge in those who earn it.

  • Microsoft System Center Configuration Manager (SCCM)

    Microsoft System Center Configuration Manager (SCCM) is a Windows product that enables the management, deployment and security of devices and applications across an enterprise.

Back to Top

Database

SearchOracle

Visit SearchOracle.com for information and tips for the Oracle community. The site provides comprehensive coverage of all Oracle-specific news, trends and developments in the database industry.

  • NetSuite

    NetSuite is a business technology vendor based in San Mateo, California.

  • stored procedure

    A stored procedure is a group of statements with a specific name, which are stored inside a database, such as MySQL or Oracle.

  • object-oriented database management system (OODBMS)

    An object-oriented database management system (OODBMS), sometimes shortened to ODBMS for object database management system, is a database management system (DBMS) that supports the modelling and creation of data as objects.

Back to Top

Disaster Recovery / Compliance

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • Microsoft MyAnalytics

    Microsoft MyAnalytics, formerly Delve Analytics, is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.

  • content sprawl

    Content sprawl is a condition of an organization’'s content assets in which proliferation and unmanaged growth have led to an unwieldy mass that is difficult to manage.

  • enterprise content management (ECM)

    Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • Cloud-to-Cloud Backup (C2C Backup)

    C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service. The backup stored on the second cloud service serves the same purpose as an off-site backup.

  • What is cloud backup and how does it work?

    Cloud backup, also known as online backup or remote backup, is a strategy for backing up data that involves sending a copy of the data over a proprietary or public network to an off-site server and storage system.

  • Full Backup

    A full backup is the process of making at least one additional copy of all data files that an organization wishes to protect in a single backup operation.

SearchDisasterRecovery

Natural disasters, internal threats, user error and terrorist acts are realities that IT must take into consideration in their efforts to effectively protect their digital assets. Fortunately, SearchDisasterRecovery.com is the premier online resource for IT professionals responsible for disaster recovery planning.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate recovery, if necessary.

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a natural catastrophe, power outage or another type of business disruption.

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other resources to public cloud or dedicated service providers.

Back to Top

Emerging Technologies

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • fog computing (fog networking, fogging)

    Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.

  • IPv6 address

    An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.

  • smart home hub (home automation hub)

    A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

Back to Top

Healthcare IT

SearchHealthIT

SearchHealthIT.com is the health care technology professional’s how-to guide to building and managing an electronic health care infrastructure.

  • protected health information (PHI) or personal health information

    Protected health information (PHI), also referred to as personal health information, generally refers to demographic information, medical histories, test and laboratory results, mental health conditions, insurance information, and other data that a healthcare professional collects to identify an individual and determine appropriate care.

  • HIPAA (Health Insurance Portability and Accountability Act)

    HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security provisions for safeguarding medical information.

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the telecommunications infrastructure.

Back to Top

Networking

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • fog computing (fog networking, fogging)

    Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.

  • IPv6 address

    An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.

  • smart home hub (home automation hub)

    A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.

SearchMobileComputing

SearchMobileComputing.com provides comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise.

  • OTA update (over-the-air update)

    An over-the-air (OTA) update is the wireless delivery of new software, firmware, or other data to mobile devices.

  • Microsoft OneDrive

    OneDrive (formerly SkyDrive) is an online cloud storage service from Microsoft.

  • Mobile Threat Defense (MTD)

    Mobile Threat Defense (MTD) is a security software meant to protect organizations and individual users from security threats on mobile platforms.

SearchNetworking

SearchNetworking.com is one of the largest and most active online communities dedicated to the enterprise network.

  • cloud networking

    Cloud networking is when some or all of an organization's networking resources are hosted in the cloud.

  • network security

    In information technology, network security is the act of maintaining the integrity of a computer network and the data within it.

  • Cisco Certified Entry Networking Technician (CCENT)

    Cisco Certified Entry Networking Technician (CCENT) is a now-retired certification offered by Cisco, as part of their certification program.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

SearchUnifiedCommunications

SearchUnifiedCommunications.com provides a reliable source of how-to tips and best practices for implementing, managing and securing VoIP and advanced IP applications, enabling IT professionals to take advantage of the cost savings and new features and benefits associated with converged enterprise network.

  • video conferencing

    Video conferencing is live, visual connection between two or more remote parties over the internet that simulates a face-to-face meeting.

  • VoIP (voice over IP)

    VoIP (voice over Internet Protocol) is the transmission of voice and multimedia content over an internet connection.

  • Avaya

    Avaya is an American technology company that specializes in business communications services, such as unified communications (UC), and contact center (CC).

Back to Top

Security

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • software-defined perimeter (SDP)

    The software-defined perimeter, or SDP, is a security framework that controls access to resources based on identity.

  • cloud access security broker (CASB)

    A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure.

  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.

  • SOAR (Security Orchestration, Automation and Response)

    SOAR (Security Orchestration, Automation and Response) is a solution stack of compatible software programs that allow an organization to collect data about security threats, and respond to low-level security events without human assistance.

  • Certified Information Systems Auditor (CISA)

    The Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment. 

Back to Top

Storage

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • data center capacity planning

    Data center capacity planning ensures that an IT organization has enough facility space, power and computing resources to support average and peak workloads.

  • What is hyper-converged infrastructure? Guide to HCI

    Hyper-converged infrastructure is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

  • hyper-converged appliance

    A hyper-converged appliance is a hardware device that provides multiple data center management technologies within a single box.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • Cloud-to-Cloud Backup (C2C Backup)

    C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service. The backup stored on the second cloud service serves the same purpose as an off-site backup.

  • What is cloud backup and how does it work?

    Cloud backup, also known as online backup or remote backup, is a strategy for backing up data that involves sending a copy of the data over a proprietary or public network to an off-site server and storage system.

  • Full Backup

    A full backup is the process of making at least one additional copy of all data files that an organization wishes to protect in a single backup operation.

SearchStorage

The TechTarget Storage Media Group has built a community of the largest and most audience of storage decision-makers on the web.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency.

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Back to Top

Virtualization

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • server hardware degradation

    Server hardware degradation is the gradual breakdown of the physical parts of a server.

  • hypervisor

    A hypervisor is a function that abstracts -- isolates -- operating systems (OSes) and applications from the underlying computer hardware.

  • server virtualization

    Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware vSphere Client

    The VMware vSphere Client is a web-based application that connects to the vCenter Server so IT administrators can manage installations and handle inventory objects in a vSphere deployment.

  • VMware

    VMware is a virtualization and cloud computing software provider based in Palo Alto, Calif.

  • VMware DRS (Distributed Resource Scheduler)

    VMware DRS (Distributed Resource Scheduler) is a utility that balances computing workloads with available resources in a virtualized environment. The utility is part of a virtualization suite called VMware Infrastructure 3.

Back to Top

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close