Alexander S. Gillis Technical Writer and Editor, TechTarget Search Networking secure access service edge (SASE) 13 Jun 2024 Search Networking CIDR (Classless Inter-Domain Routing or supernetting) 13 Jun 2024 Search Customer Experience customer retention 10 Jun 2024 Search ITOperations IT incident management 07 Jun 2024 Search Enterprise AI data splitting 06 Jun 2024 Search Data Management RDBMS (relational database management system) 06 Jun 2024 WhatIs graph database 31 May 2024 Search Data Management database (DB) 28 May 2024 Search ITOperations Zabbix 23 May 2024 Search Security Common Vulnerability Scoring System (CVSS) 15 May 2024 Search App Architecture Remote Procedure Call (RPC) 13 May 2024 Search Business Analytics operational efficiency 10 May 2024 Search App Architecture RESTful API 10 May 2024 Search Data Center technological convergence 09 May 2024 Search Storage logical unit number (LUN) 08 May 2024 Search Enterprise AI facial recognition 03 May 2024 Search Enterprise AI What are graph neural networks (GNNs)? 02 May 2024 Search Security What is role-based access control (RBAC)? 02 May 2024 Search Security What is a potentially unwanted program (PUP)? 02 May 2024 Search Customer Experience chatbot 01 May 2024 Search Security Federal Information Security Modernization Act (FISMA) 01 May 2024 Search Security cloud security posture management (CSPM) 30 Apr 2024 Search Software Quality integrated development environment (IDE) 29 Apr 2024 Search Software Quality fault injection testing 29 Apr 2024 Search Software Quality staging environment 29 Apr 2024 Search HRSoftware succession planning 29 Apr 2024 Cloud Computing Azure Kubernetes Service (AKS) 26 Apr 2024 Search Software Quality DevOps Dojo 25 Apr 2024 Search Software Quality model-driven development 25 Apr 2024 Search Software Quality spike testing 24 Apr 2024 Mobile Computing GPRS (General Packet Radio Service) 24 Apr 2024 WhatIs Bitcoin 22 Apr 2024 Search Unified Communications What is VoIP (voice over Internet Protocol)? 22 Apr 2024 Search Disaster Recovery business continuity 16 Apr 2024 Search Data Management database as a service (DBaaS) 15 Apr 2024 Search HRSoftware core HR (core human resources) 12 Apr 2024 Search Storage storage as a service (STaaS) 11 Apr 2024 Search Security fraud detection 10 Apr 2024 WhatIs Zoom fatigue (virtual meeting fatigue) 10 Apr 2024 Search App Architecture middleware 09 Apr 2024 Search HRSoftware employee retention 01 Apr 2024 Search HRSoftware HR technology (human resources tech) 26 Mar 2024 Search HRSoftware social media recruitment (social media recruiting) 21 Mar 2024 WhatIs augmented reality (AR) 21 Mar 2024 Search Data Management data modeling 19 Mar 2024 Search Storage DRAM (dynamic random access memory) 18 Mar 2024 Search ITOperations continuous delivery (CD) 18 Mar 2024 Search Data Management data engineer 15 Mar 2024 Search ITOperations What is server virtualization? The ultimate guide 13 Mar 2024 Search HRSoftware Betterworks 08 Mar 2024 Search Security phishing 29 Feb 2024 Search ITOperations What is DevOps? Meaning, methodology and guide 23 Feb 2024 Search Security cybersecurity 22 Feb 2024 Search ITOperations hypervisor 20 Feb 2024 Search ITOperations on-demand computing (ODC) 15 Feb 2024 Search Business Analytics data mining 13 Feb 2024 Search CIO robotic process automation (RPA) 12 Feb 2024 Search CIO spatial computing 12 Feb 2024 Search Security keylogger (keystroke logger or system monitor) 07 Feb 2024 WhatIs uncanny valley 06 Feb 2024 WhatIs explainable AI 06 Feb 2024 Search Enterprise AI Retrieval-Augmented Language Model pre-training 30 Jan 2024 Search Networking private 5G 26 Jan 2024 Search Storage cloud SLA (cloud service-level agreement) 24 Jan 2024 Search Networking millimeter wave (mmWave) 23 Jan 2024 Search Networking 5G 23 Jan 2024 Search Content Management semantic network (knowledge graph) 18 Jan 2024 Search Security NIST Cybersecurity Framework 08 Jan 2024 Search ERP Top 10 essential skills for ERP professionals in 2024 03 Jan 2024 WhatIs 5G New Radio (NR) 21 Dec 2023 Search CIO business process outsourcing (BPO) 21 Dec 2023 Search Security CISO (chief information security officer) 19 Dec 2023 WhatIs complex event processing (CEP) 12 Dec 2023 WhatIs logic gate (AND, OR, XOR, NOT, NAND, NOR and XNOR) 11 Dec 2023 WhatIs cyber resilience 05 Dec 2023 Search CIO digital process automation 01 Dec 2023 WhatIs attack surface 01 Dec 2023 Search Networking single-user multiple input, multiple output (SU-MIMO) 01 Dec 2023 Search CIO business process reengineering (BPR) 28 Nov 2023 Search Storage SAN switch (storage area network switch) 20 Nov 2023 Search Data Management 5V's of big data 17 Nov 2023 Search Networking CPRI (Common Public Radio Interface) 15 Nov 2023 Search Virtual Desktop graphics processing unit (GPU) 08 Nov 2023 Search Storage Fibre Channel switch (FC switch) 03 Nov 2023 Search App Architecture What are microservices? Everything you need to know 26 Oct 2023 WhatIs microlearning (microtraining) 24 Oct 2023 Search App Architecture API economy 17 Oct 2023 Search IoT decentralized application (DApp) 16 Oct 2023 Search HRSoftware employee sentiment analysis 16 Oct 2023 Search Security risk appetite 10 Oct 2023 Search CIO blockchain 05 Oct 2023 Search Enterprise AI retrieval-augmented generation 05 Oct 2023 Search CIO enterprise risk management (ERM) 05 Oct 2023 Search Security risk assessment 05 Oct 2023 Search Security ISO 31000 Risk Management 02 Oct 2023 Search Security voice squatting 02 Oct 2023 Search CIO digital innovation 28 Sep 2023 Search Content Management workflow automation 27 Sep 2023 Search Security principle of least privilege (POLP) 26 Sep 2023 Search Security governance, risk and compliance (GRC) 21 Sep 2023 1 2 3 4 5 6