WhatIs
Browse Definitions :
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • #
Login Register
  • TechTarget Network
  • Tech Accelerator
  • News
  • 2024 IT Salary Survey Results
RSS
  • WhatIs
  • Browse Definitions By Topic
    Please select a category
    • Business software
    • Cloud computing
    • Computer science
    • Data analytics and AI
    • Data centers
    • IT management
    • Networking
    • Security
    • Software development
    Business software View All
    • ERP
    • HR management
    • Marketing and CX
    • Microsoft
    • Software applications
    Cloud computing View All
    • Internet applications
    • Internet of Things
    • Web services
    Computer science View All
    • Electronics
    • Internet technologies
    • IT standards and organizations
    • Microprocessors
    • Robotics
    Data analytics and AI View All
    • Algorithms
    • Artificial intelligence
    • Data and data management
    • Database management
    Data centers View All
    • Data backup and disaster recovery
    • Data center management
    • Linux
    • Operating systems
    • Storage Admin
    • Storage and Data Mgmt
    • Virtualization
    IT management View All
    • Certifications
    • IT career paths
    • IT Operations
    • Personal computing
    • Project management
    • Technical support
    Networking View All
    • High-speed networks
    • Network Admin
    • Network hardware
    • Networking and communications
    • Wireless and mobile
    Security View All
    • Authentication and access control
    • Compliance, risk and governance
    • Network security
    • Security Admin
    • Threat management
    Software development View All
    • Agile software development
    • AppDev
    • DevOps
    • Programming
  • Browse Features Resources
    • Business strategies
    • Career resources
    • Emerging tech
    • Tech explainers
  • Follow:

WhatIs RSS

  • Word of the Day

    About this Feed:
  • Enterprise IT news roundup

    About this Feed:
  • Enterprise IT tips and expert advice

    About this Feed:
  • ContentSyndication

    About this Feed:

Additional RSS Feeds From TechTarget

Search Security

  • ContentSyndication

    About this Feed:
  • Security Wire Daily News

    About this Feed:
  • Security Bytes

    About this Feed:
  • Security Wire Weekly

    About this Feed:
  • Network Security Tactics

    About this Feed:
  • Threat Monitor

    About this Feed:
  • Security New White Papers

    About this Feed:
  • Risk & Repeat podcast

    About this Feed:

Search Networking

  • Network management news, advice and technical information

    About this Feed:
  • Network security news, advice and technical information

    About this Feed:
  • News and technical advice on the 'new network'

    About this Feed:
  • News on networking, mobility and voice

    About this Feed:
  • ContentSyndication

    About this Feed:
  • Routing and switching news, advice and technical information

    About this Feed:
  • Wireless networks news, advice and technical information

    About this Feed:
  • Network Security Tactics

    About this Feed:
  • Wide area networks news, advice and technical information

    About this Feed:

Search HR Software

  • SearchHRSoftware RSS

    About this Feed:

Search CIO

  • IT news and analysis for CIOs

    About this Feed:
  • ContentSyndication

    About this Feed:
  • The Data Mill

    About this Feed:
  • Schooled in AI Podcast Feed

    About this Feed:

Search Customer Experience

  • About RSS

    About this Feed:
  • CX news, tech trends and expert opinion

    About this Feed:
Latest TechTarget resources
  • Networking
  • Security
  • CIO
  • HR Software
  • Customer Experience
Search Networking
  • What is a network node?

    A network node is a connection point in a communications network.

  • What is Telnet?

    Telnet is a network protocol used to remotely access a computer for a text-based communication channel between two machines.

  • What are port numbers and how do they work?

    A port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it ...

Search Security
  • What is a certificate authority (CA)?

    A certificate authority (CA) is a trusted entity that issues digital certificates to authenticate content sent from web servers.

  • What is promiscuous mode in networking?

    In computer networking, promiscuous mode is a mode of operation in which a network device, such as a network interface card (NIC)...

  • What is the Twofish encryption algorithm?

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

Search CIO
  • What is a think tank?

    A think tank is an organization that gathers a group of interdisciplinary scholars to perform research around particular policies...

  • What is emotional intelligence (EI)?

    Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior.

  • What are agreed-upon procedures (AUPs)?

    Agreed-upon procedures are a standard a company or client outlines in an engagement letter or other written agreement when it ...

Search HRSoftware
  • What is gamification? How it works and how to use it

    Gamification is a strategy that integrates entertaining and immersive gaming elements into nongame contexts to enhance engagement...

  • What is employee self-service (ESS)?

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • What is DEI? Diversity, equity and inclusion explained

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

Search Customer Experience
  • What is voice of the customer? A guide to VOC Strategy

    Voice of the customer (VOC) is the component of customer experience (CX) that focuses on customer needs, wants, expectations and ...

  • What is high-touch customer service?

    High-touch customer service is a category of contact center interaction that requires human interaction.

  • What is CRM (customer relationship management)?

    CRM (customer relationship management) is the combination of practices, strategies and technologies that companies use to manage ...

  • Browse by Topic
  • Browse Resources
  • About Us
  • Meet The Editors
  • Editorial Ethics Policy
  • Contact Us
  • Advertisers
  • Business Partners
  • Events
  • Media Kit
  • Corporate Site
  • Reprints

All Rights Reserved, Copyright 1999 - 2025, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close