Browse Definitions :

Find Technology-Specific Sites

TechTarget gives technology professionals and executives the information they need to perform their jobs – from developing strategy, to making cost-effective purchase decisions and managing their organizations' technology projects. Bookmark this page for easy access to the TechTarget network of technology-specific websites.

Browse TechTarget Sites by Topic

Application Development

Ajaxian

Ajaxian is a resource for software developers who work with Ajax, PHP, ASP.net, jQuery, Javascript, NodeJS, noSQL, FP and Visualization.

SearchAppArchitecture

Over 4 million programmers, architects, IT managers, and developers turn to our site for industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, Business Process Management (BPM), application integration and APIs, software containers and microservices design and development, DevOps, and more.

  • source code

    Source code is the fundamental component of a computer program that is created by a programmer. It can be read and easily understood by a human being.

  • React Native

    React Native is an open source JavaScript framework for mobile application development. The framework is based on Facebook’s user interface (UI) JavaScript library, React, and can be used to design apps for the web, iOS and Android.

  • Spring Framework

    The Spring Framework (Spring) is an open-source application framework that provides infrastructure support for developing Java applications.

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • cloud database

    A cloud database is a collection of informational content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform.

  • cloud integration platform

    A cloud integration platform is a product that facilitates the integration of an organization’s onsite (non-cloud-based) business resources with cloud-based resources.

SearchMicroservices

SearchMicroservices.com provides readers with industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, business process management (BPM), application integration and APIs, software containers, microservices and DevOps.

  • Clojure programming language

    The Clojure programming language, used in the Lisp programming language, is a high-level, dynamic functional programming language.

  • application integration (enterprise application integration or EAI)

    Application integration (sometimes called enterprise application integration or EAI) is the process of bringing data or a function from one application program together with that of another application program.

  • CUSeeMe

    CUseeMe is a low-cost product for Internet videoconferencing.

SearchSoftwareQuality

SearchSoftwareQuality.com is the online community for developers, architects and executives interested in building secure and quality software.

  • functional specification

    A functional specification is a formal document used to describe a product's intended capabilities, appearance, and interactions with users in detail for software developers.

  • software requirements specification (SRS)

    A software requirements specification (SRS) is a comprehensive description of the intended purpose and environment for software under development. The SRS fully describes what the software will do and how it will be expected to perform... (Continued)

  • hybrid application (hybrid app)

    A hybrid application (hybrid app) is one that combines elements of both native and Web applications. Hybrid apps are popular because they allow developers to write code once and still accommodate multiple platforms.

SearchWinDevelopment

SearchWinDevelopment.com is a unique online resource for developers, architects and development managers tasked with building and maintaining enterprise applications using Visual Basic, C# and the Microsoft .NET platform.

  • Azure DevOps (formerly Visual Studio Team Services)

    Visual Studio Team Services (VSTS) -- rebranded as Azure DevOps in 2018 -- is an Azure cloud-hosted extension of Microsoft's Team Foundation Server (TFS) -- now called Azure DvOps -- that assist development teams with special tools and services for software programmers, analysts and testers as well as IT project or team managers.

  • browser

    A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.

  • .NET Framework

    .NET Framework is a managed execution environment for Windows that allows software developers to create a software application in one programming language and be assured the app can work with code written in other languages. 

TheServerSide

TheServerSide.com is the world’s largest online community for enterprise Java architects and developers, providing daily news, tech talk interviews with key industry figures, design patterns, discussion forums, tutorials and more.

  • HTML (Hypertext Markup Language)

    HTML (Hypertext Markup Language) is a text-based approach to describing how content contained within an HTML file is structured.

  • JAVA_HOME

    JAVA_HOME is an operating system (OS) environment variable which can optionally be set after either the Java Development Kit (JDK) or the Java Runtime Environment (JRE) is installed.

  • prettyprint

    Prettyprint is the process of converting and presenting source code or other objects in a legible and attractive way.

Back to Top

Business Intelligence / Analytics

BeyeNETWORK

BeyeNETWORK.com is the primary site of the BeyeNETWORK, providing viewers with access to the thought leaders in business intelligence, performance management, business integration, information quality, data warehousing and more.

