Browse Definitions :

Find Technology-Specific Sites

TechTarget gives technology professionals and executives the information they need to perform their jobs – from developing strategy, to making cost-effective purchase decisions and managing their organizations' technology projects. Bookmark this page for easy access to the TechTarget network of technology-specific websites.

Browse TechTarget Sites by Topic

Application Development

SearchAppArchitecture

Over 4 million programmers, architects, IT managers, and developers turn to our site for industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, Business Process Management (BPM), application integration and APIs, software containers and microservices design and development, DevOps, and more.

  • RESTful API (REST API)

    A RESTful API is an architectural style for an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data.

  • API economy

    The API economy refers to the set of business models and practices designed around the use of APIs in today's digital economy.

  • API endpoint

    An API endpoint is a point at which an application program interface (API) -- the code that allows two software programs to communicate with each other -- connects with the software program.

SearchSoftwareQuality

SearchSoftwareQuality.com is the online community for developers, architects and executives interested in building secure and quality software.

  • static testing

    Static testing is a software testing method that involves the examination of a program, along with any associated documents, but does not require the program to be executed.

  • native app

    A native application is a software program that is developed for use on a particular platform or device.

  • user story

    A user story is a tool used in Agile development to capture a description of a software feature from an end-user perspective.

TheServerSide

TheServerSide.com is the world’s largest online community for enterprise Java architects and developers, providing daily news, tech talk interviews with key industry figures, design patterns, discussion forums, tutorials and more.

  • git stash

    Git stash is a built-in command with the distributed version control tool in Git that locally stores all the most recent changes in a workspace and resets the state of the workspace to the prior commit state.

  • GraalVM

    GraalVM is a tool for developers to write and execute Java code.

  • HTML (Hypertext Markup Language)

    HTML (Hypertext Markup Language) is a text-based approach to describing how content contained within an HTML file is structured.

Back to Top

Business Intelligence / Analytics

SearchBusinessAnalytics

SearchBusinessAnalytics.com is dedicated to serving the information needs of business and IT professionals.

  • predictive analytics

    Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast activity, behavior and trends.

  • text mining (text analytics)

    Text mining is the process of exploring and analyzing large amounts of unstructured text data aided by software that can identify concepts, patterns, topics, keywords and other attributes in the data.

  • business intelligence (BI)

    Business intelligence (BI) is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • Microsoft MyAnalytics

    Microsoft MyAnalytics, formerly Delve Analytics, is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.

  • content sprawl

    Content sprawl is a condition of an organization’'s content assets in which proliferation and unmanaged growth have led to an unwieldy mass that is difficult to manage.

  • enterprise content management (ECM)

    Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.

SearchCRM

SearchCRM.com is a free resource dedicated to Customer Relationship Management (CRM) decision makers.

SearchCustomerExperience

SearchCustomerExperience keeps our readers up-to-speed on emerging trends in customer data analytics, customer self-service, omnichannel customer service, artificial intelligence (AI), contact center technology, marketing software, sales technology, digital experience management, sales force automation and web content management.

  • CRM (customer relationship management)

    Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle.

  • speech recognition

    Speech recognition, or speech-to-text, is the ability for a machine or program to identify words spoken aloud and convert them into readable text.

  • contact center as a service (CCaS)

    Contact center as a service (CCaaS) is a framework for contact center infrastructure management that combines the principles of contact center hosting and cloud-based contact center infrastructure.

SearchDataManagement

SearchDataManagement.com is a guide for data management professionals and business leaders.

  • OLAP (online analytical processing)

    OLAP (online analytical processing) is a computing method that enables users to easily and selectively extract and query data in order to analyze it from different points of view.

  • data analytics (DA)

    Data analytics (DA) is the process of examining data sets in order to find trends and draw conclusions about the information they contain.

  • Apache Hadoop YARN

    Apache Hadoop YARN is the resource management and job scheduling technology in the open source Hadoop distributed processing framework.

