Browse Definitions :
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • #

Word of the Day

hyper-converged appliance

A hyper-converged appliance is a hardware device that provides multiple data center management technologies within a single box.See More

Newest and Updated Terms

  • quality of service (QoS)
  • network engineer
  • GPU
  • IaaS
  • NOR flash memory
  • enterprise resource planning
  • ERP finance module
  • human capital management
  • data science
  • What is SecOps? Everything you need to know

Know-IT-All

  • An inside look at the AWS Certified Security - Specialty exam

    of 'AWS Certified Security - Specialty Exam Guide' Stuart Scott shares insights on how to prepare for the exam and reap the professional benefits of certification.

  • Try a Cisco DEVASC 200-901 practice quiz

    Ready for Cisco's introductory DevNet exam, DEVASC 200-901? Start your Cisco DevNet Associate training with this practice quiz directly from the official exam guidebook.

Buzzword Alert

microsegmentation

Microsegmentation is a technique used to divide a network into logical and secure units through the application of policies that dictate how data and applications are accessed and controlled.

Read More

Essential Knowledge

How improving your math skills can help in programming

How to hire a data scientist with AI skills during pandemic

As organizations ramp up their AI efforts during the pandemic and as they return to the workplace, IT leaders are now prioritizing how to find ...

Tech's racial diversity problem meets its day of reckoning

Tech's diversity problem is under intense scrutiny amid national protests over systemic racism. But the solution goes well beyond simply hiring more ...

Leaders discuss challenges, strategies for women in IT

Women in tech still face challenges, including finding opportunities for advancement and management support. A recent panel of women in IT leadership...

How CIOs can combat the IT talent shortage

Research shows organizations are still struggling to bring in IT talent. We identify the reasons why there's a shortage and what CIOs and other IT ...

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • What is SecOps? Everything you need to know

    SecOps, formed from a combination of security and IT operations staff, is a highly skilled team focused on monitoring and ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • CVSS (Common Vulnerability Scoring System)

    The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in ...

SearchHealthIT

  • protected health information (PHI) or personal health information

    Protected health information (PHI), also referred to as personal health information, generally refers to demographic information,...

  • HIPAA (Health Insurance Portability and Accountability Act)

    HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security ...

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

Close