Find a Tech Definition
Browse By Topic
-
Application Development
- Agile, Scrum, XP
- Apple
- Internet applications
- Linux
- Microsoft
- Open source
- Operating systems
- Programming
- Software applications
- Software development
- Web services, SOA
Recently Published
- cross-site scripting (XSS) - Cross-site scripting (XSS) is a security exploit which is carried out on Web applications that ac...
- Apple Smart Keyboard - Apple's Smart Keyboard is a detachable, full-size, text input device designed for the iPad Pro. I...
- Microsoft App-V (Microsoft Application Virtualization) - Microsoft App-V is a tool IT administrators can use to virtualize and stream applications to user...
-
Computer Science
- Computing fundamentals
- Electronics
- IT standards and organizations
- Mathematics
- Microprocessors
- Nanotechnology
- Protocols
- Robotics
Recently Published
- time-to-live (TTL) - Time-to-live (TTL) is a value in an Internet Protocol (IP) packet that tells a network router whe...
- backpropagation algorithm - The backpropagation algorithm repeatedly processes data to improve the accuracy of predictions in...
- photonics - Photonics is an area of study that involves the use of radiant energy (such as light), whose fund...
-
Consumer Technology
- Desktop PCs
- Internet acronyms and lingo
- Internet technologies
- Multimedia and graphics
- Peripherals
- Personal computing
- Printers
- Wireless and mobile
Recently Published
- Apple Smart Keyboard - Apple's Smart Keyboard is a detachable, full-size, text input device designed for the iPad Pro. I...
- Apple 3D Touch - Apple 3D Touch is a pressure-sensitive feature first included in iPhone 6s and 6s Plus that trigg...
- time-to-live (TTL) - Time-to-live (TTL) is a value in an Internet Protocol (IP) packet that tells a network router whe...
-
Data Center
Recently Published
- mesh network topology (mesh network) - A mesh network is a local area network (LAN) that employs one of two connection arrangements, ful...
- Dedicated Cloud - Dedicated Cloud is a cloud service model available in VMware's vCloud Hybrid Service.
- Amazon Machine Learning - Amazon Machine Learning is an Amazon Web Services product that allows a developer to discover pat...
-
IT Management
- Business software
- Business terms
- Call centers
- Compliance
- Government IT
- Healthcare IT
- Network administration
- Project management
- Search engine optimization (SEO)
- Security management
- Software management
- Storage management
Recently Published
- man-in-the-middle attack (MitM) - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages b...
- dynamic pricing - The goal of dynamic pricing is to allow a company that sells goods or services over the Internet ...
- corporation (C corporation, C corp) - A corporation is a large and complex organization that is owned by its shareholders and governed ...
-
Learning Tools
Recently Published
- augmented reality (AR) - Augmented reality (AR) is the integration of digital information with live video or the user's en...
- mobile productivity app (mobile productivity application) - A mobile productivity app is a software program that allows smartphone, tablet and wearable devic...
- Network-attached storage (NAS) vocabulary quiz - How much do you know about the essential terminology related to network-attached storage (NAS)? T...
-
Networking
- Circuit switched services equipment and providers
- Data transmission
- Email and messaging
- High-speed networks
- Internet of Things
- Local area networks (LANs)
- Network hardware
- Network software
- Networking and communications
- Routing and switching
- Smart grid
- Telecom
- Voice over IP (VoIP)
- Wireless LANs
- Wireless technologies
Recently Published
- mesh network topology (mesh network) - A mesh network is a local area network (LAN) that employs one of two connection arrangements, ful...
- man-in-the-middle attack (MitM) - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages b...
- Exchange staged migration - The staged Exchange migration process transfers data and mailboxes from one Exchange server to an...
-
Security
- Application security
- Authentication
- Malware
- Network security
- Security threats and countermeasures
- Spyware
Recently Published
- endpoint authentication (device authentication) - Endpoint authentication is a security mechanism designed to ensure that only authorized devices c...
- man-in-the-middle attack (MitM) - A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages b...
- cross-site scripting (XSS) - Cross-site scripting (XSS) is a security exploit which is carried out on Web applications that ac...
-
Storage and Data Management
- Backup and recovery
- Business intelligence - business analytics
- Content management
- Customer data management
- Data and data management
- Data deduplication
- Database
- Network-attached storage (NAS)
- Storage-area network (SAN)
Recently Published
- descriptive analytics - Descriptive analytics is a preliminary stage of data processing that creates a summary of histori...
- historical data - Historical data, in a broad context, is collected data about past events and circumstances pertai...
- data warehouse as a service (DWaaS) - Data warehousing as a service (DWaaS) is an outsourcing model in which a service provider configu...
hybrid cloud
A hybrid cloud is a cloud computing environment in which an organization provides and manages some resources in-house and has others provided externally. More
Quote of the Day

"As users spin up new cloud services without IT input, many enterprises find themselves in the thick of hybrid cloud without a formal management strategy in place." -- Kristin Knapp
-
Test Yourself
In object storage systems, files are stored in this type of flat organization.
a. buckets
b. baskets
Answer -
Buzzword Alert
augmented reality (AR)
Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
-
Know-IT-All
Shadow IT makes IT departments more, not less, relevant
Technology trends such as self-service BI and cloud-based content management software give IT departments job security, not pink slips.
Mending the DevOps culture clash
Companies need to tread lightly as they try to speed up application development.
Essential Knowledge on IT management
#CIOChat: 2016 technology trends and predictions
What 2016 technology trends are set to dominate the enterprise? Share your IT predictions in our end-of-the-year #CIOChat on Wednesday, Dec. 16, at 3 p.m. EST.
-
IT SECURITY
2015 security predictions from McAfee Labs
As it looks ahead to next year security player McAfee has outlined some of the things it believes will happen in the market.
-
Storage
Five Strategies for Using Flash in Your Next Storage Project
Learn how to deploy flash technology to deliver the right data, at the right time, at the right cost to fit your needs.
Visit now -
Improve business agility
The benefits of a converged infrastructure
Learn how organizations are able to leverage a converged infrastructure and service automation to decrease the testing window, accelerate system refreshes and enable the rapid deployment of new environments.
Visit Today