SearchBusinessAnalytics

SearchBusinessAnalytics.com is dedicated to serving the information needs of business and IT professionals.

  • big data analytics

    Big data analytics is the often complex process of examining large and varied data sets, or big data, to uncover information -- such as hidden patterns, unknown correlations, market trends and customer preferences -- that can help organizations make informed business decisions.

  • business intelligence (BI)

    Business intelligence (BI) is a technology-driven process for analyzing data and presenting actionable information to help executives, managers and other corporate end users make informed business decisions.

  • BABOK Guide (Guide to the Business Analysis Body of Knowledge)

    The guide to the Business Analysis Body of Knowledge, or the BABOK Guide, is a book from the International Institute of Business Analysis (IIBA) that provides essential support and direction to business analysts (BAs) by presenting a collection of the activities that comprise business analysis.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • content management system (CMS)

    A content management system (CMS) is an application program for creating and managing digital content in a collaborative environment.

  • content automation

    Content automation is a digital marketing strategy that focuses on removing the need for human intervention in the content lifecycle.

  • Adobe Sign

    Adobe Sign is a cloud-based service that lets an individual or organization send, secure, track and manage e-signature processes.

SearchCRM

SearchCRM.com is a free resource dedicated to Customer Relationship Management (CRM) decision makers.

SearchCustomerExperience

SearchCustomerExperience keeps our readers up-to-speed on emerging trends in customer data analytics, customer self-service, omnichannel customer service, artificial intelligence (AI), contact center technology, marketing software, sales technology, digital experience management, sales force automation and web content management.

  • social media influence

    Social media influence is a marketing term that describes an individual’s ability to affect other people's thinking in a social online community.

  • headless commerce (headless e-commerce)

    Headless commerce, also called headless e-commerce, is a platform architecture that decouples the front end of an e-commerce website with the back end.

  • account-based experience (ABX)

    Account-based experience (ABX) is a methodology in which separate teams in an organization work closely with one another to ensure all brand interactions are focused on the end user.

SearchDataManagement

SearchDataManagement.com is a guide for data management professionals and business leaders.

  • Entity Relationship Diagram (ERD)

    An entity relationship diagram (ERD), also known as an entity relationship model, is a graphical representation that depicts relationships among people, objects, places, concepts or events within an information technology (IT) system.

  • big data

    Big data is an evolving term that describes a large volume of structured, semi-structured and unstructured data that has the potential to be mined for information and used in machine learning projects and other advanced analytics applications.

  • Heap

    Heap is a user analytics tool which can be utilized to capture all web, mobile and cloud-based user interactions in an application.

SearchSQLServer

SearchSQLServer.com is dedicated to serving the information needs of database developers and administrators working with Microsoft's flagship database enterprise server, SQL Server.

  • T-SQL (Transact-SQL)

    T-SQL (Transact-SQL) is a set of programming extensions from Sybase and Microsoft that add several features to the Structured Query Language (SQL), including transaction control, exception and error handling, row processing and declared variables.

  • database normalization

    Database normalization is intrinsic to most relational database schemes. It is a process that organizes data into tables so that results are always unambiguous.

  • Azure SQL Data Warehouse

    Azure SQL Data Warehouse is a managed Data Warehouse-as-a Service (DWaaS) offering provided by Microsoft Azure.

Back to Top

Business Software

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • cloud database

    A cloud database is a collection of informational content, either structured or unstructured, that resides on a private, public or hybrid cloud computing infrastructure platform.

  • cloud integration platform

    A cloud integration platform is a product that facilitates the integration of an organization’s onsite (non-cloud-based) business resources with cloud-based resources.

SearchDomino

SearchDomino.com is a leading source for Lotus Notes and Domino-specific information for enterprise IT professionals.

  • knowledge management (KM)

    Knowledge management is a concept in which an enterprise consciously and comprehensively gathers, organizes, shares and analyzes its knowledge in terms of resources, documents, and people skills.

  • Instant Messaging: Glossary

    This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.

  • iNotes (iNotes Web Access)

    iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.

SearchERP

SearchERP was built to help startups, small and mid-sized businesses, and large corporations better leverage ERP technologies and strategies to eliminate legacy platforms that cause data silos, improve business processes, boost profitability, improve financial reporting and gain more visibility.

