Browse Definitions :

Find Technology-Specific Sites

TechTarget gives technology professionals and executives the information they need to perform their jobs – from developing strategy, to making cost-effective purchase decisions and managing their organizations' technology projects. Bookmark this page for easy access to the TechTarget network of technology-specific websites.

Browse TechTarget Sites by Topic

Application Development

Ajaxian

Ajaxian is a resource for software developers who work with Ajax, PHP, ASP.net, jQuery, Javascript, NodeJS, noSQL, FP and Visualization.

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • cloud database

    A cloud database is a collection of informational content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform.

  • cloud database

    A cloud database is a collection of informational content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform.

  • web application development

    Web app development is the creation of application programs that reside on remote servers and are delivered to the user’s device over the Internet.

SearchMicroservices

SearchMicroservices.com provides readers with industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, business process management (BPM), application integration and APIs, software containers, microservices and DevOps.

  • object-oriented programming (OOP)

    Object-oriented programming (OOP) is a programming language model where programs are organized around data, or objects, rather than functions and logic.

  • event

    An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.

  • RESTful API

    A RESTful API is an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data. A RESTful API -- also referred to as a RESTful web service -- is based on representational state transfer (REST) technology, an architectural style and approach to communications often used in web services development.

SearchSoftwareQuality

SearchSoftwareQuality.com is the online community for developers, architects and executives interested in building secure and quality software.

  • Agile retrospective

    An Agile retrospective is a meeting that’s held at the end of an iteration in Agile development.

  • DevOps Dojo

    DevOps Dojos provide software developers and operations engineers with an immersive learning environment where team members can gain practical work experience without having to worry about introducing errors into the production environment.

  • low-code/no-code development platform (LCNC platform)

    Low-code/no-code development platforms are tools that enable citizen developers – including business analysts, office administrators, small-business owners and others – to create mobile and web apps quickly with little or no hand-coding.

SearchWinDevelopment

SearchWinDevelopment.com is a unique online resource for developers, architects and development managers tasked with building and maintaining enterprise applications using Visual Basic, C# and the Microsoft .NET platform.

  • intranet

    An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences.

  • Internet

    The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).

  • scripting language

    A scripting language is a form of programming language that is usually interpreted rather than compiled. Scripting languages are typically converted into machine code on the fly during runtime by a program called an interpreter.

TheServerSide

TheServerSide.com is the world’s largest online community for enterprise Java architects and developers, providing daily news, tech talk interviews with key industry figures, design patterns, discussion forums, tutorials and more.

  • Java

    Java is a widely used programming language expressly designed for use in the distributed environment of the internet.

  • Java Runtime Environment (JRE)

    The Java Runtime Environment (JRE), also known as Java Runtime, is the part of the Java Development Kit (JDK) that contains and orchestrates the set of tools and minimum requirements for executing a Java application.

  • OpenJDK

    OpenJDK is a free, open-source version of the Java Development Kit for the Java Platform, Standard Edition (Java SE).

Back to Top

Business Intelligence / Analytics

BeyeNETWORK

BeyeNETWORK.com is the primary site of the BeyeNETWORK, providing viewers with access to the thought leaders in business intelligence, performance management, business integration, information quality, data warehousing and more.

SearchBusinessAnalytics

SearchBusinessAnalytics.com is dedicated to serving the information needs of business and IT professionals.

  • sentiment analysis (opinion mining)

    Sentiment analysis, also referred to as opinion mining, is an approach to natural language processing (NLP) that identifies the emotional tone behind a body of text.

  • business intelligence (BI)

    Business intelligence (BI) is a technology-driven process for analyzing data and presenting actionable information to help executives, managers and other corporate end users make informed business decisions.

  • data exploration

    Data exploration is the first step in data analysis and typically involves summarizing the main characteristics of a data set, including its size, accuracy, initial patterns in the data and other attributes.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • OCR (optical character recognition)

    OCR (optical character recognition) is the use of technology to distinguish printed or handwritten text characters inside digital images of physical documents, such as a scanned paper document.

