Alexander S. Gillis Technical Writer and Editor, TechTarget Search CIO enterprise risk management (ERM) 05 Oct 2023 Search Security risk assessment 05 Oct 2023 Search Security ISO 31000 Risk Management 02 Oct 2023 Search Security voice squatting 02 Oct 2023 Search CIO digital innovation 28 Sep 2023 Search Content Management workflow automation 27 Sep 2023 Search Security principle of least privilege (POLP) 26 Sep 2023 Search Security governance, risk and compliance (GRC) 21 Sep 2023 WhatIs bitcoin mining 19 Sep 2023 Search HRSoftware people analytics (HR analytics) 12 Sep 2023 WhatIs What is Web 3.0 (Web3)? Definition, guide and history 09 Sep 2023 SearchWindows Server Microsoft SCOM (System Center Operations Manager) 22 Aug 2023 Search IoT IoT devices (internet of things devices) 21 Aug 2023 Search HRSoftware competency framework 17 Aug 2023 Search ITOperations Terraform 16 Aug 2023 Search IoT IoT gateway 15 Aug 2023 Search Data Management consumer privacy (customer privacy) 08 Aug 2023 Search Security insecure deserialization 07 Aug 2023 Search IoT industrial internet of things (IIoT) 04 Aug 2023 Search Enterprise Desktop BIOS password 04 Aug 2023 Search Storage quad-level cell NAND (QLC NAND) 02 Aug 2023 WhatIs narrowband IoT (NB-IoT) 01 Aug 2023 Search IoT artificial intelligence of things (AIoT) 28 Jul 2023 Search ITOperations containers (container-based virtualization or containerization) 25 Jul 2023 Search ERP supply chain planning (SCP) 21 Jul 2023 Search Storage NVMe over Fabrics (NVMe-oF) 17 Jul 2023 SearchWindows Server System Restore (Windows) 14 Jul 2023 Search ITOperations server hardware degradation 10 Jul 2023 Search ITOperations Linkerd 05 Jul 2023 Search ITOperations Nagios 05 Jul 2023 Search Security WannaCry ransomware 05 Jul 2023 Search Storage flash storage 30 Jun 2023 Search Storage PCIe SSD (Peripheral Component Interconnect Express solid-state drive) 30 Jun 2023 Search Storage NVMe (non-volatile memory express) 29 Jun 2023 Search Enterprise AI cognitive computing 29 Jun 2023 Search Storage M.2 SSD 28 Jun 2023 Search CIO Hyperledger 13 Jun 2023 WhatIs The impact of AI on social media 08 Jun 2023 Search Networking network performance monitoring (NPM) 02 Jun 2023 Search Software Quality automated testing 02 Jun 2023 WhatIs Direct Memory Access (DMA) 31 May 2023 Search Content Management Power Platform 24 May 2023 Search ITOperations GitOps 24 May 2023 Search Networking frequency band 15 May 2023 Search Mobile Computing remote wipe 15 May 2023 Search Enterprise AI automated reasoning 15 May 2023 Search HRSoftware employee lifecycle 11 May 2023 Search Data Center edge data center 08 May 2023 WhatIs APK file (Android Package Kit file format) 04 May 2023 Search Data Center screen scraping 03 May 2023 Search Networking Synchronous Optical Network (SONET) 02 May 2023 Search ITOperations IT monitoring 28 Apr 2023 Search Enterprise AI cognitive bias 27 Apr 2023 Search Security TrickBot malware 26 Apr 2023 Search Disaster Recovery disaster recovery as a service (DRaaS) 24 Apr 2023 Search ITOperations service discovery 19 Apr 2023 Search ITOperations mutation testing 14 Apr 2023 Search Security Microsoft Defender for Endpoint (formerly Windows Defender ATP) 13 Apr 2023 Search ITOperations application release automation (ARA) 12 Apr 2023 Search Enterprise AI intelligent process automation (IPA) 11 Apr 2023 Search Enterprise AI crypto-agility 11 Apr 2023 Search Cloud Computing Azure Migrate 11 Apr 2023 Search Security intrusion prevention system (IPS) 11 Apr 2023 Search Storage software portability 06 Apr 2023 Search Networking HAProxy 06 Apr 2023 Search Security post-quantum cryptography 05 Apr 2023 Search Security deprovisioning 05 Apr 2023 Search CIO Total Quality Management (TQM) 05 Apr 2023 Search Cloud Computing container registry 31 Mar 2023 Search Software Quality mob programming 30 Mar 2023 Search CIO knowledge-based systems (KBSes) 28 Mar 2023 Search Networking computer network 28 Mar 2023 Search Security three-factor authentication (3FA) 24 Mar 2023 Search CIO project charter 23 Mar 2023 Search Security cyber espionage 23 Mar 2023 Search Customer Experience service level indicator 23 Mar 2023 WhatIs death by PowerPoint 22 Mar 2023 WhatIs Asilomar AI Principles 22 Mar 2023 Search Cloud Computing Microsoft Azure monitoring tools 17 Mar 2023 Search AWS Amazon AI 16 Mar 2023 Search Security YubiKey 15 Mar 2023 Search Cloud Computing CloudOps (cloud operations) 14 Mar 2023 SearchWindows Server Windows event log 14 Mar 2023 Search Enterprise AI lemmatization 13 Mar 2023 Search Mobile Computing wireless distribution system (WDS) 13 Mar 2023 Search Mobile Computing wireless broadband (WiBB) 10 Mar 2023 Search Software Quality end-to-end testing 09 Mar 2023 Search Cloud Computing confidential computing 09 Mar 2023 Search Mobile Computing LTE (Long-Term Evolution) 09 Mar 2023 WhatIs OST file (.ost) 09 Mar 2023 Search Software Quality performance testing 09 Mar 2023 Search Security cyberwarfare 09 Mar 2023 Search ITOperations log analytics 08 Mar 2023 WhatIs FACTA (Fair and Accurate Credit Transactions Act) 08 Mar 2023 Search Cloud Computing virtual private cloud (VPC) 08 Mar 2023 Search Software Quality smoke testing 07 Mar 2023 Search CIO proof of concept (POC) 07 Mar 2023 Search Networking physical layer 07 Mar 2023 WhatIs print server 07 Mar 2023 Search Data Management MongoDB 07 Mar 2023 1 2 3 4 5 6