Learn about four distinct filter applications in enterprise computing and how each is used.| WhatIs
This definition explains browser, an application program that provides a way to view and interact with information on the World Wide Web.| WhatIs
Learn how you can use data validation to ensure the applications your organization uses are accessing complete, accurate and properly structured data.| Search Data Management
Get introduced to the five fundamental types of software architecture design worth knowing: Client-server, MVC, event driven, microkernel and microservices.| Search App Architecture
MVC and MVVM are two design patterns for applications that seek to separate front-end interfaces from back-end app components. MVC and MVVM foster componentization, modularity and independent testing. However, each pattern does so in a unique way. Learn about the differences in MVC vs. MVVM here.| Search App Architecture
Development and application management teams can use these five design patterns to assemble a dependably resilient software architecture.| Search App Architecture
Learn about the Waterfall model approach to the software development lifecycle, who uses it, advantages and disadvantages, tools and capabilities.| Search Software Quality
Planning to implement CI/CD? This comprehensive guide explores the stages of a CI/CD pipeline, its pros and cons, best practices and more.| Search Software Quality
Metadata is data that describes other data, providing a structured reference that helps to sort and identify attributes of the information it describes.| WhatIs
This comprehensive guide lays out the fundamentals of enterprise resource planning, its importance, and tips on choosing and implementing ERP products.| Search ERP
Content teams must understand why document version control is crucial for proper storage and collaboration. Discover its pros, cons and how to manage it.| Search Content Management
Deploying enterprise content management software can be daunting. Follow these steps to implement an effective ECM strategy and ensure a smooth rollout.| Search Content Management
Creating an enterprise content tagging taxonomy can improve the findability of items within an organization's content management system. Learn more here.| Search Content Management
Learn what information governance is and why it's important. Examine the different information governance frameworks, laws, regulations and software.| Search CIO
XML (Extensible Markup Language) is a text-based format used to share data on the World Wide Web, intranets and more. See the full XML definition here.| WhatIs
Learn how businesses use Drupal, the free, open source content management system and tools, to build brand awareness and maintain online digital content.| WhatIs
Explore the pros and cons, roles and KPIs involved in digital marketing, which promotes goods and services to consumers through electronic technologies.| Search Customer Experience
In digital asset management, version control differs from the same control in ECM strategies. Learn how DAM systems help marketers track asset versions.| Search Content Management
An enterprise content management certification can help business and IT professionals alike at any stage of their career. Explore the top certifications.| Search Content Management
Workflows are the activities needed to complete a task. Find out about the various types of workflows and how they're created, used, managed and automated.| Search CIO
Every computing device has a user interface where people interact with the device. Learn about the various types of UIs, how they work and how they evolved.| Search App Architecture
SearchAppArchitecture.com provides content that guides software teams on subjects such as software development tooling, existing and emerging architecture styles, API management, development team alignment and translating business goals to software strategy.| www.techtarget.com
This enterprise content management site has news and information on ECM technology, enterprise collaboration and search, information governance, information management, knowledge management and more| www.techtarget.com
AI is rapidly proving its worth when it comes to cybersecurity, especially when it comes to AI pen testing. Learn how AI penetration testing -- aka breach and attack simulation, or BAS -- technologies make pen tests more accurate and free up IT professionals for other cybersecurity tasks.| Search Security
Vulnerability management tools can be an invaluable asset for enterprises. Here's how vulnerability management software works to close security gaps.| Search Security
Agentic AI applications and agent building are gaining traction in enterprises, along with agentic AI governance.| Search Enterprise AI
WhatIs.com delivers in-depth definitions and explainers on IT, cybersecurity, AI, and enterprise tech for business and IT leaders.| www.techtarget.com
Network interruptions and brownouts are among the most persistent and damaging network performance issues, and the average cost of network downtime from them is drastic. Learn five calculations for organizations to assess and prevent lost revenue, employee productivity and customers from brownouts.| Search Networking
Learn what makes an application mission critical vs. business critical, how to avoid mission-critical app failures and the pros and cons of cloud hosting.| Search IT Operations
You've heard of RPO and RTO, but what about RLO? Find out how recovery level objective fits into the overall business continuity process in this tip.| Search Disaster Recovery
Explore the differences between disaster recovery and business continuity and the elements of a DR plan. Discover DR benefits and key providers.| Search Disaster Recovery
Continuous data protection (CDP) is a method of automatic data protection. Learn how it works, how to implement it and how it compares to other methods.| Search Storage
