Browse Definitions :

Find Technology-Specific Sites

TechTarget gives technology professionals and executives the information they need to perform their jobs – from developing strategy, to making cost-effective purchase decisions and managing their organizations' technology projects. Bookmark this page for easy access to the TechTarget network of technology-specific websites.

Browse TechTarget Sites by Topic

Application Development

SearchAppArchitecture

Over 4 million programmers, architects, IT managers, and developers turn to our site for industry news, expert advice and peer-to-peer learning opportunities around managing microservices and service-oriented architecture (SOA), application modernization and digital transformation, Business Process Management (BPM), application integration and APIs, software containers and microservices design and development, DevOps, and more.

  • Remote Procedure Call (RPC)

    Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network's details.

  • object-oriented programming (OOP)

    Object-oriented programming (OOP) is a computer programming model that organizes software design around data, or objects, rather than functions and logic.

  • data dictionary

    A data dictionary is a collection of descriptions of the data objects or items in a data model for the benefit of programmers and others who need to refer to them.

SearchSoftwareQuality

SearchSoftwareQuality.com is the online community for developers, architects and executives interested in building secure and quality software.

  • static analysis (static code analysis)

    Static analysis, also called static code analysis, is a method of computer program debugging that is done by examining the code without executing the program.

  • MoSCoW method

    The MoSCoW method is a four-step approach to prioritizing which project requirements will provide the best return on investment (ROI).

  • structured programming (modular programming)

    Structured programming (sometimes known as modular programming) is a programming paradigm that facilitates the creation of programs with readable code and reusable components.

TheServerSide

TheServerSide.com is the world’s largest online community for enterprise Java architects and developers, providing daily news, tech talk interviews with key industry figures, design patterns, discussion forums, tutorials and more.

  • git stash

    Git stash is a built-in command with the distributed version control tool in Git that locally stores all the most recent changes in a workspace and resets the state of the workspace to the prior commit state.

  • GraalVM

    GraalVM is a tool for developers to write and execute Java code.

  • HTML (Hypertext Markup Language)

    HTML (Hypertext Markup Language) is a text-based approach to describing how content contained within an HTML file is structured.

Back to Top

Business Intelligence / Analytics

SearchBusinessAnalytics

SearchBusinessAnalytics.com is dedicated to serving the information needs of business and IT professionals.

  • data preparation

    Data preparation is the process of gathering, combining, structuring and organizing data so it can be used in business intelligence (BI), analytics and data visualization applications.

  • self-service business intelligence (BI)

    Self-service business intelligence (BI) is an approach to data analytics that enables business users to access and work with corporate data even if they don't have a background in BI, statistical analysis or data mining.

  • big data analytics

    Big data analytics is the often complex process of examining large and varied data sets, or big data, to uncover information -- such as hidden patterns, unknown correlations, market trends and customer preferences -- that can help organizations make informed business decisions.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • Microsoft MyAnalytics

    Microsoft MyAnalytics, formerly Delve Analytics, is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.

  • content sprawl

    Content sprawl is a condition of an organization’'s content assets in which proliferation and unmanaged growth have led to an unwieldy mass that is difficult to manage.

  • enterprise content management (ECM)

    Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.

SearchCRM

SearchCRM.com is a free resource dedicated to Customer Relationship Management (CRM) decision makers.

SearchCustomerExperience

SearchCustomerExperience keeps our readers up-to-speed on emerging trends in customer data analytics, customer self-service, omnichannel customer service, artificial intelligence (AI), contact center technology, marketing software, sales technology, digital experience management, sales force automation and web content management.

  • content personalization

    Content personalization is a strategy that tailors webpages and other forms of content to individual users' characteristics or preferences.

  • Salesforce Service Cloud

    Salesforce Service Cloud is a customer relationship management (CRM) platform for customer service and support, based on the company's CRM software for sales professionals.

  • What is customer experience management (CEM or CXM)?

    Building brand loyalty among customers involves a customer-centric strategy and measuring feedback through voice of the customer data to improve customer experiences.

SearchDataManagement

SearchDataManagement.com is a guide for data management professionals and business leaders.

  • relational database

    A relational database is a collection of information that organizes data points with defined relationships for easy access.

  • database replication

    Database replication is the frequent electronic copying of data from a database in one computer or server to a database in another -- so that all users share the same level of information.

  • What is data governance and why does it matter?

    Data governance (DG) is the process of managing the availability, usability, integrity and security of the data in enterprise systems, based on internal data standards and policies that also control data usage.

SearchSQLServer

SearchSQLServer.com is dedicated to serving the information needs of database developers and administrators working with Microsoft's flagship database enterprise server, SQL Server.

