Browse Definitions:

Find Technology-Specific Sites

<p>TechTarget gives technology professionals and executives the information they need to perform their jobs – from developing strategy, to making cost-effective purchase decisions and managing their organizations' technology projects. Bookmark this page for easy access to the TechTarget network of technology-specific websites. &#160;</p>

Browse TechTarget Sites by Topic

Application Development

Ajaxian

Ajaxian is a resource for software developers who work with Ajax, PHP, ASP.net, jQuery, Javascript, NodeJS, noSQL, FP and Visualization.

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • Red Hat OpenShift

    Red Hat OpenShift is a multifaceted, open source container application platform from Red Hat Inc. for the development, deployment and management of applications.

  • cloud application

    A cloud application, or cloud app, is a software program where cloud-based and local components work together.

  • iPaaS (integration platform as a service)

    Integration platform as a service (iPaaS) is a set of automated tools for connecting software applications that are deployed in different environments. iPaaS is often used by large business-to-business (B2B) enterprises that need to integrate on-premises applications and data with cloud applications and data.

SearchMicroservices

SearchMicroservices.com provides readers with industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, business process management (BPM), application integration and APIs, software containers, microservices and DevOps.

  • JavaScript

    JavaScript is a programming language that started off simply as a mechanism to add logic and interactivity to an otherwise static Netscape browser.

  • microservices

    Microservices, or microservice architecture, is an approach to application development in which a large application is built as a suite of modular components or services.

  • service-oriented architecture (SOA)

    Service-oriented architecture (SOA) is a software development model for distributed application components that incorporates discovery, access control, data mapping and security features.

SearchSoftwareQuality

SearchSoftwareQuality.com is the online community for developers, architects and executives interested in building secure and quality software.

  • native app

    A native application is a software program that is developed for use on a particular platform or device.

  • black box (black box testing)

    Black box testing assesses a system solely from the outside, without the operator or tester knowing what is happening within the system to generate responses to test actions.

  • smoke testing

    Smoke testing, also called build verification testing or build acceptance testing, is nonexhaustive software analysis that ascertains that the most crucial functions of a program work but does not delve into finer details.

SearchWinDevelopment

SearchWinDevelopment.com is a unique online resource for developers, architects and development managers tasked with building and maintaining enterprise applications using Visual Basic, C# and the Microsoft .NET platform.

  • scripting language

    A scripting language is a form of programming language that is usually interpreted rather than compiled. Scripting languages are typically converted into machine code on the fly during runtime by a program called an interpreter.

  • Internet

    The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).

  • domain name

    A domain name locates an organization or other entity on the Internet. For example, the domain name "www.totalbaseball.com" locates an Internet address for "totalbaseball.com" at Internet point 199.0.0.2 and a particular host server named "www."

TheServerSide

TheServerSide.com is the world’s largest online community for enterprise Java architects and developers, providing daily news, tech talk interviews with key industry figures, design patterns, discussion forums, tutorials and more.

  • Java assert

    The Java assert is a mechanism used primarily in nonproduction environments to test for extraordinary conditions that will never be encountered unless a bug exists somewhere in the code.

  • Java Platform, Enterprise Edition (Java EE)

    The Java Platform, Enterprise Edition (Java EE) is a collection of Java APIs owned by Oracle that software developers can use to write server-side applications. It was formerly known as Java 2 Platform, Enterprise Edition, or J2EE.

  • JAR file (Java Archive)

    A Java Archive, or JAR file, contains all of the various components that make up a self-contained, executable Java application, deployable Java applet or, most commonly, a Java library to which any Java Runtime Environment can link.

Back to Top

Business Intelligence / Analytics

BeyeNETWORK

BeyeNETWORK.com is the primary site of the BeyeNETWORK, providing viewers with access to the thought leaders in business intelligence, performance management, business integration, information quality, data warehousing and more.

SearchBusinessAnalytics

SearchBusinessAnalytics.com is dedicated to serving the information needs of business and IT professionals.