  • digital workplace

    The digital workplace is the concept that businesses should use digital transformation (DX) to align technology, employees and business processes to improve operational efficiency and meet organizational goals.

  • Nintex Sign

    Nintex Sign is a native electronic signature capability that is powered by Adobe Sign. Public and private sector organizations can usethe Nintex Sign platform to streamline or automate paper-based workflows that require signatures.

SearchCRM

SearchCRM.com is a free resource dedicated to Customer Relationship Management (CRM) decision makers.

SearchCustomerExperience

SearchCustomerExperience keeps our readers up-to-speed on emerging trends in customer data analytics, customer self-service, omnichannel customer service, artificial intelligence (AI), contact center technology, marketing software, sales technology, digital experience management, sales force automation and web content management.

  • real-time analytics

    Real-time analytics is the use of, or the capacity to use, data and related resources as soon as the data enters the system.

  • customer churn (customer attrition)

    Customer churn, also called customer attrition, is the number of paying customers who fail to become repeat customers. In this context, churn is a quantifiable rate of change that occurs over a specified amount of time.

  • customer segmentation

    Customer segmentation is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests and spending habits.

SearchDataManagement

SearchDataManagement.com is a guide for data management professionals and business leaders.

  • data profiling

    Data profiling is the process of examining, analyzing and reviewing data to collect statistics surrounding the quality and hygiene of the dataset.

  • data access rights

    A data access right (DAR) is a permission that has been granted that allows a person or computer program to locate and read digital information at rest. Digital access rights play and important role in information security and compliance.

  • data analytics (DA)

    Data analytics (DA) is the science of examining raw data with the purpose of drawing conclusions about that information.

SearchSQLServer

SearchSQLServer.com is dedicated to serving the information needs of database developers and administrators working with Microsoft's flagship database enterprise server, SQL Server.

  • database management system (DBMS)

    If the database is a file of information, then the DBMS is the file folders, the file labels and the file cabinet.

  • data mining

    Data mining is the process of sorting through large data sets to identify patterns and establish relationships to solve problems through data analysis.

  • database (DB)

    A database is a collection of information that is organized so that it can be easily accessed, managed and updated.

Back to Top

Business Software

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • cloud database

    A cloud database is a collection of informational content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform.

  • cloud database

    A cloud database is a collection of informational content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform.

  • web application development

    Web app development is the creation of application programs that reside on remote servers and are delivered to the user’s device over the Internet.

SearchDomino

SearchDomino.com is a leading source for Lotus Notes and Domino-specific information for enterprise IT professionals.

  • knowledge management (KM)

    Knowledge management is a concept in which an enterprise consciously and comprehensively gathers, organizes, shares and analyzes its knowledge in terms of resources, documents, and people skills.

  • Instant Messaging: Glossary

    This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.

  • iNotes (iNotes Web Access)

    iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.

SearchERP

SearchERP was built to help startups, small and mid-sized businesses, and large corporations better leverage ERP technologies and strategies to eliminate legacy platforms that cause data silos, improve business processes, boost profitability, improve financial reporting and gain more visibility.

  • cost of goods sold (COGS)

    Cost of goods sold (COGS) is the total of the costs directly attributable to producing goods. It includes material and labor costs but not indirect costs such as sales, marketing and distribution. In accounting, it is a standard item in the expense section of a company's income statement.

  • supply chain security

    Supply chain security is the part of supply chain management (SCM) that focuses on minimizing risk for supply chain, logistics and transportation management systems (TMS).

  • budgeting, planning and forecasting (BP&F)

    Budgeting, planning and forecasting (BP&F) is a three-step strategic planning process for determining and detailing an organization's long- and short-term financial goals.

SearchHRSoftware

Find unbiased news, analysis, resources and the latest strategies to better manage HR and HCM functions at your organization.