  • data preprocessing

    Data preprocessing describes any type of processing performed on raw data to prepare it for another processing procedure.

  • data aggregation

    Data aggregation is any process whereby data is gathered and expressed in a summary form.

  • database administrator (DBA)

    A database administrator (DBA) is the information technician responsible for directing or performing all activities related to maintaining a successful database environment.

Back to Top

Business Software

SearchERP

SearchERP was built to help startups, small and mid-sized businesses, and large corporations better leverage ERP technologies and strategies to eliminate legacy platforms that cause data silos, improve business processes, boost profitability, improve financial reporting and gain more visibility.

  • lean water spider

    Lean water spider is a term used in manufacturing that refers to a position in a production environment or warehouse that ensures materials are supplied where and when they are needed.

  • RFI (request for information)

    An RFI (request for information) is a formal process for gathering information from potential suppliers of a good or service.

  • Kaizen (continuous improvement)

    Kaizen is an approach to creating continuous improvement based on the idea that small, ongoing positive changes can reap significant improvements.

SearchHRSoftware

Find unbiased news, analysis, resources and the latest strategies to better manage HR and HCM functions at your organization.

  • employee experience

    Employee experience is a worker's perceptions about his or her journey through all the touchpoints at a particular company, starting with job candidacy through to the exit from the company.

  • employee life cycle

    Employee life cycle -- also spelled employee lifecycle -- is an HR model that identifies the different stages a worker advances through in an organization in, as well as the role HR plays in optimizing that progress.

  • employee activism

    Employee activism is actions taken by workers to speak out for or against their employers on controversial issues that impact society.

SearchSalesforce

SearchSalesforce.com is a resource for Salesforce news, expert advice, technical tips and career guidance as well as a forum for community interaction. The site focuses on the Salesforce customer relationship management (CRM) platform as well as its ecosystem of partners.

SearchSAP

SearchSAP.com is the SAP community's resource for news, expert advice, technical tips and career guidance.

  • SAP

    SAP SE is a multinational software corporation that is currently the market leader in the enterprise resource planning (ERP) field.

  • SAP Leonardo

    SAP Leonardo is an umbrella brand for SAP’s collection of software and services that organizations can use to develop digital transformation projects.

  • SAP Business One

    SAP Business One is an ERP software platform specifically intended for small and medium-sized businesses (SMBs).

Back to Top

CIO Strategies

ComputerWeekly

ComputerWeekly.com is the leading provider of news, analysis, opinion, information and services for the UK IT community. The site serves as an advocate for UK IT professionals and the role of technology in improving organisations in all sectors of business and public life.

ebizQ

ebizQ is the insider’s guide to next-generation business process management. The site offers a growing collection of independent editorial articles on BPM trends, issues, challenges and solutions, all targeted to business and IT BPM professionals.

SearchCIO

SearchCIO.com provides technology management strategies designed exclusively for the enterprise CIO. Our award-winning team of editors and industry luminaries offer strategic advice and technology best practices to help streamline global IT operations.

  • systems thinking

    Systems thinking is a holistic approach to analysis that focuses on the way that a system's constituent parts interrelate and how systems work over time and within the context of larger systems.

  • enterprise architecture (EA)

    An enterprise architecture (EA) is a conceptual blueprint that defines the structure and operation of an organization.

  • onshore outsourcing (domestic outsourcing)

    Onshore outsourcing, also known as domestic outsourcing, is the obtaining of services from someone outside a company but within the same country.

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

Back to Top

Channel Resources

MicroScope

Stay ahead with IT Business management and technology news and articles on UK laws, regulations, credit and finance, selling, sales management, marketing and supplier relationships.

SearchITChannel

If you're a value-added reseller (VAR), information technology reseller or a systems integrator, all of your research needs are met at SearchITChannel.com.

  • request for proposal (RFP)

    A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.

  • TIN (Taxpayer Identification Number)

    A Taxpayer Identification Number (TIN), in the United States, is a unique nine-digit number for identifying an individual, business or other entity in tax returns and additional documents filed with the Internal Revenue Service (IRS).

  • Defense Contract Management Agency (DCMA)

    The Defense Contract Management Agency (DCMA) is a component of the United States Department of Defense (DoD) that works with defense contractors to ensure government services and supplies are delivered on time, come at the expected cost and satisfy all performance requirements.

Back to Top

Cloud

SearchAWS

From cloud infrastructure to applications, development, security, big data, storage and more, SearchAWS.com provides meaningful insight from award-winning editors, research analysts and industry experts on one of the fastest-growing cloud services providers, Amazon Web Services.