  • decision-making process

    The decision-making process, in a business context, is a set of steps taken by managers in an enterprise to determine the planned path for business initiatives and to set specific actions in motion.

  • unstructured data

    Unstructured data is information, in many different forms, that doesn't hew to conventional data models and thus typically isn't a good fit for a mainstream relational database.

  • predictive analytics

    Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast activity, behavior and trends.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • e-signature

    An e-signature (electronic signature) is a digital version of a traditional pen and ink signature.

  • SharePoint farm

    A SharePoint farm is a collection of servers that work in concert to provide a set of basic SharePoint services to support a single site.

  • enterprise content management (ECM)

    Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.

SearchCRM

SearchCRM.com is a free resource dedicated to Customer Relationship Management (CRM) decision makers.

  • emotions analytics (EA)

    Emotions analytics (EA) software collects data on how a person communicates verbally and nonverbally to understand the person's mood or attitude.

  • Interactive Voice Response (IVR)

    Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipients.

  • customer experience management (CEM or CXM)

    Customer experience management (CEM or CXM) is the collection of processes a company uses to track, oversee and organize every interaction between a customer and the organization.

SearchDataManagement

SearchDataManagement.com is a guide for data management professionals and business leaders.

  • entity relationship diagram (ERD)

    An entity relationship diagram (ERD), also known as an entity relationship model, is a graphical representation of an information system that depicts the relationships among people, objects, places, concepts or events within that system.

  • master data management (MDM)

    Master data management (MDM) is a comprehensive method of enabling an enterprise to link all of its critical data to a common point of reference.

  • Apache Hadoop YARN

    Apache Hadoop YARN is the resource management and job scheduling technology in the open source Hadoop distributed processing framework.

SearchSQLServer

SearchSQLServer.com is dedicated to serving the information needs of database developers and administrators working with Microsoft's flagship database enterprise server, SQL Server.

  • U-SQL

    U-SQL is a Microsoft query language that combines a declarative SQL-like syntax with C# programming, enabling it to be used to process both structured and unstructured data in big data environments.

  • Microsoft Azure Cosmos DB

    Azure Cosmos DB is a Microsoft cloud database that supports multiple ways of storing and processing data. As such, it is classified as a multimodel database.

  • Microsoft SQL Server

    Microsoft SQL Server is a relational database management system, or RDBMS, that supports a wide variety of transaction processing, business intelligence and analytics applications in corporate IT environments

Back to Top

Business Software

SearchCloudApplications

SearchCloudApplications.com is dedicated to serving the information needs of organizations which have, or are planning to add, business applications in the cloud.

  • Red Hat OpenShift

    Red Hat OpenShift is a multifaceted, open source container application platform from Red Hat Inc. for the development, deployment and management of applications.

  • cloud application

    A cloud application, or cloud app, is a software program where cloud-based and local components work together.

  • iPaaS (integration platform as a service)

    Integration platform as a service (iPaaS) is a set of automated tools for connecting software applications that are deployed in different environments. iPaaS is often used by large business-to-business (B2B) enterprises that need to integrate on-premises applications and data with cloud applications and data.

SearchDomino

SearchDomino.com is a leading source for Lotus Notes and Domino-specific information for enterprise IT professionals.

  • knowledge management (KM)

    Knowledge management is a concept in which an enterprise consciously and comprehensively gathers, organizes, shares and analyzes its knowledge in terms of resources, documents, and people skills.

  • Instant Messaging: Glossary

    This glossary provides short definitions of terms related to instant messaging (IM) and other presence technologies.

  • iNotes (iNotes Web Access)

    iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.

SearchERP

SearchERP was built to help startups, small and mid-sized businesses, and large corporations better leverage ERP technologies and strategies to eliminate legacy platforms that cause data silos, improve business processes, boost profitability, improve financial reporting and gain more visibility.

  • cloud ERP

    Cloud ERP is a type of enterprise resource planning (ERP) software that is hosted on a cloud computing platform, rather than on premises within an enterprise's own data center.

