Browse Definitions :

Write for us!

Have knowledge to share? Want to advance your career? Write for us! 

WhatIs.com is a self-education tool about information technology with over 10,000 terms and resources available. A TechTarget-owned website, WhatIs.com provides our visitors with in-depth, problem-solving technical content. The majority of our content is written by staff and industry thought leaders, but we always have room for contributions from within the enterprise IT community. Become a contributor, promote your personal brand and join our legion of influencers in every major enterprise technology segment.

In this IT encyclopedia, we provide writers with the opportunity to contribute up-and-coming technology definitions by explaining what it is, what it does, how it works, who uses it and why it's important.

To discuss your ideas for contributing or updating a term, please send an email to [email protected].

General Submission Guidelines

What topics can I write about?
When coming up with definition ideas, ask yourself: Would an explanation of this term be beneficial to a wide audience? Is this term still relevant or heavily used? Do I understand the term well enough to translate it into plain English? Are there enough external resources for me to gather information about the term? It also helps to check if the definition already exists on WhatIs.com, or any of the TechTarget websites, and whether it needs to be written from scratch or simply updated.

Can I contribute to a definition that is already published on the site?

Of course! If you see a definition that needs updating or you have important information that would make our readers more informed about the topic, please share it with us.

Are there any guidelines to writing a definition?

The main goal about writing a definition is to answer the six crucial questions:

  1. What is it?
  2. What does it do?
  3. How does it work?
  4. Who uses it?
  5. Why is it important?
  6. Is there anything else I need to know in order to be knowledgeable on the subject?

A more in-depth list of guidelines and tips can be given upon request.

Can I reuse the articles I write for TechTarget ?
Content must be previously unpublished and contributors must agree not to republish the content, except as part of a longer book written primarily by the contributor.

How long should my content be?
While there is no limit to the length of content, we encourage a minimum of 500 words. We have found 500 - 1000 words to be the sweet spot for both readability and searchability. If we agree to publish your article, we will send you a writer's agreement that defines our required criteria in more detail. 

What do I get when I write for TechTarget?
If your content is accepted for publication, you will be listed as the contributor for the definition and the opportunity to provide a link. Links can be direct to a LinkedIn profile, company website or a dedicated TechTarget contributor page.

Can I link to my company or organization's website in the content I write?
Links to company-related information and products can be added to your contributor tag.

Can I include links in my article?
As a contributor, you can suggest links but TechTarget editors will have the last call. 

What visibility will I receive?
Your work will be eligible to be featured in a newsletter and promoted across social media.

Can I link to my TechTarget article from other websites?
Links on social media and blogs are a great way to stir up readership and increase visibility. 

Can I respond to comments?
You bet, interaction is always welcome; comments and discussion are indications of great content. 

Can I include photos or videos?
Photos and videos are welcome, but please be sure you have the right to use the material and that you credit your sources.

Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close