  • Amazon S3

    Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service.

  • Amazon Web Services (AWS)

    AWS (Amazon Web Services) is a comprehensive, evolving cloud computing platform provided by Amazon that includes a mixture of infrastructure as a service (IaaS), platform as a service (PaaS) and packaged software as a service (SaaS) offerings.

  • Amazon VPC traffic mirroring

    Traffic mirroring is a feature for Amazon Virtual Private Cloud (Amazon VPC). The feature is used to monitor the network-level traffic of workloads.

SearchCloudComputing

SearchCloudComputing.com is the Web's most comprehensive resource for cloud computing news, analysis and case studies.

  • testing as a service (TaaS)

    Testing as a service (TaaS) is an outsourcing model in which testing activities associated with some of an organization's business activities are performed by a service provider rather than in-house employees.

  • Platform as a Service (PaaS)

    Platform as a service (PaaS) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.

  • Infrastructure as a Service (IaaS)

    Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized computing resources over the internet.

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • cloud access security broker (CASB)

    A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

  • software-defined perimeter (SDP)

    Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • server hardware degradation

    Server hardware degradation is the gradual breakdown of the physical parts of a server.

  • hypervisor

    A hypervisor is a function that abstracts -- isolates -- operating systems (OSes) and applications from the underlying computer hardware.

  • server virtualization

    Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • virtual desktop infrastructure (VDI)

    Virtual desktop infrastructure (VDI) is a desktop virtualization technology wherein a desktop operating system (OS) -- typically Microsoft Windows -- runs and is managed in an on-premises or cloud data center.

  • Remote Desktop Connection Manager (RDCMan)

    Remote Desktop Connection Manager (RDCMan) is a tool that allows information technology (IT) administrators to organize, group and control remote desktop connections.

  • GPU (graphics processing unit)

    A graphics processing unit (GPU) is a computer chip that performs rapid mathematical calculations, primarily for the purpose of rendering images.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware

    VMware is a virtualization and cloud computing software provider based in Palo Alto, Calif.

  • VMware DRS (Distributed Resource Scheduler)

    VMware DRS (Distributed Resource Scheduler) is a utility that balances computing workloads with available resources in a virtualized environment. The utility is part of a virtualization suite called VMware Infrastructure 3.

  • virtual machine replication

    Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.

Back to Top

Data Center Management

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • hyper-converged appliance

    A hyper-converged appliance is a hardware device that provides multiple data center management technologies within a single box.

  • hyper-converged storage

    Hyper-converged storage is a software-defined approach to storage management that combines storage, compute, virtualization and sometimes networking technologies in one physical unit that is managed as a single system.

  • network convergence

    Network convergence is the efficient coexistence of telephone, video and data communication within a single network.

SearchDataCenter

SearchDataCenter.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • edge computing

    Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible.

  • screen scraping

    Screen scraping is the act of copying information that shows on a digital display so it can be used for another purpose.

  • data center

    A data center (or datacenter) is a facility composed of networked computers and storage that businesses and other organizations use to organize, process, store and disseminate large amounts of data.

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is the leading source for tactical expert advice and best practices on desktop management and security. The site provides essential resources including the latest tips, tutorials, webcasts, white papers and more.

  • hard-drive encryption

    Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.

  • unified endpoint management (UEM)

    Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.

SearchITOperations

As hybrid cloud deployments, containers, microservices and DevOps continue to become part of a data center's infrastructure, IT operations pros are facing a new set of responsibilities. Because they must be agile and able to manage next-gen apps in blended environments, the roles and responsibilities of development and operation teams are blending. 

  • IT/OT convergence

    IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.

  • application containerization (app containerization)

    Application containerization is an OS-level virtualization method used to deploy and run distributed applications without launching an entire virtual machine (VM) for each app.

  • IT monitoring

    IT monitoring is the process to gather metrics about the operations of an IT environment's hardware and software to ensure everything functions as expected to support applications and services.

SearchWindowsServer

SearchWindowsServer.com is dedicated to serving the information needs of Windows server professionals. The site provides targeted news, expert advice, tips, tutorials, learning guides, webcasts, white papers and more.

  • Microsoft Software Assurance (SA)

    Microsoft Software Assurance is a software maintenance program that helps organizations gain access to the latest software versions and releases, without incurring additional licensing costs.

  • Active Directory forest (AD forest)

    An Active Directory forest is the highest level of organization within Active Directory.

  • wbadmin

    Wbadmin is an elevated command prompt that allows administrators or backup operators to backup and restore an operating system (OS), volume, file, folder or application.

Back to Top

Database

SearchOracle

Visit SearchOracle.com for information and tips for the Oracle community. The site provides comprehensive coverage of all Oracle-specific news, trends and developments in the database industry.