  • sales and operations planning (S&OP)

    Sales and operations planning (S&OP) is a process for better matching a manufacturer's supply with demand by having the sales department collaborate with operations to create a single production plan.

  • transportation management system (TMS)

    A transportation management system (TMS) is a subset of supply chain management (SCM) that deals with the planning, execution and optimization of the physical movements of goods.

SearchExchange

SearchExchange.com is dedicated to serving the information needs of administrators and managers of Microsoft Exchange and Outlook messaging applications.

SearchHRSoftware

Find unbiased news, analysis, resources and the latest strategies to better manage HR and HCM functions at your organization.

  • payroll software

    Payroll software automates the process of paying salaried, hourly and contingent employees.

  • talent activation

    Talent activation is a human resources strategy for improving team leadership and workgroup collaboration that involves using surveys and questionnaires to solicit employee feedback on a regular basis. The goal of continuous feedback is to help the organization improve communication, create a climate of trust, encourage cooperation within and between workgroups and help front-line managers become better team leaders.

  • manager self-service

    Manager self-service is self-service platform that enables managers to get immediate access to employee information and initiate employment-related actions.

SearchSalesforce

SearchSalesforce.com is a resource for Salesforce news, expert advice, technical tips and career guidance as well as a forum for community interaction. The site focuses on the Salesforce customer relationship management (CRM) platform as well as its ecosystem of partners.

  • Salesforce Solution Architect

    A Salesforce Solution Architect is someone who has been certified for demonstrating the capabilities to build and design solutions across Salesforce platforms.

  • customer journey map

    A customer journey map is a diagram or several diagrams that depict the stages customers go through when interacting with a company, from buying products online to accessing customer service on the phone to airing grievances on social media.

  • Salesforce DX

    Salesforce DX is a Salesforce product in the App cloud that allows users to develop and manage Salesforce apps throughout the entire platform in a more direct and efficient way.

SearchSAP

SearchSAP.com is the SAP community's resource for news, expert advice, technical tips and career guidance.

  • SAP FICO (SAP Finance and SAP Controlling)

    SAP FICO is a core functional component in SAP ERP Central Component that allows an organization to manage all of its financial data.

  • SAP ERP Central Component (SAP ECC)

    SAP ERP Central Component (SAP ECC) is the umbrella term for SAP's functional and technical software components that compose its ERP system.

  • SAP S/4HANA HCM

    SAP S/4HANA HCM is the unofficial name of a product SAP will release in 2023 as a bridge to give SAP ERP HCM users more time to migrate to SAP's cloud HCM platform, SuccessFactors.

Back to Top

CIO Strategies

ComputerWeekly

ComputerWeekly.com is the leading provider of news, analysis, opinion, information and services for the UK IT community. The site serves as an advocate for UK IT professionals and the role of technology in improving organisations in all sectors of business and public life.

ebizQ

ebizQ is the insider’s guide to next-generation business process management. The site offers a growing collection of independent editorial articles on BPM trends, issues, challenges and solutions, all targeted to business and IT BPM professionals.

SearchCIO

SearchCIO.com provides technology management strategies designed exclusively for the enterprise CIO. Our award-winning team of editors and industry luminaries offer strategic advice and technology best practices to help streamline global IT operations.

  • enterprise risk management (ERM)

    Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimize the effects of risk on an organization's capital and earnings.

  • entrepreneur (entrepreneurship)

    An entrepreneur is an individual who identifies a need in the marketplace and works to fulfill it.

  • change agent (agent of change)

    A change agent, or agent of change, is someone who promotes and enables change to happen within any group or organization.

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies or assets between parties under certain conditions.

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A risk map helps companies identify and prioritize the risks associated with their business.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine how well it conforms to a set of specific criteria.

Back to Top

Channel Resources

MicroScope

Stay ahead with IT Business management and technology news and articles on UK laws, regulations, credit and finance, selling, sales management, marketing and supplier relationships.

SearchITChannel

If you're a value-added reseller (VAR), information technology reseller or a systems integrator, all of your research needs are met at SearchITChannel.com.