Natural disaster recovery is tailored to help organizations respond and resume business after physical disasters, such as floods, hurricanes and fires.| Search Disaster Recovery
Explore the various types of disasters and learn how to create a DRP. Examine how to test a DRP and explore examples of different DRP scenarios.| Search Disaster Recovery
In computing, a workload is a program or application using computing resources to accomplish tasks. Learn about the types of workloads and how they work.| Search Data Center
Backup scheduling is a key part of data protection. Learn essential elements that go into a schedule and how they improve availability and recovery.| Search Data Backup
Does your backup strategy need improvement? 3-2-1 backup and the cloud are a start, but these eight best practices are indispensable for enterprise backup.| Search Data Backup
Learn how backup storage devices can safely store copies of your company's data on local storage systems, at a remote site or using a cloud backup service.| Search Data Backup
Learn what data backup is, why it matters, types of backups, storage options and best practices for building a secure and reliable backup strategy.| Search Data Backup
IT teams trying to maximize AWS uptime can turn to a variety of tools, but evaluating and testing a BCP are critical steps in the process.| Search AWS
Storage area networks (SANs) connect servers and storage and help pool storage resources. Find out more about SANs, including their architectural components, benefits and drawbacks, vendors and products, and management best practices, with our comprehensive guide| Search Storage
Learn how data redundancy works, its benefits and drawbacks, as well as how it compares to backup and other alternatives.| Search Storage
Don't just assume software can recover from disruptions -- put together a disaster recovery testing plan and test it to make sure. Here's why disaster recovery testing is crucial, the metrics your team and organization should use, and the key criteria of a disaster recovery testing plan.| Search Software Quality
As more organizations attempt to automate DR failover, APIs are beginning to outpace GUI front ends. Here are six tips for utilizing APIs in automated failovers.| Search Disaster Recovery
Patching software is an everyday requirement for most organizations. Discover which software patch testing best practices are the most important.| Search Security
Establishing network perimeter security now requires the use of SDN to achieve deep segmentation. Learn how to put in place a software-defined perimeter.| Search Networking
Change management helps make sure that alterations to critical processes don't cause problems down the road. Learn how it fits into business continuity.| Search Disaster Recovery
This disaster recovery (DR) plan template offers step-by-step procedures to restore disrupted systems and applications to recover quickly from a disaster.| Search Disaster Recovery
A data center fire can be devastating. Learn how to protect your data center through mitigation, detection and suppression techniques.| Search Data Center
ASHRAE's data center temperature and humidity standards help admins determine what the environment of the facility should be for optimal performance.| Search Data Center
Learn how undertaking a business impact analysis might help your organization overcome the effects of an unexpected interruption to critical business systems.| Search Storage
Learn about risk assessments, their goals and how to use a risk assessment matrix. Examine how quantitative and qualitative assessments differ.| Search Security
Business continuity certifications demonstrate an IT professional's expertise in the BCDR field. Check out these six certification options.| Search Disaster Recovery
For organizations planning on building an alternate disaster recovery site, there are several factors to consider. Here are six common requirements.| Search Disaster Recovery
Disaster recovery plans and advice for making them vary widely. Here are some disaster recovery plan best practices that businesses of all types can use.| Search Disaster Recovery
These tips on business continuity and disaster recovery training for employees could be critical to the success of your emergency response plan.| Search Disaster Recovery
A crisis communications plan is critical in a disaster. Download our free template and follow these five tips to make sure your business is covered.| Search Disaster Recovery
Learn about DR sites, which are facilities for recovering/restoring technology infrastructure/operations when a primary data center becomes unavailable.| Search Disaster Recovery
A business continuity plan (BCP) is key to keeping an organization operating during an emergency. Find out why a BCP is important, and the steps involved.| Search Disaster Recovery
Learn about conversion rate optimization, how it benefits businesses by maximizing their existing traffic and how to calculate a conversion rate.| WhatIs
A CRO is a senior executive who manages and mitigates an organization's risks. Learn about a CRO's responsibilities, required skills and salary outlooks.| Search Security
Artificial intelligence (AI) is the ability of machines to perform tasks that typically require human intelligence. Learn about its history, types, real-world examples, and business applications.| Search Enterprise AI
Follow these six phases of the software testing lifecycle -- from requirements analysis to test reporting -- to ensure applications perform as expected.| Search Software Quality
Learn what user acceptance testing is, how it works and the different types of UAT. Also, explore its challenges, best practices and how its performed.| Search Software Quality