SearchSQLServer

SearchSQLServer.com is dedicated to serving the information needs of database developers and administrators working with Microsoft's flagship database enterprise server, SQL Server.

  • data mining

    Data mining is the process of sorting through large data sets to identify patterns and establish relationships to solve problems through data analysis.

  • data preprocessing

    Data preprocessing describes any type of processing performed on raw data to prepare it for another processing procedure.

  • data aggregation

    Data aggregation is any process whereby data is gathered and expressed in a summary form.

Back to Top

Business Software

SearchERP

SearchERP was built to help startups, small and mid-sized businesses, and large corporations better leverage ERP technologies and strategies to eliminate legacy platforms that cause data silos, improve business processes, boost profitability, improve financial reporting and gain more visibility.

  • lean water spider

    Lean water spider is a term used in manufacturing that refers to a position in a production environment or warehouse that ensures materials are supplied where and when they are needed.

  • RFI (request for information)

    An RFI (request for information) is a formal process for gathering information from potential suppliers of a good or service.

  • Kaizen (continuous improvement)

    Kaizen is an approach to creating continuous improvement based on the idea that small, ongoing positive changes can reap significant improvements.

SearchHRSoftware

Find unbiased news, analysis, resources and the latest strategies to better manage HR and HCM functions at your organization.

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related functions, such as applying for reimbursement, updating personal information and accessing company benefits information -- which was once largely paper-based, or otherwise would have been maintained by management or administrative staff.

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee feedback and other unstructured data to quantify and describe how employees feel about their organization.

  • people analytics (HR analytics)

    People analytics, also known as HR analytics and talent analytics, is the use of data analysis on candidate and employee issues to understand their impact on business goals and evaluate the effectiveness of human resources initiatives.

SearchSalesforce

SearchSalesforce.com is a resource for Salesforce news, expert advice, technical tips and career guidance as well as a forum for community interaction. The site focuses on the Salesforce customer relationship management (CRM) platform as well as its ecosystem of partners.

SearchSAP

SearchSAP.com is the SAP community's resource for news, expert advice, technical tips and career guidance.

  • SAP MII (SAP Manufacturing Integration and Intelligence)

    SAP MII (SAP Manufacturing Integration and Intelligence) is an SAP application for synchronizing manufacturing operations with back-office business processes and standardized data.

  • SAP

    SAP SE is a multinational software corporation that is currently the market leader in the enterprise resource planning (ERP) field.

  • SAP Leonardo

    SAP Leonardo is an umbrella brand for SAP’s collection of software and services that organizations can use to develop digital transformation projects.

Back to Top

CIO Strategies

ComputerWeekly

ComputerWeekly.com is the leading provider of news, analysis, opinion, information and services for the UK IT community. The site serves as an advocate for UK IT professionals and the role of technology in improving organisations in all sectors of business and public life.

ebizQ

ebizQ is the insider’s guide to next-generation business process management. The site offers a growing collection of independent editorial articles on BPM trends, issues, challenges and solutions, all targeted to business and IT BPM professionals.

SearchCIO

SearchCIO.com provides technology management strategies designed exclusively for the enterprise CIO. Our award-winning team of editors and industry luminaries offer strategic advice and technology best practices to help streamline global IT operations.

  • business process management (BPM)

    Business process management (BPM) is the discipline of improving a business process from end to end by analyzing it, modelling how it works in different scenarios, executing improvements, monitoring the improved process and continually optimizing it.

  • Agile Project Management

    Agile Project Management (APM) is an iterative approach to planning and guiding project processes, that breaks it down into smaller cycles called "sprints."

  • systems thinking

    Systems thinking is a holistic approach to analysis that focuses on the way that a system's constituent parts interrelate and how systems work over time and within the context of larger systems.

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

Back to Top

Channel Resources

MicroScope

Stay ahead with IT Business management and technology news and articles on UK laws, regulations, credit and finance, selling, sales management, marketing and supplier relationships.

SearchITChannel

If you're a value-added reseller (VAR), information technology reseller or a systems integrator, all of your research needs are met at SearchITChannel.com.

