WebSafe 3.7techtarget.com
|
|
🏠
WhatIs
Browse Definitions :
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • #
Login Register
  • TechTarget Network
  • Tech Accelerator
  • News
RSS
  • WhatIs
  • Browse Definitions By Topic
    Please select a category
    • Business software
    • Cloud computing
    • Computer science
    • Data analytics and AI
    • Data centers
    • IT management
    • Networking
    • Security
    • Software development
    Business software View All
    • ERP
    • HR management
    • Marketing and CX
    • Microsoft
    • Software applications
    Cloud computing View All
    • Internet applications
    • Internet of Things
    • Web services
    Computer science View All
    • Electronics
    • Internet technologies
    • IT standards and organizations
    • Microprocessors
    • Robotics
    Data analytics and AI View All
    • Algorithms
    • Artificial intelligence
    • Data and data management
    • Database management
    Data centers View All
    • Data backup and disaster recovery
    • Data center management
    • Linux
    • Operating systems
    • Storage Admin
    • Storage and Data Mgmt
    • Virtualization
    IT management View All
    • Certifications
    • IT career paths
    • IT Operations
    • Personal computing
    • Project management
    • Technical support
    Networking View All
    • High-speed networks
    • Network Admin
    • Network hardware
    • Networking and communications
    • Wireless and mobile
    Security View All
    • Authentication and access control
    • Compliance, risk and governance
    • Network security
    • Security Admin
    • Threat management
    Software development View All
    • Agile software development
    • AppDev
    • DevOps
    • Programming
  • Browse Features Resources
    • Business strategies
    • Career resources
    • Emerging tech
    • Tech explainers
  • Follow:

WhatIs RSS

  • Word of the Day

    About this Feed:
  • Enterprise IT news roundup

    About this Feed:
  • Enterprise IT tips and expert advice

    About this Feed:
  • ContentSyndication

    About this Feed:

Additional RSS Feeds From TechTarget

Search HR Software

  • SearchHRSoftware RSS

    About this Feed:

Search Customer Experience

  • About RSS

    About this Feed:
  • CX news, tech trends and expert opinion

    About this Feed:

Search CIO

  • IT news and analysis for CIOs

    About this Feed:
  • ContentSyndication

    About this Feed:
  • The Data Mill

    About this Feed:
  • Schooled in AI Podcast Feed

    About this Feed:

Search Security

  • ContentSyndication

    About this Feed:
  • Security Wire Daily News

    About this Feed:
  • Security Bytes

    About this Feed:
  • Security Wire Weekly

    About this Feed:
  • Network Security Tactics

    About this Feed:
  • Threat Monitor

    About this Feed:
  • Security New White Papers

    About this Feed:
  • Risk & Repeat podcast

    About this Feed:

Search Networking

  • Network management news, advice and technical information

    About this Feed:
  • Network security news, advice and technical information

    About this Feed:
  • News and technical advice on the 'new network'

    About this Feed:
  • News on networking, mobility and voice

    About this Feed:
  • ContentSyndication

    About this Feed:
  • Routing and switching news, advice and technical information

    About this Feed:
  • Wireless networks news, advice and technical information

    About this Feed:
  • Network Security Tactics

    About this Feed:
  • Wide area networks news, advice and technical information

    About this Feed:
Latest TechTarget resources
  • Networking
  • Security
  • CIO
  • HR Software
  • Customer Experience
Search Networking
  • What is multi-access edge computing? Benefits and use cases

    Multi-access edge computing (MEC) is a network architecture concept that brings cloud computing capabilities and IT services ...

  • What is 5G?

    Fifth-generation wireless or 5G is a global standard and technology for wireless and telecommunications networks.

  • What is a small cell in wireless networks?

    A small cell is a type of low-power cellular radio access point or base station that provides wireless service within a limited ...

Search Security
  • What is identity and access management? Guide to IAM

    No longer just a good idea, IAM is a crucial piece of the cybersecurity puzzle. It's how an organization regulates access to ...

  • What is data masking?

    Data masking is a security technique that modifies sensitive data in a data set so it can be used safely in a non-production ...

  • What is antivirus software?

    Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other ...

Search CIO
  • What is a chief data officer (CDO)?

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • What is user-generated content?

    User-generated content (UGC) is published information that an unpaid contributor provides to a website.

  • What is business process outsourcing (BPO)?

    Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to...

Search HRSoftware
  • What is succession planning?

    Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles ...

  • What is compensation management?

    Compensation management is the discipline and process for determining employees' appropriate pay, incentives, rewards, bonuses ...

  • What is HR technology (human resources tech)?

    HR technology (human resources tech) refers to the hardware and software that support an organization's human resource management...

Search Customer Experience
  • What are virtual agents and how are they being used?

    A virtual agent is an AI-powered software application or service that interacts with humans or other digital systems in a ...

  • Customer acquisition cost (CAC): How to calculate and reduce it

    Customer acquisition cost (CAC) is the cost associated with convincing a consumer to buy your product or service, including ...

  • What is direct marketing?

    Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or ...

  • Browse by Topic
  • Browse Resources
  • About Us
  • Meet The Editors
  • Editorial Ethics Policy
  • Contact Us
  • Advertisers
  • Business Partners
  • Events
  • Media Kit
  • Corporate Site
  • Reprints

All Rights Reserved. Copyright 1999 - 2026, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close