  • managed IT service

    A managed IT service is an information technology (IT) task provided by a third-party contractor and delivered to a customer.

  • Managed security service provider (MSSP)

    A managed security service provider (MSSP) is an IT service provider that provides an organization with some amount of cybersecurity monitoring and management, which may include virus and spam blocking, intrusion detection, firewalls and virtual private network (VPN) management.

  • Request for Proposal (RFP)

    A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.

Back to Top

Cloud

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchAWS

From cloud infrastructure to applications, development, security, big data, storage and more, SearchAWS.com provides meaningful insight from award-winning editors, research analysts and industry experts on one of the fastest-growing cloud services providers, Amazon Web Services.

  • AWS Network Load Balancer (NLB)

    Network Load Balancer is an Amazon Web Services (AWS) tool that distributes end user traffic across multiple cloud resources to ensure low latency and high throughput for applications.

  • Amazon Connect

    Amazon Connect is a customer contact center service provided by and hosted in the Amazon Web Services (AWS) public cloud.

  • AWS Cost Management

    AWS Cost Management is a collection of tools that provide insight into Amazon Web Services (AWS) public cloud cost and usage.

SearchCloudComputing

SearchCloudComputing.com is the Web's most comprehensive resource for cloud computing news, analysis and case studies.

  • Azure Cost Management by Cloudyn

    Azure Cost Management by Cloudyn is a software as a service (SaaS) cost management and monitoring tool for multi-cloud environments.

  • Azure Reserved Virtual Machine Instances

    Azure Reserved Virtual Machine Instances (RIs) are a type of virtual machine (VM) on the Azure public cloud that a development or IT team can reserve to use in advance.

  • Google Preemptible VM

    A Preemptible VM (PVM) is a Google Compute Engine (GCE) virtual machine (VM) instance that can be purchased for a steep discount as long as the customer accepts that the instance will terminate after 24 hours. The customer must also agree that Google can shut down the PVM should additional capacity be required to run other workloads.

SearchCloudProvider

At SearchCloudProvider.com you'll find news and resources on building cloud services with robust data center, network, storage and security elements; enabling service delivery and management; delivering specific cloud applications; and evaluating and selecting cloud technology, solutions and platforms.

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • Google Cloud Key Management Service (KMS)

    Google Cloud Key Management Service (KMS) is a cloud service for managing encryption keys for other Google cloud services that enterprises can use to implement cryptographic functions.

  • AWS CloudTrail

    AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS).

  • cloud access security broker (CASB)

    Cloud access security brokers (CASBs) are tools or services that enforce an organization's security policies in a public cloud environment.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • service virtualization

    Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.

  • Red Hat Virtualization (RHV)

    Red Hat Virtualization (RHV) is an enterprise-class virtualization platform produced by Red Hat.

  • Citrix XenServer

    Citrix XenServer is an open source server virtualization platform based on the Xen hypervisor.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • user environment management (UEM)

    User environment management is a technology designed to allow IT to oversee a user's complete desktop experience, including the profile, any policies IT applies and customizations the user makes.

  • VMware vRealize Operations for Horizon

    VMware vRealize Operations for Horizon is a monitoring tool that tracks the health and performance of Horizon, Citrix XenDesktop and XenApp, and Remote Desktop Session Host deployments.

  • Real Time Streaming Protocol (RTSP)

    Real Time Streaming Protocol (RTSP) is an application-level network communication system that transfers real-time data from multimedia to an endpoint device by communicating directly with the server streaming the data.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware vSphere Client

    The VMware vSphere Client is a web-based application that connects to the vCenter Server so IT administrators can manage installations and handle inventory objects in a vSphere deployment.

  • VMware vCenter Server (formerly VMware VirtualCenter)

    VMware vCenter Server is the centralized monitoring and resource management software for VMware vSphere virtual infrastructure.

  • VMware NSX

    VMware NSX is a virtual networking and security software product family created from VMware's vCloud Networking and Security (vCNS) and Nicira's Network Virtualization Platform (NVP) intellectual property.