Learn the importance of system testing and its various types. Also, explore the phases of system testing and tools used for conducting it.| Search Software Quality
Performance testing evaluates speed, responsiveness and stability of hardware, software and networks under a workload. See types, common metrics and more.| Search Software Quality
See how alpha testing -- which consists of the initial tests that validate whether a product performs properly -- plays an integral role in app development.| Search Software Quality
Testers must prioritize three crucial performance testing objectives. Software quality -- particularly measured with performance metrics -- is often tied to how well a development team analyzes test results, how it defines measurements and the way it designs tests.| Search Software Quality
Explore the underlying concepts behind software architecture scalability strategies, including control over response times and efficient use of hosting resources.| Search App Architecture
The SolarWinds hack exposed government and enterprise networks to hackers through a routine maintenance update to the company's Orion IT management software.| WhatIs
Jenkins is a DevOps tool for continuous integration and delivery workflows. Learn its history, how plugins enhance it, and its advantages and disadvantages.| Search Software Quality
Learn about phase-locked loop (PLL), a closed-loop feedback control system that eliminates frequency and phase differences between output and input signals.| Search Networking
Explore the Nyquist theorem, which underpins all analog-to-digital conversion and is used in digital audio/video to reduce aliasing. See how it works and is used.| WhatIs
Learn how the Model Context Protocol standardizes AI interactions with external data, APIs and services. Explore MCP use cases, architecture and benefits.| Search Enterprise AI
New & Notable| www.techtarget.com
The benefits of RFID are particularly critical in the fashion industry, where responsiveness is the key to success. Here's a look.| Search ERP
RFID tagging involves small devices that use radio frequencies to transfer data, mainly to track and identify objects, animals and people. Read on to explore the history of RFID, RFID tagging system components, standards and regulations, and more.| Search IoT
RFID tagging involves small devices that use radio frequencies to transfer data, mainly to track and identify objects, animals and people. Learn more here.| Search IoT
IoT enables data exchange between interconnected devices. Explore its features, advantages, limitations, frameworks and historical development.| Search IoT
An IT strategic plan details the comprehensive technology-enabled business management processes an organization uses to guide operations. Learn more here.| Search CIO
Learn about podcasting, informative prerecorded talk-radio episodes distributed on the internet to consumers -- also used for marketing and advertising.| Search Unified Communications
Learn how the objectives and key results framework encourages companies to set, share and monitor goals and outcomes in an effective, transparent manner.| Search HR Software
The metaverse is described as the next evolution of the internet. But how is it shaping up and what will it become? Read our in-depth guide to find out.| WhatIs
In this definition, learn about voice recognition, how it works, its common uses and its pros and cons, in addition to examining the history of voice recognition.| Search Customer Experience
Learn what data silos are, how they occur and why they're a problem. Examine several strategies organizations can use to identify and break down data silos.| Search Data Management
News| www.techtarget.com
A perceptron is a simple model of a biological neuron used in an artificial neural network. Learn about its role as a machine learning building block.| WhatIs
Learn how regression in machine learning helps organizations make predictions and sound decisions by revealing the relationships between variables.| Search Enterprise AI
Transformer neutral networks were a key advance in natural language processing. Learn what transformers are, how they work and their role in generative AI.| Search Enterprise AI
Learn about how recurrent neural networks are suited for analyzing sequential data -- such as text, speech and time-series data.| Search Enterprise AI
Learn the inner workings of machine vision and its various types. Explore the use cases for machine vision, and learn what sets it apart from computer vision.| Search Enterprise AI
Learn what generative adversarial networks are and how they're used. Explore the different types of GANs as well as the future of this technology.| Search Enterprise AI
Learn about CNNs, how they work, their applications, and their pros and cons. This definition also covers how CNNs compare to RNNs.| Search Enterprise AI
Learn how a backpropagation algorithm enhances neural networks. Examine how they work, their objectives and their history.| Search Enterprise AI
This definition explains kanban. Learn about what a kanban is, how it works, and about how kanban boards are used. In addition lean about how kanban boards were founded.| WhatIs
Explore just-in-time manufacturing, a production model where items are created only to meet demand, to improve efficiency, cut costs and speed up deliveries.| WhatIs
Various types of technology can collect manufacturing data, and collecting it can benefit companies in various ways. Learn more.| Search ERP
Companies are currently facing pressure to adopt sustainable supply chain practices. Learn steps that can help get there.| Search ERP
Learn how blockchain technology can benefit supply chain management as well as some use cases and downsides.| Search ERP
Value stream mapping provides a roadmap of the steps required to deliver a product or service to market. Find out how it's used to optimize processes.| Search ERP