TechTarget Contributor WhatIs.com SearchITOperations distributed cloud 24 Jul 2015 SearchSecurity endpoint security management 21 Jul 2015 WhatIs.com codebase (code base) 17 Jul 2015 SearchMobileComputing NANDroid backup 17 Jul 2015 WhatIs.com hard error 16 Jul 2015 WhatIs.com soft error 16 Jul 2015 WhatIs.com memory read error 16 Jul 2015 WhatIs.com authenticated security scan 14 Jul 2015 WhatIs.com unauthenticated security scan (logged-out secuity scan) 14 Jul 2015 SearchCIO IT leadership (information technology leadership) 10 Jul 2015 WhatIs.com Euler diagram 09 Jul 2015 SearchDataCenter unified computing system (UCS) 09 Jul 2015 WhatIs.com pixel 08 Jul 2015 WhatIs.com IDOV methodology (identify, design, optimize, verify) 08 Jul 2015 WhatIs.com cloud service latency 07 Jul 2015 SearchMobileComputing mobile payment (m-payment) 07 Jul 2015 WhatIs.com electric field strength 03 Jul 2015 WhatIs.com dielectric constant 03 Jul 2015 WhatIs.com serial presence detect (SPD) 02 Jul 2015 SearchSecurity strong cryptography 30 Jun 2015 SearchDataManagement MPP database (massively parallel processing database) 30 Jun 2015 SearchSecurity PCI gap assessment 30 Jun 2015 SearchStorage NAS filer (network-attached storage filer) 30 Jun 2015 TheServerSide.com JDBC driver 30 Jun 2015 WhatIs.com data residency (data sovereignty) 30 Jun 2015 WhatIs.com cloud configuration 29 Jun 2015 SearchDataManagement Apache Giraph 29 Jun 2015 SearchDataManagement CouchDB 29 Jun 2015 SearchSecurity network vulnerability scanning 29 Jun 2015 WhatIs.com gesture recognition 25 Jun 2015 WhatIs.com hotword 25 Jun 2015 WhatIs.com Payment Card Industry (PCI) 23 Jun 2015 SearchStorage QNAP Systems Inc. (Quality Network Appliance Provider Systems Inc.) 23 Jun 2015 WhatIs.com logical interface (LIF) 19 Jun 2015 WhatIs.com personalized search 17 Jun 2015 WhatIs.com Linux Mint 16 Jun 2015 WhatIs.com Let's Encrypt 15 Jun 2015 WhatIs.com OpenPGP 12 Jun 2015 WhatIs.com BYOE (bring your own encryption) 12 Jun 2015 WhatIs.com image metadata 11 Jun 2015 WhatIs.com mount point 10 Jun 2015 WhatIs.com diode 08 Jun 2015 WhatIs.com in-app purchase (IAP) 04 Jun 2015 WhatIs.com SIGINT (signals intelligence) 29 May 2015 WhatIs.com COMINT (communications intelligence) 29 May 2015 WhatIs.com ELINT (electronic intelligence) 29 May 2015 WhatIs.com NAS gateway 27 May 2015 SearchSecurity web server security 21 May 2015 WhatIs.com OpLock (opportunistic lock) 21 May 2015 WhatIs.com Microsoft Edge 19 May 2015 WhatIs.com communication plan 13 May 2015 WhatIs.com memristor 12 May 2015 WhatIs.com electric grid 11 May 2015 WhatIs.com lemniscate 08 May 2015 WhatIs.com Tesla Powerpack 07 May 2015 WhatIs.com rechargeable battery 07 May 2015 WhatIs.com de-anonymization (deanonymization) 06 May 2015 WhatIs.com battery memory effect 05 May 2015 WhatIs.com charge cycle 05 May 2015 WhatIs.com MATLAB 29 Apr 2015 WhatIs.com data exhaust 29 Apr 2015 WhatIs.com data marketplace (data market) 29 Apr 2015 SearchSecurity Common Vulnerabilities and Exposures (CVE) 28 Apr 2015 WhatIs.com Microsoft Project (Microsoft Office Project) 27 Apr 2015 WhatIs.com Space Communications Protocol Specifications (SCPS) 08 Apr 2015 WhatIs.com leaky bucket algorithm 02 Apr 2015 WhatIs.com packet coalescing 01 Apr 2015 WhatIs.com burstiness 31 Mar 2015 WhatIs.com vendor 31 Mar 2015 WhatIs.com attack surface analysis 31 Mar 2015 WhatIs.com public sector 31 Mar 2015 IoT Agenda sensor analytics 30 Mar 2015 WhatIs.com network socket 27 Mar 2015 WhatIs.com behavioral biometrics 26 Mar 2015 WhatIs.com National Vulnerability Database (NVD) 26 Mar 2015 WhatIs.com float (project float, slack) 25 Mar 2015 WhatIs.com cone of uncertainty 21 Mar 2015 WhatIs.com constraint (project constraint) 19 Mar 2015 WhatIs.com what if scenario analysis (WISA) 18 Mar 2015 WhatIs.com WIPS (wireless intrusion prevention system) 09 Mar 2015 SearchSecurity single-factor authentication (SFA) 02 Mar 2015 SearchEnterpriseDesktop external drive enclosure (disk enclosure, disk caddy, drive caddy) 02 Mar 2015 WhatIs.com NGO (non-governmental organization) 27 Feb 2015 WhatIs.com headless Android 27 Feb 2015 WhatIs.com due diligence 25 Feb 2015 WhatIs.com Capex (capital expenditure) 24 Feb 2015 SearchEnterpriseDesktop disk analyzer 23 Feb 2015 WhatIs.com IS (information system or information services) 23 Feb 2015 SearchCustomerExperience big data CRM (big data customer relationship management) 20 Feb 2015 IoT Agenda embedded device hacking 19 Feb 2015 IoT Agenda embedded firmware 19 Feb 2015 IoT Agenda embedded software 19 Feb 2015 WhatIs.com greedy algorithm 18 Feb 2015 WhatIs.com object recognition 16 Feb 2015 SearchSecurity knowledge-based authentication (KBA) 13 Feb 2015 WhatIs.com strong authentication 12 Feb 2015 WhatIs.com capacitor (capacitance) 09 Feb 2015 WhatIs.com just-in-time manufacturing (JIT manufacturing) 30 Jan 2015 WhatIs.com tilde 29 Jan 2015 WhatIs.com critical path method (CPM) 29 Jan 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25