  • request for proposal (RFP)

    A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.

  • TIN (Taxpayer Identification Number)

    A Taxpayer Identification Number (TIN), in the United States, is a unique nine-digit number for identifying an individual, business or other entity in tax returns and additional documents filed with the Internal Revenue Service (IRS).

  • Defense Contract Management Agency (DCMA)

    The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.

Back to Top

Cloud

SearchAWS

From cloud infrastructure to applications, development, security, big data, storage and more, SearchAWS.com provides meaningful insight from award-winning editors, research analysts and industry experts on one of the fastest-growing cloud services providers, Amazon Web Services.

  • Amazon S3

    Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service.

  • Amazon Web Services (AWS)

    AWS (Amazon Web Services) is a comprehensive, evolving cloud computing platform provided by Amazon that includes a mixture of infrastructure as a service (IaaS), platform as a service (PaaS) and packaged software as a service (SaaS) offerings.

  • Amazon VPC traffic mirroring

    Traffic mirroring is a feature for Amazon Virtual Private Cloud (Amazon VPC). The feature is used to monitor the network-level traffic of workloads.

SearchCloudComputing

SearchCloudComputing.com is the Web's most comprehensive resource for cloud computing news, analysis and case studies.

  • What is public cloud? Everything you need to know

    A public cloud is a platform that uses the standard cloud computing model to make resources -- such as virtual machines (VMs), applications or storage -- available to users remotely.

  • testing as a service (TaaS)

    Testing as a service (TaaS) is an outsourcing model in which testing activities associated with some of an organization's business activities are performed by a service provider rather than in-house employees.

  • Platform as a Service (PaaS)

    Platform as a service (PaaS) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • cloud access security broker (CASB)

    A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

  • software-defined perimeter (SDP)

    Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • server hardware degradation

    Server hardware degradation is the gradual breakdown of the physical parts of a server.

  • hypervisor

    A hypervisor is a function that abstracts -- isolates -- operating systems (OSes) and applications from the underlying computer hardware.

  • server virtualization

    Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • zero client

    Zero client, also known as ultrathin client, is a server-based computing model in which the end user's computing device has no local storage.

  • desktop as a service (DaaS)

    Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.

  • Remote Desktop Session Host (RDSH)

    Remote Desktop Session Host (RDSH) is a role in Remote Desktop Services (RDS).

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware

    VMware is a virtualization and cloud computing software provider based in Palo Alto, Calif.

  • VMware DRS (Distributed Resource Scheduler)

    VMware DRS (Distributed Resource Scheduler) is a utility that balances computing workloads with available resources in a virtualized environment. The utility is part of a virtualization suite called VMware Infrastructure 3.

  • virtual machine replication

    Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.

Back to Top

Data Center Management

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • hyper-converged infrastructure

    Hyper-converged infrastructure is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

  • hyper-converged appliance

    A hyper-converged appliance is a hardware device that provides multiple data center management technologies within a single box.

  • hyper-converged storage

    Hyper-converged storage is a software-defined approach to storage management that combines storage, compute, virtualization and sometimes networking technologies in one physical unit that is managed as a single system.

SearchDataCenter

SearchDataCenter.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • edge computing

    Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible.

  • screen scraping

    Screen scraping is the act of copying information that shows on a digital display so it can be used for another purpose.

  • data center

    A data center (or datacenter) is a facility composed of networked computers and storage that businesses and other organizations use to organize, process, store and disseminate large amounts of data.

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is the leading source for tactical expert advice and best practices on desktop management and security. The site provides essential resources including the latest tips, tutorials, webcasts, white papers and more.

  • hard-drive encryption

    Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.

  • unified endpoint management (UEM)

    Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.

SearchITOperations

As hybrid cloud deployments, containers, microservices and DevOps continue to become part of a data center's infrastructure, IT operations pros are facing a new set of responsibilities. Because they must be agile and able to manage next-gen apps in blended environments, the roles and responsibilities of development and operation teams are blending. 