  • Human Resource Certification Institute (HRCI)

    HRCI (Human Resource Certification Institute) is a U.S. based credentialing organization offering certifications to HR generalists, administrators and managers. The certifications are awarded upon successful completion of competency exams that cover Human Resource Management (HRM) practices, policies and principles.

  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) is a performance management framework designed to encourage companies to set, communicate and monitor broad organizational goals and results.

  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal participation to achieve objectives.

SearchSalesforce

SearchSalesforce.com is a resource for Salesforce news, expert advice, technical tips and career guidance as well as a forum for community interaction. The site focuses on the Salesforce customer relationship management (CRM) platform as well as its ecosystem of partners.

SearchSAP

SearchSAP.com is the SAP community's resource for news, expert advice, technical tips and career guidance.

  • SAP Leonardo

    SAP Leonardo is an umbrella brand for SAP’s collection of software and services that organizations can use to develop digital transformation projects.

  • SAP Business One

    SAP Business One is an ERP software platform specifically intended for small and medium-sized businesses (SMBs).

  • ABAP (Advanced Business Application Programming)

    ABAP (Advanced Business Application Programming) is the primary programming language supported on the SAP NetWeaver ABAP application server platform and applications that run on it, such as SAP ERP (formerly R/3), S/4HANA and CRM.

Back to Top

CIO Strategies

ComputerWeekly

ComputerWeekly.com is the leading provider of news, analysis, opinion, information and services for the UK IT community. The site serves as an advocate for UK IT professionals and the role of technology in improving organisations in all sectors of business and public life.

ebizQ

ebizQ is the insider’s guide to next-generation business process management. The site offers a growing collection of independent editorial articles on BPM trends, issues, challenges and solutions, all targeted to business and IT BPM professionals.

SearchCIO

SearchCIO.com provides technology management strategies designed exclusively for the enterprise CIO. Our award-winning team of editors and industry luminaries offer strategic advice and technology best practices to help streamline global IT operations.

  • blockchain

    Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data.

  • platform economy

    Platform economy is the tendency for commerce to increasingly move towards and favor digital platform business models.

  • brand equity

    Brand equity is the perceived value a company gains by having a known name, logo or other identifier.

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from retaliatory action for voluntarily disclosing information about dishonest or illegal activities occurring in a government organization.

Back to Top

Channel Resources

MicroScope

Stay ahead with IT Business management and technology news and articles on UK laws, regulations, credit and finance, selling, sales management, marketing and supplier relationships.

SearchITChannel

If you're a value-added reseller (VAR), information technology reseller or a systems integrator, all of your research needs are met at SearchITChannel.com.

  • feedback loop

    A feedback loop is a system where some portion or all of the output produced by the system returns as input, effecting the succeeding processes of that system in some way.

  • professional services

    A professional service is an intangible product that a contractor or product vendor sells to help a customer manage a specific part of their business.

  • IBM

    IBM (International Business Machines) ranks among the world's largest information technology companies, providing a wide spectrum of hardware, software and services offerings.

Back to Top

Cloud

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchAWS

From cloud infrastructure to applications, development, security, big data, storage and more, SearchAWS.com provides meaningful insight from award-winning editors, research analysts and industry experts on one of the fastest-growing cloud services providers, Amazon Web Services.

  • data lake

    A data lake is a storage repository that holds a vast amount of raw data in its native format until it is needed.

  • Amazon Aurora

    Amazon Aurora is a relational database engine from Amazon Web Services. The engine is MySQL-compatible, which means code, applications and drivers used in databases relying on MySQL can be used in Aurora with minimal or no changes.

  • Amazon Connect

    Amazon Connect is an Amazon Web Services (AWS) public cloud customer contact center service.

SearchCloudComputing

SearchCloudComputing.com is the Web's most comprehensive resource for cloud computing news, analysis and case studies.

  • cloud integration

    Cloud integration is the act of combining different cloud-based systems into an integral whole. The term may also refer to joining cloud-based systems with on-premises systems.