  • ERP (enterprise resource planning)

    ERP, or enterprise resource planning, is a modular software system designed to integrate the main functional areas of an organization's business processes into a unified system.

  • IBM OpenPages

    IBM OpenPages is a governance, risk and compliance (GRC) platform that centralizes services and components associated with the challenges and management of regulatory initiatives.

  • order to cash (OTC or O2C)

    Order to cash (OTC or O2C) is a set of business processes that involve receiving and fulfilling customer requests for goods or services.

SearchHRSoftware

Find unbiased news, analysis, resources and the latest strategies to better manage HR and HCM functions at your organization.

  • HRIS (human resource information system)

    A human resource information system (HRIS) is software that provides a centralized repository of employee master data that the human resource management (HRM) group needs for completing core human resource (core HR) processes.

  • people analytics (HR analytics)

    People analytics, also known as human resource (HR) analytics and talent analytics, is a form of big data that applies math, statistics and modeling to worker-related data to see and predict patterns.

  • workforce management (WFM)

    Workforce management (WFM) is an integrated set of processes that a company uses to optimize the productivity of its employees.

SearchSalesforce

SearchSalesforce.com is a resource for Salesforce news, expert advice, technical tips and career guidance as well as a forum for community interaction. The site focuses on the Salesforce customer relationship management (CRM) platform as well as its ecosystem of partners.

SearchSAP

SearchSAP.com is the SAP community's resource for news, expert advice, technical tips and career guidance.

  • SAP

    SAP SE is a multinational software corporation that is currently the market leader in the enterprise resource planning (ERP) field.

  • SAP Leonardo

    SAP Leonardo is an umbrella brand for SAP’s collection of software and services that organizations can use to develop digital transformation projects.

  • SAP Business One

    SAP Business One is an ERP software platform specifically intended for small and medium-sized businesses (SMBs).

Back to Top

CIO Strategies

ComputerWeekly

ComputerWeekly.com is the leading provider of news, analysis, opinion, information and services for the UK IT community. The site serves as an advocate for UK IT professionals and the role of technology in improving organisations in all sectors of business and public life.

ebizQ

ebizQ is the insider’s guide to next-generation business process management. The site offers a growing collection of independent editorial articles on BPM trends, issues, challenges and solutions, all targeted to business and IT BPM professionals.

SearchCIO

SearchCIO.com provides technology management strategies designed exclusively for the enterprise CIO. Our award-winning team of editors and industry luminaries offer strategic advice and technology best practices to help streamline global IT operations.

  • Prototyping Model

    The prototyping model is a systems development method in which a prototype is built, tested and then reworked as necessary until an acceptable outcome is achieved from which the complete system or product can be developed. table prototype is finally achieved.

  • SWOT analysis (strengths, weaknesses, opportunities and threats analysis)

    SWOT analysis (strengths, weaknesses, opportunities and threats analysis) is a framework for identifying and analyzing the internal and external factors that can have an impact on the viability of a project, product, place or person.

  • SIPOC diagram (suppliers, inputs, process, outputs, customers)

    A SIPOC (suppliers, inputs, process, outputs, customers) diagram is a visual tool for documenting a business process from beginning to end prior to implementation.

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (MSP) will help an organization meet its regulatory compliance mandates.

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, procedures or technologies affect individuals’ privacy and eliminate any risks that might violate compliance.

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to control their own personally identifiable information (PII).

Back to Top

Channel Resources

MicroScope

Stay ahead with IT Business management and technology news and articles on UK laws, regulations, credit and finance, selling, sales management, marketing and supplier relationships.

SearchITChannel

If you're a value-added reseller (VAR), information technology reseller or a systems integrator, all of your research needs are met at SearchITChannel.com.

  • Prisma

    Prisma is a cloud security suite that provides four different services that use rule-based security policies and machine learning to protect cloud services. This suite can be used on Amazon Web Services (AWS), Azure, and Google Cloud Platforms.

  • hardware-as-a-service (in managed services)

    Hardware-as-a-service (HaaS) is a procurement model that is similar to leasing or licensing in which hardware that belongs to a managed service provider (MSP) is installed at a customer's site and a service level agreement (SLA) defines the responsibilities of both parties.