Back to Top

Consumer Product Review

Brighthand

Brighthand.com offers SmartPhone, handheld computer, and cell phone reviews and news. Our active forum community is a great source of information on SmartPhones and related devices.

DigitalCameraReview

DigitalCameraReview.com offers digital camera reviews and news, a forum community, digital camera price comparisons, deals and coupons on digital cameras and accessories.

NotebookReview

NotebookReview.com offers the latest notebook and laptop reviews, as well as price comparisons, support forums and news."

TabletPCReview

TabletPCReview.com offers Tablet PC reviews and ratings, price comparisons, as well as support forums and news.

TechnologyGuide

TechnologyGuide.com is a family of product review and evaluation websites that are the leading source for information on the latest desktop and notebook computers, software and printers, wireless smartphones, digital cameras, and other devices for both the consumer and business markets.

Back to Top

Data Center Management

Search400

Search400.com is an online information resource for the latest news, tech tips and expert advice for the iSeries professional.

  • Quiz: iSeries (AS/400) History

    2003 marks the 15th anniversary of the AS/400 (now called the iSeries), so we thought we'd take a look back and see how it's changed over the years.

  • Quiz: iSeries (AS/400) Commands

    The iSeries (AS/400) is one of IBM's greatest success stories.

  • OS/400

    OS/400 is IBM's operating system for its AS/400 and AS/400e line of business computers. (Continued...)

SearchCloudProvider

At SearchCloudProvider.com you'll find news and resources on building cloud services with robust data center, network, storage and security elements; enabling service delivery and management; delivering specific cloud applications; and evaluating and selecting cloud technology, solutions and platforms.

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • FlexPod

    FlexPod is a reference architecture for server, storage and networking components that are pre-tested and validated to work together as an integrated infrastructure stack.

  • Hitachi Vantara (formerly Hitachi Data Systems or HDS)

    Hitachi Vantara is a data storage systems provider, previously known as Hitachi Data Systems (HDS).

  • Nutanix

    Nutanix is a hyper-converged infrastructure pioneer that markets its technology as a building block for private clouds.

SearchDataCenter

SearchDataCenter.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • ISO (International Organization for Standardization)

    ISO (International Organization for Standardization) is a worldwide federation of national standards bodies.

  • SUSE Linux Enterprise Server (SLES)

    SUSE Linux Enterprise Server (SLES) is a Linux-based server operating system created and maintained by the German-based organization, SUSE.

  • Unix

    Unix -- often spelled UNIX, especially as an official trademark -- is a multi-user operating system designed for flexibility and adaptability.

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is the leading source for tactical expert advice and best practices on desktop management and security. The site provides essential resources including the latest tips, tutorials, webcasts, white papers and more.

  • Microsoft Assessment and Planning (MAP) Toolkit

    Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether or not its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.

  • Microsoft Windows System Image Manager (SIM)

    Microsoft Windows System Image Manager (SIM) is a tool in the Windows Assessment and Deployment Kit IT professionals can use to create and manage unattended setup answer files for Windows before installing the operating system.

  • Windows as a service

    Windows as a service is the approach Microsoft introduced with Windows 10 to deploy, update and service the operating system.

SearchITOperations

As hybrid cloud deployments, containers, microservices and DevOps continue to become part of a data center's infrastructure, IT operations pros are facing a new set of responsibilities. Because they must be agile and able to manage next-gen apps in blended environments, the roles and responsibilities of development and operation teams are blending. 

  • AIOps (artificial intelligence for IT operations)

    Artificial intelligence for IT operations (AIOps) is an umbrella term for the use of big data analytics, machine learning (ML) and other artificial intelligence (AI) technologies to automate the identification and resolution of common information technology (IT) issues.

  • continuous deployment

    Continuous deployment is a strategy for software releases wherein any code commit that passes the automated testing phase is automatically released into the production environment, making changes that are visible to the software's users.

