Search CIO
Login Register
Explore the Network
  • TechTarget Network
  • Cloud Computing
  • Mobile Computing
  • Data Center
  • Sustainability and ESG
  • Search CIO
    • Apps, Infrastructure and Operations
    • CIO Strategy
    • Digital Transformation
    • Risk Management & Governance
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • 2024 IT Salary Survey Results
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

null Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is SOX compliance? A complete guide and checklist
  • What is a chief marketing officer (CMO)?
  • What is regulatory compliance?
  • What is enterprise architecture (EA)?
  • What is conduct risk?
  • 1
  • 2
  • 3
Latest TechTarget resources
  • Cloud Computing
  • Mobile Computing
  • Data Center
  • Sustainability and ESG
Search Cloud Computing
  • Prepare for the CompTIA CloudNetX certification

    Are you ready to advance your career? See if the CloudNex certification is right for you and how it compares to other CompTIA ...

  • Beyond Stargate: Oracle OCI ups cloud infrastructure appeal

    Oracle has struck market-shaking deals with frontier AI model makers, but experts say it has also intensified its challenges to ...

  • Top 10 SaaS Examples and Applications for Businesses

    SaaS vendors offer a variety of products for different industries. Learn about 10 SaaS offerings from vendors for different use ...

Search Mobile Computing
  • Best mobile antivirus software for the enterprise

    Antivirus protection is a built-in feature on most desktop computers, but what about mobile devices? Many smartphones need the ...

  • How to prevent and remove mobile spyware

    Mobile devices can store a lot of data, from sensitive user information to work apps and files. Mobile spyware gives bad actors ...

  • What Android security threats should IT know about?

    IT must understand the nature of the most recent Android security issues to protect users. Learn the current top threats and ...

Search Data Center
  • Increase data center energy efficiency with Linux

    Linux kernel 6.13 introduces adaptive polling, which significantly reduces energy consumption and improves network performance in...

  • Maximizing water recycling in modern data center design

    As water scarcity concerns rise, data centers are attempting to reduce their water footprint by recycling water through ...

  • How to use Vim in Linux

    This tutorial explains basic functions and commands used in Vim to complete simple tasks. Follow along to learn some beginner ...

Sustainability
and ESG
  • ESG podcasts for business leaders to follow

    For business leaders today, staying on top of ESG news and trends is essential. These six podcasts offer expert insights to help ...

  • The social 'S' in ESG: Examples, factors and best practices

    The social factors of ESG have become more prominent over time. Here's what they involve and how companies can address social ...

  • A guide to change management for sustainability

    Organizational change management for sustainability is challenging but possible when framed properly for both leadership and ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close