  • managed service provider (MSP)

    A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.

Back to Top

Cloud

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchAWS

From cloud infrastructure to applications, development, security, big data, storage and more, SearchAWS.com provides meaningful insight from award-winning editors, research analysts and industry experts on one of the fastest-growing cloud services providers, Amazon Web Services.

  • AWS certification

    AWS certification is a level of Amazon Web Services cloud expertise that an IT professional obtains after passing one or more exams the public cloud provider offers.

  • AWS Outposts

    AWS Outposts is an on-premises IT as a service (ITaaS) platform provided by Amazon Web Services (AWS).

  • Amazon EC2 (Elastic Compute Cloud)

    Amazon Elastic Compute Cloud (Amazon EC2) is a web-based service that allows businesses to run application programs in the Amazon Web Services (AWS) public cloud.

SearchCloudComputing

SearchCloudComputing.com is the Web's most comprehensive resource for cloud computing news, analysis and case studies.

  • container registry

    A container registry is a collection of repositories made to store container images

  • Google Cloud Composer

    Cloud Composer is a managed workflow automation tool that is built on Apache Airflow. Developers use Cloud Composer to author, schedule and monitor software development pipelines across clouds and on-premise data centers. 

  • public cloud

    A public cloud is a platform that uses the standard cloud computing model to make resources, such as virtual machines (VMs), applications or storage, available to users remotely.

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • cloud access security broker (CASB)

    A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

  • software-defined perimeter (SDP)

    Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • paravirtualization

    Paravirtualization (PV) is an enhancement of virtualization technology in which a guest operating system (guest OS) is modified prior to installation inside a virtual machine in order to allow all guest OS within the system to share resources and successfully collaborate, rather than attempt to emulate an entire hardware environment.

  • network virtualization

    Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between virtual machines (VMs).

  • service discovery

    Service discovery is the automatic detection of devices and offered services over a network that is used to minimize configuration efforts for administrators.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • GPU (graphics processing unit)

    A graphics processing unit (GPU) is a computer chip that performs rapid mathematical calculations, primarily for the purpose of rendering images.

  • Remote Desktop Connection Manager (RDCMan)

    Remote Desktop Connection Manager (RDCMan) is a tool for managing multiple remote desktop sessions. It creates a single location for IT administrators to organize, group and manage connections.

  • device as a service

    Device as a service is the offering of PCs, smart phones and other mobile compute devices as a paid service.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware DRS (Distributed Resource Scheduler)

    VMware DRS (Distributed Resource Scheduler) is a utility that balances computing workloads with available resources in a virtualized environment. The utility is part of a virtualization suite called VMware Infrastructure 3.

  • virtual machine replication

    Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.

  • Storage vMotion

    Storage vMotion is a component of VMware vSphere that allows the live migration of a running virtual machine's (VM) file system from one storage system to another, with no downtime for the VM or service disruption for end users.

Back to Top

Consumer Product Review

Brighthand

Brighthand.com offers SmartPhone, handheld computer, and cell phone reviews and news. Our active forum community is a great source of information on SmartPhones and related devices.

DigitalCameraReview

DigitalCameraReview.com offers digital camera reviews and news, a forum community, digital camera price comparisons, deals and coupons on digital cameras and accessories.

NotebookReview

NotebookReview.com offers the latest notebook and laptop reviews, as well as price comparisons, support forums and news."

TabletPCReview

TabletPCReview.com offers Tablet PC reviews and ratings, price comparisons, as well as support forums and news.

TechnologyGuide

TechnologyGuide.com is a family of product review and evaluation websites that are the leading source for information on the latest desktop and notebook computers, software and printers, wireless smartphones, digital cameras, and other devices for both the consumer and business markets.

Back to Top

Data Center Management

Search400

Search400.com is an online information resource for the latest news, tech tips and expert advice for the iSeries professional.

  • Quiz: iSeries (AS/400) History

    2003 marks the 15th anniversary of the AS/400 (now called the iSeries), so we thought we'd take a look back and see how it's changed over the years.

