Find a Tech Definition
Browse By Topic
-
Application Development
- Agile, Scrum, XP
- Apple
- Internet applications
- Linux
- Open source
- Operating systems
- Programming
- Software applications
- Software development
- Web services, SOA
- Windows
Recently Published
- entity relationship diagram - An entity-relationship diagram (ERD) is a type of data modeling that shows a graphical representa...
- BPEL (Business Process Execution Language) - BPEL (Business Process Execution Language) is an XML-based language that enables task-sharing in ...
- workflow - Workflow is the series of activities that are necessary to complete a task.
-
Computer Science
- Computing fundamentals
- Electronics
- IT standards and organizations
- Mathematics
- Microprocessors
- Nanotechnology
- Protocols
- Robotics
Recently Published
- digital assistant - A digital assistant is an application program that can understand natural human language and comp...
- Schrodinger's cat - Schrodinger's cat explained: This definition describes Schrodinger's famous thought experiment an...
- iSCSI (Internet Small Computer System Interface) - Definition: Learn what iSCSI is, how the protocol is used in iSCSI SANs and why it’s important fo...
-
Consumer Technology
- Desktop PCs
- Internet acronyms and lingo
- Internet technologies
- Multimedia and graphics
- Peripherals
- Personal computing
- Printers
- Wireless and mobile
Recently Published
- digital assistant - A digital assistant is an application program that can understand natural human language and comp...
- millennials (millennial generation) - Millennials, also known as Generation Y, is a demographic that includes individuals who reached a...
- BPEL (Business Process Execution Language) - BPEL (Business Process Execution Language) is an XML-based language that enables task-sharing in ...
-
Data Center
Recently Published
- Citrix VDI-in-a-Box - Citrix VDI-in-a-Box is all-in-one desktop virtualization software built for small and medium-size...
- SSD (solid-state drive, solid-state disk, solid-state storage drive) - Definition: Learn what a solid-state drive (SSD) is, why SSDs are replacing electromechanical har...
- flash storage - Flash storage, based on flash memory, is used for data repositories, storage systems and consumer...
-
IT Management
- Business software
- Business terms
- Call centers
- Compliance
- Government IT
- Healthcare IT
- Network administration
- Project management
- Search engine optimization (SEO)
- Security management
- Software management
- Storage management
Recently Published
- latency - Latency means delay. In networking, it's an expression of how long it takes for a packet to get f...
- Iometer - Iometer allows users to set custom input/output profiles to simulate different application worklo...
- business risk - A risk, in a business context, is anything that threatens an organization's ability to generate p...
-
Learning Tools
Recently Published
- How to write a business case document - A business case document is a formal, written argument intended to convince a decision maker to a...
- solid state storage technologies comparison - Solid-state storage (SSS) is an increasingly popular backup alternative to traditional storage te...
- Microsoft Virtual Academy (MVA) - The Microsoft Virtual Academy (MVA) is a free online school with courses that cover Microsoft-rel...
-
Networking
- Circuit switched services equipment and providers
- Data transmission
- Email and messaging
- High-speed networks
- Internet of Things
- Local area networks (LANs)
- Network hardware
- Network software
- Networking and communications
- Routing and switching
- Smart grid
- Telecom
- Voice over IP (VoIP)
- Wireless LANs
- Wireless technologies
Recently Published
- proxy server - What is a proxy server? A proxy server acts as an intermediary between an end user and the Intern...
- latency - Latency means delay. In networking, it's an expression of how long it takes for a packet to get f...
- iSCSI (Internet Small Computer System Interface) - Definition: Learn what iSCSI is, how the protocol is used in iSCSI SANs and why it’s important fo...
-
Security
- Application security
- Authentication
- Malware
- Network security
- Security threats and countermeasures
- Spyware
Recently Published
- Trusted Platform Module (TPM) - A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encry...
- Web application firewall (WAF) - A Web application firewall (WAF) is a firewall that monitors, filters or blocks the HTTP traffic ...
- virtual honeypot - A virtual honeypot is software that emulates a vulnerable system or network to attract intruders ...
-
Storage and Data Management
- Backup and recovery
- Business intelligence - business analytics
- Content management
- Customer data management
- Data and data management
- Data deduplication
- Database
- Network-attached storage (NAS)
- Storage-area network (SAN)
Recently Published
- Iometer - Iometer allows users to set custom input/output profiles to simulate different application worklo...
- counter-Googling - Counter-Googling is the use of the search engine to find information about the party that would t...
- entity relationship diagram - An entity-relationship diagram (ERD) is a type of data modeling that shows a graphical representa...
HANA (SAP HANA)
SAP HANA is an in-memory platform for processing high volumes of operational and transactional data in real-time. More
Quote of the Day
"Five years ago,HANA was an emerging,internally led and academically fueled application architecture project.Today, the in-memory database system sits at the heart of SAP’s technology plans." China Martens
-
Know-IT-All
CISSP Essentials Security School
SearchSecurity is debuting several all-new lessons in its CISSP Essentials Security School featuring Shon Harris of Logical Security.
An introduction to the (ISC)2 CISSP security certification exam
Spotlight article: Learn about the (ISC)2 CISSP security exam, the 10 CISSP domains and the exclusive CISSP prep materials offered by Shon Harris and SearchSecurity.
-
Hottest Terms
Essential Knowledge on IT management
Legal entity identifier, other semantic data mean better governance
When Lehman Brothers failed in 2008, regulators and other banks had precious little data to gauge wider financial risks. Enter legal entity identifiers, a form of semantic data.
-
MicroScope Big Data Quiz
What does the emergence of big data mean for the channel? Take this 1 minute quiz and answer five questions to let us know your opinion.
-
Storage
Five Strategies for Using Flash in Your Next Storage Project
Learn how to deploy flash technology to deliver the right data, at the right time, at the right cost to fit your needs.
Visit now -
Improve business agility
The benefits of a converged infrastructure
Learn how organizations are able to leverage a converged infrastructure and service automation to decrease the testing window, accelerate system refreshes and enable the rapid deployment of new environments.
Visit Today