Browse Definitions :

Write for us!

Have knowledge to share? Want to advance your career? Write for us! 

WhatIs.com is a self-education tool about information technology with over 10,000 terms and resources available. A TechTarget-owned website, WhatIs.com provides our visitors with in-depth, problem-solving technical content. The majority of our content is written by staff and industry thought leaders, but we always have room for contributions from within the enterprise IT community. Become a contributor, promote your personal brand and join our legion of influencers in every major enterprise technology segment.

In this IT encyclopedia, we provide writers with the opportunity to contribute up-and-coming technology definitions by explaining what it is, what it does, how it works, who uses it and why it's important.

To discuss your ideas for contributing or updating a term, please send an email to [email protected].

General Submission Guidelines

What topics can I write about?
When coming up with definition ideas, ask yourself: Would an explanation of this term be beneficial to a wide audience? Is this term still relevant or heavily used? Do I understand the term well enough to translate it into plain English? Are there enough external resources for me to gather information about the term? It also helps to check if the definition already exists on WhatIs.com, or any of the TechTarget websites, and whether it needs to be written from scratch or simply updated.

Can I contribute to a definition that is already published on the site?

Of course! If you see a definition that needs updating or you have important information that would make our readers more informed about the topic, please share it with us.

Are there any guidelines to writing a definition?

The main goal about writing a definition is to answer the six crucial questions:

  1. What is it?
  2. What does it do?
  3. How does it work?
  4. Who uses it?
  5. Why is it important?
  6. Is there anything else I need to know in order to be knowledgeable on the subject?

A more in-depth list of guidelines and tips can be given upon request.

Can I reuse the articles I write for TechTarget ?
Content must be previously unpublished and contributors must agree not to republish the content, except as part of a longer book written primarily by the contributor.

How long should my content be?
While there is no limit to the length of content, we encourage a minimum of 500 words. We have found 500 - 1000 words to be the sweet spot for both readability and searchability. If we agree to publish your article, we will send you a writer's agreement that defines our required criteria in more detail. 

What do I get when I write for TechTarget?
If your content is accepted for publication, you will be listed as the contributor for the definition and the opportunity to provide a link. Links can be direct to a LinkedIn profile, company website or a dedicated TechTarget contributor page.

Can I link to my company or organization's website in the content I write?
Links to company-related information and products can be added to your contributor tag.

Can I include links in my article?
As a contributor, you can suggest links but TechTarget editors will have the last call. 

What visibility will I receive?
Your work will be eligible to be featured in a newsletter and promoted across social media.

Can I link to my TechTarget article from other websites?
Links on social media and blogs are a great way to stir up readership and increase visibility. 

Can I respond to comments?
You bet, interaction is always welcome; comments and discussion are indications of great content. 

Can I include photos or videos?
Photos and videos are welcome, but please be sure you have the right to use the material and that you credit your sources.

SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • data compliance

    Data compliance is a process that identifies the applicable governance for data protection, security, storage and other ...

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close