  • DevSecOps

    SecOps is a management approach that connects security and operations teams, similar to how DevOps unifies software developers and operations professionals.

  • composable infrastructure

    A composable infrastructure is a framework that decouples device resources in order to treat them as services.

  • What is DevOps? The ultimate guide

    The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.

SearchWindowsServer

SearchWindowsServer.com is dedicated to serving the information needs of Windows server professionals. The site provides targeted news, expert advice, tips, tutorials, learning guides, webcasts, white papers and more.

Back to Top

Database

SearchOracle

Visit SearchOracle.com for information and tips for the Oracle community. The site provides comprehensive coverage of all Oracle-specific news, trends and developments in the database industry.

  • NetSuite

    NetSuite is a business technology vendor based in San Mateo, California.

  • stored procedure

    A stored procedure is a group of statements with a specific name, which are stored inside a database, such as MySQL or Oracle.

  • object-oriented database management system (OODBMS)

    An object-oriented database management system (OODBMS), sometimes shortened to ODBMS for object database management system, is a database management system (DBMS) that supports the modelling and creation of data as objects.

Back to Top

Disaster Recovery / Compliance

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • Microsoft MyAnalytics

    Microsoft MyAnalytics, formerly Delve Analytics, is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.

  • content sprawl

    Content sprawl is a condition of an organization’'s content assets in which proliferation and unmanaged growth have led to an unwieldy mass that is difficult to manage.

  • enterprise content management (ECM)

    Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • What is cloud backup and how does it work?

    Cloud backup, also known as online backup or remote backup, is a strategy for backing up data that involves sending a copy of the data over a proprietary or public network to an off-site server and storage system.

  • Full Backup

    A full backup is the process of making at least one additional copy of all data files that an organization wishes to protect in a single backup operation.

  • Differential Backup

    A differential backup is a type of data backup method that copies all of the files that have changed since the last full backup was performed.

SearchDisasterRecovery

Natural disasters, internal threats, user error and terrorist acts are realities that IT must take into consideration in their efforts to effectively protect their digital assets. Fortunately, SearchDisasterRecovery.com is the premier online resource for IT professionals responsible for disaster recovery planning.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate recovery, if necessary.

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a natural catastrophe, power outage or another type of business disruption.

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other resources to public cloud or dedicated service providers.

Back to Top

Emerging Technologies

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • IPv6 address

    An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.

  • smart home hub (home automation hub)

    A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.

  • IoT devices (internet of things devices)

    IoT devices are the nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

Back to Top

Healthcare IT

SearchHealthIT

SearchHealthIT.com is the health care technology professional’s how-to guide to building and managing an electronic health care infrastructure.

  • HIPAA (Health Insurance Portability and Accountability Act)

    HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security provisions for safeguarding medical information.

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the telecommunications infrastructure.

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United States. The partnership, which began in 2018, has provided Google with access to the medical records of over 50 million people.

Back to Top

Networking

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

  • IPv6 address

    An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.

  • smart home hub (home automation hub)

    A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.

  • IoT devices (internet of things devices)

    IoT devices are the nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data.

SearchMobileComputing

SearchMobileComputing.com provides comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise.

  • Microsoft OneDrive

    OneDrive (formerly SkyDrive) is an online cloud storage service from Microsoft.

  • Mobile Threat Defense (MTD)

    Mobile Threat Defense (MTD) is a security software meant to protect organizations and individual users from security threats on mobile platforms.

  • enterprise mobility management (EMM)

    Enterprise mobility management (EMM) is software that allows organizations to securely enable employee use of mobile devices and applications.

SearchNetworking

SearchNetworking.com is one of the largest and most active online communities dedicated to the enterprise network.

  • telecommunications (telecom)

    Telecommunications, also known as telecom, is the exchange of information over significant distances by electronic means and refers to all types of voice, data and video transmission.

  • HAProxy

    HAProxy (High Availability Proxy), developed by HAProxy Technologies LLC, is an open source load balancer proxy for TCP and HTTP applications.