  • NetSuite

    NetSuite is a business technology vendor based in San Mateo, California.

  • stored procedure

    A stored procedure is a group of statements with a specific name, which are stored inside a database, such as MySQL or Oracle.

  • object-oriented database management system (OODBMS)

    An object-oriented database management system (OODBMS), sometimes shortened to ODBMS for object database management system, is a database management system (DBMS) that supports the modelling and creation of data as objects.

Back to Top

Disaster Recovery / Compliance

SearchCompliance

SearchCompliance.com is a free online resource for IT professionals seeking cost-saving strategies and information on how to create a manageable compliance infrastructure.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information.

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchContentManagement

SearchContentManagement.com provides IT and business professionals with a wide range of content management and collaboration resources to help organizations more effectively manage and leverage unstructured data as a corporate asset.

  • Microsoft MyAnalytics

    Microsoft MyAnalytics, formerly Delve Analytics, is an application designed to help employees and their managers gain insight into how workers spend their time, with the goal of optimizing tasks and making them more efficient.

  • content sprawl

    Content sprawl is a condition of an organization’'s content assets in which proliferation and unmanaged growth have led to an unwieldy mass that is difficult to manage.

  • enterprise content management (ECM)

    Enterprise content management (ECM) is a set of defined processes, strategies and tools that allow a business to effectively obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • data restore

    Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location.

  • backup

    Backup refers to the copying of physical or virtual files or databases to a secondary location for preservation in case of equipment failure or catastrophe.

  • off-site backup

    Off-site backup is a method of backing up data to a remote server or to media that is transported off site.

SearchDisasterRecovery

Natural disasters, internal threats, user error and terrorist acts are realities that IT must take into consideration in their efforts to effectively protect their digital assets. Fortunately, SearchDisasterRecovery.com is the premier online resource for IT professionals responsible for disaster recovery planning.

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide failover in the event of a natural catastrophe, power outage or another type of business disruption.

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other resources to public cloud or dedicated service providers.

  • crisis management plan (CMP)

    A crisis management plan (CMP) outlines how to respond to a critical situation that would negatively affect an organization's profitability, reputation or ability to operate.

Back to Top

Emerging Technologies

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

Back to Top

Healthcare IT

SearchHealthIT

SearchHealthIT.com is the health care technology professional’s how-to guide to building and managing an electronic health care infrastructure.

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the telecommunications infrastructure.

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United States. The partnership, which began in 2018, has provided Google with access to the medical records of over 50 million people.

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and administration to streamline day-to-day tasks within a medical practice and improve the efficiency of operations and quality of patient care.

Back to Top

Networking

IoT Agenda

Use this site to build your knowledge base about IoT privacy and security issues, the software that's used to run and control IoT products, embedded systems and sensors, IoT analytics and strategies for deploying IoT technology.

SearchMobileComputing

SearchMobileComputing.com provides comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise.

  • Microsoft OneDrive

    OneDrive (formerly SkyDrive) is an online cloud storage service from Microsoft.

  • Mobile Threat Defense (MTD)

    Mobile Threat Defense (MTD) is a security software meant to protect organizations and individual users from security threats on mobile platforms.

  • enterprise mobility management (EMM)

    Enterprise mobility management (EMM) is software that allows organizations to securely enable employee use of mobile devices and applications.

SearchNetworking

SearchNetworking.com is one of the largest and most active online communities dedicated to the enterprise network.

  • 6G

    6G (sixth-generation wireless) is the successor to 5G cellular technology -- 6G networks will be able to use higher frequencies than 5G networks and provide substantially higher capacity and much lower latency.

  • fiber to the home (FTTH)

    Fiber to the home (FTTH), also called fiber to the premises (FTTP), is the installation and use of optical fiber from a central point directly to individual buildings such as residences, apartment buildings and businesses to provide high-speed internet access.

  • Universal Service Fund (USF)

    The Universal Service Fund (USF) is a United States government program that supports telecommunications access and affordability in rural and low-income communities.

SearchSDN

SearchSDN.com is dedicated to serving the information needs of organizations which have implemented, or are planning to transition to, software-defined networking.

SearchUnifiedCommunications

SearchUnifiedCommunications.com provides a reliable source of how-to tips and best practices for implementing, managing and securing VoIP and advanced IP applications, enabling IT professionals to take advantage of the cost savings and new features and benefits associated with converged enterprise network.

  • real-time communications (RTC)

    Real-time communications (RTC) is any mode of telecommunications in which all users can exchange information instantly or with negligible latency. In this context, the term 'real-time' is synonymous with 'live.'