  • Cloudability

    Cloudability is a software vendor that provides financial management tools for monitoring and analyzing cloud computing costs.

  • Software as a Service (SaaS)

    Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • software-defined perimeter (SDP)

    Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

  • clickwrap agreement (clickthrough agreement)

    A clickwrap agreement, also known as a clickthrough agreement, is an online contract that confirms a user's consent to a company's terms and conditions.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • service discovery

    Service discovery is the automatic detection of devices and offered services over a network that is used to minimize configuration efforts for administrators.

  • oVirt

    OVirt is an open source data center virtualization platform developed and promoted by Red Hat.

  • hardware virtualization

    Hardware virtualization, which is also known as server virtualization or simply virtualization, is the abstraction of computing resources from the software that uses those resources.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • Remote Desktop Services (RDS)

    Remote Desktop Services (RDS) is an umbrella term for several specific features of Microsoft Windows Server that allow users to remotely access graphical desktops and Windows applications.

  • Parallels

    Parallels is an application and desktop virtualization software vendor that offers management and delivery platforms for Apple macOS and Microsoft Windows desktop deployments.

  • Goliath Technologies

    Goliath Technologies is a performance monitoring software vendor that offers tools to monitor and analyze data centers, back-end servers and network performance for on-premises and cloud deployments.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • Storage vMotion

    Storage vMotion is a component of VMware vSphere that allows the live migration of a running virtual machine's (VM) file system from one storage system to another, with no downtime for the VM or service disruption for end users.

  • virtual machine replication

    Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.

  • VMware ESXi

    VMware ESXi is an operating system-independent hypervisor based on the VMkernel operating system that interfaces with agents that run on top of it. ESXi stands for Elastic Sky X Integrated.

Back to Top

Consumer Product Review

Brighthand

Brighthand.com offers SmartPhone, handheld computer, and cell phone reviews and news. Our active forum community is a great source of information on SmartPhones and related devices.

DigitalCameraReview

DigitalCameraReview.com offers digital camera reviews and news, a forum community, digital camera price comparisons, deals and coupons on digital cameras and accessories.

NotebookReview

NotebookReview.com offers the latest notebook and laptop reviews, as well as price comparisons, support forums and news."

TabletPCReview

TabletPCReview.com offers Tablet PC reviews and ratings, price comparisons, as well as support forums and news.

TechnologyGuide

TechnologyGuide.com is a family of product review and evaluation websites that are the leading source for information on the latest desktop and notebook computers, software and printers, wireless smartphones, digital cameras, and other devices for both the consumer and business markets.

Back to Top

Data Center Management

Search400

Search400.com is an online information resource for the latest news, tech tips and expert advice for the iSeries professional.

  • Quiz: iSeries (AS/400) History

    2003 marks the 15th anniversary of the AS/400 (now called the iSeries), so we thought we'd take a look back and see how it's changed over the years.

  • Quiz: iSeries (AS/400) Commands

    The iSeries (AS/400) is one of IBM's greatest success stories.

  • OS/400

    OS/400 is IBM's operating system for its AS/400 and AS/400e line of business computers. (Continued...)

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • network convergence

    Network convergence is the efficient coexistence of telephone, video and data communication within a single network.

  • single pane of glass

    A single pane of glass is a management console that presents data from multiple sources in a unified display. The glass, in this case, is a computer monitor or mobile device screen.

  • DataCore

    DataCore is a software-defined storage (SDS) company, as well as an early storage virtualization software vendor, in Fort Lauderdale, Fla.

SearchDataCenter

SearchDataCenter.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • National Electrical Code (NEC)

    National Electrical Code (NEC) is a set of regularly updated standards for the safe installation of electric wiring in the United States.

  • high availability (HA)

    High availability (HA) is the ability of a system or system component to be continuously operational for a desirably long length of time.

  • information technology (IT)

    Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is the leading source for tactical expert advice and best practices on desktop management and security. The site provides essential resources including the latest tips, tutorials, webcasts, white papers and more.