  • millimeter wave (MM wave)

    Millimeter wave (MM wave), also known as millimeter band, is the band of spectrum with wavelengths between 10 millimeters (30 GHz) and 1 millimeter (300 GHz).

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

SearchUnifiedCommunications

SearchUnifiedCommunications.com provides a reliable source of how-to tips and best practices for implementing, managing and securing VoIP and advanced IP applications, enabling IT professionals to take advantage of the cost savings and new features and benefits associated with converged enterprise network.

  • Avaya

    Avaya is an American technology company that specializes in business communications services, such as unified communications (UC), and contact center (CC).

  • Microsoft Teams

    Microsoft Teams is cloud-based team collaboration software and part of the Office 365 software suite.

  • communications platform as a service (CPaaS)

    Communications platform as a service (CPaaS) is a cloud-based delivery model that allows organizations to add real-time communication capabilities, such as voice, video and messaging, to business applications by deploying application program interfaces (APIs).

Back to Top

Security

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • cloud access security broker (CASB)

    A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

  • software-defined perimeter (SDP)

    Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure.

  • Federal Information Security Management Act (FISMA)

    The Federal Information Security Management Act (FISMA) is United States legislation that defines a framework of guidelines and security standards to protect government information, operations and assets.

  • CISO as a service (vCISO, virtual CISO, fractional CISO)

    A CISO as a service (CISOaaS) is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

Back to Top

Storage

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • hyper-converged infrastructure

    Hyper-converged infrastructure is a software-centric architecture that tightly integrates compute, storage and virtualization resources in a single system that usually consists of x86 hardware.

  • hyper-converged appliance

    A hyper-converged appliance is a hardware device that provides multiple data center management technologies within a single box.

  • hyper-converged storage

    Hyper-converged storage is a software-defined approach to storage management that combines storage, compute, virtualization and sometimes networking technologies in one physical unit that is managed as a single system.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • What is cloud backup and how does it work?

    Cloud backup, also known as online backup or remote backup, is a strategy for backing up data that involves sending a copy of the data over a proprietary or public network to an off-site server and storage system.

  • Full Backup

    A full backup is the process of making at least one additional copy of all data files that an organization wishes to protect in a single backup operation.

  • Differential Backup

    A differential backup is a type of data backup method that copies all of the files that have changed since the last full backup was performed.

SearchStorage

The TechTarget Storage Media Group has built a community of the largest and most audience of storage decision-makers on the web.

  • FCoE (Fibre Channel over Ethernet)

    FCoE (Fibre Channel over Ethernet) is a storage protocol that enable Fibre Channel (FC) communications to run directly over Ethernet.

  • Fibre Channel switch (FC switch)

    A Fibre Channel switch is a networking device that is compatible with the Fibre Channel (FC) protocol and designed for use in a dedicated storage area network (SAN).

  • SAN switch (storage area network switch)

    A storage area network (SAN) switch is a device that connects servers and shared pools of storage devices and is dedicated to moving storage traffic.

Back to Top

Virtualization

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • server hardware degradation

    Server hardware degradation is the gradual breakdown of the physical parts of a server.

  • hypervisor

    A hypervisor is a function that abstracts -- isolates -- operating systems (OSes) and applications from the underlying computer hardware.

  • server virtualization

    Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • zero client

    Zero client, also known as ultrathin client, is a server-based computing model in which the end user's computing device has no local storage.

  • desktop as a service (DaaS)

    Desktop as a service (DaaS) is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.

  • Remote Desktop Session Host (RDSH)

    Remote Desktop Session Host (RDSH) is a role in Remote Desktop Services (RDS).

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware

    VMware is a virtualization and cloud computing software provider based in Palo Alto, Calif.

  • VMware DRS (Distributed Resource Scheduler)

    VMware DRS (Distributed Resource Scheduler) is a utility that balances computing workloads with available resources in a virtualized environment. The utility is part of a virtualization suite called VMware Infrastructure 3.

  • virtual machine replication

    Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.

Back to Top

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close