  • container image

    A container image is an unchangeable, static file that includes executable code so it can run an isolated process on information technology (IT) infrastructure.

SearchWindowsServer

SearchWindowsServer.com is dedicated to serving the information needs of Windows server professionals. The site provides targeted news, expert advice, tips, tutorials, learning guides, webcasts, white papers and more.

Back to Top

Database

SearchOracle

Visit SearchOracle.com for information and tips for the Oracle community. The site provides comprehensive coverage of all Oracle-specific news, trends and developments in the database industry.

  • Oracle Autonomous Database

    Oracle Autonomous Database is a cloud-based technology designed to automate many of the routine tasks required to manage Oracle databases, which Oracle says can free up database administrators (DBAs) to do higher-level and more strategic work.

  • Open Database Connectivity (ODBC)

    Open Database Connectivity (ODBC) is an open standard application programming interface (API) for accessing a database.

  • Oracle

    Oracle is one of the largest vendors in the enterprise IT market and the shorthand name of its flagship product, a relational database management system (RDBMS) that's formally called Oracle Database.

Back to Top

Disaster Recovery / Compliance

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies or assets between parties under certain conditions.

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A risk map helps companies identify and prioritize the risks associated with their business.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine how well it conforms to a set of specific criteria.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • e-signature

    An e-signature (electronic signature) is a digital version of a traditional pen and ink signature.

  • SharePoint farm

    A SharePoint farm is a collection of servers that work in concert to provide a set of basic SharePoint services to support a single site.

  • enterprise content management (ECM)

    Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • cloud-to-cloud backup (C2C backup)

    Cloud-to-cloud backup, or C2C backup, is the practice of copying data stored on one cloud backup service -- commonly referred to as software as a service (SaaS) -- to another cloud.

  • Veritas NetBackup (Symantec NetBackup)

    Veritas NetBackup -- known as Symantec NetBackup from 2005 to 2016 -- is a backup and recovery software suite designed for enterprise users.

  • inline deduplication

    Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.

SearchDisasterRecovery

Natural disasters, internal threats, user error and terrorist acts are realities that IT must take into consideration in their efforts to effectively protect their digital assets. Fortunately, SearchDisasterRecovery.com is the premier online resource for IT professionals responsible for disaster recovery planning.

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical situation that would negatively affect its profitability, reputation or ability to operate.

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for unforeseen risks to continued operations.

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.

Back to Top

Emerging Technologies

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • IoT devices (internet of things devices)

    IoT devices, or any of the many things in the internet of things, are nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data.

  • MQTT (MQ Telemetry Transport)

    MQTT (MQ Telemetry Transport) is a lightweight messaging protocol that provides resource-constrained network clients with a simple way to distribute telemetry information.

  • robotic process automation

    Robotic process automation (RPA) is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required humans to perform.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

  • network orchestration

    Network orchestration is a policy-driven approach to network automation that coordinates the hardware and software components a software application or service requires to run.

  • Virtual network functions (VNF)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is an initiative to virtualize network services traditionally run on proprietary, dedicated hardware.

Back to Top

Healthcare IT

SearchHealthIT

SearchHealthIT.com is the health care technology professional’s how-to guide to building and managing an electronic health care infrastructure.

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to physicians as software as a service (SaaS).

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device innovation, mental health research and care, opioid addiction treatment and prevention, and health information technology.

Back to Top

Networking

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • IoT devices (internet of things devices)

    IoT devices, or any of the many things in the internet of things, are nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data.

  • MQTT (MQ Telemetry Transport)

    MQTT (MQ Telemetry Transport) is a lightweight messaging protocol that provides resource-constrained network clients with a simple way to distribute telemetry information.

  • robotic process automation

    Robotic process automation (RPA) is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required humans to perform.

SearchEnterpriseWAN

SearchEnterpriseWAN.com is one of the largest and most active online communities dedicated to the enterprise wide area network.

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).

  • ISDN (Integrated Services Digital Network)

    ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.

  • File Transfer Protocol (FTP)

    File Transfer Protocol (FTP) is a client-server standard used to transfer files between computers over the Internet using control and data channels.