  • Quiz: iSeries (AS/400) Commands

    The iSeries (AS/400) is one of IBM's greatest success stories.

  • OS/400

    OS/400 is IBM's operating system for its AS/400 and AS/400e line of business computers. (Continued...)

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • network convergence

    Network convergence is the efficient coexistence of telephone, video and data communication within a single network.

  • single pane of glass

    A single pane of glass is a management console that presents data from multiple sources in a unified display. The glass, in this case, is a computer monitor or mobile device screen.

  • DataCore

    DataCore is a software-defined storage (SDS) company, as well as an early storage virtualization software vendor, in Fort Lauderdale, Fla.

SearchDataCenter

SearchDataCenter.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • blade server

    A blade server, sometimes referred to as a high-density server, is a compact device containing a computer used to manage and distribute data in a collection of computers and systems, called a network.

  • shell script

    A shell script is a text file that contains a sequence of commands for a UNIX-based operating system.

  • ambient temperature

    Ambient temperature is the air temperature of any object or environment where equipment is stored.

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is the leading source for tactical expert advice and best practices on desktop management and security. The site provides essential resources including the latest tips, tutorials, webcasts, white papers and more.

  • digital workspace

    A digital workspace is an integrated technology framework that centralizes the management of applications, data and endpoints and provides users with self-service, out-of-the-box experiences that scale across platforms, locations and device ownership models.

  • Network File System (NFS)

    The Network File System (NFS) is a client/server application that lets a computer user view and optionally store and update files on a remote computer as though they were on the user's own computer. The NFS protocol is one of several distributed file system standards for network-attached storage (NAS).

  • device driver

    A device driver is a software program that controls a particular type of hardware device that is attached to a computer.

SearchITOperations

As hybrid cloud deployments, containers, microservices and DevOps continue to become part of a data center's infrastructure, IT operations pros are facing a new set of responsibilities. Because they must be agile and able to manage next-gen apps in blended environments, the roles and responsibilities of development and operation teams are blending. 

  • configuration management (CM)

    Configuration management (CM) is a governance and systems engineering process for ensuring consistency in an operational environment.

  • Amazon Elastic Container Registry (Amazon ECR)

    Amazon Elastic Container Registry (Amazon ECR) is an AWS product that stores, manages and deploys Docker images, which are managed clusters of Elastic Compute Cloud (EC2) instances.

  • VMware PKS (VMware Pivotal Container Service)

    VMware PKS (VMware Pivotal Container Service) is a managed container service that allows users to simplify, operate and manage Kubernetes clusters in multi-cloud environments.

SearchWindowsServer

SearchWindowsServer.com is dedicated to serving the information needs of Windows server professionals. The site provides targeted news, expert advice, tips, tutorials, learning guides, webcasts, white papers and more.

  • Group Policy Object (GPO)

    Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.

  • Internet Information Services (IIS)

    Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files.

  • Microsoft Azure ExpressRoute

    Microsoft Azure ExpressRoute is a service that provides a private connection between an organization's on-premises infrastructure and Microsoft Azure data centers.

Back to Top

Database

SearchOracle

Visit SearchOracle.com for information and tips for the Oracle community. The site provides comprehensive coverage of all Oracle-specific news, trends and developments in the database industry.

  • NetSuite

    NetSuite is a business technology vendor based in San Mateo, California.

  • stored procedure

    A stored procedure is a group of statements with a specific name, which are stored inside a database, such as MySQL or Oracle.

  • object-oriented database management system (OODBMS)

    An object-oriented database management system (OODBMS), sometimes shortened to ODBMS for object database management system, is a database management system (DBMS) that supports the modelling and creation of data as objects.

Back to Top

Disaster Recovery / Compliance

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (MSP) will help an organization meet its regulatory compliance mandates.

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, procedures or technologies affect individuals’ privacy and eliminate any risks that might violate compliance.

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to control their own personally identifiable information (PII).

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • content management system (CMS)

    A content management system (CMS) is an application program for creating and managing digital content in a collaborative environment.

  • content automation

    Content automation is a digital marketing strategy that focuses on removing the need for human intervention in the content lifecycle.