  • unified communications (UC)

    Unified communications (UC) is a conceptual and technological framework for integrating various enterprise communication methods -- telephony, presence, voicemail, video calling and conferencing, email, instant messaging, etc. -- within a single platform, with the goal of streamlining and enhancing business communications, collaboration and productivity.

  • telephony

    Telephony is technology associated with interactive communication between two or more physically distant parties via the electronic transmission of speech or other data.

Back to Top

Security

SearchCloudSecurity

SearchCloudSecurity.com provides IT professionals with real-world examples of current trends and applications in cloud security.

  • cloud access security broker (CASB)

    A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

  • software-defined perimeter (SDP)

    Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning.

SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure.

  • PCI DSS 12 requirements

    PCI DSS 12 requirements is a set of security controls that businesses are required to implement to protect credit card data and comply with the Payment Card Industry Data Security Standard (PCI DSS).

  • Federal Information Security Management Act (FISMA)

    The Federal Information Security Management Act (FISMA) is United States legislation that defines a comprehensive framework to protect government information, operations and assets against natural or man-made threats.

  • vulnerability assessment (vulnerability analysis)

    A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures.

Back to Top

Storage

SearchConvergedInfrastructure

SearchConvergedInfrastructure.com is the best online information resource for the latest news, tech tips and expert advice for IT managers responsible for the complex environment of the data center.

  • hyper-converged appliance

    A hyper-converged appliance is a hardware device that provides multiple data center management technologies within a single box.

  • hyper-converged storage

    Hyper-converged storage is a software-defined approach to storage management that combines storage, compute, virtualization and sometimes networking technologies in one physical unit that is managed as a single system.

  • network convergence

    Network convergence is the efficient coexistence of telephone, video and data communication within a single network.

SearchDataBackup

SearchDataBackup.com is the definitive information resource for IT professionals charged with building and managing efficient backup and restore policies and processes.

  • data restore

    Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location.

  • backup

    Backup refers to the copying of physical or virtual files or databases to a secondary location for preservation in case of equipment failure or catastrophe.

  • off-site backup

    Off-site backup is a method of backing up data to a remote server or to media that is transported off site.

SearchStorage

The TechTarget Storage Media Group has built a community of the largest and most audience of storage decision-makers on the web.

  • hot plugging

    Hot plugging is the addition of a component to a running computer system without significant interruption to the operation of the system.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted storage expansion cards of a small form factor.

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science professionals, along with the general public, when referring to amounts of computer data using the metric system.

Back to Top

Virtualization

SearchServerVirtualization

SearchServerVirtualization.com is the best server virtualization resource for system architects and IT managers.

  • server hardware degradation

    Server hardware degradation is the gradual breakdown of the physical parts of a server.

  • hypervisor

    A hypervisor is a function that abstracts -- isolates -- operating systems (OSes) and applications from the underlying computer hardware.

  • server virtualization

    Server virtualization is a process that creates and abstracts multiple virtual instances on a single server.

SearchVirtualDesktop

SearchVirtualDesktop.com is the premier source for information on desktop virtualization, application virtualization, and VDI.

  • virtual desktop infrastructure (VDI)

    Virtual desktop infrastructure (VDI) is a desktop virtualization technology wherein a desktop operating system (OS) -- typically Microsoft Windows -- runs and is managed in an on-premises or cloud data center.

  • Remote Desktop Connection Manager (RDCMan)

    Remote Desktop Connection Manager (RDCMan) is a tool that allows information technology (IT) administrators to organize, group and control remote desktop connections.

  • GPU (graphics processing unit)

    A graphics processing unit (GPU) is a computer chip that performs rapid mathematical calculations, primarily for the purpose of rendering images.

SearchVMware

SearchVMware.com is the best online resource for data center decision-makers. Our editors, resident experts and news writers are dedicated to helping IT organizations evaluate products, services and business strategies that can lead them to successful implementations of virtualization technologies in VMware environments.

  • VMware

    VMware is a virtualization and cloud computing software provider based in Palo Alto, Calif.

  • VMware DRS (Distributed Resource Scheduler)

    VMware DRS (Distributed Resource Scheduler) is a utility that balances computing workloads with available resources in a virtualized environment. The utility is part of a virtualization suite called VMware Infrastructure 3.

  • virtual machine replication

    Virtual machine replication is a process used by information technology (IT) professionals to create backup versions of virtual machines (VMs) The backup can be kept and used to restore the machine in the event that its data is corrupted or lost.

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • hot plugging

    Hot plugging is the addition of a component to a running computer system without significant interruption to the operation of the...

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

Close