SearchMobileComputing

SearchMobileComputing.com provides comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise.

  • Siri

    Siri is Apple's personal assistant for iOS, macOS, tvOS and watchOS devices that uses voice recognition and is powered by artificial intelligence (AI).

  • Google Drive

    Google Drive is a free cloud-based storage service that enables users to store and access files online.

  • mobile enterprise application platform (MEAP)

    A mobile enterprise application platform (MEAP) is a development environment that provides tools and middleware to develop, test, deploy and manage corporate software running on mobile devices.

SearchNetworking

SearchNetworking.com is one of the largest and most active online communities dedicated to the enterprise network.

  • Session layer

    In the Open Systems Interconnection (OSI) communications model, the session layer resides at Layer 5 and manages the setup and teardown of the association between two communicating endpoints.

  • OSI model (Open Systems Interconnection)

    OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.

  • presentation layer

    Residing at Layer 6 of the Open Systems Interconnection (OSI) communications model, the presentation layer ensures that the communications that pass through it are in the appropriate form for the recipient application.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

  • network orchestration

    Network orchestration is a policy-driven approach to network automation that coordinates the hardware and software components a software application or service requires to run.

  • Virtual network functions (VNF)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is an initiative to virtualize network services traditionally run on proprietary, dedicated hardware.

SearchTelecom

Whether you're an IT Pro looking for advice on building-out an infrastructure to support new customer demands or a product manager seeking new tech insights to boost ARPU, SearchTelecom.com is a critical online resource for IT and business professionals.

  • over-the-top (OTT)

    Over-the-top (OTT) is networking lingo that describes the delivery of content, services or applications over the internet. OTT edge providers typically deliver their content and services to customers on top of network infrastructure that is owned and maintained by internet service providers (ISPs), like Verizon and AT&T.

  • fiber optics (optical fiber)

    Fiber optics, or optical fiber, refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic strand or fiber.

  • IPTV (Internet Protocol television)

    IPTV (Internet Protocol television) is a service that provides television programming and other video content using the TCP/IP protocol suite as opposed to traditional cable or satellite signals.

SearchUnifiedCommunications

SearchUnifiedCommunications.com provides a reliable source of how-to tips and best practices for implementing, managing and securing VoIP and advanced IP applications, enabling IT professionals to take advantage of the cost savings and new features and benefits associated with converged enterprise network.

  • VoIP phone

    A VoIP phone is a hardware- or software-based telephone designed to use voice over IP (VoIP) technology to send and receive phone calls over an IP network.

  • VoIP (voice over IP)

    VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks. VoIP historically referred to using IP to connect private branch exchanges (PBXs), but the term is now used interchangeable with IP telephony.

  • instant messaging (IM)

    Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.

Back to Top

Security

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • Google Cloud Key Management Service (KMS)

    Google Cloud Key Management Service (KMS) is a cloud service for managing encryption keys for other Google cloud services that enterprises can use to implement cryptographic functions.

  • AWS CloudTrail

    AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS).

  • cloud access security broker (CASB)

    Cloud access security brokers (CASBs) are tools or services that enforce an organization's security policies in a public cloud environment.

SearchFinancialSecurity

IT professionals turn to SearchFinancialSecurity.com for the information they require to keep their corporate data and assets secure.

  • Dodd-Frank Act

    The Dodd-Frank Act (fully known as the Dodd-Frank Wall Street Reform and Consumer Protection Act) is a United States federal law that places regulation of the financial industry in the hands of the government.

  • Shared Assessments Program

    Shared Assessments is a third party risk membership program that provides organizations with a way to obtain a detailed report about a service provider's controls (people, process and procedures) and a procedure for verifying that the information in the report is accurate.

  • Common Vulnerabilities and Exposures (CVE)

    Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.

SearchMidmarketSecurity

SearchMidmarketSecurity.com is the only security-specific information resource geared toward midsize companies that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, a selection of highly focused security e-newsletters and more - all at no cost.

