Kinza Yasar Technical Writer, TechTarget Security security awareness training 12 Oct 2023 Customer Experience Salesforce 11 Oct 2023 Security multifactor authentication 02 Oct 2023 Customer Experience virtual assistant (AI assistant) 02 Oct 2023 Security cyber insurance 29 Sep 2023 Enterprise AI AI prompt 26 Sep 2023 Unified Communications real-time communications (RTC) 22 Sep 2023 Enterprise AI AI prompt engineer 21 Sep 2023 Security governance, risk and compliance (GRC) 21 Sep 2023 CIO IT modernization 15 Sep 2023 WhatIs 7 ways to prevent tech buyer's remorse 08 Sep 2023 Security email security 05 Sep 2023 Data Backup data restore 23 Aug 2023 Security network vulnerability scanning 23 Aug 2023 Security risk analysis 21 Aug 2023 WhatIs Link rot explained: Everything you need to know 10 Aug 2023 IoT Agenda IoT security (internet of things security) 07 Aug 2023 IoT Agenda smart home 01 Aug 2023 IoT Agenda artificial intelligence of things (AIoT) 28 Jul 2023 Storage floating gate transistor (FGT) 26 Jul 2023 Customer Experience customer journey map 25 Jul 2023 Unified Communications cloud telephony (cloud calling) 19 Jul 2023 Security cyber extortion 18 Jul 2023 Storage flash memory card 18 Jul 2023 Enterprise AI Artificial Intelligence as a Service (AIaaS) 14 Jul 2023 WhatIs Pros and cons of cryptocurrency 07 Jul 2023 WhatIs ransomware as a service (RaaS) 07 Jul 2023 Customer Experience voice of the customer (VOC) 30 Jun 2023 Data Center blade server 29 Jun 2023 Enterprise AI cognitive computing 29 Jun 2023 Storage flash memory 28 Jun 2023 Data Center multiprocessing 23 Jun 2023 ITOperations continuous deployment 02 Jun 2023 ITOperations AIOps (artificial intelligence for IT operations) 01 Jun 2023 WhatIs third-party cookie 24 May 2023 App Architecture API security 22 May 2023 WhatIs World's 10 best cities for tech workers 19 May 2023 Mobile Computing telecommuting 11 May 2023 WhatIs network drive 10 May 2023 Security Web application firewall (WAF) 01 May 2023 Disaster Recovery cloud disaster recovery (cloud DR) 28 Apr 2023 Software Quality SQL injection (SQLi) 27 Apr 2023 Mobile Computing smishing (SMS phishing) 25 Apr 2023 Security firewall 19 Apr 2023 SearchAWS Amazon S3 bucket 14 Apr 2023 Networking CDN (content delivery network) 14 Apr 2023 Enterprise AI generative modeling 28 Mar 2023 Networking computer network 28 Mar 2023 WhatIs black box AI 17 Mar 2023 ITOperations IT operations management (ITOM) 16 Mar 2023 WhatIs Microsoft Edge 16 Mar 2023 SearchWindowsServer defragmentation 15 Mar 2023 Enterprise AI image recognition 15 Mar 2023 Security antivirus software (antivirus program) 15 Mar 2023 WhatIs software engineering 14 Mar 2023 WhatIs Google Duplex 14 Mar 2023 Software Quality system testing 14 Mar 2023 Security information security (infosec) 14 Mar 2023 SearchWindowsServer Windows event log 14 Mar 2023 CIO device ID (device identification) 13 Mar 2023 ERP computer numerical control (CNC) 10 Mar 2023 Enterprise AI generative adversarial network (GAN) 09 Mar 2023 Mobile Computing 802.11n 08 Mar 2023 CIO hackathon 08 Mar 2023 Networking network operating system (NOS) 08 Mar 2023 Networking network protocol 08 Mar 2023 WhatIs collaborative robot (cobot) 08 Mar 2023 SearchAWS AWS Partner Network (APN) 07 Mar 2023 Networking virtual server 07 Mar 2023 Networking network switch 07 Mar 2023 IoT Agenda embedded systems programming 06 Mar 2023 WhatIs URN (Uniform Resource Name) 06 Mar 2023 SearchWindowsServer computer system 03 Mar 2023 SearchAWS AWS Network Load Balancer (NLB) 02 Mar 2023 WhatIs hosting (website hosting, web hosting and webhosting) 27 Feb 2023 SearchAWS AWS Management Console 07 Feb 2023 WhatIs IP address (Internet Protocol address) 31 Jan 2023 WhatIs meta description tag 31 Jan 2023 WhatIs Web 2.0 30 Jan 2023 WhatIs 10 best cybersecurity podcasts to check out 25 Jan 2023 Networking load balancing 03 Jan 2023 Unified Communications data transfer rate (DTR) 29 Dec 2022 ITOperations IT automation 27 Dec 2022 WhatIs fully qualified domain name (FQDN) 22 Dec 2022 Customer Experience integration 14 Dec 2022 WhatIs social networking 12 Dec 2022 Security checksum 12 Dec 2022 Networking MAC address (media access control address) 01 Dec 2022 Networking routing table 30 Nov 2022 WhatIs Generalist vs. specialist: What's the difference? 29 Nov 2022 Security pen testing (penetration testing) 18 Nov 2022 Networking control plane (CP) 17 Nov 2022 Enterprise AI PyTorch 16 Nov 2022 SearchSAP SAP SuccessFactors 14 Nov 2022 SearchWindowsServer C 04 Nov 2022 Data Management primary key (primary keyword) 25 Oct 2022 WhatIs command-and-control server (C&C server) 21 Oct 2022 WhatIs email 20 Oct 2022 Security RAT (remote access Trojan) 20 Oct 2022 WhatIs 6 reasons a business impact analysis is important 19 Oct 2022 1 2 3