  • Adobe Sign

    Adobe Sign is a cloud-based service that lets an individual or organization send, secure, track and manage e-signature processes.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • data protection

    Data protection is the process of safeguarding important information from corruption, compromise or loss.

  • Incremental Backup

    An incremental backup is a type of backup that only copies data that has been changed or created since the previous backup activity was conducted.

  • 3-2-1 Backup Strategy

    The 3-2-1 backup is a reliable recovery methodology for ensuring that data is protected adequately and backup copies of the data are available when needed.

SearchDisasterRecovery

Natural disasters, internal threats, user error and terrorist acts are realities that IT must take into consideration in their efforts to effectively protect their digital assets. Fortunately, SearchDisasterRecovery.com is the premier online resource for IT professionals responsible for disaster recovery planning.

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an organization’s procedures for business continuity (BC) and recovery.

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

Back to Top

Emerging Technologies

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • unique identifier (UID)

    A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.

  • IPv6 address

    An IPv6 address is a 128-bit alphanumeric string that identifies an endpoint device in the Internet Protocol Version 6 (IPv6) addressing scheme. The new IP address format was created to enable the trillions of new IP addresses required to connect not only an ever-greater number of computing devices but also the rapidly expanding numbers of items with embedded computers in them.

  • smart warehouse

    A smart warehouse is a large building in which raw materials and manufactured goods are stored that uses machines and computers to complete common warehouse operations previously performed by humans.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

Back to Top

Healthcare IT

SearchHealthIT

SearchHealthIT.com is the health care technology professional’s how-to guide to building and managing an electronic health care infrastructure.

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and administration to streamline day-to-day tasks within a medical practice and improve the efficiency of operations and quality of patient care.

  • Regional Health Information Organization (RHIO)

    A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.

  • remote patient monitoring (RPM)

    Remote patient monitoring (RPM) is a subcategory of homecare telehealth that allows patients to use mobile medical devices or technology to gather patient-generated health data (PGHD) and send it to healthcare professionals.

Back to Top

Networking

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • unique identifier (UID)

    A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.

  • IPv6 address

    An IPv6 address is a 128-bit alphanumeric string that identifies an endpoint device in the Internet Protocol Version 6 (IPv6) addressing scheme. The new IP address format was created to enable the trillions of new IP addresses required to connect not only an ever-greater number of computing devices but also the rapidly expanding numbers of items with embedded computers in them.

  • smart warehouse

    A smart warehouse is a large building in which raw materials and manufactured goods are stored that uses machines and computers to complete common warehouse operations previously performed by humans.

SearchEnterpriseWAN

SearchEnterpriseWAN.com is one of the largest and most active online communities dedicated to the enterprise wide area network.

SearchMobileComputing

SearchMobileComputing.com provides comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise.

  • Alpha TransForm (Alpha Software)

    Alpha TransForm is a mobile app development and deployment platform that allows developers and individuals to build and deploy mobile apps that can be integrated into enterprise workflows.

  • SIM card

    A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.

  • Apple Business Manager

    Apple Business Manager (ABM) is an online portal for IT administrators who deploy Mac OS, iOS and tvOS devices in an enterprise or educational setting.

SearchNetworking

SearchNetworking.com is one of the largest and most active online communities dedicated to the enterprise network.

  • URL (Uniform Resource Locator)

    A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address.

  • SD-WAN (software-defined WAN)

    Software-defined WAN (SD-WAN) is a technology to distribute network traffic across wide area networks (WAN) that uses software-defined networking (SDN) concepts to automatically determine the most effective way to route traffic to and from branch offices and data center sites.

  • IPv6 (Internet Protocol Version 6)

    IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

SearchTelecom

Whether you're an IT Pro looking for advice on building-out an infrastructure to support new customer demands or a product manager seeking new tech insights to boost ARPU, SearchTelecom.com is a critical online resource for IT and business professionals.

SearchUnifiedCommunications

SearchUnifiedCommunications.com provides a reliable source of how-to tips and best practices for implementing, managing and securing VoIP and advanced IP applications, enabling IT professionals to take advantage of the cost savings and new features and benefits associated with converged enterprise network.

  • video conferencing (video conference)

    A video conference is a live, visual connection between two or more people residing in separate locations for the purpose of communication.