  • vulnerability assessment (vulnerability analysis)

    A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization doing the assessment with the necessary knowledge, awareness and risk background to understand the threats to its environment and react appropriately.

  • endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication.

SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure.

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the Department of Defense.

Back to Top

Social Media

ITKnowledgeExchange

Find technology questions and answers in this community of information technology (IT) experts and professionals.

Back to Top

Storage

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • FlexPod

    FlexPod is a reference architecture for server, storage and networking components that are pre-tested and validated to work together as an integrated infrastructure stack.

  • Hitachi Vantara (formerly Hitachi Data Systems or HDS)

    Hitachi Vantara is a data storage systems provider, previously known as Hitachi Data Systems (HDS).

  • Nutanix

    Nutanix is a hyper-converged infrastructure pioneer that markets its technology as a building block for private clouds.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • cloud-to-cloud backup (C2C backup)

    Cloud-to-cloud backup, or C2C backup, is the practice of copying data stored on one cloud backup service -- commonly referred to as software as a service (SaaS) -- to another cloud.

  • Veritas NetBackup (Symantec NetBackup)

    Veritas NetBackup -- known as Symantec NetBackup from 2005 to 2016 -- is a backup and recovery software suite designed for enterprise users.

  • inline deduplication

    Inline deduplication is the removal of redundancies from data before or as it is being written to a backup device.

SearchStorage

The TechTarget Storage Media Group has built a community of the largest and most audience of storage decision-makers on the web.

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical charge in a memory device that is used to store data.

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically damaged or corrupted.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

Back to Top

Vendor Research

KnowledgeStorm

Browse the database of business technology software products and services.

Back to Top

Virtualization

BrianMadden

Brian Madden's blog receives millions of visitors per year and is a leading source for conversation, debate, and discourse about the application and desktop virtualization industry. Brian has written several books and over 2,000 articles about desktop and application virtualization.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • service virtualization

    Service virtualization is the process of creating replicas of systems that new applications depend on to test how well the application and systems integrate.

  • Red Hat Virtualization (RHV)

    Red Hat Virtualization (RHV) is an enterprise-class virtualization platform produced by Red Hat.

  • Citrix XenServer

    Citrix XenServer is an open source server virtualization platform based on the Xen hypervisor.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • user environment management (UEM)

    User environment management is a technology designed to allow IT to oversee a user's complete desktop experience, including the profile, any policies IT applies and customizations the user makes.

  • VMware vRealize Operations for Horizon

    VMware vRealize Operations for Horizon is a monitoring tool that tracks the health and performance of Horizon, Citrix XenDesktop and XenApp, and Remote Desktop Session Host deployments.

  • Real Time Streaming Protocol (RTSP)

    Real Time Streaming Protocol (RTSP) is an application-level network communication system that transfers real-time data from multimedia to an endpoint device by communicating directly with the server streaming the data.

SearchVirtualStorage

SearchVirtualStorage.com provides a comprehensive one-stop-shop for all things related to storage and virtualization.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware vSphere Client

    The VMware vSphere Client is a web-based application that connects to the vCenter Server so IT administrators can manage installations and handle inventory objects in a vSphere deployment.

  • VMware vCenter Server (formerly VMware VirtualCenter)

    VMware vCenter Server is the centralized monitoring and resource management software for VMware vSphere virtual infrastructure.

  • VMware NSX

    VMware NSX is a virtual networking and security software product family created from VMware's vCloud Networking and Security (vCNS) and Nicira's Network Virtualization Platform (NVP) intellectual property.

Back to Top

White Papers and Webcasts

BitPipe

A free library of IT white papers, webcasts and product information to help with your IT purchase decisions. Research the latest tools, technologies and techniques and compare offerings from thousands to technology companies.

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • Metamorphic virus

    A metamorphic virus is a type of malware that is capable of changing its code and signature patterns with each iteration.

  • vulnerability assessment (vulnerability analysis)

    A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • storage medium (storage media)

    In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve ...

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close