  • device driver

    A device driver is a software program that controls a particular type of hardware device that is attached to a computer.

  • Microsoft Windows Explorer

    Microsoft Windows Explorer is a graphical file management utility included with Microsoft Windows 95 and later; finally renamed File Explorer with Windows 8 and Windows Server 2012.

  • Windows Autopilot

    Windows Autopilot is a desktop provisioning tool native to Windows 10 that allows IT professionals to automate image deployment of new desktops with preset configurations.

SearchITOperations

As hybrid cloud deployments, containers, microservices and DevOps continue to become part of a data center's infrastructure, IT operations pros are facing a new set of responsibilities. Because they must be agile and able to manage next-gen apps in blended environments, the roles and responsibilities of development and operation teams are blending. 

  • serverless computing

    Serverless computing is an event-driven application design and deployment paradigm in which computing resources are provided as scalable cloud services.

  • native cloud application (NCA)

    A native cloud application (NCA) is a program that is designed specifically for a cloud computing architecture.

  • mutation testing

    Mutation testing, also known as code mutation testing, is a form of white box testing where testers will change specific components of an application's source code to ensure a software test suite will be able to detect the changes.

SearchWindowsServer

SearchWindowsServer.com is dedicated to serving the information needs of Windows server professionals. The site provides targeted news, expert advice, tips, tutorials, learning guides, webcasts, white papers and more.

  • Group Policy

    Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers. Group policy is primarily a security tool, and can be used to apply security settings to users and computers.

  • Windows Management Instrumentation (WMI)

    Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network from Windows computing systems.

  • read-only

    Read-only is a file attribute which only allows a user to view a file, restricting any writing to the file.

Back to Top

Database

SearchOracle

Visit SearchOracle.com for information and tips for the Oracle community. The site provides comprehensive coverage of all Oracle-specific news, trends and developments in the database industry.

  • NetSuite

    NetSuite is a business technology vendor based in San Mateo, California.

  • stored procedure

    A stored procedure is a group of statements with a specific name, which are stored inside a database, such as MySQL or Oracle.

  • object-oriented database management system (OODBMS)

    An object-oriented database management system (OODBMS), sometimes shortened to ODBMS for object database management system, is a database management system (DBMS) that supports the modelling and creation of data as objects.

Back to Top

Disaster Recovery / Compliance

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from retaliatory action for voluntarily disclosing information about dishonest or illegal activities occurring in a government organization.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • OCR (optical character recognition)

    OCR (optical character recognition) is the use of technology to distinguish printed or handwritten text characters inside digital images of physical documents, such as a scanned paper document.

  • digital workplace

    The digital workplace is the concept that businesses should use digital transformation (DX) to align technology, employees and business processes to improve operational efficiency and meet organizational goals.

  • Nintex Sign

    Nintex Sign is a native electronic signature capability that is powered by Adobe Sign. Public and private sector organizations can usethe Nintex Sign platform to streamline or automate paper-based workflows that require signatures.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • data retention policy

    A data retention policy dictates the types of data to be retained and the duration for which that data must be stored in accordance with operational or regulatory requirements.

  • data reduction

    Data reduction is the process of reducing the amount of capacity required to store data.

  • data archiving

    Data archiving migrates infrequently used data to low-cost, high-capacity archive storage for long-term retention.

SearchDisasterRecovery

Natural disasters, internal threats, user error and terrorist acts are realities that IT must take into consideration in their efforts to effectively protect their digital assets. Fortunately, SearchDisasterRecovery.com is the premier online resource for IT professionals responsible for disaster recovery planning.

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate.

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk management.

Back to Top

Emerging Technologies

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • mesh network topology (mesh network)

    A mesh network is a network in which the devices -- or nodes -- are connected so that at least some, and sometimes all, have multiple paths to other nodes.