  • gatekeeper

    A gatekeeper is a management tool for H.323 multimedia networks.

  • Session Initiation Protocol (SIP)

    Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.

Back to Top

Security

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • cloud access security broker (CASB)

    A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

  • software-defined perimeter (SDP)

    Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

SearchFinancialSecurity

IT professionals turn to SearchFinancialSecurity.com for the information they require to keep their corporate data and assets secure.

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Federal Deposit Insurance Corporation (FDIC)

    The Federal Deposit Insurance Corporation (FDIC) is an independent agency of the United States (U.S.) federal government that preserves public confidence in the banking system by insuring deposits... (Continued)

  • Governance, Risk and Compliance (GRC)

    Governance, risk and compliance (GRC) is a combined area of focus developed to cover an organization's strategy to handle any interdependencies between the three components.

SearchMidmarketSecurity

SearchMidmarketSecurity.com is the only security-specific information resource geared toward midsize companies that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, a selection of highly focused security e-newsletters and more - all at no cost.

  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response.

  • endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • clean desk policy (CDP)

    A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. Most CDPs require employees to clear their desks of all papers at the end of the day.

SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure.

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining active on infected systems.

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications.

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected; the certification is presented after completion of a comprehensive testing and application process.

Back to Top

Social Media

ITKnowledgeExchange

Find technology questions and answers in this community of information technology (IT) experts and professionals.

Back to Top

Storage

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • network convergence

    Network convergence is the efficient coexistence of telephone, video and data communication within a single network.

  • single pane of glass

    A single pane of glass is a management console that presents data from multiple sources in a unified display. The glass, in this case, is a computer monitor or mobile device screen.

  • DataCore

    DataCore is a software-defined storage (SDS) company, as well as an early storage virtualization software vendor, in Fort Lauderdale, Fla.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • data protection

    Data protection is the process of safeguarding important information from corruption, compromise or loss.

  • Incremental Backup

    An incremental backup is a type of backup that only copies data that has been changed or created since the previous backup activity was conducted.

  • 3-2-1 Backup Strategy

    The 3-2-1 backup is a reliable recovery methodology for ensuring that data is protected adequately and backup copies of the data are available when needed.

SearchStorage

The TechTarget Storage Media Group has built a community of the largest and most audience of storage decision-makers on the web.

  • VRAM (video RAM)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte or bit in computing and telecommunications.

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

Back to Top

Vendor Research

KnowledgeStorm

Browse the database of business technology software products and services.

Back to Top

Virtualization

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • paravirtualization

    Paravirtualization (PV) is an enhancement of virtualization technology in which a guest operating system (guest OS) is modified prior to installation inside a virtual machine in order to allow all guest OS within the system to share resources and successfully collaborate, rather than attempt to emulate an entire hardware environment.

  • network virtualization

    Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between virtual machines (VMs).

  • service discovery

    Service discovery is the automatic detection of devices and offered services over a network that is used to minimize configuration efforts for administrators.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • GPU (graphics processing unit)

    A graphics processing unit (GPU) is a computer chip that performs rapid mathematical calculations, primarily for the purpose of rendering images.

  • Remote Desktop Connection Manager (RDCMan)

    Remote Desktop Connection Manager (RDCMan) is a tool for managing multiple remote desktop sessions. It creates a single location for IT administrators to organize, group and manage connections.

  • device as a service

    Device as a service is the offering of PCs, smart phones and other mobile compute devices as a paid service.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware DRS (Distributed Resource Scheduler)

    VMware DRS (Distributed Resource Scheduler) is a utility that balances computing workloads with available resources in a virtualized environment. The utility is part of a virtualization suite called VMware Infrastructure 3.

  • virtual machine replication

    Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.

  • Storage vMotion

    Storage vMotion is a component of VMware vSphere that allows the live migration of a running virtual machine's (VM) file system from one storage system to another, with no downtime for the VM or service disruption for end users.

Back to Top

White Papers and Webcasts

BitPipe

A free library of IT white papers, webcasts and product information to help with your IT purchase decisions. Research the latest tools, technologies and techniques and compare offerings from thousands to technology companies.

Back to Top

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • VRAM (video RAM)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

Close