  • intranet of things

    An intranet of things is, depending on your viewpoint, either an element of the all-encompassing Internet of Things (IoT) or an alternative model that uses similar systems and technologies but limits the accessibility of its things to the corporate network.

  • industrial internet of things (IIoT)

    The industrial internet of things (IIoT) is the use of smart sensors and actuators to enhance manufacturing and industrial processes. Also known as the industrial internet or Industry 4.0, IIoT leverages the power of smart machines and real-time analytics to take advantage of the data that dumb machines have produced in industrial settings for years.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

Back to Top

Healthcare IT

SearchHealthIT

SearchHealthIT.com is the health care technology professional’s how-to guide to building and managing an electronic health care infrastructure.

  • remote patient monitoring (RPM)

    Remote patient monitoring (RPM) is a subcategory of homecare telehealth that allows patients to use mobile medical devices or technology to gather patient-generated health data (PGHD) and send it to healthcare professionals.

  • telestroke (telestroke services)

    Telestroke is a web-based approach to treating stroke victims who have not been admitted to a hospital. In its most basic form, a telestroke system requires a neurologist and attending nurse to have a high-speed Internet connection and videoconferencing capabilities through a phone, laptop, tablet or desktop computer.

  • HIPAA (Health Insurance Portability and Accountability Act)

    HIPAA (Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information.

Back to Top

Networking

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • mesh network topology (mesh network)

    A mesh network is a network in which the devices -- or nodes -- are connected so that at least some, and sometimes all, have multiple paths to other nodes.

  • intranet of things

    An intranet of things is, depending on your viewpoint, either an element of the all-encompassing Internet of Things (IoT) or an alternative model that uses similar systems and technologies but limits the accessibility of its things to the corporate network.

  • industrial internet of things (IIoT)

    The industrial internet of things (IIoT) is the use of smart sensors and actuators to enhance manufacturing and industrial processes. Also known as the industrial internet or Industry 4.0, IIoT leverages the power of smart machines and real-time analytics to take advantage of the data that dumb machines have produced in industrial settings for years.

SearchEnterpriseWAN

SearchEnterpriseWAN.com is one of the largest and most active online communities dedicated to the enterprise wide area network.

SearchMobileComputing

SearchMobileComputing.com provides comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise.

  • m-commerce (mobile commerce)

    M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.

  • GSM (Global System for Mobile communication)

    GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.

  • Android 9 Pie

    Android 9 Pie is the most recent version of Google’s mobile operating system.

SearchNetworking

SearchNetworking.com is one of the largest and most active online communities dedicated to the enterprise network.

  • network packet

    A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network.

  • local area network (LAN)

    A local area network (LAN) consists of computers and peripherals that share a common communications line or wireless link to a server. LANs are typically located within a distinct geographic area in an office or other facility.

  • client-server model (client-server architecture)

    Client-server is a relationship in which one program (the client) requests a service or resource from another program (the server). At the turn of the last century, the label client-server was used to distinguish distributed computing by personal computers (PCs) from the monolithic, centralized computing model used by mainframes.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

SearchTelecom

Whether you're an IT Pro looking for advice on building-out an infrastructure to support new customer demands or a product manager seeking new tech insights to boost ARPU, SearchTelecom.com is a critical online resource for IT and business professionals.

SearchUnifiedCommunications

SearchUnifiedCommunications.com provides a reliable source of how-to tips and best practices for implementing, managing and securing VoIP and advanced IP applications, enabling IT professionals to take advantage of the cost savings and new features and benefits associated with converged enterprise network.

  • VoIP (voice over IP)

    VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks. VoIP historically referred to using IP to connect private branch exchanges (PBXs), but the term is now used interchangeably with IP telephony.

  • communications platform as a service (CPaaS)

    Communications platform as a service (CPaaS) is a cloud-based delivery model that allows organizations to add real-time communication capabilities, such as voice, video and messaging, to business applications by deploying application program interfaces (APIs). 

  • unified communications and collaboration (UCC)

    Unified communications and collaboration (UCC) is the collection of technology and software that combines enterprise communication with real time, asynchronous cooperation capabilities.

Back to Top

Security

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • software-defined perimeter (SDP)

    Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

  • clickwrap agreement (clickthrough agreement)

    A clickwrap agreement, also known as a clickthrough agreement, is an online contract that confirms a user's consent to a company's terms and conditions.

SearchFinancialSecurity

IT professionals turn to SearchFinancialSecurity.com for the information they require to keep their corporate data and assets secure.

  • corporate governance

    Corporate governance is the combination of rules, processes or laws by which businesses are operated, regulated or controlled.

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Shared Assessments Program

    Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.

SearchMidmarketSecurity

SearchMidmarketSecurity.com is the only security-specific information resource geared toward midsize companies that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, a selection of highly focused security e-newsletters and more - all at no cost.

  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response.

  • endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • clean desk policy (CDP)

    A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. Most CDPs require employees to clear their desks of all papers at the end of the day.

SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure.

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating computer applications.

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by a computing device.

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification regardless of the user’s location in relation to the network perimeter.

Back to Top

Social Media

ITKnowledgeExchange

Find technology questions and answers in this community of information technology (IT) experts and professionals.

Back to Top

Storage

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • network convergence

    Network convergence is the efficient coexistence of telephone, video and data communication within a single network.

  • single pane of glass

    A single pane of glass is a management console that presents data from multiple sources in a unified display. The glass, in this case, is a computer monitor or mobile device screen.

  • DataCore

    DataCore is a software-defined storage (SDS) company, as well as an early storage virtualization software vendor, in Fort Lauderdale, Fla.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • data retention policy

    A data retention policy dictates the types of data to be retained and the duration for which that data must be stored in accordance with operational or regulatory requirements.

  • data reduction

    Data reduction is the process of reducing the amount of capacity required to store data.

  • data archiving

    Data archiving migrates infrequently used data to low-cost, high-capacity archive storage for long-term retention.

SearchStorage

The TechTarget Storage Media Group has built a community of the largest and most audience of storage decision-makers on the web.

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically instead of magnetically, as spinning hard disk drives (HDDs) or magnetic oxide tape do.

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes referred to as non-volatile storage.

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to reduce the amount of data that has to move between the storage plane and the compute plane.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

Back to Top

Vendor Research

KnowledgeStorm

Browse the database of business technology software products and services.

Back to Top

Virtualization

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • service discovery

    Service discovery is the automatic detection of devices and offered services over a network that is used to minimize configuration efforts for administrators.

  • oVirt

    OVirt is an open source data center virtualization platform developed and promoted by Red Hat.

  • hardware virtualization

    Hardware virtualization, which is also known as server virtualization or simply virtualization, is the abstraction of computing resources from the software that uses those resources.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • Remote Desktop Services (RDS)

    Remote Desktop Services (RDS) is an umbrella term for several specific features of Microsoft Windows Server that allow users to remotely access graphical desktops and Windows applications.

  • Parallels

    Parallels is an application and desktop virtualization software vendor that offers management and delivery platforms for Apple macOS and Microsoft Windows desktop deployments.

  • Goliath Technologies

    Goliath Technologies is a performance monitoring software vendor that offers tools to monitor and analyze data centers, back-end servers and network performance for on-premises and cloud deployments.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • Storage vMotion

    Storage vMotion is a component of VMware vSphere that allows the live migration of a running virtual machine's (VM) file system from one storage system to another, with no downtime for the VM or service disruption for end users.

  • virtual machine replication

    Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.

  • VMware ESXi

    VMware ESXi is an operating system-independent hypervisor based on the VMkernel operating system that interfaces with agents that run on top of it. ESXi stands for Elastic Sky X Integrated.

Back to Top

White Papers and Webcasts

BitPipe

A free library of IT white papers, webcasts and product information to help with your IT purchase decisions. Research the latest tools, technologies and techniques and compare offerings from thousands to technology companies.

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close